Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/9581
Full metadata record
DC FieldValueLanguage
dc.contributor.authorOnwuka, Elizabeth N-
dc.contributor.authorSalihu, Bala A.-
dc.contributor.authorA Murtala, Sheriff-
dc.date.accessioned2021-07-15T11:49:46Z-
dc.date.available2021-07-15T11:49:46Z-
dc.date.issued2016-
dc.identifier.citationE. N. Onwuka, B. A. Salihu, and S. Murtala, “A survey of influential nodes detection methods in mobile phone network,” in CEUR Workshop Proceedings, 2016, vol. 1830, no. Icta, pp. 213–219.en_US
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/9581-
dc.description.abstractThe number of mobile phone users is increasing tremendously. The social interaction between these mobile phone users can be represented using social network graphs. This type of study has very important applications in various areas especially in the detection of criminal groups who also use these devices to interact and plan their activities. Moreover, the study of identifying influential nodes in social network of any kind is currently receiving attention in the research arena. This is because identification of influential nodes of any network is significant to understanding the network. This becomes very important if the network in question is a criminal network, considering the insecurities of the current time. In this paper, a survey of influential nodes detection methods is carried out, we first define the problems associated with influential nodes detection and then examine various methods of identifying influential nodes. We also consider techniques employed in analysing users in the mobile phone network.en_US
dc.language.isoenen_US
dc.publisherCEUR Workshop Proceedingsen_US
dc.subjectCentrality measuresen_US
dc.subjectInfluential nodes detectionen_US
dc.subjectMobile phone networken_US
dc.subjectSocial networken_US
dc.titleA Survey of Influential Nodes Detection Methods in Mobile Phone Networken_US
dc.typeArticleen_US
Appears in Collections:Telecommunication Engineering



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.