<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>COLINS-</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Social Networks: Analysis, Algorithms and Their Implementation</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Svitlana Popereshnyak</string-name>
          <email>spopereshnyak@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Iryna Yurchuk</string-name>
          <email>i.a.yurchuk@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>Bohdan Hawrylyshyn str. 24, Kyiv, UA-04116</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <volume>5</volume>
      <fpage>22</fpage>
      <lpage>23</lpage>
      <abstract>
        <p>In this research the main types of social networks and methods of their analysis are considered. The types of ties and analysis of the problems of ties in the social network are analysed. The relationship between graph theory and social network analysis was studied and established. Typical database was developed. The concepts of graph theory "centrality" and "intermediate centrality" were used to build a prototype based on the proposed method of analyzing ties in cyberspace. Social network analysis, connections in social networks, social graph, graph theory, centrality.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>network actors.
networks.</p>
      <p>
        The digital nature of information facilitates the ability to obtain data about networks. The notion of
communication systems and relationships was formed long before the invention of the Internet.
However, the collection of personal data is a time-consuming and difficult procedure; people sometimes
do not understand who is in their personal network (or how strong this or that connection), and the
researcher needs to collect accurate data on interactions. These problems can be minimized through
online research because in them the information is digital and encoded through the act of sending a
message or adding one using the functionality of the website [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Also, in digital social networks, it is
easy to copy messages for further analysis.
      </p>
      <p>Methods of mathematical statistics, graph theory, differential equations are used to study social
networks. Social media analysis is closely related to graph theory and big data analysis.</p>
      <p>The analysis of social networks is based on the mathematical theory of graphs, as well as empirical
research in the field of social psychology and anthropology. While the first group of scientists
discovered various laws for constructing abstract nodes and lines, the latter found that nodes and lines
are the most convenient to denote the relationship between people. Since both groups of researchers
worked at the same time (in the second half of the twentieth century), they agreed to develop a series
of metrics and methods to identify the basic structures of complex empirical phenomena.</p>
      <p>Currently, the analysis of social networks is one of the most intensively developing areas not only
in sociology, but also in other humanitarian and technical disciplines. The interest in them is dictated
by the fact that the fact of the special position of this object of research is becoming quite obvious,
entailing a new set of explanatory models and analytical tools that are outside the framework of
conventional research methods - both quantitative and qualitative.</p>
      <p>A social network as a way of organizing social knowledge requires a special methodological
approach that differs from traditional methods of analyzing sociological information.</p>
      <p>Purpose of work - build a prototype of software that finds the power of connections between social
The aim of research – prototype of the method of intersubjuctive connections analysis in social</p>
      <p>2021 Copyright for this paper by its authors.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Background</title>
      <p>In this section main concepts and mathematical terms are considered.
2.1.</p>
    </sec>
    <sec id="sec-3">
      <title>Networks and its analysis</title>
      <p>A network is a set of nodes (such as people, organizations, websites, or government entities) and the
relationships between them (oriented or not). For example, for the postal network is the principle to
order the nodes (senders and recipients). A social network organized by the software is not usually an
oriented network of friends (users).</p>
      <p>Network analysis makes good results when all network nodes belong to the same object class. To
explore more than one type of object (such as bloggers and commentators), "two-level analysis," which
involves your own set of distinctions have to be used.</p>
      <p>There are the following types of networks:
• Solid networks (e-mail, mailing lists, and social networks of the Internet space): links are
clearly defined, it is easy to form a group structure and identify specific users. They are built using
lists, which allows you to reach any user;
• Partial networks: they are a compromise between the desire to cover a whole network and the
fact that some whole networks are just too massive to cover them completely. The researcher can
start with a single web page or several pages (so-called "sowing"), then he will look for pages related
to that sowing, and then pages related to these pages. The sampling process ends when a sufficient
number of pages have been coll ected; when all possible pages are collected; or when the sample
meets certain criteria (for example, when all pages with more than 400 words are collected);
• Ego networks: they are represented by a spontaneous sample of users, the researcher can collect
data or a star-shaped network (ego-node and its connections with other nodes), or a complete
egonetwork (which also includes connections of other nodes with each other). Data collection on ego
networks can be based on the already available results of various research techniques and interviews;
• Social networks: people is together in pre-established interpersonal relationships such as
kinship, friendship, classmates, colleagues, business partners, etc. A connection is built one at a
time. The main reason for people to join a social network is to maintain old relationships and create
new ones to expand their network. There are social networks for communication (Facebook), for
sharing media content (Instagram), for collective bargaining (Quora), for authoring (Twitter), social
bookmarking services (Pinterest), for interests (Goodreads).</p>
      <p>In Figure 1, three types of networks (solid, partial and ego networks) are illustrated.</p>
      <p>Social networks analysis (SNA) is effectively used to combat money laundering, identity theft,
network fraud, cyberattacks, and others. In particular, SNA techniques were used in the investigation
of illegal securities transactions conducted by the Australian Securities and Investment Commission.</p>
      <p>
        The author of some books and an expert in security and data analysis, Jesus Mena, called SNA as "a
technique of data mining that represents their structure in the form of interconnected objects" [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. This
technique is based on mathematical disciplines such as graph theory and matrix algebra, and provides
analysts with tools that can model and study the structure of relationships between different objects.
      </p>
      <p>According to the basic theories, there are two main tools of SNA. They are the matrix and the
relationship diagram. Accordingly, the algorithm of the analyst's work with the collected data includes
the following stages: the creation of a matrix (or matrices) of connections, construction of a diagram of
connections (graph), analysis of connections.</p>
      <p>
        Many researchers have paid attention to the issue of studying social networks [
        <xref ref-type="bibr" rid="ref3 ref4 ref5 ref6 ref7 ref8">3-8</xref>
        ].
      </p>
      <p>
        For example, social network analysis approach [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] is a way to quantify the social and intelligent
behaviors as displayed by animals in social structures. The study analyzes some of such network
measures like modularity-based algorithms for community formation, intergroup and intragroup
dynamics.
2.2.
      </p>
    </sec>
    <sec id="sec-4">
      <title>Basic concepts of graph theory</title>
      <p>
        A vertex degree is a number of edges of a graph G that are incidental to a vertex  . During
calculating, a loop is counting twice [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. A vertex degree is denoted by deg( ). The maximum and
minimum degrees of the vertices of the graph G are denoted by Δ(G) and δ(G), respectively.
      </p>
      <p>
        The sequence of degrees of the vertices of a non-orientative graph is a non-increasing sequence [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]
The sequence of degrees of vertices is an invariant of the graph, so for isomorphic graphs, it is the same.
However, the sequence of degrees of vertices is not a unique characteristic of the graph: in some cases,
nonisomorphic graphs also have the same sequence [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        The problem of degree sequences is to find some or all graphs with a given non-increasing sequence
consisting of natural numbers (zero degrees can be ignored because their number is changed by adding
or removing isolated vertices). A sequence that is a sequence of powers of any graph is called a graphical
sequence. It follows from the formula for the sum of powers that any sequence with an odd sum (such
as 3, 3, 1) cannot be a sequence of powers of a graph. The opposite is also true: if a sequence has an
even sum, it is a sequence of degrees of the multigraph. The construction of such a graph is quite simple:
it is necessary to combine the vertices of odd degrees in pairs, to the left unfilled vertices must be added
loops
conditions [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>It is more difficult to implement a simple graph with a given sequence. Erdos-Gallai theorem states
that the non-increasing sequence di (for i = 1,…,n) can be a sequence of a simple graph under certain</p>
      <p>
        According to Havel-Hakimi algorithm [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] if non-increasing sequence (d1, d2, …, dn) is a degrees
sequence of a simple graph, then (d2 − 1, d3 − 1, …, dd1+1 − 1, dd1+2, dd1+3, …, dn) is some sequence
of degrees of a simple graph. This fact allows building a polynomial algorithm for finding a simple
graph with a given sequence.
between two other nodes [11].
of edges, can be denoted as
      </p>
      <p>Intermediate centrality measures the number of times a node acts as a bridge on the shortest path
Power centrality of vertex  for a graph  ≔ ( ,  ), where | | is a set of vertices and | | is a set
  ( ) = 
( ).</p>
      <p>The calculation of the degree of centrality for all nodes in the graph takes Θ( 2) at a dense adjacency
matrix of the graph representation and Θ( ) at a sparse matrix. The definition of centrality at the node
level can be extended to the whole graph, in this case, we are talking about the centralization of the
graph. Let  ∗ be a vertex with the most power of centrality. Let X:=(Y, Z), where | | is a connected
graph which maximized the following number (with y* vertex, which is the most power of centrality at
X):</p>
      <p>A value H is a maximum if a graph X contains a unique central vertex such that all other
vertices are connected with. In this case H=(n-1) (n-2).</p>
      <p>Then the degree of centrality of a graph G equals to
 = ∑
| | [  ( ∗) −   (  )].</p>
      <p>=1
  ( ) =  =1
∑
| |</p>
      <p>[  ( ∗)−  (  )].</p>
    </sec>
    <sec id="sec-5">
      <title>3. Program design</title>
    </sec>
    <sec id="sec-6">
      <title>3.1. Finding ties</title>
      <p>To find a connection between different people in this work uses a social network in which a
person is registered and he has a list of friends. To connect all human friends, the API is used to parse
all friends (A) of a person, and all friends of friends (B). After that, the program removes from set B all
the friends who are not in set A. Then the program looks for how a friend is connected with other friends
and gives information in the form of a list (see Fig. 2).</p>
      <p>The "weak ties hypothesis" states with help of the probability theory and mathematics it can be used
to predict that if A is related to B and C, then there is a strong possibility that B and C are also related
[12].
3.2.</p>
    </sec>
    <sec id="sec-7">
      <title>Determination of weak and strong ties</title>
      <p>The powerful factor for the tie construction is a relationship between friends and friends of friends.
The connections between them are the most important thing to create a graphical representation of a
graph of friends.</p>
      <p>To detect the strength of communication (weak or strong), the program will make a comparison
between all friends on the following parameters:
• School - the system will compare data of friends and find friends:
a. who study in the same schools,
b. go to school, which is located in the same region in a big city,
c. or all schools from a small town (where 2-5 schools) and shops,
• Work - the program compares data of friends and finds friends:
a. in profiles whose job data match,
b. or companies, where they work, are located in the same city and work in the same
field,
• Communities - the program will compare groups of friends and search for shared groups that
both have. It is also a criterion for determining the strength of the connection between a user.
• Music (selective) - this criterion for those people who want to find among their friends people
who have common favors in music.
• Photo - the program will analyze the number of tags in the photo of certain person, in the photos
which are in the profiles of friends. The weight of these connections is calculated.
• Information that meets the above criteria is broken down into a database. And then the system
has a complete database with information about all friends from the list of friends in a social network.
Then the collected data about each friend will be compared with others. There is a gradation of bond
strength: weak ties, medium and strong ties.</p>
      <p>Weak ties according to the system of criteria are those ties that will correspond to 0 or 1 criterion.
Medium ties according to the system of criteria are those ties that will correspond to 2 criteria.
Strong ties according to a system of criteria are those that will correspond to 3 or more criteria.</p>
      <p>This is not a definitive system of criteria. There are many other variations that can be used to
strengthen and define relationships.
3.3.</p>
    </sec>
    <sec id="sec-8">
      <title>Database design</title>
      <p>There are the following basic elements: Person, Playlist, Song, ListCommunities, Community,
Photo, Album, Tag (see Figure 3).</p>
      <p>The Person table is used to store all users who can be parsed using the API. All users' data will be
compared with others.</p>
      <p>The Playlist is the connecting table between the Person table and the Songs table. For example, each
person has music that is in a playlist.</p>
      <p>The Song table describes the song in the playlist for future comparison of the two playlists. Usually,
everyone has albums that have photos, but often there can be many such albums.</p>
      <p>The album table gives a foreign key to person and has only one user field. Each photo in this Photo
table is described by three fields: idphoto, name, date.</p>
      <p>The tag table has information about each tag of our user in the photos of other users.</p>
      <p>The ListCommunities table is the same as the Album or Playlist. Everyone can visit some
communities. There are many communities, but the list of communities that a particular person attends
is unique, even if there are two people with the same communities on their list. The information in this
table is also used to find the strength of the links.</p>
      <p>The Community table is a table that describes the community and has three fields: name,
creationDate, Description.</p>
      <p>Basic tools of development</p>
      <p>RabbitMQ is a platform that implements a messaging system between software system components
based on the AMQP (Advanced Message Queuing Protocol) standard. Uses the standard AMQP
(Advanced Message Queuing Protocol), supports horizontal scaling to build a cluster architecture,
supports data storage on disk, support for HTTP, XMPP and STOMP, is the implementation of clients
to access RabbitMQ for some programming languages: Java, .NET, Perl , Python, Ruby, PHP, etc.,
there are various plug-ins (such as a plug-in for monitoring and management via HTTP or web interface
or a plug-in "Shovel" for transferring messages between brokers).</p>
      <p>NetworkX Python library for studying graphs and networks. NetworkX is free software that is
distributed under a BSD license. Gives you the ability to convert graphics from multiple formats, build
random graphs or build them gradually, find subgraphs, clicks, K-cores, explore contiguity, degree,
diameter, radius, center, intermediate, etc., draw networks in 2D and 3D.</p>
      <p>Matplotlib is a Python programming library for data visualization with 2D graphics (3D graphics
are also supported). The resulting images can be used as illustrations in publications.</p>
      <p>Matplotlib is a flexible, easily configurable package that, along with NumPy, SciPy, and IPython,
provides features similar to MATLAB. The package currently works with several graphics libraries,
including wxWindows and PyGTK.</p>
    </sec>
    <sec id="sec-9">
      <title>4. Model of finding leaders in the social network</title>
      <p>The task of finding leaders is one of the main in the study of social networks. It is closely related to
the task of finding clusters in a graph, namely, some communities that are similar in common. The main
steps are to recognize leaders in accessible social graphs, the introduction of metrics to combine
different characteristics and take into account the importance of each metric for the problem.
4.1.</p>
    </sec>
    <sec id="sec-10">
      <title>Functional model of the system</title>
      <p>Let consider the functional model of the system, which can be represented graphically using the
context diagram IDEF0 for "Search for social network leaders"(Fig. 4).</p>
      <p>First, we will make a general description of the system, and then perform a functional
decomposition. In Fig. 5 the functional model of the system with external links is shown.</p>
      <p>In Fig. 6 a decomposition of previous diagram on three blocks with consecutive direct is presented</p>
      <p>As the result of applying IDEF0 to the current system, we obtain a model of this system, consisting
of a hierarchically ordered set of diagrams.
4.2.</p>
    </sec>
    <sec id="sec-11">
      <title>Description of the program</title>
      <p>The program is made by the Jupyter Notebook environment in a full-featured Python programming
language.</p>
      <p>The main elements of the program consist of two files.</p>
      <p>The first file is Neural_network_graph.ipynb. This module loads the graph of the oriented neural
network of neurons and synapses of the C. elegans worm using the built-in functions of the NetworkX
library, determines the centrality coefficients for all metrics considered and sets the necessary
parameters for visualization using Gephi. The exponential centrality metric is considered first, followed
by the proximity metric, the intermediate metric, the eigenvector metric, the PageRank metric, and the
load metric. After calculating all the places for each vertex, the values of the vertices of the compatible
metric are determined. To visualize, you must specify the size and color of each vertex. The greater the
coefficient of centrality, the brighter the color of the top and has a larger size. After analyzing the results
obtained for each metric, the maximum and minimum significance coefficients of the vertices were
determined.</p>
      <p>The second file, called Gnutella_graph.ipynb, looks at an oriented neural network graph with 8,717
vertices and 31,525 edges. The difference from the previous file is that the vertices were not assigned a
color or size, but only the necessary calculations were performed to determine the coefficients of the
compatible metric.</p>
      <p>Preservation of the result: since the analysis is for research purposes, a pickle will suffice.</p>
      <p>Before saving dictionaries, it would be logical to delete the keys whose values are None. These are
blocked or deleted accounts. Simply put, these id will be present in the column, because they have
someone in the friends, well, the program will save on the number of keys in the dictionary. The saved
result must be unloaded so as not to collect again ID.</p>
      <p>For drawing a graph, Figure API and Draw Networkx are used. In Fig.7 a graph of mutual friends,
a total of 306 vertices and 2,096 edges is shown.</p>
    </sec>
    <sec id="sec-12">
      <title>The results of the experiment</title>
      <p>To analyze the selected network, an indicator metric was the first selected that calculates the number
of edges incident to each vertex, and then normalizes the value obtained for each vertex. To identify
leaders in the network, the nodes with the highest coefficient of significance in terms of metrics have a
larger size and brighter color. Yes, the first group (with the highest odds - leaders) is red, the second
yellow, the third - green, the fourth - blue and the fifth - without color (with a label).</p>
      <p>The first group includes vertices with coefficients from 0.4 to 0.5, the second - from 0.3 to 0.4, the
third - from 0.2 to 0.3, the fourth - from 0.1 to 0, 2 and to the fifth all other vertices, the coefficient of
which is less than 0.1. As can be seen from the figure, the leader with a coefficient of significance equal
to 0.45085 was the vertex with the number 305. None of the vertices fell into the second group, but the
third group received three at once - 71 with a coefficient of 0.28136 and 72nd with a coefficient of
0.27119, as well as the 217th with a coefficient of 0.20339. Therefore, it can be concluded that these
above nodes have the most connections with other vertices. But these links do not reflect their quality
and importance to the graph, but only their quantity.</p>
      <p>So, next for consideration is the proximity metric, in which all the vertices were also divided into
groups, the colors for the groups were chosen in the same way as for the indicator centrality. The results
are shown on Fig. 9.</p>
      <p>The only difference is that there are no groups with coefficients between 0.3 and 0.5, these groups
did not get any of the vertices. The maximum coefficient was again at the top of 305 and was equal to
0.57578. Blue peaks have a coefficient from 0.1 to 0.2, and from 0.2 to 0.3 - green. As you can see, the
vertex 305 not only has many connections to others, but it is also well suited for data transmission.</p>
      <p>Continuing the study, we obtain that the peak with the maximum coefficient was again the 305th
(significance factor - 0.12464). The high significance factor for this metric indicates that the vertex has
a high impact and popularity on the network, because it is indicated by many other "quality" vertices.
However, for the load metric and the intermediate vertex 305 had extremely low coefficients, so it did
not fall into the "top five" for the compatible metric.</p>
    </sec>
    <sec id="sec-13">
      <title>5. Networks as applicable to public health</title>
      <p>It is not easy to use apply networks for public health, since there is a compromise between people
and their relationships. There are many basis to construct ties as edges, for example, sexual, emotional,
transactional, and so on.</p>
      <p>If we use social networks for modeling infectious disease transmission, some requires not only the
parameters of what causes disease to spread (and not spread) but also a representative network of
individuals are needed. For creating this representative network, data are required. We will assume true
network census data are not available and data are thus egocentric.</p>
    </sec>
    <sec id="sec-14">
      <title>6. Conclusions</title>
      <p>Social networks are an important component of communication in modern life. Their analysis is
necessary both to understand the current situation and to improve some aspects of life. As a result of
the study, a prototype of the method of analysis of intersubjective connections of the social network
was built. During the work, the analysis of search and establishment of the type of connections and
research of social network problems was carried out. The relationship between graph theory and social
network analysis was studied and established. As part of this work, the problem of analysis of ties in
social networks was considered and the main methods of its solution were determined with the help of
graph theory. Using the concepts of graph theory "centrality" and "intermediate centrality", a method
of analyzing connections in cyberspace was proposed. This method was used to build a prototype for
social network analysis. The RabbitMQ, NetworkX, and Matplotlib ties algorithm include depth setting,
data sending, response retrieval, and optimization.</p>
      <p>Further research involves the neurosophic approach as a generalization of fuzzy concepts in the
graph, which will allow a deeper interpretation of the relationships and their quality.</p>
    </sec>
    <sec id="sec-15">
      <title>7. References</title>
      <p>[11] P. Erdős, I. Miklós, Z. Toroczkai, A Simple Havel–Hakimi, Type Algorithm to Realize Graphical
Degree Sequences of Directed Graphs, The Electronic Journal of Combinatorics, volume 17
(2009). doi: 10.37236/338.
[12] A. Rapoport, Contributions to the Theory of Random and Biased Nets, Bulletin of Mathematical
Biophysics, volume 19 (4), 1957, pp. 257–277. doi:10.1007/BF02478417.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S</given-names>
            <surname>Popereshnyak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O</given-names>
            <surname>Suprun</surname>
          </string-name>
          ,
          <article-title>Tools and methods for intersubjective relationships in cyberspace forecasting</article-title>
          ,
          <source>in: Proceedings of the 12th International Scientific and Technical Conference on Computer Sciences and Information Technologies</source>
          , CSIT '
          <year>2017</year>
          , Lviv, Ukraine,
          <year>2017</year>
          , pp.
          <fpage>244</fpage>
          -
          <lpage>247</lpage>
          . doi:
          <volume>10</volume>
          .1109/STC-CSIT.
          <year>2017</year>
          .
          <volume>8098779</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J.</given-names>
            <surname>Mena</surname>
          </string-name>
          ,
          <article-title>Investigative Data Mining for Security and Criminal Detection</article-title>
          .
          <source>Butterworth Heinmann</source>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Q.</given-names>
            <surname>Han</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>You</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Miao</surname>
          </string-name>
          ,
          <article-title>Rumor Spreading with Cross Propagation in Multilayer Social Networks</article-title>
          ,
          <source>in: Proceedings of the Intl Conf on Parallel &amp; Distributed Processing with Applications</source>
          ,
          <source>Big Data &amp; Cloud Computing, Sustainable Computing &amp; Communications, Social Computing &amp; Networking</source>
          , ISPA/BDCloud/SocialCom/SustainCom '2019, Xiamen, China,
          <year>2019</year>
          , pp.
          <fpage>1641</fpage>
          -
          <lpage>1645</lpage>
          . doi:
          <volume>10</volume>
          .1109/
          <string-name>
            <surname>ISPA-BDCloud-SustainCom-SocialCom48970</surname>
          </string-name>
          .
          <year>2019</year>
          .
          <volume>00242</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Pruthvi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Karthika</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Bhalaji</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          SMART COLLEGE”
          <article-title>- Study of Social Network and IoT Convergence</article-title>
          ,
          <source>in: Proceedings of the 2nd International Conference on IoT in Social</source>
          , Mobile, Analytics and Cloud,
          <string-name>
            <surname>I-SMAC</surname>
          </string-name>
          '
          <year>2018</year>
          , Palladam, India,
          <year>2018</year>
          , pp.
          <fpage>100</fpage>
          -
          <lpage>103</lpage>
          . doi:
          <volume>10</volume>
          .1109/ISMAC.
          <year>2018</year>
          .
          <volume>8653787</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
            <surname>Garg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Gandhi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Panigrahi</surname>
          </string-name>
          ,
          <article-title>Social Network measures association with social and intelligent behaviors in Dolphin network</article-title>
          ,
          <source>in: Proceedings of the 11th International Conference on Cloud Computing, Data Science &amp; Engineering</source>
          , Confluence '
          <year>2021</year>
          , Noida, India,
          <year>2021</year>
          , pp.
          <fpage>655</fpage>
          -
          <lpage>659</lpage>
          . doi:
          <volume>10</volume>
          .1109/Confluence51648.
          <year>2021</year>
          .
          <volume>9377088</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Morzy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Kazienko</surname>
          </string-name>
          , T. Kajdanowicz,
          <article-title>Priority rank model for social network generation</article-title>
          ,
          <source>in: Proceedings of the ACM International Conference on Advances in Social Networks Analysis and Mining</source>
          , ASONAM '
          <year>2016</year>
          , San Francisco, CA, USA,
          <year>2016</year>
          , pp.
          <fpage>315</fpage>
          -
          <lpage>318</lpage>
          . doi:
          <volume>10</volume>
          .1109/ASONAM.
          <year>2016</year>
          .
          <volume>7752251</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>F.</given-names>
            <surname>Long</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Ning</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Song</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <article-title>Strengthening Social Networks Analysis by Networks Fusion</article-title>
          ,
          <source>in: Proceedings of the ACM International Conference on Advances in Social Networks Analysis and Mining</source>
          , ASONAM '
          <year>2019</year>
          , Vancouver, BC, Canada,
          <year>2019</year>
          , pp.
          <fpage>460</fpage>
          -
          <lpage>463</lpage>
          . doi:
          <volume>10</volume>
          .1145/3341161.3342939.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Bitaghsir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kashipazha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Dadlani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Khonsari</surname>
          </string-name>
          ,
          <article-title>Social-aware Mobile Road Side Unit for Content Distribution in Vehicular Social Networks</article-title>
          ,
          <source>in: Proceedings of the 2019 IEEE Symposium on Computers and Communications</source>
          , ISCC '
          <year>2019</year>
          , Barcelona, Spain,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , doi: 10.1109/ISCC47284.
          <year>2019</year>
          .
          <volume>8969669</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>U.</given-names>
            <surname>Brandes</surname>
          </string-name>
          ,
          <string-name>
            <surname>A Faster</surname>
          </string-name>
          ,
          <article-title>Algorithm for Betweenness Centrality</article-title>
          ,
          <source>The Journal of Mathematical Sociology</source>
          , volume
          <volume>25</volume>
          (
          <year>2004</year>
          ). doi:
          <volume>10</volume>
          .1080/0022250X.
          <year>2001</year>
          .
          <volume>9990249</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>N.</given-names>
            <surname>Salia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Tompkins</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Zamora</surname>
          </string-name>
          ,
          <article-title>An Erdős-Gallai type theorem for vertex colored graphs</article-title>
          .
          <source>Graphs and Combinatorics</source>
          , volume
          <volume>35</volume>
          ,
          <year>2019</year>
          , pp.
          <fpage>689</fpage>
          -
          <lpage>694</lpage>
          . doi:
          <volume>10</volume>
          .1007/s00373-019-02026-1
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>