From: A graph exploration method for identifying influential spreaders in complex networks
Dataset | D1 | D2 | D3 | D4 | D5 | D6 | D7 | D8 |
---|---|---|---|---|---|---|---|---|
〈k〉 | 43.69 | 28.32 | 8.08 | 4.82 | 10.02 | 7.35 | 10.69 | 12.27 |
〈k ^{2}〉 | 4656.14 | 4117.03 | 178.20 | 55.18 | 1403.62 | 468.42 | 1966.47 | 1837.40 |
SIR | ||||||||
T ^{c} | 0.0095 | 0.0069 | 0.0475 | 0.0956 | 0.0072 | 0.0159 | 0.0055 | 0.0067 |
T ^{∗} | 1.2×T ^{c} | 1.5×T ^{c} | 1.2×T ^{c} | 1.2×T ^{c} | 3×T ^{c} | 2.5×T ^{c} | 3×T ^{c} | 3×T ^{c} |
SIS | ||||||||
λ ^{c} | 0.0094 | 0.0069 | 0.0453 | 0.0873 | 0.0071 | 0.01557 | 0.0054 | 0.0067 |
\(\widehat {\lambda }\) | λ ^{c} | 1.3×λ ^{c} | λ ^{c} | 1.1×λ ^{c} | 1.5×λ ^{c} | λ ^{c} | 1.2×λ ^{c} | 1.3×λ ^{c} |
λ ^{∗} | λ ^{c} | 1.3×λ ^{c} | λ ^{c} | 1.1×λ ^{c} | 2×λ ^{c} | 1.5×λ ^{c} | 2×λ ^{c} | 2×λ ^{c} |