{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:32:23Z","timestamp":1740133943668,"version":"3.37.3"},"reference-count":15,"publisher":"World Scientific Pub Co Pte Ltd","issue":"03","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":[". 61977016"],"award-info":[{"award-number":[". 61977016"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":[". 61572010"],"award-info":[{"award-number":[". 61572010"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":[". 2020J01164"],"award-info":[{"award-number":[". 2020J01164"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":[". 2017J01738"],"award-info":[{"award-number":[". 2017J01738"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Found. Comput. Sci."],"published-print":{"date-parts":[[2024,4]]},"abstract":"<jats:p> Networks with distinct topological structures varies in the ability to resist different kinds of attacks. Node protection in terms of node importance is an effective way to ensure the reliable communication of networks. Thus, the protection of influential node detected by node importance evaluation is beneficial to strengthen the invulnerability and robustness of networks. In this work, the network agglomeration method based on node contraction is utilized to evaluate the influence of nodes and identify important nodes in five kinds of interconnection networks. We show that the agglomeration method, which takes both the degree and position into account, is valid and feasible for these five interconnection networks. <\/jats:p>","DOI":"10.1142\/s0129054123500028","type":"journal-article","created":{"date-parts":[[2023,2,9]],"date-time":"2023-02-09T02:11:41Z","timestamp":1675908701000},"page":"271-295","source":"Crossref","is-referenced-by-count":0,"title":["Influential Node Identification of Network Based on Agglomeration Operation"],"prefix":"10.1142","volume":"35","author":[{"given":"Baohua","family":"Niu","sequence":"first","affiliation":[{"name":"College of Mathematics and Statistics, Fujian Normal University, Fuzhou, Fujian 350117, P. R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6481-3981","authenticated-orcid":false,"given":"Shuming","family":"Zhou","sequence":"additional","affiliation":[{"name":"Center for Applied Mathematics of Fujian Province (Fujian Normal University), Fuzhou, 350117, P. R. China"}]},{"given":"Hong","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Mathematics and Statistics, Fujian Normal University, Fuzhou, Fujian 350117, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2023,2,8]]},"reference":[{"volume-title":"Introduction to Graph Theory","year":"2001","author":"West D. B.","key":"S0129054123500028BIB001"},{"key":"S0129054123500028BIB002","doi-asserted-by":"publisher","DOI":"10.1126\/science.298.5594.824"},{"key":"S0129054123500028BIB003","doi-asserted-by":"publisher","DOI":"10.7498\/aps.58.3597"},{"key":"S0129054123500028BIB004","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-017-0487-0"},{"key":"S0129054123500028BIB005","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"key":"S0129054123500028BIB006","doi-asserted-by":"publisher","DOI":"10.1126\/science.286.5439.509"},{"key":"S0129054123500028BIB007","doi-asserted-by":"publisher","DOI":"10.1038\/35019019"},{"key":"S0129054123500028BIB008","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.82.056101"},{"key":"S0129054123500028BIB009","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2012.02.033"},{"key":"S0129054123500028BIB010","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.86.3682"},{"key":"S0129054123500028BIB011","doi-asserted-by":"publisher","DOI":"10.1016\/j.cjph.2018.11.003"},{"key":"S0129054123500028BIB012","first-page":"579","volume":"1","author":"Liu K.","year":"2014","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"S0129054123500028BIB013","first-page":"1","volume":"7","author":"Kunt A. A.","year":"2020","journal-title":"International Journal of Foundations of Computer Science"},{"key":"S0129054123500028BIB014","doi-asserted-by":"publisher","DOI":"10.1142\/S0129054121500210"},{"issue":"11","key":"S0129054123500028BIB015","first-page":"79","volume":"26","author":"Tan Y.-J.","year":"2006","journal-title":"Systems Engineering-Theory and Practice"}],"container-title":["International Journal of Foundations of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0129054123500028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,5]],"date-time":"2024-04-05T08:03:55Z","timestamp":1712304235000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0129054123500028"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,8]]},"references-count":15,"journal-issue":{"issue":"03","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["10.1142\/S0129054123500028"],"URL":"https:\/\/doi.org\/10.1142\/s0129054123500028","relation":{},"ISSN":["0129-0541","1793-6373"],"issn-type":[{"type":"print","value":"0129-0541"},{"type":"electronic","value":"1793-6373"}],"subject":[],"published":{"date-parts":[[2023,2,8]]}}}