Research Article  Open Access
Yuanzhi Yang, Lei Yu, Zhongliang Zhou, You Chen, Tian Kou, "Node Importance Ranking in Complex Networks Based on Multicriteria Decision Making", Mathematical Problems in Engineering, vol. 2019, Article ID 9728742, 12 pages, 2019. https://doi.org/10.1155/2019/9728742
Node Importance Ranking in Complex Networks Based on Multicriteria Decision Making
Abstract
Measuring node importance in complex networks has great theoretical and practical significance for network stability and robustness. A variety of network centrality criteria have been presented to address this problem, but each of them focuses only on certain aspects and results in loss of information. Therefore, this paper proposes a relatively comprehensive and effective method to evaluate node importance in complex networks using a multicriteria decisionmaking method. This method not only takes into account degree centrality, closeness centrality, and betweenness centrality, but also uses an entropy weighting method to calculate the weight of each criterion, which can overcome the influence of the subjective factor. To illustrate the effectiveness and feasibility of the proposed method, four experiments were conducted to rank node importance on four real networks. The experimental results showed that the proposed method can rank node importance more comprehensively and accurately than a single centrality criterion.
1. Introduction
In recent years, the study of complex network theory has received sustained attention in various academic fields, such as aviation networks [1, 2], power networks [3–5], social networks [6–8], and biological networks [9–11]. By collecting and analyzing data from actual networks, researchers have studied the statistical characteristics [12, 13] and the dynamic behavior of networks [14]. The results showed that the status of nodes in actual complex networks is unequal. Moreover, scalefree characteristics [15–17] indicate that the effect on function and structure of different nodes may vary greatly and that the cascading effect [18–20] and propagation effect [21] of the network will be affected by a few important nodes.
The term “important nodes” refers to certain nodes that can affect network structure and function to a greater extent than other nodes in the network [22]. Therefore, evaluating node importance is of great theoretical and practical significance [23, 24]. For example, it can be used to prevent the spread of disease [25, 26], stop the diffusion of rumors [27, 28], ensure the smooth flow of aviation networks [1], prevent power grids from being powered off [29, 30], and keep communication networks connected [31, 32].
Current methods of node importance analysis include social network methods and systems science methods [33]. The social network methods assume that node importance is equivalent to significance and do not destroy network connectivity. On the contrary, system science methods assume that node importance is equivalent to the destructiveness of removing nodes from the network and that node importance can be determined by analyzing connectivity indictors of the deleted nodes network. Systems science methods damage the network system, resulting in network topology changes that lose information about the relationships between nodes, but social network methods can keep the original appearance of the network. Hence, in this paper, social network methods using relevant indictors of node centrality are generally used.
Although existing centrality criteria have been widely used, they do have some shortcomings and deficiencies. Degree centrality (DC) [34] assumes that the greater the number of adjacent nodes, the greater their influence. This is an expression of node importance, but it only considers local information about nodes, ignoring global network structure. Closeness centrality (CC) [35] is represented by the reciprocal of the distance between the given node and other nodes in the network. It can be treated as a measurement of how long it takes information to spread from a given node to others, but it will fail when handling networks with disconnected components. Betweenness centrality (BC) [36] measures node importance by means of the ratio of the shortest path over the nodes to the number of all paths. It compensates for the limitations of degree centrality and closeness centrality, but problems still exist. If many nodes do not belong to the shortest path of other node pairs, then the result for betweenness centrality will be zero [37]. In addition, other node importance ranking methods are also widely used, such as eigenvector centrality [38], subgraph centrality [39], cumulative nomination [40], PageRank [41], and others. In this regard, Liu et al. [42], Lü et al. [43], and Sun et al. [44] have provided excellent summaries. A large number of experts and researchers have tried to find measures to evaluate node importance from different perspectives, but only one aspect of node importance is reflected, and in an actual network, describing node importance with a single indicator will give onesided results. To illustrate the problem, the Kite network [45] is shown in Figure 1, and the values of degree centrality, closeness centrality, and betweenness centrality are given in Table 1. Evidently, Diane is of greatest importance using degree centrality, and the most influential nodes using closeness centrality are Fernando and Garth. However, Fernando, Garth, and Diane are ranked second, fourth, and fifth, respectively, according to betweenness centrality. Based on the above analysis, it is clear that using different centrality criteria to identify important nodes in a network will produce different results.

To overcome the shortcomings of node importance ranking using a single criterion, a range of criteria must be considered that affect node importance from different perspectives. Therefore, this paper proposes a multicriteria decisionmaking (MCDM) method to rank node importance effectively. MCDM has been widely used in many fields [46–50], and in various MCDM studies, the Technology for Order Preference by Similarity to an Ideal Solution (TOPSIS) method [51] has been successfully applied in different fields [52, 53], while the entropy weighting (EW) method [54], as an important objective weighting method, has also been applied in many fields [55–57].
Therefore, the TOPSIS method and the entropy weighting method were combined to propose a novel method called EWTOPSIS. The proposed method is based on degree centrality, closeness centrality, and betweenness centrality and computes node importance through integrated computation of these criteria. Because the measurement of node importance takes into account multiple factors that impact node importance without a onesided emphasis on any single factor, the measurement is more accurate compared to when using a single criterion. Moreover, compared with other multicriteria decisionmaking methods, the proposed method uses an entropy weighting method to calculate the weight of each criterion, overcoming the disadvantage of the original TOPSIS using equal weights. This research solves the problem of partial and inaccurate ranking of node importance. It provides a beneficial supplement to network node importance measurement, enriches existing research on complex networks, and has great academic value. To demonstrate the effectiveness of the proposed method, four real networks (Zachary’s karate club, the dolphin social network, American college football, and jazz musicians) were used as experimental data. The susceptibleinfected (SI) model [58] was chosen to examine the spread of the influence of the nodes ranked by the proposed method and by a single criterion. The experimental results reveal the superiority of the proposed method.
The primary contributions of this paper can be summarized as follows:
(i) A novel method of node importance ranking in complex networks based on multicriteria decision making is proposed. It comprehensively combines the advantages of various criteria from different perspectives and makes the measurement more accurate and universal.
(ii) An entropy weighting method is proposed to calculate the weight of each criterion. It can overcome the influence of subjective factors and obtain an objective result.
(iii) Four experiments on four real networks have been conducted, and the experimental results show that the proposed method has superior performance in identifying important nodes in complex networks.
The rest of this paper is organized as follows. Section 2 briefly introduces the definitions of a graph and of some centrality criteria. The proposed method to rank node importance using the entropy weighting method and TOPSIS is illustrated in Section 3. Section 4 evaluates the performance of the proposed method based on four real networks. Finally, Section 5 presents conclusions.
2. Node Importance Criteria
An undirected network can be denoted as , where and are the sets of nodes and edges, respectively. is the adjacency matrix of the network; if there is a connection between node and node , ; otherwise, .
Definition 1 (degree centrality). The degree of node denotes the number of neighbor nodes, expressed as [34]Then degree centrality can be denoted as in the following equation:Degree centrality reflects the ability of a node to communicate directly with other nodes. The greater the value of degree centrality, the more important the node.
Definition 2 (closeness centrality). The closeness centrality of node is defined as the reciprocal of the sum of the shortest distances to all other nodes, expressed as [35]where is the distance between node and node . If there is no reachable path between node and node , then (). Closeness centrality can be treated as a measurement of a node’s importance through the average spread time of information in the network. The greater the value of closeness centrality, the more important the node.
Definition 3 (betweenness centrality). The betweenness of node is defined as the fraction of shortest paths between all node pairs that pass through node , as given by [36]where represents the number of shortest paths between node and node which pass through node , and is the number of all possible shortest paths between node and node .
The betweenness centrality of node is the normalization of . For an undirected network, the maximum possible number of node pairs is , and betweenness centrality can be expressed asBetweenness centrality can be understood as the ability of a node to control the network flow traveling along the shortest path in the network. The greater the value of betweenness centrality, the more important the node.
The above criteria can measure node importance, but they are a onesided way to rank node importance with a single criterion. Therefore, to conduct a more comprehensive and objective ranking of node importance, a novel method is proposed here, integrating the above criteria based on the entropy weighting method and TOPSIS.
3. Proposed Method
TOPSIS is a common method to solve multicriteria decisionmaking problems. Original TOPSIS has been used to identify important nodes [33, 59, 60]. However, original TOPSIS simply gives equal weight to each criterion, ignoring that different criteria play different roles in the decisionmaking process.
3.1. Constitute the Weighted Decision Matrix
If the set of nodes in a network is and the set of centrality criteria is , then represents the value of the jth criterion for the ith node. The decision matrix can be obtained asBecause the dimension is different for each criterion, it is necessary to eliminate the dimensional differences among criteria and standardize the decision matrix. The criteria can be divided into benefit criteria (the higher the criterion, the more important the node) and cost criteria (the higher the criterion, the less important the node). The abovementioned three criteria are all benefit criteria.
For cost criteria, the standardization process can be expressed asSimilarly, for benefit criteria it is expressed aswhere , .
The normalized decision matrix can be denoted as .
The entropy weighting method, which is used to calculate the weight of each criterion, determines the weight according to the variability of the criterion. The information entropy of the jth criterion is denoted aswhere .
When , then .
Then the weighting coefficient of the jth criterion can be calculated asMultiplying the columns of the normalized decision matrix by the associated weights yields the weighted decision matrix, which can be denoted as
3.2. Calculate the Distance to the Ideal Solution
The positive ideal solution and the negative ideal solution are defined as follows:Thus, the distance of each scheme to the positive ideal solution and the negative ideal solution can be calculated by the following equations, respectively:
3.3. Rank Node Importance
The closeness degree to the ideal solution can be calculated asThe closeness degree is the measurement of a node’s importance, and the vector of node importance can be simply denoted asWhen is ranked in descending order based on the value of each node’s importance, the resulting node importance ranking is obtained aswhere .
Combined with the above theoretical analysis, the specific steps of node importance ranking in complex networks can be given as in Algorithm 1.

4. Simulation and Analysis
4.1. Experimental Data
This section describes the use of four actual networks to verify the feasibility and effectiveness of the proposed method. (i) Zachary’s karate club [61] is a social network that Zachary has observed among a karate club’s 34 members in an American university over a few years. Each node represents a member of the club, and an edge represents the connection between two members of the club. (ii) The dolphin social network [62] is a social network that was observed by Lusseau and Newman in a group of New Zealand bottlenose dolphins for seven years. Each node represents a dolphin, and an edge represents the frequency of contact between two dolphins. (iii) The American college football [63] network describes American football games between Division IA colleges during the regular season in Fall 2000. Each node is a player, and an edge represents a regular season game between the two teams. (iv) Jazz musicians [64] is a collaborative network between jazz musicians. Each node is a jazz musician, and an edge denotes that two musicians have played together in a band.
4.2. Experimental Analysis
4.2.1. Experiment 1: Compare the Top 10 Nodes between the EWTOPSIS Method and Centrality Criteria
In this experiment, the EWTOPSIS method is used to identify the top 10 nodes based on the four actual networks, and the three centrality criteria DC, CC, and BC are also used for comparison. Table 2 shows the comparison results.

According to Table 2, in the karate club network, comparing the top 10 nodes of the EWTOPSIS method and DC and CC, nine of the nodes in their top 10 lists are the same. Between the EWTOPSIS method and BC, eight of the nodes in their top 10 lists are the same. In the dolphin network, the number of nodes in the top 10 lists that were the same between the EWTOPSIS method and the centrality criteria (DC, CC, and BC) was seven, seven, and nine, respectively. In the top 10 list of the football network, four of the nodes were the same between the EWTOPSIS method and DC and CC, and the top10 nodes were all the same when comparing the EWTOPSIS method and BC. In the jazz musicians network, the top two nodes (node 136 and node 60) using the four methods were the same, which says that node 136 and node 60 are the most important nodes and that node 136 is more important than node 60.
By comparing the top 10 nodes using four methods based on four actual networks, it is clear that the ranking results of DC, CC, BC, and the EWTOPSIS method are different. Different centrality criteria measure node importance from different perspectives. The EWTOPSIS method comprehensively considers multiple criteria, and the ranking results are more scientific and reasonable.
4.2.2. Experiment 2: Compare the Frequency of Nodes with the Same Ranking
Different nodes may have the same ranking, which makes it impossible to rank nodes with the same ranking accurately. For a node importance ranking method, the higher the frequency of the same ranking, the worse the performance of the ranking method. Therefore, the frequency of nodes with the same ranking can be used as an indicator to measure the performance of the method. The frequency of nodes with same ranking was compared using the four methods, with the results shown in Figure 2. For more comparisons between the existing centrality criteria and the proposed method, the maximum frequencies of nodes with the same ranking are compared in Table 3.

According to Figure 2, the frequency of nodes with the same ranking in the EWTOPSIS method is the lowest, whereas the three centrality criteria generate nodes with the same ranking in varying degrees. From Table 3, for the karate club network, the maximum frequency of nodes with the same ranking as sorted by BC is 55.88 percent, but with the proposed method, it is only 5.88 percent. In the dolphin network, the maximum frequency of nodes when sorted by BC reaches 25.81 percent, but with the proposed method, it is 3.23 percent. The gap is even larger in the football network, where the maximum frequency as sorted by DC is as high as 57.39 percent, but that with the proposed method is 0.87 percent. The difference also exists in the jazz musicians’ network. The conclusion can be drawn that the EWTOPSIS method is more effective than the three centrality criteria from this perspective.
4.2.3. Experiment 3: Compare the Average Infection Ability of the Top 10 Nodes
In this experiment, the SI model is used to examine the infection ability of the top 10 nodes. The importance of nodes can be regarded as equivalent to infection ability; that is to say, the higher the importance of a node is, the stronger its infection ability will be. Therefore, the average infection ability of nodes can be used as an indicator to evaluate the effectiveness of a ranking method. In the SI model, every node has a susceptible state and an infected state; infected nodes infect susceptible nodes with a certain probability, and nodes cannot be recovered once infected. The infection source node is chosen from the top 10 list, the number of infected nodes will reach after intervals of spread, and the average infection ability of the top 10 nodes can be defined as . In this experiment, the number of spread intervals was set to . To eliminate environmental randomness, 1000 Monte Carlo simulations were used to make the simulation environment more scientific and reasonable. Figure 3 shows the results of this experiment.
In Figure 3, the average number of infected nodes increases with time and finally reaches a stable value. In the karate club network, the curves in Figure 3(a1) almost overlap, and the same is the case in Figure 3(a2). DC and CC showed similar performance to the EWTOPSIS method, with nine of the same nodes in the top 10 list. Figure 3(a3) shows that the average number of infected nodes with the EWTOPSIS method is slightly higher than with BC, which indicates that the performance of the EWTOPSIS method is slightly superior to that of BC. In the dolphin network, from Figures 3(b1) and 3(b3), the average number of infected nodes by the EWTOPSIS method is larger than that by DC and BC in each time interval; obviously, the EWTOPSIS method outperforms DC and BC. The EWTOPSIS method showed similar performance to CC, as shown in Figure 3(b2). In the football network, the curves in Figures 3(b1), 3(b2), and 3(b3) almost overlap; that is to say, the performance between the EWTOPSIS method and DC, CC, and BC is similar. This is also the case for the jazz musicians’ network between the EWTOPSIS method and DC and CC, as shown in Figures 3(d1) and 3(d2). Figure 3(d3) shows that the EWTOPSIS method is clearly superior to BC not only because it generates a greater average number of infected nodes, but also because it has more stable mean square errors.
In addition, the spread time to reach a state of 90 percent infected nodes by the EWTOPSIS method is 11 intervals, but by BC, it is 14 intervals. Clearly, the EWTOPSIS method has better performance than DC and BC for both the average number of infected nodes and the spread velocity, and the performance of the EWTOPSIS method is similar to that of CC.
In short, the proposed method has almost the same performance as DC and is slightly better than CC. In the case of BC, it is obvious that the proposed method performs better. Hence, the experimental results illustrate the effectiveness of the proposed method.
4.2.4. Experiment 4: Compare the Average Infection Ability of a Single Node
To compare further the ranking performance of the four methods, the average infection abilities of a single node at the same infection rate are compared, with the results shown in Figure 4.
(a)
(b)
(c)
(d)
For the karate club network, from Figure 4(a), it is clear that node 34 node 3 node 33, where “” denotes “more important than,” and the simulation is consistent with the EWTOPSIS method, but contrary to DC, CC, and BC. In the dolphin network as shown in Figure 4(b), it can be concluded that node 2 node 37, which is consistent with the EWTOPSIS method, CC, and BC, but contrary to DC. Similarly, in the football network, node 7 node 2. In the jazz musicians’ network, node 83 node 168, which can be seen from Figure 4(d) and is consistent with the EWTOPSIS method and BC, but contrary to DC and CC.
The four experiments described above indicate that the proposed method has better performance than a single centrality criterion. Node importance is ranked with different methods, and the top 10 nodes of the four real networks are obtained. Based on the ranking results, the frequency of nodes with the same ranking is analyzed, and it is discovered that the proposed method has the lowest frequency; that is to say, the proposed method is more effective from this perspective. In addition, an indicator called the average infection ability is defined to describe the infection ability of the top 10 nodes, and the average infection ability of the top 10 nodes is obtained with the SI model. The proposed method performed better in terms of both infection scale and spread velocity. The infection abilities of a single node were also compared, and the results demonstrate the superiority of the proposed method.
Many criteria are used to rank node importance in complex networks, which considers only one aspect of networks. To solve this problem, a multicriteria decisionmaking method has been proposed here to perform a comprehensive evaluation of node importance. In this study, an entropy weighting method was used to obtain criterion weights that can overcome the subjective effect existing in other methods [33, 59, 60]. The method proposed here enriches existing research on complex networks and has great academic value.
5. Conclusions
This paper proposes a novel method of node importance ranking based on an entropy weighting method and TOPSIS. The proposed method takes multiple centrality criteria as its decision criteria and uses an entropy weighting method to obtain the corresponding weight of each criterion, thus overcoming the effect of subjective factors. Multiple criteria were chosen from different perspectives on complex networks, and the advantages of each criterion were combined to obtain more objective and reasonable ranking results. To verify the effectiveness of the proposed method, four experiments based on four actual networks were conducted, and the SI model was used to simulate the spread ability of the top 10 nodes. The experimental results show that the proposed method has superior performance.
In this paper, the proposed method is applicable to undirected and unweighted networks, but a complex network may be directed and weighted in real life, and therefore a future research object of the authors is directed and weighted networks. Furthermore, experiment 2 showed that there are still some nodes with the same ranking; in such a case, how should their ranking be determined? In addition, some researchers have found that node importance is involved in dissemination mechanisms in addition to network topology. Therefore, future research will focus on a combination method of dynamic characteristics and network structure to measure node importance.
Data Availability
The simulation data used to support the findings of this study are available from the corresponding author upon request.
Additional Points
Highlights. A novel method of node importance ranking in complex networks based on multicriteria decision making is proposed. The proposed method comprehensively combines centrality criteria from different perspectives. An entropy weighting method, which can overcome the influence of subjective factors, is proposed to obtain the weight of each criterion. Experimental results show that the proposed method outperforms a single centrality criterion.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
Acknowledgments
The work described in this paper is supported by the National Natural Science Foundation of China (Grant No. 61472443). We thank International Science Editing (http://www.internationalscienceediting.com) for editing this paper.
References
 K.Q. Cai, J. Zhang, W.B. Du, and X.B. Cao, “Analysis of the Chinese air route network as a complex network,” Chinese Physics B, vol. 21, no. 2, pp. 596–602, 2012. View at: Google Scholar
 M. Zanin and F. Lillo, “Modelling the air transport with complex networks: a short review,” The European Physical Journal Special Topics, vol. 215, no. 1, pp. 5–21, 2013. View at: Publisher Site  Google Scholar
 Y. Yang, T. Nishikawa, and A. E. Motter, “Small vulnerable sets determine large network cascades in power grids,” Science, vol. 6365, no. 358, article 3184, 2017. View at: Google Scholar
 P. H. J. Nardelli, N. Rubido, C. Wang et al., “Models for the modern power grid,” The European Physical Journal Special Topics, vol. 223, no. 12, pp. 2423–2437, 2014. View at: Publisher Site  Google Scholar
 W.L. Fan, X.M. Zhang, S.W. Mei, and S.W. Huang, “Vulnerable transmission line identification considering depth of Kshell decomposition in complex grids,” IET Generation, Transmission & Distribution, vol. 12, no. 5, pp. 1137–1144, 2018. View at: Publisher Site  Google Scholar
 S. Ni, W. Weng, and H. Zhang, “Modeling the effects of social impact on epidemic spreading in complex networks,” Physica A: Statistical Mechanics and its Applications, vol. 390, no. 2324, pp. 4528–4534, 2011. View at: Publisher Site  Google Scholar  MathSciNet
 S. Pei, L. Muchnik, J. S. Andrade Jr., Z. Zheng, and H. A. Makse, “Searching for superspreaders of information in realworld social media,” Scientific Reports, vol. 4, article 5547, 2014. View at: Publisher Site  Google Scholar
 A. N. Arularasan, A. Suresh, and K. Seerangan, “Identification and classification of best spreader in the domain of interest over the social networks,” Cluster Computing, pp. 1–11, 2018. View at: Google Scholar
 L. Wang and X. Li, “Spatial epidemiology of networked metapopulation: an overview,” Chinese Science Bulletin, vol. 59, no. 28, pp. 3511–3522, 2014. View at: Publisher Site  Google Scholar
 X.P. Yuan, Y.K. Xue, and M.X. Liu, “Dynamic analysis of a sexually transmitted disease model on complex networks,” Chinese Physics B, vol. 22, no. 3, Article ID 030207, 2013. View at: Google Scholar
 Y. Shang, “Degree distribution dynamics for disease spreading with individual awareness,” Journal of Systems Science and Complexity, vol. 28, no. 1, pp. 96–104, 2015. View at: Google Scholar
 R. Albert and A. Barabási, “Statistical mechanics of complex networks,” Reviews of Modern Physics, vol. 74, no. 1, pp. 47–97, 2002. View at: Publisher Site  Google Scholar  MathSciNet
 M. E. J. Newman, “The structure and function of complex networks,” SIAM Review, vol. 45, no. 2, pp. 167–256, 2003. View at: Publisher Site  Google Scholar  MathSciNet
 X. Li, Z. H. Liu, and B. H. Wang, “On spreading dynamics on networks,” Complex System, vol. 07, no. 2, pp. 33–37, 2010. View at: Google Scholar
 A. Barabasi and R. Albert, “Emergence of scaling in random networks,” Science, vol. 286, no. 5439, pp. 509–512, 1999. View at: Publisher Site  Google Scholar  MathSciNet
 G. Caldarelli, Scalefree networks: complex webs in nature and technology, Oxford University Press, Oxford, UK, 2007. View at: Publisher Site
 A. L. Barabási, “Scalefree networks: a decade and beyond,” Science, vol. 325, no. 5939, pp. 412413, 2009. View at: Publisher Site  Google Scholar  MathSciNet
 R. Albert, H. Jeong, and A.L. Barabási, “Error and attack tolerance of complex networks,” Nature, vol. 406, no. 6794, pp. 378–382, 2000. View at: Publisher Site  Google Scholar
 K. Hu, T. Hu, and Y. Tang, “Model for cascading failures with adaptive defense in complex networks,” Chinese Physics B, vol. 19, no. 8, pp. 65–71, 2010. View at: Publisher Site  Google Scholar
 S. V. Buldyrev, R. Parshani, G. Paul, H. E. Stanley, and S. Havlin, “Catastrophic cascade of failures in interdependent networks,” Nature, vol. 464, no. 7291, pp. 1025–1028, 2010. View at: Publisher Site  Google Scholar
 R. PastorSatorras and A. Vespignani, “Immunization of complex networks,” Physical Review E Statistical Nonlinear & Soft Matter Physics, vol. 66, Article ID 036104, 2002. View at: Google Scholar
 X.L. Ren and L.Y. Lü, “Review of ranking nodes in complex networks,” Chinese Science Bulletin, vol. 59, no. 13, pp. 1175–1197, 2014. View at: Publisher Site  Google Scholar
 D. Chen, R. Xiao, A. Zeng, and Y. Zhang, “Path diversity improves the identification of influential spreaders,” EPL (Europhysics Letters), vol. 104, no. 6, Article ID 68006, 2013. View at: Publisher Site  Google Scholar
 B. Xu, F. Wang, D. Chen, and H. Zhang, “Hamiltonian modeling of multihydroturbine governing systems with sharing common penstock and dynamic analyses under shock load,” Energy Conversion and Management, vol. 108, pp. 478–487, 2016. View at: Publisher Site  Google Scholar
 A. Barabási, N. Gulbahce, and J. Loscalzo, “Network medicine: a networkbased approach to human disease,” Nature Reviews Genetics, vol. 12, no. 1, pp. 56–68, 2011. View at: Publisher Site  Google Scholar
 R. Yang, B.H. Wang, J. Ren et al., “Epidemic spreading on heterogeneous networks with identical infectivity,” Physics Letters A, vol. 364, no. 3, pp. 189–193, 2006. View at: Google Scholar
 X. Xiong and Y. Hu, “Research on the dynamic of opinion spread based on social network services,” Acta Physica Sinica, vol. 61, no. 15, pp. 104–110, 2012. View at: Google Scholar
 B. Ceren, A. Divyakant, and A. E. I. Abbadi, “Limiting the spread of misinformation in social networks,” Games & Economic Behavior, vol. 70, no. 2, pp. 194–227, 2010. View at: Google Scholar
 R. Albert, I. Albert, and G. L. Nakarado, “Structural vulnerability of the North American power grid,” Physical Review E: Statistical, Nonlinear, and Soft Matter Physics, vol. 69, no. 2, Article ID 025103, 2004. View at: Publisher Site  Google Scholar
 A. E. Motter, “Cascade control and defense in complex networks,” Physical Review Letters, vol. 93, no. 9, Article ID 098701, 2004. View at: Publisher Site  Google Scholar
 G. Mauricio, C. Resende, and P. M. Panos, Handbook of optimization in telecommunications, Springer USA, 2006. View at: MathSciNet
 R. Cohen, K. Erez, D. BenAvraham, and S. Havlin, “Breakdown of the internet under intentional attack,” Physical Review Letters, vol. 86, no. 16, pp. 3682–3685, 2001. View at: Publisher Site  Google Scholar
 H. Yu, Z. Liu, and J. Li Y, “key nodes in complex networks identified by multiattribute decisionmaking method,” Acta Physica Sinica, vol. 62, no. 2, Article ID 020204, 2013. View at: Google Scholar
 P. Bonacich, “Factoring and weighting approaches to status scores and clique identification,” The Journal of Mathematical Sociology, vol. 2, no. 1, pp. 113–120, 1972. View at: Publisher Site  Google Scholar
 L. C. Freeman, “Centrality in social networks conceptual clarification,” Social Networks, vol. 1, no. 3, pp. 215–239, 19781979. View at: Publisher Site  Google Scholar
 M. E. J. Newman, “A measure of betweenness centrality based on random walks,” Social Networks, vol. 27, no. 1, pp. 39–54, 2005. View at: Publisher Site  Google Scholar
 T. Opsahl, F. Agneessens, and J. Skvoretz, “Node centrality in weighted networks: Generalizing degree and shortest paths,” Social Networks, vol. 32, no. 3, pp. 245–251, 2010. View at: Publisher Site  Google Scholar
 K. Stephenson and M. Zelen, “Rethinking centrality: methods and examples,” Social Networks, vol. 11, no. 1, pp. 1–37, 1989. View at: Publisher Site  Google Scholar  MathSciNet
 E. Estrada and J. A. RodríguezVelázquez, “Subgraph centrality in complex networks,” Physical Review E: Statistical, Nonlinear, and Soft Matter Physics, vol. 71, no. 2, Article ID 056103, 2005. View at: Publisher Site  Google Scholar  MathSciNet
 R. Poulin, M.C. Boily, and B. R. Mâsse, “Dynamical systems to define centrality in social networks,” Social Networks, vol. 22, no. 3, pp. 187–220, 2000. View at: Publisher Site  Google Scholar
 S. Brin, “The anatomy of a largescale hypertextual Web search engine,” Computer Networks, vol. 30, no. 1, pp. 107–117, 1998. View at: Publisher Site  Google Scholar
 J. G. Liu, Z. M. Ren, Q. Guo et al., “Node importance ranking of complex networks,” Acta Physica Sinica, vol. 62, no. 17, Article ID 178901, 2013. View at: Google Scholar
 L. Lü, D. Chen, X.L. Ren, Q.M. Zhang, Y.C. Zhang, and T. Zhou, “Vital nodes identification in complex networks,” Physics Reports, vol. 650, pp. 1–63, 2016. View at: Publisher Site  Google Scholar
 R. Sun and W. B. Luo, “Review on evaluation of node importance in public opinion,” Application Research of Computers, vol. 29, no. 10, pp. 3606–3608, 2012. View at: Google Scholar
 D. Krackhardt, “Assessing the Political Landscape: Structure, Cognition, and Power in Organizations,” Administrative Science Quarterly, vol. 35, no. 2, pp. 342–369, 1990. View at: Publisher Site  Google Scholar
 Y. Deng, F. T. S. Chan, Y. Wu, and D. Wang, “A new linguistic MCDM method based on multiplecriterion data fusion,” Expert Systems with Applications, vol. 38, no. 6, pp. 6985–6993, 2011. View at: Publisher Site  Google Scholar
 M. AbdelBasset, G. Manogaran, M. Mohamed, and N. Chilamkurti, “Threeway decisions based on neutrosophic sets and AHPQFD framework for supplier selection problem,” Future Generation Computer Systems, vol. 89, pp. 19–30, 2018. View at: Publisher Site  Google Scholar
 M. AbdelBasset, M. Gunasekaran, M. Mohamed, and N. Chilamkurti, “A framework for risk assessment, management and evaluation: Economic tool for quantifying risks in supply chain,” Future Generation Computer Systems, vol. 90, pp. 489–502, 2019. View at: Publisher Site  Google Scholar
 Y. Deng and F. T. S. Chan, “A new fuzzy dempster MCDM method and its application in supplier selection,” Expert Systems with Applications, vol. 38, no. 8, pp. 9854–9861, 2011. View at: Publisher Site  Google Scholar
 X. Deng, Y. Hu, Y. Deng, and S. Mahadevan, “Environmental impact assessment based on D numbers,” Expert Systems with Applications, vol. 41, no. 2, pp. 635–643, 2014. View at: Publisher Site  Google Scholar
 C. L. Hwang and K. Yoon, Multiple Attribute Decision Making: Methods and Applications, vol. 186, Springer, Heidelberg, Germany, 1981. View at: MathSciNet
 A. Awasthi, S. S. Chauhan, and S. K. Goyal, “A fuzzy multicriteria approach for evaluating environmental performance of suppliers,” International Journal of Production Economics, vol. 126, no. 2, pp. 370–378, 2010. View at: Publisher Site  Google Scholar
 V. Chang, M. AbdelBasset, and M. Ramachandran, “Towards a Reuse Strategic Decision Pattern Framework–from Theories to Practices,” Information Systems Frontiers, pp. 1–18, 2018. View at: Publisher Site  Google Scholar
 S. Guiaşu, “Weighted entropy,” Reports on Mathematical Physics, vol. 2, no. 3, pp. 165–179, 1971. View at: Publisher Site  Google Scholar  MathSciNet
 J.Z. Wu and Q. Zhang, “Multicriteria decision making method based on intuitionistic fuzzy weighted entropy,” Expert Systems with Applications, vol. 38, no. 1, pp. 916–922, 2011. View at: Publisher Site  Google Scholar
 P.D. Liu and X. Zhang, “Research on the supplier selection of a supply chain based on entropy weight and improved ELECTREIII method,” International Journal of Production Research, vol. 49, no. 3, pp. 637–646, 2011. View at: Publisher Site  Google Scholar
 X. Li, K. Wang, L. Liuz et al., “Application of the entropy weight and TOPSIS method in safe evaluation of coal mines,” Procedia Engineering, vol. 26, no. 4, pp. 2085–2091, 2011. View at: Google Scholar
 T. Zhou, J.G. Liu, W.J. Bai, G. Chen, and B.H. Wang, “Behaviors of susceptibleinfected epidemics on scalefree networks with identical infectivity,” Physical Review E: Statistical, Nonlinear, and Soft Matter Physics, vol. 74, no. 5, Article ID 056109, 2006. View at: Publisher Site  Google Scholar
 Y. Du, C. Gao, Y. Hu, S. Mahadevan, and Y. Deng, “A new method of identifying influential nodes in complex networks based on TOPSIS,” Physica A: Statistical Mechanics and its Applications, vol. 399, pp. 57–69, 2014. View at: Publisher Site  Google Scholar
 Z. Liu, C. Jiang, J. Wang, and H. Yu, “The node importance in actual complex networks based on a multiattribute ranking method,” KnowledgeBased Systems, vol. 84, pp. 56–66, 2015. View at: Publisher Site  Google Scholar
 W. W. Zachary, “An information flow model for conflict and fission in small groups,” Journal of Anthropological Research, vol. 33, no. 4, pp. 452–473, 1977. View at: Publisher Site  Google Scholar
 D. Lusseau, K. Schneider, O. J. Boisseau, P. Haase, E. Slooten, and S. M. Dawson, “The bottlenose dolphin community of doubtful sound features a large proportion of longlasting associations: can geographic isolation explain this unique trait?” Behavioral Ecology and Sociobiology, vol. 54, no. 4, pp. 396–405, 2003. View at: Publisher Site  Google Scholar
 M. Girvan and M. E. J. Newman, “Community structure in social and biological networks,” Proceedings of the National Acadamy of Sciences of the United States of America, vol. 99, no. 12, pp. 7821–7826, 2002. View at: Publisher Site  Google Scholar  MathSciNet
 P. M. Gleiser and L. Danon, “Community structure in jazz,” Advances in Complex Systems (ACS), vol. 6, no. 4, pp. 565–573, 2003. View at: Publisher Site  Google Scholar
Copyright
Copyright © 2019 Yuanzhi Yang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.