<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article article-type="research-article" dtd-version="2.3" xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Phys.</journal-id>
<journal-title>Frontiers in Physics</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Phys.</abbrev-journal-title>
<issn pub-type="epub">2296-424X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">1133250</article-id>
<article-id pub-id-type="doi">10.3389/fphy.2023.1133250</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Physics</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Hybrid weighted communication network node importance evaluation method</article-title>
<alt-title alt-title-type="left-running-head">Tian et al.</alt-title>
<alt-title alt-title-type="right-running-head">
<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3389/fphy.2023.1133250">10.3389/fphy.2023.1133250</ext-link>
</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Tian</surname>
<given-names>Gan</given-names>
</name>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Yang</surname>
<given-names>Xinzhi</given-names>
</name>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
<uri xlink:href="https://loop.frontiersin.org/people/1837831/overview"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Li</surname>
<given-names>Yaxiong</given-names>
</name>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Yang</surname>
<given-names>Zhengwei</given-names>
</name>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Chen</surname>
<given-names>Gong</given-names>
</name>
</contrib>
</contrib-group>
<aff>
<institution>Xi&#x2019;an Research Institute of High Technology</institution>, <addr-line>Xi&#x2019;an</addr-line>, <addr-line>Shaanxi</addr-line>, <country>China</country>
</aff>
<author-notes>
<fn fn-type="edited-by">
<p>
<bold>Edited by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1930716/overview">Jiang Zhu</ext-link>, Netskope Inc., United States</p>
</fn>
<fn fn-type="edited-by">
<p>
<bold>Reviewed by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/101109/overview">Chengyi Xia</ext-link>, Tiangong University, China</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1769126/overview">Fei Xiong</ext-link>, Beijing Jiaotong University, China</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1980753/overview">Zhenjiang Zhang</ext-link>, Beijing Jiaotong University, China</p>
</fn>
<corresp id="c001">&#x2a;Correspondence: Xinzhi Yang, <email>2823129411@qq.com</email>
</corresp>
</author-notes>
<pub-date pub-type="epub">
<day>19</day>
<month>06</month>
<year>2023</year>
</pub-date>
<pub-date pub-type="collection">
<year>2023</year>
</pub-date>
<volume>11</volume>
<elocation-id>1133250</elocation-id>
<history>
<date date-type="received">
<day>28</day>
<month>12</month>
<year>2022</year>
</date>
<date date-type="accepted">
<day>17</day>
<month>04</month>
<year>2023</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#xa9; 2023 Tian, Yang, Li, Yang and Chen.</copyright-statement>
<copyright-year>2023</copyright-year>
<copyright-holder>Tian, Yang, Li, Yang and Chen</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p>
</license>
</permissions>
<abstract>
<p>Communication networks are used as an important guarantee for information interaction and efficient collaboration within many fields and systems; however, under information technology conditions, the destruction of a number of nodes in a network may have a great impact on the overall operation of the network. Therefore, it is important to accurately determine the critical nodes in the network to enhance the network&#x2019;s resistance to destruction. Combining the characteristic attributes of the communication network, a node contribution evaluation matrix is proposed based on the efficiency matrix, from the perspective of node receiving information; a node value evaluation matrix is proposed from the perspective of a node providing information to neighboring nodes, and node importance is calculated by integrating the evaluation results of the two matrices and the node&#x2019;s own attributes. The algorithm is suitable for directed-weighted network node value evaluation, and the effectiveness and accuracy of the algorithm are verified by comparing other algorithms for a small-scale network. In further experimental validation, a hybrid weighted communication network evolution model based on organizational structured networks is proposed, and networks of different sizes are generated for experimental simulation. The results show that when nodes with high importance are removed from the network, they can cause a rapid decrease in the network efficiency and maximum connectivity, confirming the accuracy of the algorithm in evaluating the importance of nodes and identifying critical nodes in the network.</p>
</abstract>
<kwd-group>
<kwd>communication networks</kwd>
<kwd>directed-weighted network</kwd>
<kwd>node importance</kwd>
<kwd>evaluation matrix</kwd>
<kwd>network destruction resistance</kwd>
<kwd>vulnerabilities</kwd>
</kwd-group>
<custom-meta-wrap>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Social Physics</meta-value>
</custom-meta>
</custom-meta-wrap>
</article-meta>
</front>
<body>
<sec id="s1">
<title>1 Introduction</title>
<p>Following the rapid development of information technology, communication networks have become an indispensable and important part of many systems and fields [<xref ref-type="bibr" rid="B1">1</xref>, <xref ref-type="bibr" rid="B2">2</xref>]. A communication network refers to a complex network with topology and specific functions and is composed of multiple nodes with information transmission functions that are interconnected by communication links. The communication network is the basis for information transmission, close collaboration, and efficient cooperation among the components within the system [<xref ref-type="bibr" rid="B3">3</xref>, <xref ref-type="bibr" rid="B4">4</xref>]. Differences in hierarchical relationships, location effects, and information interaction capabilities of the nodes in a communication network result in nodes having different values and varying influence on the whole network [<xref ref-type="bibr" rid="B5">5</xref>&#x2013;<xref ref-type="bibr" rid="B7">7</xref>]. Evaluating the importance of nodes in communication networks, detecting critical nodes in the network, and protecting them are important for improving networks&#x2019; resilience to damage [<xref ref-type="bibr" rid="B8">8</xref>].</p>
<p>At present, evaluating the importance of network nodes is generally based on complex network theory, mainly focusing on the study of undirected and unweighted networks, while results from the study of directed-weighted networks are rare [<xref ref-type="bibr" rid="B9">9</xref>&#x2013;<xref ref-type="bibr" rid="B13">13</xref>]. The connection between communication network nodes represents a link for information transmission and defines the direction of information flow; the strength of information interaction between nodes; and the connectivity of communication links, transmission rate, communication capacity, and other various indicators [<xref ref-type="bibr" rid="B14">14</xref>, <xref ref-type="bibr" rid="B15">15</xref>]. This causes specificity of the connected edges between nodes, which need to be assigned different weights for consideration; therefore, evaluation methods in undirected and unweighted networks cannot be simply applied to communication networks.</p>
<p>[<xref ref-type="bibr" rid="B16">16</xref>] proposed the DWCN_NodeRank metric to evaluate the importance of nodes in directed-weighted networks from the perspective of information transmission based on the idea of the PageRank algorithm. However, the algorithm was not well-distinguished for partial nodes and it converged slowly, making it difficult to guarantee accuracy. Wang et al. [<xref ref-type="bibr" rid="B17">17</xref>] constructed multiple influence matrices for directed-weighted networks; however, the algorithm needed to calculate both the shortest path and the number of path entries between nodes, making it highly time-consuming, complex, and difficult to apply to large-scale networks. Ma et al. [<xref ref-type="bibr" rid="B3">3</xref>] introduced a mutual information (MI) algorithm [<xref ref-type="bibr" rid="B18">18</xref>] to communication networks to measure node importance; however, the algorithm did not take the mutual influence between non-adjacent nodes into account, while the consideration of edge weights was neglected in the calculation process and the measured results were unconvincing. The literature [<xref ref-type="bibr" rid="B19">19</xref>&#x2013;<xref ref-type="bibr" rid="B22">22</xref>] used a node importance contribution matrix and a network efficiency matrix to evaluate the value of nodes; however, the former only considered the influence between neighboring nodes, while the latter ignored the weakening effect of intermediate nodes on information transmission when considering the interaction between non-adjacent nodes, and both did not take the directedness of the network into account.</p>
<p>In this article, complex network theory is used to evaluate the importance of nodes in communication networks. To address the problem that most current node importance evaluation algorithms are not applicable to directed-weighted networks, we combine the characteristics of communication networks and, first, complete the construction of a topological model of a communication network. Second, considering the directedness of the network, the importance of nodes in the network is divided into the importance of receiving information from other nodes and the importance generated by providing information to adjacent nodes. From the above two different perspectives, CEM and VEM are proposed to measure the node importance. Finally, a hybrid weighted communication network evolution model based on OSN is proposed to determine the characteristics of communication network hierarchy, and experimental simulations are performed in the model to verify the effectiveness of the algorithm.</p>
</sec>
<sec id="s2">
<title>2 Communication network and its node importance</title>
<sec id="s2-1">
<title>2.1 Communication network topology model construction</title>
<p>In communication networks, information transmission between nodes occurs both bidirectionally and unidirectionally, and the weights of two edges in bidirectional communication transmission may not be the same. Based on this, the communication network is abstracted as a hybrid weighted network with both undirected and directed edges [<xref ref-type="bibr" rid="B3">3</xref>].</p>
<p>For the convenience of research, the bidirectional link in the communication network, i.e., the undirected edges in the network, is transformed into two directed edges with opposite directions, thus transforming the hybrid weighted network into a directed-weighted network with only directed edges. The weights of communication links represent the flow of information transmitted between nodes, so the principle of similar weights is used [<xref ref-type="bibr" rid="B23">23</xref>], i.e., the larger the weight, the stronger the connection between nodes. On this basis, the nodes in the network can then be studied using a directed-weighted network node importance assessment method.</p>
<p>In the directed-weighted network model, <inline-formula id="inf1">
<mml:math id="m1">
<mml:mrow>
<mml:mi>G</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi mathvariant="bold-italic">V</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="bold-italic">E</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="bold-italic">W</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, where <inline-formula id="inf2">
<mml:math id="m2">
<mml:mrow>
<mml:mi mathvariant="bold-italic">V</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="{" close="}" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mo>&#x22ef;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is the set of nodes in the network, the number of nodes is <italic>n</italic>, <inline-formula id="inf3">
<mml:math id="m3">
<mml:mrow>
<mml:mi mathvariant="bold-italic">E</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="{" close="}" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mo>&#x22ef;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mi>m</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is the set of directed edges with the number of edges <italic>m</italic>, <inline-formula id="inf4">
<mml:math id="m4">
<mml:mrow>
<mml:mi mathvariant="bold-italic">W</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#xd7;</mml:mo>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the edge weight matrix, and if there exists a directed edge pointing from node <inline-formula id="inf5">
<mml:math id="m5">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> to node <inline-formula id="inf6">
<mml:math id="m6">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, then <inline-formula id="inf7">
<mml:math id="m7">
<mml:mrow>
<mml:msub>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> denotes the weight of the edge, and if not, then <inline-formula id="inf8">
<mml:math id="m8">
<mml:mrow>
<mml:msub>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>. The node strength can be divided into in-strength <inline-formula id="inf9">
<mml:math id="m9">
<mml:mrow>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> and out-strength <inline-formula id="inf10">
<mml:math id="m10">
<mml:mrow>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mi>o</mml:mi>
<mml:mi>u</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>. <inline-formula id="inf11">
<mml:math id="m11">
<mml:mrow>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is the sum of the weights of all edges pointing to node <inline-formula id="inf12">
<mml:math id="m12">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, which can be obtained by summing the <italic>i</italic>th column of <inline-formula id="inf13">
<mml:math id="m13">
<mml:mrow>
<mml:mi mathvariant="bold-italic">W</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf14">
<mml:math id="m14">
<mml:mrow>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mi>o</mml:mi>
<mml:mi>u</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is the sum of the weights of edges connected from node <inline-formula id="inf15">
<mml:math id="m15">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, which can be obtained by summing the <italic>i</italic>th row of <inline-formula id="inf16">
<mml:math id="m16">
<mml:mrow>
<mml:mi mathvariant="bold-italic">W</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>. The total strength of the nodes is <inline-formula id="inf17">
<mml:math id="m17">
<mml:mrow>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mi>o</mml:mi>
<mml:mi>u</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>. The connectivity of nodes in a network is usually represented by the adjacency matrix <inline-formula id="inf18">
<mml:math id="m18">
<mml:mrow>
<mml:mi mathvariant="bold-italic">A</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#xd7;</mml:mo>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, which can be regarded as a mapping of the edge weight matrix <inline-formula id="inf19">
<mml:math id="m19">
<mml:mrow>
<mml:mi mathvariant="bold-italic">W</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>. When <inline-formula id="inf20">
<mml:math id="m20">
<mml:mrow>
<mml:msub>
<mml:mi>W</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is not 0, there exists a directed edge <inline-formula id="inf21">
<mml:math id="m21">
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> pointing from <inline-formula id="inf22">
<mml:math id="m22">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> to <inline-formula id="inf23">
<mml:math id="m23">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, then <inline-formula id="inf24">
<mml:math id="m24">
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, and <italic>vice versa</italic>, <inline-formula id="inf25">
<mml:math id="m25">
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>. In a directed network, <inline-formula id="inf26">
<mml:math id="m26">
<mml:mrow>
<mml:mi mathvariant="bold-italic">A</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> is not always a symmetric matrix, i.e., <inline-formula id="inf27">
<mml:math id="m27">
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is not necessarily equal to <inline-formula id="inf28">
<mml:math id="m28">
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>. Summing the <italic>i</italic>th row of the adjacency matrix <inline-formula id="inf29">
<mml:math id="m29">
<mml:mrow>
<mml:mi mathvariant="bold-italic">A</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> represents the out-degree <inline-formula id="inf30">
<mml:math id="m30">
<mml:mrow>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>o</mml:mi>
<mml:mi>u</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> of node <inline-formula id="inf31">
<mml:math id="m31">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and summing the <italic>i</italic>th column of A represents the in-degree <inline-formula id="inf32">
<mml:math id="m32">
<mml:mrow>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> of node <inline-formula id="inf33">
<mml:math id="m33">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
</sec>
<sec id="s2-2">
<title>2.2 Related metrics</title>
<p>Based on the network model constructed above and considering the operational characteristics of the communication network [<xref ref-type="bibr" rid="B15">15</xref>, <xref ref-type="bibr" rid="B24">24</xref>, <xref ref-type="bibr" rid="B25">25</xref>], the following definitions are given to measure the individual nodes in the network as well as the network globally.</p>
<sec id="s2-2-1">
<title>2.2.1 Node importance metrics</title>
<p>
<bold>Metric 1:</bold> Node efficiency <inline-formula id="inf34">
<mml:math id="m34">
<mml:mrow>
<mml:msub>
<mml:mi>I</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> [<xref ref-type="bibr" rid="B15">15</xref>]. The average of the sum of the inverse of the distances from a node to other nodes in the network can be calculated as:<disp-formula id="e1">
<mml:math id="m35">
<mml:mrow>
<mml:msub>
<mml:mi>I</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mn>1</mml:mn>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>&#x2260;</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mi>n</mml:mi>
</mml:munderover>
</mml:mstyle>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(1)</label>
</disp-formula>where <inline-formula id="inf35">
<mml:math id="m36">
<mml:mrow>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the shortest path distance from node <inline-formula id="inf36">
<mml:math id="m37">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> to node <inline-formula id="inf37">
<mml:math id="m38">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>. In a weighted network, the closeness of node connections is measured by the weights of the edges between nodes, and, based on the principle of similar weights, the node distance is the minimum value of the sum of the inverse of the weights of the edges contained in the node path; the calculation for which is as follows:<disp-formula id="e2">
<mml:math id="m39">
<mml:mrow>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>min</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:msub>
<mml:mi>j</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x2b;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:msub>
<mml:mi>j</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:msub>
<mml:mi>j</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x2b;</mml:mo>
<mml:mo>&#x22ef;</mml:mo>
<mml:mo>&#x2b;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:msub>
<mml:mi>j</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(2)</label>
</disp-formula>where <inline-formula id="inf38">
<mml:math id="m40">
<mml:mrow>
<mml:msub>
<mml:mi>j</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>j</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mo>&#x22ef;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>j</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> denote the intermediate nodes through the path from node <inline-formula id="inf39">
<mml:math id="m41">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> to node <inline-formula id="inf40">
<mml:math id="m42">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>. If there is no path between nodes <inline-formula id="inf41">
<mml:math id="m43">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf42">
<mml:math id="m44">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, then <inline-formula id="inf43">
<mml:math id="m45">
<mml:mrow>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2192;</mml:mo>
<mml:mi>&#x221e;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>. Node efficiency reflects the difficulty of nodes to transmit information to other nodes in the network as well as the contribution of nodes to network information transmission. The larger the value of node efficiency, the greater the role played by nodes in network information transmission.</p>
<p>
<bold>Metric 2:</bold> DWCN_NodeRank (NR). Zhang et al. [<xref ref-type="bibr" rid="B16">16</xref>] proposed the NR method, an evaluation metric for the importance of nodes in directed-weighted network; the <inline-formula id="inf44">
<mml:math id="m46">
<mml:mrow>
<mml:mi>N</mml:mi>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> value of a node is calculated as follows:<disp-formula id="e3">
<mml:math id="m47">
<mml:mrow>
<mml:mi>N</mml:mi>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c3;</mml:mi>
</mml:mrow>
<mml:mi>n</mml:mi>
</mml:mfrac>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3c3;</mml:mi>
<mml:mrow>
<mml:munder>
<mml:mstyle displaystyle="true">
<mml:mo>&#x2211;</mml:mo>
</mml:mstyle>
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x2208;</mml:mo>
<mml:msub>
<mml:mi>V</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:munder>
<mml:mfrac>
<mml:mrow>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:msub>
<mml:mi>k</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:msubsup>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>z</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mi>N</mml:mi>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(3)</label>
</disp-formula>where <inline-formula id="inf45">
<mml:math id="m48">
<mml:mrow>
<mml:mi>&#x3c3;</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mo>&#x3c;</mml:mo>
<mml:mi>&#x3c3;</mml:mi>
<mml:mo>&#x3c;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is the damping coefficient, which indicates the resistance to continue propagation when the information flow reaches a node. The larger the damping coefficient, the greater the benefit of the information flow to the node. <inline-formula id="inf46">
<mml:math id="m49">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x2208;</mml:mo>
<mml:msub>
<mml:mi>V</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is the incoming node of node <inline-formula id="inf47">
<mml:math id="m50">
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>. <inline-formula id="inf48">
<mml:math id="m51">
<mml:mrow>
<mml:msubsup>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:msub>
<mml:mi>k</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:msubsup>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>z</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> denotes the sum of all the connected edge weights with node <inline-formula id="inf49">
<mml:math id="m52">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> as the source node, i.e., the out-strength <inline-formula id="inf50">
<mml:math id="m53">
<mml:mrow>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mi>o</mml:mi>
<mml:mi>u</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> of node <inline-formula id="inf51">
<mml:math id="m54">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>.The <inline-formula id="inf52">
<mml:math id="m55">
<mml:mrow>
<mml:mi>N</mml:mi>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> value is calculated by the iterative method, which is related to the in-degree of the node and the proportion of the node to the out-strength of the source node; the larger the <inline-formula id="inf53">
<mml:math id="m56">
<mml:mrow>
<mml:mi>N</mml:mi>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> value, the more important the node is in the network.</p>
</sec>
<sec id="s2-2-2">
<title>2.2.2 Network global efficiency metrics</title>
<p>
<bold>Metric 3:</bold> Maximum connectivity <inline-formula id="inf54">
<mml:math id="m57">
<mml:mrow>
<mml:mi>C</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> [<xref ref-type="bibr" rid="B24">24</xref>]. The ratio of the number of nodes contained in the maximum connected subgraph to the total number of network nodes in the directed graph network is called the maximum connectivity, and can be calculated as:<disp-formula id="e4">
<mml:math id="m58">
<mml:mrow>
<mml:mi>C</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>max</mml:mi>
<mml:mrow>
<mml:mfenced open="&#x2016;" close="&#x2016;" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>Z</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
<mml:mi>n</mml:mi>
</mml:mfrac>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(4)</label>
</disp-formula>where <inline-formula id="inf55">
<mml:math id="m59">
<mml:mrow>
<mml:msub>
<mml:mi>Z</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x2208;</mml:mo>
<mml:mi>G</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> denotes a connected subgraph in the network, where a connected path exists between any nodes in the subgraph. <inline-formula id="inf56">
<mml:math id="m60">
<mml:mrow>
<mml:mi>max</mml:mi>
<mml:mrow>
<mml:mfenced open="&#x2016;" close="&#x2016;" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>Z</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> denotes the number of nodes in the maximum connectivity subgraph of the network and the maximum connectivity <inline-formula id="inf57">
<mml:math id="m61">
<mml:mrow>
<mml:mi>C</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mfenced open="" close="]" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="(" close="" separators="|">
<mml:mrow>
<mml:mn>0,1</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> reflects the difficulty of information transmission in the network. When <inline-formula id="inf58">
<mml:math id="m62">
<mml:mrow>
<mml:mi>C</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula> the network is fully connected.</p>
<p>
<bold>Metric 4:</bold> Network efficiency <inline-formula id="inf59">
<mml:math id="m63">
<mml:mrow>
<mml:mi>E</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> [<xref ref-type="bibr" rid="B25">25</xref>]. The average of the summation of the inverse of the distances of all nodes in the network represents the efficiency of the entire network and is calculated as follows:<disp-formula id="e5">
<mml:math id="m64">
<mml:mrow>
<mml:mi>E</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:munder>
<mml:mstyle displaystyle="true">
<mml:mo>&#x2211;</mml:mo>
</mml:mstyle>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x2260;</mml:mo>
<mml:mi>j</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mi mathvariant="bold-italic">V</mml:mi>
</mml:mrow>
</mml:munder>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:math>
<label>(5)</label>
</disp-formula>
</p>
<p>The higher the efficiency of the network, the smoother the transmission of information in the network and the stronger the connectivity of the network.</p>
</sec>
</sec>
</sec>
<sec id="s3">
<title>3 Node importance evaluation method based on importance evaluation matrix</title>
<p>In complex communication networks, nodes interact with each other through paths composed of directed edges to complete an information interaction. The variability of node connectivity in the network and the fact that the edges connecting nodes have different weights and directions cause the strength of interaction between different nodes and their contribution to the overall information flow efficiency of the network to be strong or weak. The node importance contribution matrix [<xref ref-type="bibr" rid="B20">20</xref>] mainly describes the contribution of nodes to adjacent nodes without taking the interaction effects between non-adjacent nodes into account, and it is only researched for undirected networks. The efficiency matrix [<xref ref-type="bibr" rid="B22">22</xref>] takes the influence of non-adjacent nodes through the shortest path between nodes into account. However, this method just considers the influence of the nodes in the shortest path on network information transmission and only for undirected networks.</p>
<p>In this article, we believe that the importance of nodes in the process of information transmission in the network is mainly reflected in two aspects: one is the contribution value from other nodes in the network. In a directed network, when there exists a path from node <inline-formula id="inf60">
<mml:math id="m65">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> to node <inline-formula id="inf61">
<mml:math id="m66">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, information can be transmitted through node <inline-formula id="inf62">
<mml:math id="m67">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> to node <inline-formula id="inf63">
<mml:math id="m68">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, and node <inline-formula id="inf64">
<mml:math id="m69">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> can be considered to make a contribution to node <inline-formula id="inf65">
<mml:math id="m70">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>. Therefore, the contribution of all nodes in the network to <inline-formula id="inf66">
<mml:math id="m71">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> can be used to evaluate the importance of node <inline-formula id="inf67">
<mml:math id="m72">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>. However, it is not comprehensive enough to use only the contribution degree of other nodes as the basis of measurement. In a directed communication network, there are some nodes which in-degree are 0, and these nodes do not receive information from other nodes, such as from some sub-nodes located at the bottom of the intelligence reconnaissance network. These nodes only transmit information to the higher-level nodes and do not receive information from other nodes; all nodes in the network do not contribute to this node and it is difficult to distinguish the importance of such nodes by only using the above method [<xref ref-type="bibr" rid="B26">26</xref>, <xref ref-type="bibr" rid="B27">27</xref>]. Therefore, we believe that another aspect that reflects the importance of a node lies in its ability to provide information to its neighboring nodes. When the amount of information provided by node <inline-formula id="inf68">
<mml:math id="m73">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> to its neighboring nodes is greater, the node is more important.</p>
<p>In this article, CEM and VEM are proposed to measure the value of nodes in the above two aspects in directed-weighted networks.</p>
</sec>
<sec id="s4">
<title>4 Node contribution evaluation matrix (CEM)</title>
<p>For directed-weighted networks, the transmission efficiency between nodes forms the network efficiency matrix <inline-formula id="inf69">
<mml:math id="m74">
<mml:mrow>
<mml:mi mathvariant="bold-italic">E</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#xd7;</mml:mo>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, where <inline-formula id="inf70">
<mml:math id="m75">
<mml:mrow>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:math>
</inline-formula> is the information transmission efficiency between node <inline-formula id="inf71">
<mml:math id="m76">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and node <inline-formula id="inf72">
<mml:math id="m77">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>. The traditional efficiency matrix does not consider the influence of intermediate nodes contained in the information transmission path on the transmission efficiency, so we redefine the transmission efficiency matrix <inline-formula id="inf73">
<mml:math id="m78">
<mml:mrow>
<mml:mtext>EN</mml:mtext>
</mml:mrow>
</mml:math>
</inline-formula> as follows:<disp-formula id="e6">
<mml:math id="m79">
<mml:mrow>
<mml:mtext mathvariant="bold-italic">EN</mml:mtext>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mtable columnalign="center">
<mml:mtr>
<mml:mtd>
<mml:mn>0</mml:mn>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mn>12</mml:mn>
</mml:msub>
<mml:msup>
<mml:mi>&#x3b1;</mml:mi>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mn>12</mml:mn>
</mml:msub>
</mml:msup>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mo>&#x22ef;</mml:mo>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:msup>
<mml:mi>&#x3b1;</mml:mi>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
</mml:msup>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mn>21</mml:mn>
</mml:msub>
<mml:msup>
<mml:mi>&#x3b1;</mml:mi>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mn>21</mml:mn>
</mml:msub>
</mml:msup>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mn>0</mml:mn>
</mml:mtd>
<mml:mtd>
<mml:mo>&#x22ef;</mml:mo>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:msup>
<mml:mi>&#x3b1;</mml:mi>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
</mml:msup>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mo>&#x22ee;</mml:mo>
</mml:mtd>
<mml:mtd>
<mml:mo>&#x22ee;</mml:mo>
</mml:mtd>
<mml:mtd>
<mml:mo>&#x22f1;</mml:mo>
</mml:mtd>
<mml:mtd>
<mml:mo>&#x22ee;</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:msup>
<mml:mi>&#x3b1;</mml:mi>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:msup>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:msup>
<mml:mi>&#x3b1;</mml:mi>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
</mml:msup>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mo>&#x22ef;</mml:mo>
</mml:mtd>
<mml:mtd>
<mml:mn>0</mml:mn>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(6)</label>
</disp-formula>where <inline-formula id="inf74">
<mml:math id="m80">
<mml:mrow>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the number of intermediate nodes contained in the shortest path from node <inline-formula id="inf75">
<mml:math id="m81">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> to node <inline-formula id="inf76">
<mml:math id="m82">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>. <inline-formula id="inf77">
<mml:math id="m83">
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mo>&#x3c;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>&#x3c;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is the fading rate, which indicates the amount of information remaining when the message continues to propagate backward through each intermediate node. <inline-formula id="inf78">
<mml:math id="m84">
<mml:mrow>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:msup>
<mml:mi>&#x3b1;</mml:mi>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula> is used to denote the transmission efficiency of information from node <inline-formula id="inf79">
<mml:math id="m85">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> to node <inline-formula id="inf80">
<mml:math id="m86">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>. The higher the transmission efficiency, the smoother the information transmission from node <inline-formula id="inf81">
<mml:math id="m87">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> to node <inline-formula id="inf82">
<mml:math id="m88">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>. Each row of the efficiency matrix <inline-formula id="inf83">
<mml:math id="m89">
<mml:mrow>
<mml:mtext>EN</mml:mtext>
</mml:mrow>
</mml:math>
</inline-formula> is multiplied with the total strength of the corresponding node to obtain the CEM as follows:<disp-formula id="e7">
<mml:math id="m90">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">H</mml:mi>
<mml:mtext>CEM</mml:mtext>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mtable columnalign="center">
<mml:mtr>
<mml:mtd>
<mml:mn>0</mml:mn>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mn>12</mml:mn>
</mml:msub>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:msup>
<mml:mi>&#x3b1;</mml:mi>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mn>12</mml:mn>
</mml:msub>
</mml:msup>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mo>&#x22ef;</mml:mo>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:msup>
<mml:mi>&#x3b1;</mml:mi>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
</mml:msup>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mn>21</mml:mn>
</mml:msub>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:msup>
<mml:mi>&#x3b1;</mml:mi>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mn>21</mml:mn>
</mml:msub>
</mml:msup>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mn>0</mml:mn>
</mml:mtd>
<mml:mtd>
<mml:mo>&#x22ef;</mml:mo>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:msup>
<mml:mi>&#x3b1;</mml:mi>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
</mml:msup>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mo>&#x22ee;</mml:mo>
</mml:mtd>
<mml:mtd>
<mml:mo>&#x22ee;</mml:mo>
</mml:mtd>
<mml:mtd>
<mml:mo>&#x22f1;</mml:mo>
</mml:mtd>
<mml:mtd>
<mml:mo>&#x22ee;</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:msup>
<mml:mi>&#x3b1;</mml:mi>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:msup>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:msup>
<mml:mi>&#x3b1;</mml:mi>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
</mml:msup>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mo>&#x22ef;</mml:mo>
</mml:mtd>
<mml:mtd>
<mml:mn>0</mml:mn>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(7)</label>
</disp-formula>where <inline-formula id="inf84">
<mml:math id="m91">
<mml:mrow>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:msup>
<mml:mi>&#x3b1;</mml:mi>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula> is the contribution of node <inline-formula id="inf85">
<mml:math id="m92">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> to node <inline-formula id="inf86">
<mml:math id="m93">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, which is influenced by the strength of the source node and the transmission efficiency. After obtaining the CEM, the contribution importance of the node <inline-formula id="inf87">
<mml:math id="m94">
<mml:mrow>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mrow>
<mml:mi>C</mml:mi>
<mml:mi>E</mml:mi>
<mml:mi>M</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> can be obtained by calculating the contribution of all nodes in the network as follows:<disp-formula id="e8">
<mml:math id="m95">
<mml:mrow>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mrow>
<mml:mi>C</mml:mi>
<mml:mi>E</mml:mi>
<mml:mi>M</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>&#x2260;</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mi>n</mml:mi>
</mml:munderover>
</mml:mstyle>
<mml:mrow>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:msup>
<mml:mi>&#x3b1;</mml:mi>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:msup>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(8)</label>
</disp-formula>
</p>
<p>A larger value of node <inline-formula id="inf88">
<mml:math id="m96">
<mml:mrow>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mrow>
<mml:mi>C</mml:mi>
<mml:mi>E</mml:mi>
<mml:mi>M</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> indicates that the more information node <inline-formula id="inf89">
<mml:math id="m97">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> receives from other nodes in the network, the more important the node is.</p>
<sec id="s4-1">
<title>4.1 Node value evaluation matrix (VEM)</title>
<p>The CEM measures the node importance from the point of view that the node receives contributions from other nodes. In this section, the node value is measured from the point of view that the node provides information for its adjacent nodes, and the VEM is proposed as follows:<disp-formula id="e9">
<mml:math id="m98">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">H</mml:mi>
<mml:mtext>VEM</mml:mtext>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mtable columnalign="center">
<mml:mtr>
<mml:mtd>
<mml:mn>0</mml:mn>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mn>12</mml:mn>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mo>&#x22ef;</mml:mo>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mn>21</mml:mn>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mn>0</mml:mn>
</mml:mtd>
<mml:mtd>
<mml:mo>&#x22ef;</mml:mo>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mo>&#x22ee;</mml:mo>
</mml:mtd>
<mml:mtd>
<mml:mo>&#x22ee;</mml:mo>
</mml:mtd>
<mml:mtd>
<mml:mo>&#x22f1;</mml:mo>
</mml:mtd>
<mml:mtd>
<mml:mo>&#x22ee;</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mo>&#x22ef;</mml:mo>
</mml:mtd>
<mml:mtd>
<mml:mn>0</mml:mn>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(9)</label>
</disp-formula>
</p>
<p>In this matrix, <inline-formula id="inf90">
<mml:math id="m99">
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> reflects the connection between nodes, <inline-formula id="inf91">
<mml:math id="m100">
<mml:mrow>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> denotes the weight of edge <inline-formula id="inf92">
<mml:math id="m101">
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula>, <inline-formula id="inf93">
<mml:math id="m102">
<mml:mrow>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is the in-strength of node <inline-formula id="inf94">
<mml:math id="m103">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>. The ratio of the two can represent the proportion of the information provided by node <inline-formula id="inf95">
<mml:math id="m104">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> to the information received by node <inline-formula id="inf96">
<mml:math id="m105">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>. The higher the ratio is, the more valuable node <inline-formula id="inf97">
<mml:math id="m106">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is to node <inline-formula id="inf98">
<mml:math id="m107">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, so the value importance of node <inline-formula id="inf99">
<mml:math id="m108">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> can be expressed as:<disp-formula id="e10">
<mml:math id="m109">
<mml:mrow>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mrow>
<mml:mi>V</mml:mi>
<mml:mi>E</mml:mi>
<mml:mi>M</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
<mml:mo>&#x2260;</mml:mo>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mi>n</mml:mi>
</mml:munderover>
</mml:mstyle>
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfrac>
<mml:mrow>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(10)</label>
</disp-formula>
</p>
<p>A higher <inline-formula id="inf100">
<mml:math id="m110">
<mml:mrow>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mrow>
<mml:mi>V</mml:mi>
<mml:mi>E</mml:mi>
<mml:mi>M</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> value means the node is more valuable to its adjacent nodes, and the node is more important.</p>
</sec>
<sec id="s4-2">
<title>4.2 Evaluation the node importance</title>
<p>CEM and VEM measure the importance of nodes from different perspectives, and obtain the contribution evaluation vector <inline-formula id="inf101">
<mml:math id="m111">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">h</mml:mi>
<mml:mrow>
<mml:mi>C</mml:mi>
<mml:mi>E</mml:mi>
<mml:mi>M</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and value evaluation vector <inline-formula id="inf102">
<mml:math id="m112">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">h</mml:mi>
<mml:mrow>
<mml:mi>V</mml:mi>
<mml:mi>E</mml:mi>
<mml:mi>M</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>. The two vectors are normalized and the comprehensive importance of the node is determined by considering the above two measurement methods:<disp-formula id="e11">
<mml:math id="m113">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">h</mml:mi>
<mml:mi mathvariant="bold-italic">I</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi mathvariant="bold-italic">h</mml:mi>
<mml:mtext>CEM</mml:mtext>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi mathvariant="bold-italic">h</mml:mi>
<mml:mtext>VEM</mml:mtext>
</mml:msub>
</mml:mrow>
</mml:math>
<label>(11)</label>
</disp-formula>
</p>
<p>Combining Eq. <xref ref-type="disp-formula" rid="e11">11</xref>&#x2013;<xref ref-type="disp-formula" rid="e13">13</xref>, the above equation can be expressed as:<disp-formula id="e12">
<mml:math id="m114">
<mml:mrow>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mi>I</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x22c5;</mml:mo>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
<mml:mo>&#x2260;</mml:mo>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mi>n</mml:mi>
</mml:munderover>
</mml:mstyle>
<mml:mrow>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
<mml:msup>
<mml:mi>&#x3b1;</mml:mi>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
</mml:msup>
<mml:mo>&#x2b;</mml:mo>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x22c5;</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
<mml:mo>&#x2260;</mml:mo>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mi>n</mml:mi>
</mml:munderover>
</mml:mstyle>
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfrac>
<mml:mrow>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(12)</label>
</disp-formula>where <inline-formula id="inf103">
<mml:math id="m115">
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mo>&#x3c;</mml:mo>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x3c;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is an adjustable parameter used to adjust the proportion of evaluation results based on different methods. CEM and VEM have different emphases in evaluating the importance of nodes. The former considers the influence of non-adjacent nodes and evaluates the importance of nodes from the perspective of nodes receiving global network information. The latter only considers the influence of adjacent nodes, and evaluates the importance of nodes from the perspective of nodes providing information locally to the network.</p>
<p>After obtaining the comprehensive importance of the node, it is also necessary to take the node&#x2019;s own strength information into consideration in the calculation of the node importance. The importance of the node <inline-formula id="inf104">
<mml:math id="m116">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> can be finally expressed as:<disp-formula id="e13">
<mml:math id="m117">
<mml:mrow>
<mml:mi>I</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mi>I</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
<label>(13)</label>
</disp-formula>
</p>
</sec>
<sec id="s4-3">
<title>4.3 Algorithm steps and complexity analysis</title>
<p>In a communication network, the most direct form of information exchange and dissemination exists between adjacent nodes; however, when the strength of a node and the efficiency of information transmission are high, this will also have a greater influence on non-adjacent nodes, which makes the evaluation results inaccurate if only node importance is evaluated in terms of nodes receiving or outputting information. Therefore, this article comprehensively considers the characteristics of the above two aspects in a directed-weighted network. The information flow and interaction of the communication network, CEM, and VEM are proposed. Combining the node importance obtained by the two matrixes, a comprehensive evaluation of the node importance is finally realized. The specific steps of the algorithm are as follows.</p>
<p>
<statement>
<label>Step 1:</label>
<p>Preparation stage. According to the network edge weight matrix <inline-formula id="inf105">
<mml:math id="m118">
<mml:mrow>
<mml:mi mathvariant="bold-italic">W</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>, the out-strength <inline-formula id="inf106">
<mml:math id="m119">
<mml:mrow>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mi>o</mml:mi>
<mml:mi>u</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, in-strength <inline-formula id="inf107">
<mml:math id="m120">
<mml:mrow>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, and total strength <inline-formula id="inf108">
<mml:math id="m121">
<mml:mrow>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> of each node in the network are calculated. Using the Floyd algorithm, the shortest path length <inline-formula id="inf109">
<mml:math id="m122">
<mml:mrow>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> between all node pairs in the network and the number of intermediate nodes <inline-formula id="inf110">
<mml:math id="m123">
<mml:mrow>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> included are calculated according to Eq. <xref ref-type="disp-formula" rid="e2">2</xref>.</p>
</statement>
</p>
<p>
<statement>
<label>Step 2:</label>
<p>Constructing CEM and calculating the node contribution importance. Fill the obtained <inline-formula id="inf111">
<mml:math id="m124">
<mml:mrow>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, <inline-formula id="inf112">
<mml:math id="m125">
<mml:mrow>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, <inline-formula id="inf113">
<mml:math id="m126">
<mml:mrow>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> values into the matrix, sum each column element of the matrix, and then convert it into a column vector, thereby obtaining the node contribution evaluation vector <inline-formula id="inf114">
<mml:math id="m127">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">h</mml:mi>
<mml:mrow>
<mml:mi>C</mml:mi>
<mml:mi>E</mml:mi>
<mml:mi>M</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
</statement>
</p>
<p>
<statement>
<label>Step 3:</label>
<p>Constructing VEM and calculating the node value importance. Fill the elements <inline-formula id="inf115">
<mml:math id="m128">
<mml:mrow>
<mml:mi mathvariant="bold-italic">W</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf116">
<mml:math id="m129">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">S</mml:mi>
<mml:mtext>in</mml:mtext>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> into the corresponding positions of the matrix and sum up each row of the matrix to obtain the node value evaluation vector <inline-formula id="inf117">
<mml:math id="m130">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">h</mml:mi>
<mml:mrow>
<mml:mi>V</mml:mi>
<mml:mi>E</mml:mi>
<mml:mi>M</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
</statement>
</p>
<p>
<statement>
<label>Step 4:</label>
<p>Importance integration. Normalize the vectors <inline-formula id="inf118">
<mml:math id="m131">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">h</mml:mi>
<mml:mrow>
<mml:mi>C</mml:mi>
<mml:mi>E</mml:mi>
<mml:mi>M</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf119">
<mml:math id="m132">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">h</mml:mi>
<mml:mrow>
<mml:mi>V</mml:mi>
<mml:mi>E</mml:mi>
<mml:mi>M</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and fuse them according to Eq. <xref ref-type="disp-formula" rid="e11">11</xref> to obtain the comprehensive importance vector <inline-formula id="inf120">
<mml:math id="m133">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">h</mml:mi>
<mml:mi mathvariant="bold-italic">I</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> of the node.</p>
</statement>
</p>
<p>
<statement content-type="step" id="Step_5">
<label>Step 5:</label>
<p>Node importance calculation. The importance of the node <inline-formula id="inf121">
<mml:math id="m134">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is obtained by multiplying the node strength <inline-formula id="inf122">
<mml:math id="m135">
<mml:mrow>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and the node comprehensive importance <inline-formula id="inf123">
<mml:math id="m136">
<mml:mrow>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mi>I</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, according to Eq. <xref ref-type="disp-formula" rid="e13">13</xref>.</p>
<p>The framework chart of the proposed algorithm and a comparison of the two evaluation methods are shown in <xref ref-type="fig" rid="F1">Figure 1</xref>.</p>
<p>From the above algorithm steps, the time complexity of the entire algorithm is mainly concentrated in the calculation of the node distance in step 1. The time complexity of the Floyd algorithm is <inline-formula id="inf124">
<mml:math id="m137">
<mml:mrow>
<mml:mi>O</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>n</mml:mi>
<mml:mn>3</mml:mn>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, so the time complexity of the entire algorithm is <inline-formula id="inf125">
<mml:math id="m138">
<mml:mrow>
<mml:mi>O</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>n</mml:mi>
<mml:mn>3</mml:mn>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>. Previous studies [<xref ref-type="bibr" rid="B19">19</xref>, <xref ref-type="bibr" rid="B20">20</xref>] optimized the design of the Floyd algorithm to reduce the time complexity of the algorithm to <inline-formula id="inf126">
<mml:math id="m139">
<mml:mrow>
<mml:mi>O</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>n</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, In this article, the improved method in Ref. [<xref ref-type="bibr" rid="B20">20</xref>] is adopted and the final computational complexity of the algorithm <inline-formula id="inf127">
<mml:math id="m140">
<mml:mrow>
<mml:mi>O</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>n</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is obtained.</p>
</statement>
</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption>
<p>Framework chart of the proposed algorithm and a comparison of the two evaluation methods.</p>
</caption>
<graphic xlink:href="fphy-11-1133250-g001.tif"/>
</fig>
</sec>
</sec>
<sec id="s5">
<title>5 Experiment analysis</title>
<sec id="s5-1">
<title>5.1 Algorithm effectiveness analysis</title>
<p>The ARPA (advanced research project agency) network is a typical network model, which is often used to verify the evaluation results of the importance of complex networks. As shown in <xref ref-type="fig" rid="F2">Figure 2</xref> the network has 21 nodes and 26 edges. This article takes the directed-weighted ARPA network as an example to analyze the effectiveness of the algorithm employed here. The node deletion (ND) method, NR method (&#x3c3; &#x3d; 0.85) [<xref ref-type="bibr" rid="B16">16</xref>], MI method [<xref ref-type="bibr" rid="B3">3</xref>], our algorithm (<italic>&#x3b1;</italic> &#x3d; 0.8, <italic>&#x3b8;</italic> &#x3d; 0.7), and only the evaluation results of the CEM method are used for comparison. The experimental results are shown in <xref ref-type="table" rid="T1">Table 1</xref>.</p>
<fig id="F2" position="float">
<label>FIGURE 2</label>
<caption>
<p>Directed-weighted network obtained by the ARPA network.</p>
</caption>
<graphic xlink:href="fphy-11-1133250-g002.tif"/>
</fig>
<table-wrap id="T1" position="float">
<label>TABLE 1</label>
<caption>
<p>Results of node importance evaluation in ARPA networks.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th colspan="2" align="center">ND method</th>
<th colspan="2" align="center">NR method</th>
<th colspan="2" align="center">MI method</th>
<th colspan="2" align="center">CEM method</th>
<th colspan="2" align="center">Our algorithm</th>
</tr>
<tr>
<th align="center">Node</th>
<th align="center">Value</th>
<th align="center">Node</th>
<th align="center">Value</th>
<th align="center">Node</th>
<th align="center">Value</th>
<th align="center">Node</th>
<th align="center">Value</th>
<th align="center">Node</th>
<th align="center">Value</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="center">2</td>
<td align="center">0.2655</td>
<td align="center">19</td>
<td align="center">0.0375</td>
<td align="center">2</td>
<td align="center">3.7744</td>
<td align="center">2</td>
<td align="center">0.4993</td>
<td align="center">2</td>
<td align="center">0.3555</td>
</tr>
<tr>
<td align="center">3</td>
<td align="center">0.2598</td>
<td align="center">2</td>
<td align="center">0.0363</td>
<td align="center">14</td>
<td align="center">2.9717</td>
<td align="center">14</td>
<td align="center">0.2202</td>
<td align="center">14</td>
<td align="center">0.1568</td>
</tr>
<tr>
<td align="center">14</td>
<td align="center">0.1705</td>
<td align="center">6</td>
<td align="center">0.0278</td>
<td align="center">19</td>
<td align="center">2.5055</td>
<td align="center">3</td>
<td align="center">0.1131</td>
<td align="center">3</td>
<td align="center">0.1057</td>
</tr>
<tr>
<td align="center">12</td>
<td align="center">0.1504</td>
<td align="center">12</td>
<td align="center">0.0231</td>
<td align="center">6</td>
<td align="center">2.2741</td>
<td align="center">19</td>
<td align="center">0.0725</td>
<td align="center">19</td>
<td align="center">0.0516</td>
</tr>
<tr>
<td align="center">15</td>
<td align="center">0.1449</td>
<td align="center">3</td>
<td align="center">0.0217</td>
<td align="center">9</td>
<td align="center">1.3862</td>
<td align="center">6</td>
<td align="center">0.0289</td>
<td align="center">15</td>
<td align="center">0.0456</td>
</tr>
<tr>
<td align="center">19</td>
<td align="center">0.1440</td>
<td align="center">14</td>
<td align="center">0.0208</td>
<td align="center">3</td>
<td align="center">1.0314</td>
<td align="center">12</td>
<td align="center">0.0277</td>
<td align="center">12</td>
<td align="center">0.0353</td>
</tr>
<tr>
<td align="center">11</td>
<td align="center">0.0967</td>
<td align="center">7</td>
<td align="center">0.0157</td>
<td align="center">5</td>
<td align="center">0.3285</td>
<td align="center">15</td>
<td align="center">0.0199</td>
<td align="center">1</td>
<td align="center">0.0286</td>
</tr>
<tr>
<td align="center">4</td>
<td align="center">0.0950</td>
<td align="center">11</td>
<td align="center">0.0157</td>
<td align="center">21</td>
<td align="center">0.3285</td>
<td align="center">4</td>
<td align="center">0.0037</td>
<td align="center">9</td>
<td align="center">0.0277</td>
</tr>
<tr>
<td align="center">6</td>
<td align="center">0.0933</td>
<td align="center">8</td>
<td align="center">0.0101</td>
<td align="center">1</td>
<td align="center">&#x2212;0.297</td>
<td align="center">7</td>
<td align="center">0.0035</td>
<td align="center">5</td>
<td align="center">0.0230</td>
</tr>
<tr>
<td align="center">17</td>
<td align="center">0.0909</td>
<td align="center">10</td>
<td align="center">0.0101</td>
<td align="center">12</td>
<td align="center">&#x2212;0.3083</td>
<td align="center">11</td>
<td align="center">0.0035</td>
<td align="center">21</td>
<td align="center">0.0230</td>
</tr>
<tr>
<td align="center">18</td>
<td align="center">0.0824</td>
<td align="center">15</td>
<td align="center">0.0097</td>
<td align="center">8</td>
<td align="center">&#x2212;0.6931</td>
<td align="center">20</td>
<td align="center">0.0031</td>
<td align="center">6</td>
<td align="center">0.0205</td>
</tr>
<tr>
<td align="center">1</td>
<td align="center">0.0767</td>
<td align="center">4</td>
<td align="center">0.0095</td>
<td align="center">10</td>
<td align="center">&#x2212;0.6931</td>
<td align="center">8</td>
<td align="center">0.0020</td>
<td align="center">13</td>
<td align="center">0.0175</td>
</tr>
<tr>
<td align="center">13</td>
<td align="center">0.0750</td>
<td align="center">20</td>
<td align="center">0.0095</td>
<td align="center">11</td>
<td align="center">&#x2212;0.6931</td>
<td align="center">10</td>
<td align="center">0.0020</td>
<td align="center">17</td>
<td align="center">0.0153</td>
</tr>
<tr>
<td align="center">10</td>
<td align="center">0.0728</td>
<td align="center">1</td>
<td align="center">0.0071</td>
<td align="center">13</td>
<td align="center">&#x2212;0.7903</td>
<td align="center">1</td>
<td align="center">0</td>
<td align="center">8</td>
<td align="center">0.0152</td>
</tr>
<tr>
<td align="center">9</td>
<td align="center">0.0694</td>
<td align="center">5</td>
<td align="center">0.0071</td>
<td align="center">18</td>
<td align="center">&#x2212;0.9444</td>
<td align="center">5</td>
<td align="center">0</td>
<td align="center">10</td>
<td align="center">0.0152</td>
</tr>
<tr>
<td align="center">16</td>
<td align="center">0.0682</td>
<td align="center">9</td>
<td align="center">0.0071</td>
<td align="center">7</td>
<td align="center">&#x2212;1.0986</td>
<td align="center">9</td>
<td align="center">0</td>
<td align="center">18</td>
<td align="center">0.0150</td>
</tr>
<tr>
<td align="center">7</td>
<td align="center">0.0677</td>
<td align="center">13</td>
<td align="center">0.0071</td>
<td align="center">17</td>
<td align="center">&#x2212;1.2164</td>
<td align="center">13</td>
<td align="center">0</td>
<td align="center">16</td>
<td align="center">0.0111</td>
</tr>
<tr>
<td align="center">5</td>
<td align="center">0.0637</td>
<td align="center">16</td>
<td align="center">0.0071</td>
<td align="center">16</td>
<td align="center">&#x2212;1.8225</td>
<td align="center">16</td>
<td align="center">0</td>
<td align="center">11</td>
<td align="center">0.0111</td>
</tr>
<tr>
<td align="center">8</td>
<td align="center">0.0592</td>
<td align="center">17</td>
<td align="center">0.0071</td>
<td align="center">15</td>
<td align="center">&#x2212;1.8589</td>
<td align="center">17</td>
<td align="center">0</td>
<td align="center">4</td>
<td align="center">0.0096</td>
</tr>
<tr>
<td align="center">20</td>
<td align="center">0.0528</td>
<td align="center">18</td>
<td align="center">0.0071</td>
<td align="center">4</td>
<td align="center">&#x2212;2.0149</td>
<td align="center">18</td>
<td align="center">0</td>
<td align="center">7</td>
<td align="center">0.0082</td>
</tr>
<tr>
<td align="center">21</td>
<td align="center">0.0528</td>
<td align="center">21</td>
<td align="center">0.0071</td>
<td align="center">20</td>
<td align="center">&#x2212;2.1690</td>
<td align="center">21</td>
<td align="center">0</td>
<td align="center">20</td>
<td align="center">0.0072</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>From the comparison results in <xref ref-type="table" rid="T1">Table 1</xref>, the calculation results of the algorithm in this study have a higher distinguishing effect for nodes than the NR method and only the CEM method; the above two methods have the same evaluation results for 8 nodes with an in-degree of 0 in the network, especially for the evaluation of nodes 1, 5, 9, and 16. The above four nodes are located in different positions in the network, and the edge weights of the nodes are different. However, the NR values of the four nodes and the evaluation results using only the CEM cannot effectively distinguish them. Therefore, it is not comprehensive enough to consider the importance of nodes in directed-weighted communication network only from the perspective of nodes receiving contributions from other nodes. Comparing the algorithm in this study with the evaluation results using only the CEM, the first four nodes with the highest importance are the same, and they are all nodes 2, 14, 3, and 19. For the node ranked fifth in importance, the CEM considered to be node 6, and the algorithm in this study considered to be node 15 after the comprehensive VEM. Comparing the evaluation of the above two nodes by the node deletion method, the importance of node 15 is obviously better than node 6. Therefore, the algorithm in this study considers the importance of two aspects of the node, which not only strengthens the distinction of the algorithm for node identification, but also makes the evaluation results more accurate. At the same time, taking the evaluation results of the node deletion method as a reference, comparing our algorithm with the MI method, the evaluation result of our algorithm is more relevant to the node deletion method.</p>
<p>The algorithm based on CEM and VEM measures the importance of nodes from the two aspects of receiving information and outputting information. We proved using examples that the algorithm has better applicability to the directed-weighted network, and the accuracy of measuring the importance of nodes.</p>
</sec>
<sec id="s5-2">
<title>5.2 Further analysis in simulated network</title>
<sec id="s5-2-1">
<title>5.2.1 Construction of hybrid weighted communication network</title>
<p>Most of the real-world communication networks have an obvious organizational hierarchy [<xref ref-type="bibr" rid="B28">28</xref>], such as the combat command network, which has obvious hierarchical characteristics between nodes and contains tree skeletons and implicit connections [<xref ref-type="bibr" rid="B29">29</xref>, <xref ref-type="bibr" rid="B30">30</xref>]. Such networks can be classified as Organizational Structure Networks (OSNs) [<xref ref-type="bibr" rid="B31">31</xref>]. In order to better simulate the hybrid weighted communication network with organizational structure characteristics, this study proposes an OSN-based hybrid weighted network evolution model for the characteristics of the communication network. The construction process of the model is as follows.</p>
<p>
<statement>
<label>Step 1:</label>
<p>Generate nodes and establish a communication network skeleton with a hierarchical structure. First, add a central node to the network and randomly generate <italic>m</italic> <inline-formula id="inf128">
<mml:math id="m141">
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mi>a</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>b</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> nodes under the central node; the layer of these nodes is 1. Then, take each node in the first layer as the central node and randomly generate <italic>m</italic> nodes below. In this step, the number of layers of generated nodes is 2 and this process is repeated until the number of network nodes reaches N.</p>
</statement>
</p>
<p>
<statement>
<label>Step 2:</label>
<p>Assign weights to the skeleton network and define the edge connecting the node and the parent node in the skeleton network as an undirected edge. The edge weight is <inline-formula id="inf129">
<mml:math id="m142">
<mml:mrow>
<mml:msub>
<mml:mi>w</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:msup>
<mml:mi>&#x3b2;</mml:mi>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula>, where <inline-formula id="inf130">
<mml:math id="m143">
<mml:mrow>
<mml:mi>&#x3b2;</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mo>&#x3c;</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
<mml:mo>&#x3c;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is the weight weakening value and <inline-formula id="inf131">
<mml:math id="m144">
<mml:mrow>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the layers of child nodes. The lower the number of layers the node is in, the more valuable the connection between the node and the upper-level node; therefore, a higher weight is given.</p>
</statement>
</p>
<p>
<statement>
<label>Step 3:</label>
<p>Generate implicit connections for the skeleton network and assign edges between nodes according to the probability given by the following formula:<disp-formula id="e14">
<mml:math id="m145">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msup>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3bb;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:msup>
<mml:mo>&#x22c5;</mml:mo>
<mml:msup>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:msup>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msubsup>
<mml:mi>d</mml:mi>
<mml:mi>i</mml:mi>
<mml:mn>2</mml:mn>
</mml:msubsup>
<mml:mo>&#x2b;</mml:mo>
<mml:msubsup>
<mml:mi>d</mml:mi>
<mml:mi>j</mml:mi>
<mml:mn>2</mml:mn>
</mml:msubsup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mfrac bevelled="true">
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:msup>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3be;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:math>
<label>(14)</label>
</disp-formula>where <inline-formula id="inf132">
<mml:math id="m146">
<mml:mrow>
<mml:mi>&#x3bb;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf133">
<mml:math id="m147">
<mml:mrow>
<mml:mi>&#x3be;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> are adjustable parameters that are used to adjust the probability of implicit connection and <inline-formula id="inf134">
<mml:math id="m148">
<mml:mrow>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the number of layers of the common parent node of node <inline-formula id="inf135">
<mml:math id="m149">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and node <inline-formula id="inf136">
<mml:math id="m150">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>. We believe that the lower layers a node is located in, the more frequent the information interaction between nodes, and the greater the probability of generating implicit connections.</p>
</statement>
</p>
<p>
<statement>
<label>Step 4:</label>
<p>Determine the direction and weight of implied edges. The direction of the edge is divided into the following three cases: i) when <inline-formula id="inf137">
<mml:math id="m151">
<mml:mrow>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x3c;</mml:mo>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> the implied edge points to node <inline-formula id="inf138">
<mml:math id="m152">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, ii) when <inline-formula id="inf139">
<mml:math id="m153">
<mml:mrow>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> the implied edge is an undirected edge, and iii) when <inline-formula id="inf140">
<mml:math id="m154">
<mml:mrow>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x3e;</mml:mo>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> the implied edge points to node <inline-formula id="inf141">
<mml:math id="m155">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>. In this study, we believe that implicit connections are generally directed from lower-level nodes to upper-level nodes, that is, nodes with higher layers provide information to nodes with lower layers and newly generated edges are given weights <inline-formula id="inf142">
<mml:math id="m156">
<mml:mrow>
<mml:msubsup>
<mml:mi>w</mml:mi>
<mml:mn>0</mml:mn>
<mml:mn>2</mml:mn>
</mml:msubsup>
<mml:mo>&#x22c5;</mml:mo>
<mml:msup>
<mml:mi>&#x3b2;</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
</statement>
</p>
</sec>
<sec id="s5-2-2">
<title>5.2.2 Simulation experiment analysis</title>
<p>Taking the parameters <inline-formula id="inf143">
<mml:math id="m157">
<mml:mrow>
<mml:mi>a</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, <inline-formula id="inf144">
<mml:math id="m158">
<mml:mrow>
<mml:mi>b</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>6</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, <inline-formula id="inf145">
<mml:math id="m159">
<mml:mrow>
<mml:mi>&#x3bb;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.8</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, <inline-formula id="inf146">
<mml:math id="m160">
<mml:mrow>
<mml:mi>&#x3be;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.8</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, and <inline-formula id="inf147">
<mml:math id="m161">
<mml:mrow>
<mml:mi>&#x3b2;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.7</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula> in the above network evolution model, three hybrid weighted OSN communication network models with <italic>N</italic> &#x3d; 100, 200, 300, 500, and 1000 nodes are generated. <xref ref-type="fig" rid="F3">Figure 3</xref> shows a simulation network with 100 nodes generated according to the model rules. The lower the number of node layers in the figure, the larger the node. <xref ref-type="table" rid="T2">Table 2</xref> shows the number of directed and undirected edges in the three generated networks.</p>
<fig id="F3" position="float">
<label>FIGURE 3</label>
<caption>
<p>Hybrid weighted OSN communication network model (<italic>N</italic> &#x3d; 100).</p>
</caption>
<graphic xlink:href="fphy-11-1133250-g003.tif"/>
</fig>
<table-wrap id="T2" position="float">
<label>TABLE 2</label>
<caption>
<p>Distribution of edges in the hybrid weighted network generated by the model.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th rowspan="2" align="center"/>
<th rowspan="2" align="center">Skeleton network edges (undirected edge)</th>
<th colspan="2" align="center">Implicitly connected</th>
<th rowspan="2" align="center">Total number of edges</th>
</tr>
<tr>
<th align="center">Undirected edge</th>
<th align="center">Directed edge</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="center">N &#x3d; 100</td>
<td align="center">198</td>
<td align="center">64</td>
<td align="center">54</td>
<td align="center">316</td>
</tr>
<tr>
<td align="center">N &#x3d; 200</td>
<td align="center">324</td>
<td align="center">98</td>
<td align="center">75</td>
<td align="center">497</td>
</tr>
<tr>
<td align="center">N &#x3d; 300</td>
<td align="center">406</td>
<td align="center">86</td>
<td align="center">93</td>
<td align="center">585</td>
</tr>
<tr>
<td align="center">N &#x3d; 500</td>
<td align="center">634</td>
<td align="center">137</td>
<td align="center">168</td>
<td align="center">939</td>
</tr>
<tr>
<td align="center">N &#x3d; 1000</td>
<td align="center">1218</td>
<td align="center">372</td>
<td align="center">411</td>
<td align="center">2001</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>In order to further verify the effectiveness of the algorithm, according to the ranking results of the importance of the nodes, the nodes in the network are deleted in turn, and the changes of the maximum connectivity <inline-formula id="inf148">
<mml:math id="m162">
<mml:mrow>
<mml:mi>C</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> and the network efficiency <inline-formula id="inf149">
<mml:math id="m163">
<mml:mrow>
<mml:mi>E</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> of the network are observed. The NR method (<italic>&#x3c3;</italic> &#x3d; 0.85), the MI method, and the CEM are also used as comparisons. In addition to this, we added two different mechanisms of node importance evaluation algorithms for directed-weighted networks: the K-Order Propagation Number (WKPN) algorithm [<xref ref-type="bibr" rid="B11">11</xref>] and WVoteRank algorithm [<xref ref-type="bibr" rid="B32">32</xref>]. The accuracy of the different evaluation algorithms was further compared in OSN networks by the node deletion method. The experimental results are shown in <xref ref-type="fig" rid="F4">Figures 4</xref>, <xref ref-type="fig" rid="F5">5</xref>.</p>
<fig id="F4" position="float">
<label>FIGURE 4</label>
<caption>
<p>Maximum connectivity curves of the network after removing nodes according to the ranking results of different algorithms. <bold>(A&#x2013;E)</bold> respectively show the results of five groups of experiments with a network size of 100 to 1000.</p>
</caption>
<graphic xlink:href="fphy-11-1133250-g004.tif"/>
</fig>
<p>As can be seen from <xref ref-type="fig" rid="F4">Figure 4</xref>, removing the nodes in the network according to the sorting results of the algorithm in this study (<italic>&#x3b1;</italic> &#x3d; 0.8, <italic>&#x3b8;</italic> &#x3d; 0.7) can rapidly decreases the network connectivity, which has a significant impact on the transmission of information in the network. Compared with other algorithms, this algorithm also has certain advantages. As can be seen from <xref ref-type="fig" rid="F5">Figure 5</xref>, in networks of different scales, the network efficiency decline curves obtained by our algorithm can maintain a rapid downward trend in the initial stage, indicating that after these nodes are removed from the network, the network will be rapidly destroy.</p>
<fig id="F5" position="float">
<label>FIGURE 5</label>
<caption>
<p>Network efficiency changing curves after removing nodes according to the ranking results of different algorithms. <bold>(A&#x2013;E)</bold> respectively show the results of five groups of experiments with a network size of 100 to 1000.</p>
</caption>
<graphic xlink:href="fphy-11-1133250-g005.tif"/>
</fig>
<p>As shown in <xref ref-type="fig" rid="F4">Figures 4</xref>, <xref ref-type="fig" rid="F5">5</xref>, the algorithm in this study deletes the same number of nodes in most cases, which can cause greater damage to the network. Therefore, using the algorithm in this article, and considering the importance of the two aspects of the node, the node can be measured more accurately.</p>
</sec>
</sec>
</sec>
<sec sec-type="conclusion" id="s6">
<title>6 Conclusion</title>
<p>In this article, a communication network is abstracted as a hybrid weighted network for analysis and the CEM and the VEM are respectively proposed to evaluate the importance of nodes from the perspective of nodes receiving and output information. The effectiveness of the algorithm is proved in a small network. A hybrid weighted network evolution model based on OSN is proposed to verify the efficacy of the algorithm.</p>
<p>The experimental results show that the algorithm proposed in this study can better distinguish the nodes in the network and is more suitable for evaluating the importance of different types of nodes in a directed network. The validity of the algorithm is verified in the ARPA network. Compared with other directed-weighted network node value evaluation algorithms, the measurement results of the node value of the algorithm in this study have a higher correlation with the measurement results based on the ND method, indicating that the algorithm is more accurate in identifying key nodes in the network. At the same time, according to the sorting result of the algorithm in this study, when the node is deleted from the OSN-based hybrid weighted network model, the maximum connectivity and network efficiency drop rapidly, which shows that the important nodes identified by our algorithm have great value in the network. Through experimental simulation, the accuracy of the algorithm in discovering critical nodes in the network is further verified, which has certain application value for improving the invulnerability of communication networks.</p>
</sec>
</body>
<back>
<sec sec-type="data-availability" id="s7">
<title>Data availability statement</title>
<p>The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation.</p>
</sec>
<sec id="s8">
<title>Author contributions</title>
<p>GT and XY performed the analysis. GT validated the analysis and drafted the manuscript. ZY reviewed the manuscript. YL and GC designed the research. All authors have read and approved the content of the manuscript.</p>
</sec>
<sec id="s9">
<title>Funding</title>
<p>This work was financially supported by the regional foundation of the Shaanxi Natural Science Foundation (2021JM-250).</p>
</sec>
<sec sec-type="COI-statement" id="s10">
<title>Conflict of interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="disclaimer" id="s11">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="B1">
<label>1.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Ren</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Lin</surname>
<given-names>Z</given-names>
</name>
</person-group>. <article-title>Analysis of computer communication network and its security technology framework</article-title>. In: <source>Innovative computing: Proceedings of the 4th international conference on innovative computing (IC 2021)</source>. <publisher-loc>Singapore</publisher-loc>: <publisher-name>Springer</publisher-name> (<year>2022</year>).</citation>
</ref>
<ref id="B2">
<label>2.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chen</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Sun</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>Repair strategy of military communication network based on discrete artificial bee colony algorithm</article-title>. <source>IEEE Access</source> (<year>2020</year>) <volume>8</volume>:<fpage>73051</fpage>&#x2013;<lpage>60</lpage>. <pub-id pub-id-type="doi">10.1109/access.2020.2987860</pub-id>
</citation>
</ref>
<ref id="B3">
<label>3.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yang</surname>
<given-names>Y-Z</given-names>
</name>
<name>
<surname>Hu</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Huang</surname>
<given-names>T-Y</given-names>
</name>
</person-group>. <article-title>Influential nodes identification in complex networks based on global and local information</article-title>. <source>Chin Phys B</source> (<year>2020</year>) <volume>29</volume>(<issue>8</issue>):<fpage>088903</fpage>. <pub-id pub-id-type="doi">10.1088/1674-1056/ab969f</pub-id>
</citation>
</ref>
<ref id="B4">
<label>4.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Lu</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Zhao</surname>
<given-names>Y-J</given-names>
</name>
<name>
<surname>Sun</surname>
<given-names>F-C</given-names>
</name>
<name>
<surname>Liang</surname>
<given-names>R</given-names>
</name>
</person-group>. <article-title>Measuring and improving communication robustness of networks</article-title>. <source>IEEE Commun Lett</source> (<year>2019</year>) <volume>23</volume>(<issue>12</issue>):<fpage>2168</fpage>&#x2013;<lpage>71</lpage>. <pub-id pub-id-type="doi">10.1109/lcomm.2019.2941940</pub-id>
</citation>
</ref>
<ref id="B5">
<label>5.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hu</surname>
<given-names>T-R</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Huang</surname>
<given-names>X-H</given-names>
</name>
</person-group>. <article-title>Node importance evaluation method for command information system communication network</article-title>. <source>Command Inf Syst Tech</source> (<year>2019</year>) <volume>10</volume>(<issue>5</issue>):<fpage>95</fpage>&#x2013;<lpage>100</lpage>.</citation>
</ref>
<ref id="B6">
<label>6.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>L&#xfc;</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>YC</given-names>
</name>
<name>
<surname>Yeung</surname>
<given-names>CH</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>T</given-names>
</name>
</person-group>. <article-title>Leaders in social networks, the delicious case</article-title>. <source>PloS one</source> (<year>2011</year>) <volume>6</volume>(<issue>6</issue>):<fpage>e21202</fpage>. <pub-id pub-id-type="doi">10.1371/journal.pone.0021202</pub-id>
</citation>
</ref>
<ref id="B7">
<label>7.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Sun</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Xia</surname>
<given-names>C</given-names>
</name>
</person-group>. <article-title>Identification of influential spreaders based on classified neighbors in real-world complex networks</article-title>. <source>Appl Math Comput</source> (<year>2018</year>) <volume>320</volume>:<fpage>512</fpage>&#x2013;<lpage>23</lpage>. <pub-id pub-id-type="doi">10.1016/j.amc.2017.10.001</pub-id>
</citation>
</ref>
<ref id="B8">
<label>8.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>Z-Q</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Guo</surname>
<given-names>Q-Q</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>S-D</given-names>
</name>
</person-group>. <article-title>DJ-1 can inhibit microtubule associated protein 1 B formed aggregates</article-title>. <source>J Beijing Univ Posts Telecommunications</source> (<year>2011</year>) <volume>34</volume>(<issue>4</issue>):<fpage>38</fpage>&#x2013;<lpage>42</lpage>. <pub-id pub-id-type="doi">10.1186/1750-1326-6-38</pub-id>
</citation>
</ref>
<ref id="B9">
<label>9.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Sun</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>D</given-names>
</name>
<name>
<surname>He</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Ch&#x2019;ng</surname>
<given-names>E</given-names>
</name>
</person-group>. <article-title>A voting approach to uncover multiple influential spreaders on weighted networks</article-title>. <source>Physica A: Stat Mech its Appl</source> (<year>2019</year>) <volume>519</volume>:<fpage>303</fpage>&#x2013;<lpage>12</lpage>. <pub-id pub-id-type="doi">10.1016/j.physa.2018.12.001</pub-id>
</citation>
</ref>
<ref id="B10">
<label>10.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gao</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Cao</surname>
<given-names>J-H</given-names>
</name>
<name>
<surname>Song</surname>
<given-names>T-L</given-names>
</name>
<name>
<surname>Xing</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Yan</surname>
<given-names>X</given-names>
</name>
</person-group>. <article-title>Evolution model of equipment support system of systems based on complex network theory</article-title>. <source>Acta Armamentarii</source> (<year>2017</year>) <volume>38</volume>(<issue>10</issue>):<fpage>2019</fpage>&#x2013;<lpage>30</lpage>.</citation>
</ref>
<ref id="B11">
<label>11.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Tang</surname>
<given-names>P-C</given-names>
</name>
<name>
<surname>Song</surname>
<given-names>C-C</given-names>
</name>
<name>
<surname>Ding</surname>
<given-names>W-W</given-names>
</name>
<name>
<surname>Ma</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Dong</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Huang</surname>
<given-names>L</given-names>
</name>
</person-group>. <article-title>Research on the node importance of a weighted network based on the K-Order propagation number algorithm</article-title>. <source>Entropy</source> (<year>2020</year>) <volume>22</volume>(<issue>3</issue>):<fpage>364</fpage>. <pub-id pub-id-type="doi">10.3390/e22030364</pub-id>
</citation>
</ref>
<ref id="B12">
<label>12.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>Z-Y</given-names>
</name>
<name>
<surname>Xiong</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>X-M</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>H-S</given-names>
</name>
<name>
<surname>Xiong</surname>
<given-names>X</given-names>
</name>
</person-group>. <source>Topological influence-aware recommendation on social networks</source>. <publisher-loc>New York</publisher-loc>: <publisher-name>John Wiley</publisher-name> (<year>2019</year>). <comment>Complexity</comment>.</citation>
</ref>
<ref id="B13">
<label>13.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Xiong</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Shen</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Pan</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Yan</surname>
<given-names>Z</given-names>
</name>
</person-group>. <article-title>Exploiting implicit influence from information propagation for social recommendation</article-title>. <source>IEEE Trans Cybernetics</source> (<year>2019</year>) <volume>50</volume>(<issue>10</issue>):<fpage>4186</fpage>&#x2013;<lpage>99</lpage>. <pub-id pub-id-type="doi">10.1109/tcyb.2019.2939390</pub-id>
</citation>
</ref>
<ref id="B14">
<label>14.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yang</surname>
<given-names>Z-R</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>Optimization algorithm of military communication network structure under node attack strategy</article-title>. <source>Syst Eng Elect</source> (<year>2021</year>) <volume>43</volume>(<issue>7</issue>):<fpage>1848</fpage>&#x2013;<lpage>55</lpage>.</citation>
</ref>
<ref id="B15">
<label>15.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chandrasekharan</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Gomez</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Al-Hourani</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Kandeepan</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Rasheed</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Goratti</surname>
<given-names>L</given-names>
</name>
<etal/>
</person-group> <article-title>Designing and implementing future aerial communication networks</article-title>. <source>IEEE Commun Mag</source> (<year>2016</year>) <volume>54</volume>(<issue>5</issue>):<fpage>26</fpage>&#x2013;<lpage>34</lpage>. <pub-id pub-id-type="doi">10.1109/mcom.2016.7470932</pub-id>
</citation>
</ref>
<ref id="B16">
<label>16.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Zhu</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Hu</surname>
<given-names>M</given-names>
</name>
</person-group>. <article-title>Evaluation method for node importance in directed-weighted complex networks based on PageRank</article-title>. <source>J Nanjing Univ Aeronautics Astronautics</source> (<year>2013</year>) <volume>45</volume>(<issue>3</issue>):<fpage>429</fpage>&#x2013;<lpage>34</lpage>.</citation>
</ref>
<ref id="B17">
<label>17.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Guo</surname>
<given-names>J-L</given-names>
</name>
</person-group>. <article-title>Evaluation method of node importance in directed-weighted complex network based on multiple influence matrix</article-title>. <source>Acta Physica Sinica</source> (<year>2017</year>) <volume>66</volume>(<issue>5</issue>):<fpage>050201</fpage>. <pub-id pub-id-type="doi">10.7498/aps.66.050201</pub-id>
</citation>
</ref>
<ref id="B18">
<label>18.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Liu</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Jin</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>C</given-names>
</name>
</person-group>. <article-title>A new clustering algorithm based on data field in complex networks</article-title>. <source>The J Supercomputing</source> (<year>2014</year>) <volume>67</volume>(<issue>3</issue>):<fpage>723</fpage>&#x2013;<lpage>37</lpage>. <pub-id pub-id-type="doi">10.1007/s11227-013-0984-x</pub-id>
</citation>
</ref>
<ref id="B19">
<label>19.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Xuan</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>F-M</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>K-W</given-names>
</name>
<name>
<surname>Hui</surname>
<given-names>X-B</given-names>
</name>
<name>
<surname>Wu</surname>
<given-names>H-S</given-names>
</name>
</person-group>. <article-title>Finding vital node by node importance evaluation matrix in complex networks</article-title>. <source>Acta Physica Sinica</source> (<year>2012</year>) <volume>61</volume>(<issue>5</issue>):<fpage>1</fpage>&#x2013;<lpage>7</lpage>.</citation>
</ref>
<ref id="B20">
<label>20.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhou</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>J-W</given-names>
</name>
</person-group>. <article-title>A new node importance evaluating method for complex weighted networks</article-title>. <source>Acta Armamentarii</source> (<year>2015</year>) <volume>36</volume>(<issue>S2</issue>):<fpage>268</fpage>&#x2013;<lpage>73</lpage>.</citation>
</ref>
<ref id="B21">
<label>21.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Fan</surname>
<given-names>W-L</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>Z-G</given-names>
</name>
</person-group>. <article-title>An evaluation method for node importance based on efficiency matrix</article-title>. <source>Chin J Comput Phys</source> (<year>2013</year>) <volume>30</volume>(<issue>5</issue>):<fpage>714</fpage>&#x2013;<lpage>9</lpage>.</citation>
</ref>
<ref id="B22">
<label>22.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Fan</surname>
<given-names>W-L</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>Z-G</given-names>
</name>
</person-group>. <article-title>Ranking method for node importance based on efficiency matrix</article-title>. <source>J Southwest Jiaotong Univ</source> (<year>2014</year>) <volume>49</volume>(<issue>2</issue>):<fpage>337</fpage>&#x2013;<lpage>42</lpage>.</citation>
</ref>
<ref id="B23">
<label>23.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhong</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Xiong</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Pan</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Xiong</surname>
<given-names>X</given-names>
</name>
</person-group>. <article-title>Hierarchical attention neural network for information cascade prediction</article-title>. <source>Inf Sci</source> (<year>2023</year>) <volume>622</volume>:<fpage>1109</fpage>&#x2013;<lpage>27</lpage>. <pub-id pub-id-type="doi">10.1016/j.ins.2022.11.163</pub-id>
</citation>
</ref>
<ref id="B24">
<label>24.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>H</given-names>
</name>
<name>
<surname>L&#xfc;</surname>
<given-names>Y-J</given-names>
</name>
</person-group>. <article-title>Vulnerability of vehicular ad hoc network based on complex network</article-title>. <source>J Beijing Univ Aeronautics Astronautics</source> (<year>2021</year>) <volume>47</volume>(<issue>8</issue>):<fpage>1543</fpage>&#x2013;<lpage>9</lpage>.</citation>
</ref>
<ref id="B25">
<label>25.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Liu</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Xiong</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Shi</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Shi</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>K</given-names>
</name>
</person-group>. <article-title>Evaluating the importance of nodes in complex networks</article-title>. <source>Physica A: Stat Mech its Appl</source> (<year>2016</year>) <volume>452</volume>:<fpage>209</fpage>&#x2013;<lpage>19</lpage>. <pub-id pub-id-type="doi">10.1016/j.physa.2016.02.049</pub-id>
</citation>
</ref>
<ref id="B26">
<label>26.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Liu</surname>
<given-names>J-X</given-names>
</name>
</person-group>. <article-title>A regulative arithmetic on the contingency communication in the damaged military communication networks</article-title>. <source>Appl Mech Mater</source> (<year>2014</year>) <volume>364</volume>:<fpage>571</fpage>&#x2013;<lpage>2</lpage>.</citation>
</ref>
<ref id="B27">
<label>27.</label>
<citation citation-type="thesis">
<person-group person-group-type="author">
<name>
<surname>Yu</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Xiao</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Cui</surname>
<given-names>Y</given-names>
</name>
</person-group>. <article-title>Cascading failure model and robustness of heterogeneous interdependent combat network</article-title>. <comment>arXiv preprint arXiv:2205.04099</comment> (<year>2022</year>).</citation>
</ref>
<ref id="B28">
<label>28.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Mosse</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Cole</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Pickel</surname>
<given-names>J-G</given-names>
</name>
</person-group>. <article-title>Dynamic wireless network reconfiguration for control system applied to a nuclear reactor case study</article-title>. <source>Proc 26th Int Conf Real-Time Networks Syst</source> (<year>2018</year>) <fpage>30</fpage>&#x2013;<lpage>40</lpage>.</citation>
</ref>
<ref id="B29">
<label>29.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>J-C</given-names>
</name>
<name>
<surname>Jiang</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>K-W</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>Y</given-names>
</name>
</person-group>. <article-title>Research on functional robustness of heterogeneous combat networks</article-title>. <source>IEEE Syst J</source> (<year>2019</year>) <volume>13</volume>(<issue>2</issue>):<fpage>1487</fpage>&#x2013;<lpage>95</lpage>. <pub-id pub-id-type="doi">10.1109/jsyst.2018.2828779</pub-id>
</citation>
</ref>
<ref id="B30">
<label>30.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Qiu</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Si</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Wu</surname>
<given-names>DO</given-names>
</name>
</person-group>. <article-title>Robustness optimization scheme with multi-population Co-evolution for scale-free wireless sensor networks</article-title>. <source>IEEE/ACM Trans Networking</source> (<year>2019</year>) <volume>27</volume>(<issue>3</issue>):<fpage>1028</fpage>&#x2013;<lpage>42</lpage>. <pub-id pub-id-type="doi">10.1109/tnet.2019.2907243</pub-id>
</citation>
</ref>
<ref id="B31">
<label>31.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>E-Y</given-names>
</name>
<name>
<surname>Gong</surname>
<given-names>J-X</given-names>
</name>
<name>
<surname>Huang</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Kong</surname>
<given-names>J-T</given-names>
</name>
</person-group>. <article-title>Node importance analysis of complex networks for combat systems based on function chain</article-title>. <source>J Command Control</source> (<year>2018</year>) <volume>4</volume>(<issue>1</issue>):<fpage>42</fpage>&#x2013;<lpage>9</lpage>.</citation>
</ref>
<ref id="B32">
<label>32.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kumar</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Panda</surname>
<given-names>A</given-names>
</name>
</person-group>. <article-title>Identifying influential nodes in weighted complex networks using an improved WVoteRank approach</article-title>. <source>Appl Intelligence</source> (<year>2022</year>) <volume>52</volume>(<issue>2</issue>):<fpage>1838</fpage>&#x2013;<lpage>52</lpage>. <pub-id pub-id-type="doi">10.1007/s10489-021-02403-5</pub-id>
</citation>
</ref>
</ref-list>
</back>
</article>