{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T13:42:40Z","timestamp":1740145360685,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,2,15]],"date-time":"2019-02-15T00:00:00Z","timestamp":1550188800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Autom. Comput."],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11633-018-1167-2","type":"journal-article","created":{"date-parts":[[2019,2,15]],"date-time":"2019-02-15T05:51:48Z","timestamp":1550209908000},"page":"341-353","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Management of Control Impacts Based on Maximizing the Spread of Influence"],"prefix":"10.1007","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6956-5315","authenticated-orcid":false,"given":"Alexander","family":"Tselykh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7485-8614","authenticated-orcid":false,"given":"Vladislav","family":"Vasilev","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5663-1563","authenticated-orcid":false,"given":"Larisa","family":"Tselykh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,15]]},"reference":[{"issue":"4","key":"1167_CR1","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/s11633-018-1124-0","volume":"15","author":"B. Chang","year":"2018","unstructured":"B. Chang, T. Xu, Q. Liu, E. H. Chen. Study on information diffusion analysis in social networks and its applications. International Journal of Automation and Computing, vol. 15, no. 4, pp. 377\u2013401, 2018. DOI: \n                    https:\/\/doi.org\/10.1007\/s11633-018-1124-0\n                    \n                  .","journal-title":"International Journal of Automation and Computing"},{"key":"1167_CR2","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.ins.2016.08.023","volume":"379","author":"S. C. Peng","year":"2017","unstructured":"S. C. Peng, A. M. Yang, L. H. Cao, S. Yu, D. Q. Xie. Social influence modeling using information theory in mobile social networks. Information Sciences, vol. 379, pp. 146\u2013159, 2017. DOI: \n                    https:\/\/doi.org\/10.1016\/j.ins.2016.08.023\n                    \n                  .","journal-title":"Information Sciences"},{"key":"1167_CR3","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.jnca.2018.01.005","volume":"106","author":"S. C. Peng","year":"2018","unstructured":"S. C. Peng, Y. M. Zhou, L. H. Cao, S. Yu, J. W. Niu, W. J. Jia. Influence analysis in social networks: A survey. Journal of Network and Computer Applications, vol. 106, pp. 17\u201332, 2018. DOI: \n                    https:\/\/doi.org\/10.1016\/j.jnca.2018.01.005\n                    \n                  .","journal-title":"Journal of Network and Computer Applications"},{"key":"1167_CR4","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1145\/956750.956769","volume-title":"Proceedings of the 9th International Conference on Knowledge Discovery and Data Mining","author":"D. Kempe","year":"2003","unstructured":"D. Kempe, J. Kleinberg, E. Tardos. Maximizing the spread of influence through a social network. In Proceedings of the 9th International Conference on Knowledge Discovery and Data Mining, ACM, Washington, USA, pp. 105\u2013147, 2003. DOI: \n                    https:\/\/doi.org\/10.1145\/956750.956769\n                    \n                  ."},{"issue":"6","key":"1167_CR5","doi-asserted-by":"publisher","first-page":"1420","DOI":"10.1086\/226707","volume":"83","author":"M. Granovetter","year":"1978","unstructured":"M. Granovetter. Threshold models of collective behavior. American Journal of Sociology, vol. 83, no. 6, pp. 1420\u20131443, 1978. DOI: \n                    https:\/\/doi.org\/10.1086\/226707\n                    \n                  .","journal-title":"American Journal of Sociology"},{"issue":"3","key":"1167_CR6","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1023\/A:1011122126881","volume":"12","author":"J. Goldenberg","year":"2001","unstructured":"J. Goldenberg, B. Libai, E. Muller. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing Letters, vol. 12, no. 3, pp. 211\u2013223, 2001. DOI: \n                    https:\/\/doi.org\/10.1023\/A:1011122126881\n                    \n                  .","journal-title":"Marketing Letters"},{"issue":"1\u20137","key":"1167_CR7","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/S0169-7552(98)00110-X","volume":"30","author":"S. Brin","year":"1998","unstructured":"S. Brin, L. Page. The anatomy of a large-scale hypertextual web search engine. Computer Networks and ISDN Systems, vol. 30, no. 1\u20137, pp. 107\u2013117, 1998. DOI: \n                    https:\/\/doi.org\/10.1016\/S0169-7552(98)00110-X\n                    \n                  .","journal-title":"Computer Networks and ISDN Systems"},{"issue":"1","key":"1167_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11633-016-1052-9","volume":"14","author":"G. R. Chen","year":"2017","unstructured":"G. R. Chen. Pinning control and controllability of complex dynamical networks. International Journal of Automation and Computing, vol. 14, no. 1, pp. 1\u20139, 2017. DOI: \n                    https:\/\/doi.org\/10.1007\/s11633-016-1052-9\n                    \n                  .","journal-title":"International Journal of Automation and Computing"},{"issue":"1","key":"1167_CR9","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/S0020-7373(86)80040-2","volume":"24","author":"B. Kosko","year":"1986","unstructured":"B. Kosko. Fuzzy cognitive maps. International Journal of Man-Machine Studies, vol. 24, no. 1, pp. 65\u201375, 1986. DOI: \n                    https:\/\/doi.org\/10.1016\/S0020-7373(86)80040-2\n                    \n                  .","journal-title":"International Journal of Man-Machine Studies"},{"key":"1167_CR10","volume-title":"Fuzzy Control and Fuzzy Systems","author":"W. Pedrycz","year":"1993","unstructured":"W. Pedrycz. Fuzzy Control and Fuzzy Systems, 2nd ed., New York, USA: John Wiley & Sons, 1993."},{"key":"1167_CR11","volume-title":"Discrete Mathematical Models with Applications to Social","author":"F. S. Roberts","year":"1997","unstructured":"F. S. Roberts. Discrete Mathematical Models with Applications to Social, Biological, and Environmental Problems, Englewood Cliffs, USA: Prentice Hall Press, 1997."},{"issue":"3","key":"1167_CR12","doi-asserted-by":"publisher","first-page":"11697","DOI":"10.3182\/20140824-6-ZA-1003.00946","volume":"47","author":"W. Yang","year":"2014","unstructured":"W. Yang, X. F. Wang, H. B. Shi. Optimal control nodes selection for consensus in multi-agent systems. IFAC Proceedings Volumes, vol. 47, no. 3, pp. 11697\u201311702, 2014. DOI: \n                    https:\/\/doi.org\/10.3182\/20140824-6-ZA-1003.00946\n                    \n                  .","journal-title":"IFAC Proceedings Volumes"},{"key":"1167_CR13","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.physa.2015.11.018","volume":"446","author":"M. Y. Zhou","year":"2016","unstructured":"M. Y. Zhou, X. S. He, Z. Q. Fu, H. Liao, S. M. Cai, Z. Zhuo. Diffusion inspires selection of pinning nodes in pinning control. Physica A: Statistical Mechanics and its Applications, vol. 446, pp. 120\u2013128, 2016. DOI: \n                    https:\/\/doi.org\/10.1016\/j.physa.2015.11.018\n                    \n                  .","journal-title":"Physica A: Statistical Mechanics and its Applications"},{"key":"1167_CR14","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.comnet.2017.05.004","volume":"123","author":"P. Wu","year":"2017","unstructured":"P. Wu, L. Pan. Scalable influence blocking maximization in social networks under competitive independent cascade models. Computer Networks, vol. 123, pp. 38\u201350, 2017. DOI: \n                    https:\/\/doi.org\/10.1016\/j.comnet.2017.05.004\n                    \n                  .","journal-title":"Computer Networks"},{"key":"1167_CR15","doi-asserted-by":"publisher","unstructured":"C. Budak, D. Agrawal, A. El Abbadi. Limiting the spread of misinformation in social networks. In Proceedings of the 20th International Conference on World Wide Web, ACM, Hyderabad, India, pp. 665\u2013674, 2011. DOI: \n                    https:\/\/doi.org\/10.1145\/1963405.1963499\n                    \n                  .","DOI":"10.1145\/1963405.1963499"},{"issue":"24","key":"1167_CR16","doi-asserted-by":"publisher","first-page":"6603","DOI":"10.1016\/j.physa.2013.09.004","volume":"392","author":"J. Ding","year":"2013","unstructured":"J. Ding, Y. Z. Lu, J. Chu. Studies on controllability of directed networks with extremal optimization. Physica A: Statistical Mechanics and its Applications, vol. 392, no. 24, pp. 6603\u20136615, 2013. DOI: \n                    https:\/\/doi.org\/10.1016\/j.physa.2013.09.004\n                    \n                  .","journal-title":"Physica A: Statistical Mechanics and its Applications"},{"key":"1167_CR17","doi-asserted-by":"publisher","first-page":"1524","DOI":"10.1016\/j.neucom.2015.07.102","volume":"171","author":"J. Ding","year":"2016","unstructured":"J. Ding, P. Tan, Y. Z. Lu. Optimizing the controllability index of directed networks with the fixed number of control nodes. Neurocomputing, vol. 171, pp. 1524\u20131532, 2016. DOI: \n                    https:\/\/doi.org\/10.1016\/j.neucom.2015.07.102\n                    \n                  .","journal-title":"Neurocomputing"},{"issue":"7346","key":"1167_CR18","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1038\/nature10011","volume":"473","author":"Y. Y. Liu","year":"2011","unstructured":"Y. Y. Liu, J. J. Slotine, A. L. Barabasi. Controllability of complex networks. Nature, vol. 473, no. 7346, pp. 161\u2013173, 2011. DOI: \n                    https:\/\/doi.org\/10.1038\/nature10011\n                    \n                  .","journal-title":"Nature"},{"key":"1167_CR19","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1016\/j.physa.2017.01.053","volume":"474","author":"N. Cai","year":"2017","unstructured":"N. Cai. On quantitatively measuring controllability of complex networks. Physica A: Statistical Mechanics and its Applications, vol. 474, pp. 282\u2013292, 2017. DOI: \n                    https:\/\/doi.org\/10.1016\/j.physa.2017.01.053\n                    \n                  .","journal-title":"Physica A: Statistical Mechanics and its Applications"},{"issue":"3","key":"1167_CR20","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/S0378-8733(01)00038-7","volume":"23","author":"P. Bonacich","year":"2001","unstructured":"P. Bonacich, P. Lloyd. Eigenvector-like measures of centrality for asymmetric relations. Social Networks, vol. 23, no. 3, pp. 191\u2013201, 2001. DOI: \n                    https:\/\/doi.org\/10.1016\/S0378-8733(01)00038-7\n                    \n                  .","journal-title":"Social Networks"},{"key":"1167_CR21","volume-title":"Matrix Analysis","author":"R. A. Horn","year":"2013","unstructured":"R. A. Horn, C. R. Johnson. Matrix Analysis, 2nd ed., New York, USA: Cambridge University Press, 2013."},{"key":"1167_CR22","volume-title":"Time Series Analysis: Forecasting and Control","author":"G. E. P. Box","year":"1994","unstructured":"G. E. P. Box, G. M. Jenkins, G. C. Reinsel. Time Series Analysis: Forecasting and Control, Englewood Cliffs, USA: Prentice Hall, 1994."},{"key":"1167_CR23","volume-title":"The Analysis of Time Series: An Introduction","author":"C. Chatfield","year":"1996","unstructured":"C. Chatfield. The Analysis of Time Series: An Introduction, London, UK: Chapman & Hall, 1996."},{"issue":"2","key":"1167_CR24","doi-asserted-by":"publisher","first-page":"203","DOI":"10.15598\/aeee.v15i2.1950","volume":"15","author":"A. N. Tselykh","year":"2017","unstructured":"A. N. Tselykh, V. S. Vasilev, L. A. Tselykh, S. A. Barkovskii. Method maximizing the spread of influence in directed signed weighted graphs. Advances in Electrical and Electronic Engineering, vol. 15, no. 2, pp. 203\u2013214, 2017. DOI: \n                    https:\/\/doi.org\/10.15598\/aeee.v15i2.1950\n                    \n                  .","journal-title":"Advances in Electrical and Electronic Engineering"},{"key":"1167_CR25","volume-title":"The Theory of Matrices","author":"P. Lancaster","year":"1985","unstructured":"P. Lancaster, M. Tismenetsky. The Theory of Matrices, Orlando, USA: Academic Press, 1985."},{"key":"1167_CR26","volume-title":"Constrained Optimization and Lagrange Multiplier Methods","author":"D. P. Bertsekas","year":"1996","unstructured":"D. P. Bertsekas. Constrained Optimization and Lagrange Multiplier Methods, Belmont, USA: Athena Scientific, 1996."},{"issue":"7","key":"1167_CR27","first-page":"101","volume":"168","author":"A. Tselykh","year":"2015","unstructured":"A. Tselykh, L. Tselykh. Methodology for comparative cognitive modeling based on the analysis of fuzzy target and control factors. Izvestiya SFedU.Engineering sciences, vol. 168, no. 7, pp. 101\u2013115, 2015.","journal-title":"Izvestiya SFedU.Engineering sciences"},{"issue":"3","key":"1167_CR28","doi-asserted-by":"publisher","first-page":"37","DOI":"10.5901\/mjss.2015.v6n3s4p37","volume":"6","author":"A. H. Karanashev","year":"2015","unstructured":"A. H. Karanashev, A. G. Karasheva, L. B. Baysultanova, L. A. Tselykh, E. A. Panfilova. Comparative cognitive corporate culture modeling of the Kabardino-Balkaria republic\u2032s enterprises recreational sphere. Mediterranean Journal of Social Sciences, vol. 6, no. 3 S4, pp. 37\u201343, 2015. DOI: \n                    https:\/\/doi.org\/10.5901\/mjss.2015.v6n3s4p37\n                    \n                  .","journal-title":"Mediterranean Journal of Social Sciences"},{"key":"1167_CR29","doi-asserted-by":"publisher","first-page":"35","DOI":"10.5772\/7118","volume-title":"Subject-formal Methods Based on Cognitive Maps and the Problem of Risk Due to the Human Factor","author":"N. Abramova","year":"2010","unstructured":"N. Abramova, Z. Avdeeva, S. Kovriga, D. Makarenko. Subject-formal Methods Based on Cognitive Maps and the Problem of Risk Due to the Human Factor, Vienna, Austria: InTech, pp. 35\u201363, 2010. DOI: \n                    https:\/\/doi.org\/10.5772\/7118\n                    \n                  ."},{"issue":"2","key":"1167_CR30","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1080\/12294659.2005.10805047","volume":"9","author":"D. H. Kim","year":"2004","unstructured":"D. H. Kim. Cognitive maps of policy makers on financial crises of South Korea and Malaysia: A comparative study. International Review of Public Administration, vol. 9, no. 2, pp. 31\u201338, 2004. DOI: \n                    https:\/\/doi.org\/10.1080\/12294659.2005.10805047\n                    \n                  .","journal-title":"International Review of Public Administration"},{"key":"1167_CR31","volume-title":"Solutions of Ill-Posed Problems","author":"A. Tikhonov","year":"1977","unstructured":"A. Tikhonov, V. Arsenin. Solutions of Ill-Posed Problems, New York, USA: Wiley, 1977."}],"container-title":["International Journal of Automation and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11633-018-1167-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-018-1167-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-018-1167-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,14]],"date-time":"2020-02-14T19:30:18Z","timestamp":1581708618000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11633-018-1167-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,15]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["1167"],"URL":"https:\/\/doi.org\/10.1007\/s11633-018-1167-2","relation":{},"ISSN":["1476-8186","1751-8520"],"issn-type":[{"type":"print","value":"1476-8186"},{"type":"electronic","value":"1751-8520"}],"subject":[],"published":{"date-parts":[[2019,2,15]]},"assertion":[{"value":"4 August 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 November 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}