Please use this identifier to cite or link to this item:
http://cmuir.cmu.ac.th/jspui/handle/6653943832/70448
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Shuliang Wang | en_US |
dc.contributor.author | Kanokwan Malang | en_US |
dc.contributor.author | Hanning Yuan | en_US |
dc.contributor.author | Aniwat Phaphuangwittayakul | en_US |
dc.contributor.author | Yuanyuan Lv | en_US |
dc.contributor.author | Matthew David Lowdermilk | en_US |
dc.contributor.author | Jing Geng | en_US |
dc.date.accessioned | 2020-10-14T08:31:06Z | - |
dc.date.available | 2020-10-14T08:31:06Z | - |
dc.date.issued | 2020-01-01 | en_US |
dc.identifier.issn | 10990526 | en_US |
dc.identifier.issn | 10762787 | en_US |
dc.identifier.other | 2-s2.0-85087727934 | en_US |
dc.identifier.other | 10.1155/2020/7643290 | en_US |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85087727934&origin=inward | en_US |
dc.identifier.uri | http://cmuir.cmu.ac.th/jspui/handle/6653943832/70448 | - |
dc.description.abstract | © 2020 Shuliang Wang et al. Skeleton network extraction is a crucial context in studying the core structure and essential information on complex networks. The objective of this paper is to introduce the novel network extraction method, namely, TPKS-skeleton, for investigating the global terrorism network. Our method aims to reduce the network's size while preserving key topology and spatial features. A TPKS-skeleton comprises three steps: node evaluation, similarity-based clustering, and skeleton network reconstruction. The importance of skeleton nodes is quantified by the improved topology potential algorithm. Similarity-based clustering is then integrated to allow detecting high incident concentrations and allocating the important nodes according to the event features and spatial distribution. Finally, the skeleton network can be reconstructed by aggregating high-influential nodes from each cluster and their simplified edges. To verify the efficiency of the proposed method, we carry out three classes of a network assessment framework: node-equivalence assessment, network-equivalence assessment, and spatial information assessment. For each class, various assessment indexes were performed using the original network as a benchmark. The results verify that our proposed TPKS-skeleton outperforms other competitive methods in particular node-equivalence by Spearman rank correlation and high network structural-equivalence defined by quadratic assignment procedure. In the spatial perspective, the TPKS-skeleton network preserves reasonably all kinds of spatial information. Our study paves the way to extract the optimal skeleton of the global terrorism network, which might be beneficial for counterterrorism and network analysis in wider areas. | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Multidisciplinary | en_US |
dc.title | Extracting Skeleton of the Global Terrorism Network Based on m-Modified Topology Potential | en_US |
dc.type | Journal | en_US |
article.title.sourcetitle | Complexity | en_US |
article.volume | 2020 | en_US |
article.stream.affiliations | Beijing Institute of Technology | en_US |
article.stream.affiliations | Chiang Mai University | en_US |
Appears in Collections: | CMUL: Journal Articles |
Files in This Item:
There are no files associated with this item.
Items in CMUIR are protected by copyright, with all rights reserved, unless otherwise indicated.