دانلود رایگان مقالات IEEEدانلود رایگان مقالات پژوهشی مهندسی فناوری اطلاعات ITدانلود رایگان مقالات ژورنالی مهندسی فناوری اطلاعات ITدانلود رایگان مقالات سال 2018دانلود رایگان مقاله ISI اینترنت و شبکه های گسترده به زبان انگلیسیدانلود رایگان مقاله ISI رایانش امن به زبان انگلیسیدانلود رایگان مقاله ISI مهندسی فناوری اطلاعات به زبان انگلیسی سال 2022 و 2023سال انتشار

مقاله انگلیسی رایگان در مورد برآوردگر بیشینه‌گر احتمال پسین برای شناسایی منبع اطلاعات – IEEE 2018

 

مشخصات مقاله
ترجمه عنوان مقاله برآوردگر بیشینه‌گر احتمال پسین برای شناسایی منبع اطلاعات
عنوان انگلیسی مقاله Maximum a Posteriori Estimation for Information Source Detection
انتشار مقاله سال ۲۰۱۸
تعداد صفحات مقاله انگلیسی ۱۵ صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
پایگاه داده نشریه IEEE
مقاله بیس این مقاله بیس نمیباشد
نمایه (index) scopus – master journals – JCR
نوع مقاله ISI
فرمت مقاله انگلیسی  PDF
ایمپکت فاکتور(IF)
۵٫۱۳۱ در سال ۲۰۱۷
شاخص H_index ۱۰۵ در سال ۲۰۱۸
شاخص SJR ۱٫۳۰۳ در سال ۲۰۱۸
رشته های مرتبط مهندسی فناوری اطلاعات
گرایش های مرتبط اینترنت و شبکه های گسترده، رایانش امن
نوع ارائه مقاله
ژورنال
مجله / کنفرانس یافته های IEEE در حوضه سیستم ها، انسان و سیبرنتیک: سیستم ها – IEEE TRANSACTIONS ON SYSTEMS
دانشگاه University of Science and Technology of China – China
کلمات کلیدی جستجوی حریصانه، تشخیص منبع اطلاعات، تقریب احتمال، حداکثر پساگرایی (MAP)
کلمات کلیدی انگلیسی Greedy search, information source detection, likelihood approximation, maximum a posteriori (MAP)
شناسه دیجیتال – doi
https://doi.org/10.1109/TSMC.2018.2811410
کد محصول E10366
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

فهرست مطالب مقاله:
Abstract
I INTRODUCTION
II RELATED WORK
III PRELIMINARIES
V APPROXIMATE MAP ESTIMATORS
VI EXPERIMENT
VII CONCLUSION
REFERENCES

 

بخشی از متن مقاله:
Abstract

Information source detection is to identify nodes initiating the diffusion process in a network, which has a wide range of applications including epidemic outbreak prevention, Internet virus source identification, and rumor source tracing in social networks. Although it has attracted ever-increasing attention from research community in recent years, existing solutions still suffer from high time complexity and inadequate effectiveness, due to high dynamics of information diffusion and observing just a snapshot of the whole process. To this end, we present a comprehensive study for single information source detection in weighted graphs. Specifically, we first propose a maximum a posteriori (MAP) estimator to detect the information source with other methods as the prior, which ensures our method can be integrated with others naturally. Different from many related works, we exploit both infected nodes and their uninfected neighbors to calculate the effective propagation probability, and then derive the exact formation of likelihood for general weighted graphs. To further improve the efficiency, we design two approximate MAP estimators, namely brute force search approximation (BFSA) and greedy search bound approximation (GSBA), from the perspective of likelihood approximation. BFSA tries to traverse the permitted permutations to directly compute the likelihood, but GSBA exploits a strategy of greedy search to find a surrogate upper bound of the likelihood, and thus avoids the enumeration of permitted permutations. Therefore, detecting with partial nodes and likelihood approximation reduces the computational complexity drastically for large graphs. Extensive experiments on several data sets also clearly demonstrate the effectiveness of our methods on detecting the single information source with different settings in weighted graphs.

INTRODUCTION

THE BOOM of research on social network analysis [1]–[۵] has brought ever-increasing attention to the topics of information source detection [6]–[۸], influence maximization [9]–[۱۲], and so on [13]–[۱۶] in recent years. Information source detection aims to identify the nodes initiating the diffusion process based on a single snapshot of the infected network (e.g., diffusion of opinion, rumor, and epidemic). Its wide range of applications include epidemic outbreak prevention, Internet virus source identification, and rumor source tracing in social networks [7], [17]–[۲۰]. The research challenges of this problem come from a number of aspects. First, information diffusion is characteristic of high dynamics and displays a great variety of patterns when initiating from different sources [21]. For example, in social networks, a photograph will be shared more times if it is posted by a celebrity. Second, the actual information diffusion laws are unknown. Although many models have been proposed such as the susceptible-infected-recovered (SIR) model [22] and independent cascade (IC) model [23], they cannot describe information diffusion comprehensively. Third, we only observe a snapshot of the infected network, which is just a part of the whole diffusion process. Nevertheless, various methods have been introduced along the years to overcome these challenges and detect the source of a diffusion for different situations, including methods based on centrality [8], [24], spectral [17], [19], belief propagation (BP) [25]–[۲۷], and so on. However, existing methods are still deemed inadequate due to their high computational complexity and yet-to-be-improved effectiveness. For example, rumor center (RC) [8] only considers the utility of infected nodes to detect the source in homogeneous graphs, and Jordan center (JC) [6] just aims to minimize the maximum distance from the source to others and neglects the dynamicity of information diffusion. Dynamic message passing (DMP) [27], one of the state-of-the-arts, exploits all nodes in the network to estimate the marginal probability of a given node to be in a given state and how long the information has already propagated, which is too time-consuming.

نوشته های مشابه

دیدگاهتان را بنویسید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *

دکمه بازگشت به بالا