Next Article in Journal
SDA-Net: A Symmetric Dual-Attention Network with Multi-Scale Convolution for MOOC Dropout Prediction
Previous Article in Journal
A Review of Hyperon Physics at BESIII Experiment
 
 
Due to scheduled maintenance work on our servers, there may be short service disruptions on this website between 11:00 and 12:00 CEST on March 28th.
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Fuzzy-SNA Computational Framework for Quantifying Intimate Relationship Stability and Social Network Threats

School of Mathematics and Data, Jiangnan University, Wuxi 214122, China
*
Author to whom correspondence should be addressed.
Symmetry 2026, 18(1), 201; https://doi.org/10.3390/sym18010201
Submission received: 17 December 2025 / Revised: 9 January 2026 / Accepted: 16 January 2026 / Published: 21 January 2026
(This article belongs to the Section Mathematics)

Abstract

Intimate relationship stability is fundamental to human wellbeing, yet its quantitative assessment faces dual challenges: the inherent subjectivity of psychological constructs and the complexity of social ecosystems. Symmetry, as a fundamental structural feature of social interaction, plays a pivotal role in shaping relational dynamics. To address these limitations, this study proposes an innovative computational framework that integrates Fuzzy Set Theory with Social Network Analysis (SNA). The framework consists of two complementary components: (1) a psychologically grounded fuzzy assessment model that employs differentiated membership functions to transform discrete subjective ratings into continuous and interpretable relationship quality indices and (2) an enhanced Fuzzy C-Means (FCM) threat detection model that utilizes Weighted Mahalanobis Distance to accurately identify and cluster potential interference sources within social networks. Empirical validation using a simulated dataset—comprising typical characteristic samples from 10 couples—demonstrates that the proposed framework not only generates interpretable relationship diagnostics by correcting biases associated with traditional averaging methods, but also achieves high precision in threat identification. The results indicate that stable relationships exhibit greater symmetry in partner interactions, whereas threatened nodes display structural and behavioural asymmetry. This study establishes a rigorous mathematical paradigm—“Subjective Fuzzification → Multidimensional Feature Engineering → Intelligent Clustering”—for relationship science, thereby advancing the field from descriptive analysis toward data-driven, quantitative evaluation and laying a foundation for systematic assessment of relational health.

1. Introduction

The stability of intimate relationships forms a crucial foundation for individual well-being and social functioning, profoundly impacting personal, physical, and mental health [1,2]. However, maintaining stable long-term intimate relationships faces dual challenges from both internal and external sources. Internal dynamics include the constant evolution of individual needs and the shifting patterns of interpersonal communication. External pressures stem from professional demands and increasingly complex social environments [3]. Therefore, understanding relationship stability and its scientific quantification are crucial for promoting healthy intimate relationships.
However, current research faces significant limitations that manifest themselves primarily in three bottlenecks. First, ambiguity bottleneck—mainstream methods rely on Likert scales to forcibly discretize continuous indicators such as trust, commitment, and satisfaction in graded scores, resulting in loss of information granularity and hindering the capture of the actual continuous spectrum within relationships [4,5]. Second, complexity bottleneck—while acknowledging environmental influences, classical theories often oversimplify operational aspects. They do not reflect the structural characteristics of support networks or depict the transmission pathways of social influences within relationships, making it difficult to effectively identify and quantify subtle risks embedded within social networks [6]. Finally, the static bottleneck—most models remain confined to cross-sectional static depictions—failing to capture the real-time interactions and strategy adjustments that co-evolve between partners over time. This limits their ability to explain and predict relationship dynamics [7,8].
Moreover, symmetry represents a fundamental yet under-explored dimension within intimate relationships. Within dyadic bonds, symmetry manifests itself as balanced emotional investment, reciprocal trust, and two-way communication—hallmarks of relational health. In contrast, asymmetry frequently signals underlying tensions or external changes. At the network level, symmetrical connections foster relational stability, whereas asymmetric threat propagation may undermine this equilibrium. Despite the significance of symmetry, current computational models seldom incorporate explicit symmetry metrics, thus limiting their capacity to capture the nuanced interplay between relational equilibrium and threat dynamics.
To address the first two bottlenecks, this study proposes a computational framework that integrates fuzzy set theory with social network analysis (SNA). Crucially, we incorporate symmetry considerations into this unified framework, aiming to bridge the aforementioned gaps and provide a more comprehensive, symmetry-aware approach to quantifying relational stability and detecting latent threats. In this manner, not only are we able to describe the fuzzy attributes and complex structures within relationships, but we are also able to capture the inherent bidirectionality and equilibrium of relational systems. The core contributions of this paper are primarily in the following four aspects:
1.
We propose a paradigm for constructing differentiated fuzzy membership functions based on psychological constructs. This approach transcends the conventional homogeneous function framework by adaptively designing membership function shapes—such as trapezoidal, S-curves, and Gaussian—to match the intrinsic dynamic characteristics of distinct psychological constructs like trust, satisfaction, and communication.
2.
We propose a displayed partner symmetry factor, distinct from methods that implicitly assume perceived symmetry through arithmetic averaging. This factor quantifies and corrects for asymmetry between partners, ultimately generating a system relationship score that more accurately reflects bilateral realities.
3.
We propose a weighted Mahalanobis fuzzy C-means (WM-FCM) algorithm. By assigning feature weights based on information gain ratios and optimizing distance metrics through covariance matrix adjustments, it substantially enhances the detection of potential threats within social networks. Compared with FCM, this approach demonstrates superior robustness and accuracy, achieving a paradigm shift from merely describing network structures to actively detecting threats.
4.
We have constructed a closed-loop, symmetry-aware computational paradigm for relational science, progressing from fuzziness metrics to feature space sets and ultimately to fuzzy clustering. This drives the field from descriptive analysis towards data-driven, quantitative systems diagnostics, providing a generalizable template for evaluating relational ecosystems.
The remaining sections of this paper are organized as follows: Section 2 presents a review of the relevant literature; Section 3 describes the proposed fuzzy-social network analysis framework; Section 4 illustrative application and numerical analysis; Section 5 discusses the experiments and provides a comparative analysis; Section 6 summarizes the entire article and outlines future research directions.

2. Literature Review

Traditional studies on relationship stability predominantly employ investment models [9] and vulnerability-stress-coping frameworks [8]. While these theories effectively identify key indicators such as trust and satisfaction, their quantification suffers from two primary shortcomings: First, complex and continuous emotional experiences are forcibly compressed into discrete rating scales, resulting in the loss of nuanced “fuzzy” information [10]; Second, existing scales struggle to capture contradictory states within relationships, such as the complex paradox of “feeling highly emotionally satisfied with one’s partner while simultaneously experiencing extreme exhaustion due to objective stressors both within and outside the relationship” [11]. Recent research indicates that single-point ratings are insufficient to depict and reflect the complex, multifaceted nature of genuine contradictions [12].
Fuzzy mathematics has significant advantages in quantifying subjective concepts [13], but its application in intimate relationship research remains constrained. Current studies predominantly lack systematic fuzzy quantification of multidimensional constructs like trust. As a core relational element, trust itself possesses multidimensional attributes [4], that encompass cognitive, emotional, and behavioral dimensions [14]. However, existing studies are predominantly based on single-dimensional measurements using discrete scales, failing to capture the inherent fuzziness of “trust levels.” A more significant shortcoming is the lack of differentiated membership functions designed for the conceptual characteristics of relationships. In particular, emerging mathematical tools such as fuzzy sets and Gaussian aggregation operators [15] are gradually evolving. Although they show significant potential for precise quantification [16], their application in this field remains underdeveloped.
Meanwhile, social network analysis (SNA), a classic method for examining the external structure of relationships, exhibits significant limitations in intimate relationship research [6]. First, representational ambiguity: traditional SNA struggles to capture ambiguous relationship states such as “close but not deeply intimate” [17]. Second, methodological constraint: while SNA excels in describing overall network structures, it lacks built-in algorithmic frameworks, making it incapable of automatically diagnosing specific risks within relationships [18]. In particular, research in fake news detection has demonstrated that integrating internal traits with external network characteristics significantly enhances analytical efficacy [19], offering crucial methodological insights for intimate relationship studies. Meanwhile, review studies in the SNA field indicate that inadequate dynamic modeling is one of the current main bottlenecks [20]. These findings provide theoretical justification for this study’s focus on “static snapshot” analysis and also point the way for future dynamic model research.
Regarding clustering algorithms, traditional methods show significant limitations when handling mixed-type, heterogeneous feature data, such as intimate relationships. Recent research demonstrates that Mahalanobis distance has notable advantages in processing correlated feature data [21], particularly in multi-view clustering, where the MMA method research proves that maximizing Mahalanobis distance can significantly enhance cluster discriminability. These findings provide a solid theoretical and methodological foundation for our improvement of the FCM algorithm, allowing us to more effectively identify potential threat patterns in relationship networks.
Through a systematic review of the literature, this study identifies two key research gaps. In terms of fuzzy quantification, multidimensional constructs in intimate relationships lack systematic fuzzy mathematical quantification methods and differentiated membership functions designed for relationship characteristics. In terms of systematic threat identification, SNA lacks algorithmic frameworks for automatic diagnosis and prediction of relationship risks. Interdisciplinary research cases provide important information: Just as data integration frameworks drive breakthroughs in biomedicine [22], and AI models demonstrate enormous potential to assess social situations [23], this study offers an innovative way to solve the classic socio-psychological problem of intimate relationships by constructing an interdisciplinary computational framework integrating fuzzy mathematics and SNA.

3. The Proposed Fuzzy-SNA Framework

3.1. Overview of the Framework

The stability of a dyadic system is conceptualized as emerging from the continuous interaction between the internal subjective states of individuals and the external structural environment of their shared social network. To model this integration scientifically, we propose a novel computational framework that synergistically combines fuzzy mathematics and SNA. The framework comprises two computationally parallel, task-independent, yet complementary models:
1.
The Internal-State Fuzzy Assessment Model: This model performs a parallel determination of the uncertain, subjective perceptions of nodes within the social network through a hierarchical fuzzy logic system.
2.
The External-Network Risk Screening Model: This model enables the proactive identification and categorization of nodes that are likely to pose risks to dyadic stability, utilizing an enhanced clustering algorithm.
To systematically simulate the interaction between the state of the internal relationship and the impact of the external network, we proposed a dual-path computing framework, as shown in Figure 1. This integrated architecture handles subjective perception and network risks in parallel, thereby realizing the overall diagnosis of relationship health.
The following sections elaborate on the general standardized mathematical expression of each model, aiming to establish it as a reusable methodological system, to complete the construction of the theoretical framework before the specific application and verification in Section 4.

3.2. Quantification of Fuzzy Indicators

A hierarchical, two-layer fuzzy aggregation model is proposed to convert discrete subjective ratings (such as Likert-scale surveys) into a continuous measure of relationship quality. This approach provides a transparent and psychologically plausible framework for the conversion.
Convert discrete survey results into continuous relational quality indicators, following a structured two-layer fuzzy aggregation process. Figure 2 details the flow chart, from the original input blurring to the final blurring score.

3.2.1. Indicator System and Fuzzification

The model obtains the original numerical score from five basic sub-dimensions: Cognitive Trust ( T 1 ), Affective Trust ( T 2 ), Behavioral Trust ( T 3 ), Satisfaction (S) and Communication Quality (C). Set x to represent the original brittleness score of any of these subdimensions. Each fraction is converted into a fuzzy set, which is defined as a language variable (Low (L), Medium (M), High (H)) by its specific affiliation function.
The differentiated membership functions constructed for different psychological constructs are based on a comprehensive consideration of their measurement characteristics and psychological theories:
  • Cognitive trust ( T 1 ): It involves explicit rational judgements, with evaluations typically possessing clear threshold intervals such as the boundary between ‘basic trust’ and ‘complete trust’ [13,24]. The plateau region of the trapezoidal function effectively represents this relatively stable intermediate state, aligning with the ‘ambiguous yet stable’ psychological response pattern corresponding to mid-range scores on Likert scales.
μ T 1 ( L ) ( x ) = 1 x [ 1 , 2 ] 3 x 1 x ( 2 , 3 ) 0 x [ 3 , 7 ]
μ T 1 ( M ) ( x ) = 0 x [ 1 , 2 ] [ 6 , 7 ] x 2 1 x ( 2 , 3 ) 1 x [ 3 , 5 ] 6 x 1 x ( 5 , 6 )
μ T 1 ( H ) ( x ) = 0 x [ 1 , 5 ] x 5 1 x ( 5 , 6 ) 1 x [ 6 , 7 ]
  • Affective trust ( T 2 ): It often exhibits clustered distributions among populations, with few extremes and most individuals occupying intermediate levels. The piecewise linear function fits this centrally clustered distribution with gradual attenuation at both ends, consistent with the linear gradation characteristic of emotional evaluations [4].
μ T 2 ( L ) ( x ) = 3 x 2 x [ 1 , 3 ] 0 x ( 3 , 7 ]
μ T 2 ( M ) ( x ) = 0 x [ 1 , 2 ] [ 6 , 7 ] x 2 2 x ( 2 , 4 ) 6 x 2 x [ 4 , 6 )
μ T 2 ( H ) ( x ) = 0 x [ 1 , 5 ] x 5 2 x ( 5 , 7 ]
  • Behavioral trust ( T 3 ): It exhibits a characteristic ‘threshold effect,’ where minor cumulative behaviors trigger a qualitative shift in trust. The sigmoid function’s gradual progression followed by abrupt change precisely models this non-linear dynamic [14].
μ T 3 ( L ) ( x ) = 1 1 + e 1.5 ( x 2 ) μ T 3 ( M ) ( x ) = 1 1 + e 1.5 ( x 2 ) 1 1 + e 1.5 ( x 5 ) μ T 3 ( H ) ( x ) = 1 1 1 + e 1.5 ( x 5 )
  • Satisfaction (S): As a continuous affective state, satisfaction typically undergoes gradual, smooth transitions [11]. The bell-shaped curve of the Gaussian function naturally represents the gradual attenuation around the ‘peak satisfaction point,’ avoiding the abrupt boundaries of trapezoidal functions and better reflecting the inherently fuzzy, gradual nature of subjective satisfaction.
μ S ( L ) ( x ) = e x 2 1.5 2 , μ S ( M ) ( x ) = e x 4 1.5 2 , μ S ( H ) ( x ) = e x 6 1.5 2
  • Communication Quality (C): It is often categorized into finite, relatively well-defined categories such as ‘conflict’, “neutral”, and ‘harmony’ [25]. This psychological tendency towards classification inherently endows perceptions of communication quality with interval characteristics. The trapezoidal function clearly represents both the plateau regions within these categories and the gradient zones between them.
μ C ( L ) ( x ) = 1 x [ 1 , 2 ] 3 x 1 x ( 2 , 3 ) 0 x [ 3 , 7 ]
μ C ( M ) ( x ) = 0 x [ 1 , 2 ] [ 6 , 7 ] x 2 1 x ( 2 , 3 ) 1 x [ 3 , 5 ] 6 x 1 x ( 5 , 6 )
μ C ( H ) ( x ) = 0 x [ 1 , 5 ] x 5 1 x ( 5 , 6 ) 1 x [ 6 , 7 ]

3.2.2. Two-Layer Fuzzy Aggregation

  • First-Layer Aggregation: Computing Comprehensive Trust ( T ˜ )
    Gather three trust sub-dimensions into a composite trust fuzzy set. The weighting is based on Rempel’s multidimensional theory of trust [4]. This model posits that trust within intimate relationships comprises three distinct yet interrelated components. Rempel et al. propose that while all three are indispensable, the affective dimension typically constitutes the core of intimate trust and is more directly linked to relational well-being. Consequently, we assign it a slightly higher weighting w 2 = 0.4 . While cognitive and behavioral dimensions are crucial, they are given equal weightings w 1 = w 3 = 0.3 to reflect their complementary roles in forming the overall trust judgment, satisfying w 1 + w 2 + w 3 = 1 . The aggregation uses the fuzzy weighted average (FWA) operator for each linguistic term k { L , M , H } :
    μ T ( k ) = w 1 · μ T 1 ( k ) + w 2 · μ T 2 ( k ) + w 3 · μ T 3 ( k ) ( k = L , M , H )
    The output T ˜ is the fuzzy set { μ T ( L ) , μ T ( M ) , μ T ( H ) }
  • Second-Layer Aggregation: Computing Relationship Quality ( Q ˜ )
    Intermediate indicators—Composite Trust ( T ˜ ), Satisfaction ( S ˜ ), and Communication Quality ( C ˜ )-are summarized in the fuzzy set of the final quality of the relationship. The weighting is based on a mature three-dimensional model of relationship quality [11], w T = 0.4 , w S = 0.3 , w C = 0.3 , satisfying w T + w S + w C = 1 , which considers trust as the foundational pillar, while satisfaction and communication serve as key reinforcing elements. This model emphasizes that although satisfaction reflects immediate emotional rewards and communication ensures day-to-day functioning, trust is the cornerstone of long-term stability in intimate relationships. Consequently, composite trust is assigned the highest weighting. Satisfaction and communication quality are equally weighted, reflecting their complementary and interdependent roles in sustaining relationship wellbeing.

3.2.3. Defuzzification

The mass center method converts the final fuzzy set ( Q ˜ ) into a single explainable, clear fraction (Q) on a continuous scale to provide a quantitative measure of the health of the overall relationship. This study employs the centroid method for defuzzification, a standard strategy within fuzzy systems. This approach delivers smooth, continuous output whilst comprehensively incorporating the overall distribution information of fuzzy sets.
Q = Defuzz ( Q ˜ ) = ν L · μ Q ( L ) + ν M · μ Q ( M ) + ν H · μ Q ( H ) μ Q ( L ) + μ Q ( M ) + μ Q ( H )
Here ν L = 1 , ν M = 4 , ν H = 7 are the representative values for the low, medium and high linguistic terms, corresponding to the 7-point scale.

3.2.4. Dyadic Symmetry Adjustment

To transform individual assessments into estimates of the dyadic system, we introduce a symmetry adjustment factor based on data from both partners. For each dimension d, the symmetry factor is as follows:
σ d sum = 1 | S A d S B d | max ( S A d , S B d ) min ( S A d , S B d ) + ϵ
where S A d and S B d are partners’ scores (1–7 scale), and ϵ = 10 5 . The overall dyadic symmetry is as follows:
σ ¯ = 1 5 d = 1 5 σ d s y m
The symmetry-adjusted system-level relationship quality is then the following:
Q s y s t e m s y m = Q A × σ ¯ + Q B × σ ¯ 2 = σ ¯ × Q A + Q B 2
where Q A and Q B are the defuzzified relationship quality scores for each calculated partner.
Below is the Algorithm 1 flow chart, which fuzzifies individual scores and aggregates them through two layers to obtain a system-level relationship quality score.
Algorithm 1 Fuzzy-SNA Relationship Quality Assessment Model
Require: Individual scores for partners A and B:
   1:
    T A = [ T 1 A , T 2 A , T 3 A ] , T B = [ T 1 B , T 2 B , T 3 B ]
▹ Trust dimensions
   2:
    S A , S B
▹ Satisfaction scores
   3:
    C A , C B
▹ Communication scores
Ensure: System-level relationship quality score: Q s y s t e m
   4:
Step 1: Fuzzification for each parameter
   5:
for each partner P { A , B }  do
   6:
    Apply trapezoidal MF to T 1 P , T 2 P , T 3 P
▹ Trust parameters
   7:
    Apply Gaussian MF to S P
▹ Satisfaction parameter
   8:
    Apply S-shaped MF to C P
▹ Communication parameter
   9:
    Obtain fuzzy membership vectors: F T P , F S P , F C P
  10:
end for
  11:
Step 2: First-layer aggregation (Rempel’s theory)
  12:
Apply weights w 1 = 0.3 , w 2 = 0.4 , w 3 = 0.3 for trust dimensions
  13:
Q A T w 1 · F T 1 A + w 2 · F T 2 A + w 3 · F T 3 A
  14:
Q B T w 1 · F T 1 B + w 2 · F T 2 B + w 3 · F T 3 B
  15:
Q A S F S A , Q B S F S B
▹ Satisfaction aggregation
  16:
Q A C F C A , Q B C F C C
▹ Communication aggregation
  17:
Step 3: Second-layer aggregation (cross-dimension)
  18:
Apply dimension weights: w T = 0.4 , w S = 0.3 , w C = 0.3
  19:
Q A w T · Q A T + w S · Q A S + w C · Q A C
  20:
Q B w T · Q B T + w S · Q B S + w C · Q B C
  21:
Step 4: Dyadic symmetry adjustment
  22:
for each dimension d { T , S , C }  do
  23:
    Compute symmetry factor σ d s y m :
  24:
     σ d s y m = 1 | Q A d Q B d | max ( Q A d , Q B d ) min ( Q A d , Q B d ) + ϵ
  25:
    where ϵ = 10 5
  26:
    Compute adjusted quality: Q s y m d Q A d + Q B d 2 × σ d s y m
  27:
end for
  28:
Step 5: System-level integration
  29:
Q s y s t e m α T · Q s y m T + α S · Q s y m S + α C · Q s y m C
  30:
Step 6: Defuzzification (centroid method)
  31:
Q s y s t e m CentroidDefuzzify ( Q s y s t e m )
  32:
return Q s y s t e m

3.3. Identification of Potential Threats via FCM

To capture the inherent ambiguity in social threat assessment, we employ Fuzzy C-Means clustering. Unlike hard clustering, FCM assigns soft membership degrees, making it particularly suitable for modeling psychological and behavioral data with ill-defined boundaries [26].

3.3.1. Multimodal Feature Engineering Framework

The social network is represented by graph G = ( V , E ) , where V is the set of nodes (individuals) and E is the set of edges (relations). For each node i V , we construct a contour using the characteristic vector x i R d derived from four orthogonal dimensions. Feature dimensions include network structure, interaction behavior, sentiment orientation, and interference sources.
The features of d were normalized to the [ 0 , 1 ] range by the min-max normalization method. For feature j of node i:
x i j = x i j min ( x j ) max ( x j ) min ( x j )
Here min ( x j ) and max ( x j ) denote the minimum and maximum values of the feature j at all nodes, respectively.

3.3.2. Two-Stage Feature Selection

Not all social network features contribute equally to threat identification. To ensure that more discriminative features exert a greater influence on clustering outcomes, we introduce a feature weighting mechanism. This approach builds upon the growing body of research on feature-weighted clustering, which has demonstrated its advantages in enhancing clustering compactness and interpretability [27]. We compute the information gain ratio for each feature, a well-established metric in feature selection that mitigates bias towards multi-valued features [28]. The IGR measures the reduction in entropy regarding threat levels given a feature, normalized by the feature’s inherent entropy.
1.
Redundancy Removal: We compute the Pearson correlation coefficient matrix for all input features d, denoted as R = [ r m n ] . Typically, θ = 0.8 is set. If the absolute correlation coefficient | r m n | between any feature pair m and n exceeds θ , the less important feature is discarded. Subsequently, d denotes the number of features retained following this procedure.
2.
Importance Assessment & Weighting: We calculate the information gain ratio for d . Let us consider a feature A. Its values are partitioned into bins v. The information gain ratio for feature A is defined by the following formula:
GainRatio ( A ) = Gain ( A ) SplitInfo ( A ) = Ent ( D ) s = 1 v | D s | | D | Ent ( D s ) s = 1 v | D s | | D | log 2 | D s | | D |
w j = GainRatio ( A j ) n = 1 d GainRatio ( A n )
These weights form the diagonal weight matrix W = diag ( w 1 , w 2 , , w d ) .

3.3.3. The Weighted Mahalanobis FCM (WM-FCM) Algorithm

The objective function of the algorithm is defined as
J WM - FCM = i = 1 n j = 1 c ( u i j ) m ( d i j WM ) 2
The fuzzifier parameter m > 1 controls the degree of overlap between clusters. In this study, it was set to m = 2 a conventional choice that provides a good balance between the fuzziness of the membership assignments and the computational efficiency of the algorithm [29].
Step 1: Data Standardization & Feature Weight Matrix W
Standardize the d -dimensional feature vectors X = { x 1 , x 2 , , x n } for n nodes to eliminate scale differences. Construct the diagonal feature weight matrix W = diag ( w 1 , w 2 , , w d ) , where each weight w j is derived from the Two-Stage Feature Selection protocol.
Step 2: Initialize Cluster Centers via the Max-Min Distance Method
Initialize c cluster centers V = { v 1 , v 2 , , v c } using the deterministic Max-Min Distance Method to ensure robust convergence and mitigate poor local optima.
1.
Select the first initial center v 1 ( 0 ) :
v 1 ( 0 ) = x p
The sample x p that is predefined as a “threat” and exhibits extreme feature values—such as lying near the [ 1 , 1 , , 1 ] boundary in the standardized space—is chosen.
2.
Select the second initial center v 2 ( 0 ) :
v 2 ( 0 ) = arg max x i X x i v 1 ( 0 )
The sample farthest from v 1 ( 0 ) by Euclidean distance is selected.
3.
Select the j-th initial center v j ( 0 ) ( j = 3 , , c ):
(a)
For each sample x i , compute its minimum distance to each selected centre.
d i ( min ) = min k = 1 j 1 x i v k ( 0 )
(b)
Select the sample with the maximum d i ( min ) as the next center:
v j ( 0 ) = arg max x i X d i ( min )
Step 3: Calculate Covariance Matrix Σ and Compute Σ 1
Standard FCM employs Euclidean distance, assuming features are independent and homoscedastic. However, social network features often exhibit correlations. To address this, we introduce the weighted Mahalanobis distance, which accounts for feature correlations through the inverse covariance matrix and achieves standardization, rendering it insensitive to scale differences [30,31].
Calculate the d × d pooled covariance matrix Σ from the entire standardized feature set X :
Σ = 1 n 1 i = 1 n ( x i μ ) ( x i μ ) T
where μ is the global feature mean vector.
Σ = V Λ V T Σ 1 = V Λ 1 V T
where Λ 1 = diag ( 1 / λ 1 , , 1 / λ d ) .
Step 4: Calculate Weighted Mahalanobis Distance Matrix
For each node i and cluster j, compute the Weighted Mahalanobis Distance d i j W M :
d i j W M = ( x i v j ) T W Σ 1 W ( x i v j )
Step 5: Update Fuzzy Membership Matrix U
Update the membership degree u i j of node i to cluster j using the following:
u i j = 1 k = 1 c d i j W M d i k W M 2 / ( m 1 )
where m > 1 is the fuzzifier (typically m = 2 ). This update rule ensures that a node’s membership across all clusters is equal to 1 ( j u i j = 1 ), and a higher membership is assigned to the closer clusters.
Step 6: Update Cluster Centers V
Update each cluster center v j as the weighted mean of all node feature vectors:
v j = i = 1 n ( u i j ) m x i i = 1 n ( u i j ) m
The nodes with the highest membership in the cluster j exert a greater influence on the repositioning of its center v j .
Step 7: Check Convergence by Monitoring Objective Function
Check if the algorithm has converged by evaluating the objective function J WM-FCM . The convergence criterion can be based on the relative change in the objective function value between iterations t and t + 1 :
Δ J = J ( t + 1 ) J ( t ) J ( t ) < ϵ
If the condition is not met, return to Step 4. If the condition is met, proceed to the final step. Using Δ J directly aligns the convergence check with the main optimization goal of the algorithm.
Step 8: Output Final Threat Membership Degrees
Output the converged fuzzy membership matrix U, where u i j [ 0 , 1 ] . The threat membership degree for a node i can be defined as its maximum membership across clusters:
ThreatDegree ( x i ) = max 1 j C u i j
It shows that it has the strongest connection with any threat file. Alternatively, the membership of the predefined “high threat” cluster can be directly used for risk assessment.
The WM-FCM algorithm combines the characteristic weight and covariance structure to improve the clustering accuracy. Its iteration process—from initialization to convergence—is shown in Figure 3.
To handle high-dimensional data with correlated features, we further propose Algorithm 2, the Weighted Mahalanobis Fuzzy C-Means algorithm, which incorporates feature weighting and covariance adaptation mechanisms.
Algorithm 2 Weighted Mahalanobis Fuzzy C-Means Algorithm
Require: Dataset X, number of clusters c, fuzzifier m, maximum iterations T, convergence threshold ϵ
Ensure: Membership matrix U, cluster centroids V
   1:
Initialize cluster centroids V ( 0 )
   2:
Compute feature weights w based on Information Gain Ratio
   3:
Compute feature covariance matrix Σ
   4:
for  t = 1 to T do
   5:
      Compute weighted Mahalanobis distance:
   6:
       d i j = ( x i v j ) T W Σ 1 W T ( x i v j )
   7:
      Update membership matrix U ( t ) :
   8:
       u i j = k = 1 c d i j d i k 2 m 1 1
   9:
      Update cluster centroids V ( t ) :
  10:
       v j = i = 1 n ( u i j ) m x i i = 1 n ( u i j ) m
  11:
      if  U ( t ) U ( t 1 ) < ϵ  then
  12:
            break
  13:
      end if
  14:
end for
  15:
return U, V

3.3.4. Cluster Validation and Interpretable Output

The optimal number of clusters c is determined by jointly optimizing two indices over a range of candidate c values:
  • Fuzzy Partition Coefficient (FPC): Measures the overall clarity of the membership matrix. It is defined as
    FPC = 1 n i = 1 n j = 1 c u i j 2 .
    Values closer to 1 indicate well-separated clusters.
  • Xie-Beni (XB) Index: Evaluates the compactness within clusters and the separation between them. It is defined as
    XB = i = 1 n j = 1 c u i j m ( d i j WM ) 2 n × min j k v j v k 2 .
    Smaller values indicate better clustering performance.
The final output is not a hard label, but a membership degree vector u i = ( u i 1 , u i 2 , , u i c ) for each node i. The final cluster center V * provides a prototype representation of the characteristic outline of each risk category.

3.4. Implementation Details and Reproducibility

To ensure full reproducibility of the proposed framework, we provide the following implementation details:
All experiments were implemented in MATLAB R2024a, utilizing the Fuzzy Logic Toolbox for membership function operations and the Statistics and Machine Learning Toolbox for covariance computation and clustering.
For the iterative Weighted Mahalanobis FCM algorithm, convergence was determined when the maximum absolute change in the membership matrix between two consecutive iterations fell below a threshold ϵ conv = 10 5 : with a maximum iteration limit of T max = 100 to prevent infinite loops. The relationship quality assessment model follows a deterministic forward computation and thus does not require iterative convergence checks.A complete overview of all parameter configurations used in the proposed framework is provided in Table 1.

4. Illustrative Application and Numerical Analysis

This section demonstrates the application and evaluates the performance of the proposed framework through a detailed case study: threat assessment in intimate relationships. This domain presents the core challenges the framework is designed to address the inherent ambiguity of internal psychological states and the complex risks embedded in external social networks.
The analysis is conducted on a micro-social network dataset of 10 nodes, characterized by 12 initial features derived from the relational dimensions defined in Section 3. The validation unfolds on two complementary levels: a granular analysis of a selected dyad using Model I (Relationship Quality), and a comprehensive network-wide assessment using Model II (Integrative Threat Assessment).

4.1. Relationship Quality Analysis Based on Model I

To demonstrate the capability of model I, we extend the analysis to include both partners’ data.
  • Partner A: T 1 = 5 , T 2 = 6 , T 3 = 4 , S = 5 , C = 6
  • Partner B: T 1 = 6 , T 2 = 5 , T 3 = 5 , S = 4 , C = 5
The following is the calculation process for Partner A.
μ T 1 ( L ) = 0 , μ T 1 ( M ) = 1 , μ T 1 ( H ) = 0 T ˜ 1 A = ( 0 , 1 , 0 )
μ T 2 ( L ) = 0 , μ T 2 ( M ) = 0 , μ T 2 ( H ) = 0.5 T ˜ 2 A = ( 0 , 0 , 0.5 ) ( 0 , 0 , 1 )
μ T 3 ( L ) = 0.047 , μ T 3 ( M ) = 0.135 , μ T 3 ( H ) = 0.818 T ˜ 3 A = ( 0.047 , 0.135 , 0.818 )
μ S ( L ) = 0.018 , μ S ( M ) = 0.641 , μ S ( H ) = 0.641 S ˜ A = ( 0.018 , 0.641 , 0.641 ) ( 0.014 , 0.493 , 0.493 )
μ C ( L ) = 0 , μ C ( M ) = 0 , μ C ( H ) = 1 C ˜ A = ( 0 , 0 , 1 )
w 1 = 0.3 , w 2 = 0.4 , w 3 = 0.3
μ T ( L ) = w 1 · μ T 1 ( L ) + w 2 · μ T 2 ( L ) + w 3 · μ T 3 ( L ) = 0.014
μ T ( M ) = w 1 · μ T 1 ( M ) + w 2 · μ T 2 ( M ) + w 3 · μ T 3 ( M ) = 0.341
μ T ( H ) = w 1 · μ T 1 ( H ) + w 2 · μ T 2 ( H ) + w 3 · μ T 3 ( H ) = 0.645
T ˜ A = ( 0.014 , 0.341 , 0.645 )
w T = 0.4 , w S = 0.3 , w C = 0.3
μ Q ( L ) = w T · μ T ( L ) + w S · μ S ( L ) + w C · μ C ( L ) = 0.010
μ Q ( M ) = w T · μ T ( M ) + w S · μ S ( M ) + w C · μ C ( M ) = 0.284
μ Q ( H ) = w T · μ T ( H ) + w S · μ S ( H ) + w C · μ C ( H ) = 0.706
Q ˜ A = ( 0.010 , 0.284 , 0.706 )
D e f u z z ( Q ˜ A ) = 1 · μ Q ( L ) + 4 · μ Q ( M ) + 7 · μ Q ( H ) μ Q ( L ) + μ Q ( M ) + μ Q ( H ) = 6.088
The traditional arithmetic mean yields a result of 5.2 points, calculated as follows:
Mean ( A ) = T 1 A + T 2 A + T 3 A + S A + C A 5 = 5 + 6 + 4 + 5 + 6 5 = 5.2
Employ an identical computational procedure to produce the data for Partner B.
μ T 1 ( L ) = 0 , μ T 1 ( M ) = 0 , μ T 1 ( H ) = 1 T ˜ 1 B = ( 0 , 0 , 1 )
μ T 2 ( L ) = 0 , μ T 2 ( M ) = 0.5 , μ T 2 ( H ) = 0 T ˜ 2 B = ( 0 , 0.5 , 0 ) ( 0 , 1 , 0 )
μ T 3 ( L ) = 0.011 , μ T 3 ( M ) = 0.489 , μ T 3 ( H ) = 0.500 T ˜ 3 B = ( 0.011 , 0.489 , 0.500 )
μ S ( L ) = 0.169 , μ S ( M ) = 1 , μ S ( H ) = 0.169 S ˜ B = ( 0.169 , 1 , 0.169 ) ( 0.126 , 0.747 , 0.126 )
μ C ( L ) = 0 , μ C ( M ) = 1 , μ C ( H ) = 0 C ˜ B = ( 0 , 1 , 0 )
w 1 = 0.3 , w 2 = 0.4 , w 3 = 0.3
μ T ( L ) = w 1 · μ T 1 ( L ) + w 2 · μ T 2 ( L ) + w 3 · μ T 3 ( L ) = 0.003
μ T ( M ) = w 1 · μ T 1 ( M ) + w 2 · μ T 2 ( M ) + w 3 · μ T 3 ( M ) = 0.547
μ T ( H ) = w 1 · μ T 1 ( H ) + w 2 · μ T 2 ( H ) + w 3 · μ T 3 ( H ) = 0.450
T ˜ B = ( 0.003 , 0.547 , 0.450 )
w T = 0.4 , w S = 0.3 , w C = 0.3
μ Q ( L ) = w T · μ T ( L ) + w S · μ S ( L ) + w C · μ C ( L ) = 0.039
μ Q ( M ) = w T · μ T ( M ) + w S · μ S ( M ) + w C · μ C ( M ) = 0.743
μ Q ( H ) = w T · μ T ( H ) + w S · μ S ( H ) + w C · μ C ( H ) = 0.218
Q ˜ B = ( 0.039 , 0.743 , 0.218 )
D e f u z z ( Q ˜ B ) = 1 · μ Q ( L ) + 4 · μ Q ( M ) + 7 · μ Q ( H ) μ Q ( L ) + μ Q ( M ) + μ Q ( H ) = 4.537
The traditional arithmetic mean yields a result of 5 points, calculated as follows:
Mean ( B ) = T 1 B + T 2 B + T 3 B + S B + C B 5 = 6 + 5 + 5 + 4 + 5 5 = 5
  • Quality of relationship between Partner A: Q A = 6.088
  • Quality of relationship between Partner B: Q B = 4.537
The symmetry factors are computed from the consistent 1-point differences:
σ d s y m = 1 1 6 = 0.833 for all dimensions , σ ¯ = 0.833
Symmetry-adjusted individual assessments:
Q A a d j = Q A × σ ¯ = 6.088 × 0.833 = 5.071 Q B a d j = Q B × σ ¯ = 4.537 × 0.833 = 3.779
The system-level relationship quality, representing the couple as a relational unit:
Q s y s t e m s y m = Q A a d j + Q B a d j 2 = 5.071 + 3.779 2 = 4.425
Through fuzzy quantification, Model I provides a more nuanced analysis for each partner: For Partner A, cognitive trust ( T 1 = 5 ) is clearly classified as “moderate”, establishing a stable and rational foundation for the relationship. Emotional trust ( T 2 = 6 ) exhibits ‘high’ trust characteristics, indicating a strong emotional bond. Behavioral trust ( T 3 = 4 ) presents a complex and ambiguous state; its distribution spans ( 0.047 , 0.135 , 0.818 ) , strongly leaning towards ‘high’ trust while retaining some uncertainty.
In contrast, Partner B exhibits a divergent pattern: emotional trust ( T 2 = 5 ) falls into the ‘moderate’ category, while cognitive trust ( T 1 = 6 ) is rated as ‘high’. This reversal indicates differing priorities in the foundation of trust between the two individuals. Partner B’s behavioral trust ( T 3 = 5 ) distributed across ( 0.011 , 0.489 , 0.500 ) , exhibiting nearly equal membership in the medium and high categories, indicating greater ambiguity in their observable behaviors.
Following two-stage aggregation and defuzzification, the quality of Partner A’s relationship was quantified as ( 0.010 , 0.284 , 0.706 ) , which yields a defuzzification score of Q A = 6.088 ; Partner B’s profile was ( 0.039 , 0.743 , 0.218 ) , which yields a score of Q B = 4.537 . This significant disparity (1.551 points) reveals perceived asymmetry within the dyadic relationship.Detailed calculation results can be found in Table 2.
Applying symmetry adjustment with σ ¯ = 0.833 , we obtain adjusted scores of Q A adj = 5.071 and Q B adj = 3.779 , resulting in a system-level relationship quality of Q system sym = 4.425 . This outcome corrects the inherent bias of traditional mean-based methods by taking into account perceptual asymmetry. By accurately amplifying the positive influences of communication quality and emotional trust while moderating for asymmetry, the model produces an assessment more reflective of the dyadic system’s actual state.
To assess the sensitivity of the final relationship quality score Q to the choice of defuzzification method, we compared three commonly used approaches: (1) Centroid method (employed herein), (2) Maximum membership degree method (selecting the item with the highest membership degree as the representative value), and (3) Weighted average method (directly weighting by membership degree). Taking the sample from (partners A and B) as an example, the computational results for each method are presented in the Table 3.
As shown in Table 3, the scores derived from the three methods exhibit a high degree of consistency, with Pearson correlation coefficients exceeding 0.95 and the maximum relative deviation of the system score Q sym being less than 5%. This outcome indicates that the core output of this model—the relationship quality score—is insensitive to the specific defuzzification method selected, which enhances the robustness of the research conclusions.

4.2. Identifying Network Risks Using Model II

To evaluate Model II’s capability for automatically identifying potential threats within social networks, we shall conduct testing on an intimate relationship network dataset comprising ten nodes. This section records the complete analysis process in detail: from building a multi-dimensional feature space and refining it through a two-stage selection protocol, to determining the best cluster configuration and implementing the core WM-FCM algorithm.

4.2.1. Feature Space Construction and Data Foundation

The first step is to build a comprehensive feature space to numerically represent the position and behavior of each node in the network. We have defined 12 initial characteristics on four theoretical basic dimensions: network structure, interactive behavior, emotional tendency, and source of interference Table 4. This case proves that the model can reveal the subtle structural patterns in the data which are covered by the traditional average method.
In order to systematically verify the ability of Model II to identify threats in real social networks, we have built a multi-dimensional feature dataset containing 10 sample nodes. The data set is based on four theoretical dimensions—network structure, interactive behavior, emotional tendency, and source of interference—including 12 carefully designed characteristic indicators. As shown in Table 5, each sample includes quantitative characteristics extracted from actual social interactions and provides manual annotations (“threat”/“normal”) by field experts. This fine-grained multidimensional feature representation ensures that potential threats can be effectively identified from different angles.

4.2.2. Two-Stage Feature Selection: From Comprehensiveness to Precision

In order to ensure model efficiency and avoid overfitting, we have implemented a two-stage feature selection protocol. In the first stage, redundant features are removed through correlation analysis, and in the second stage, the importance of features is evaluated through information gain ratio. Operating directly in a 12-dimensional space may lead to inefficiency and overfitting of the model due to redundancy and unrelated features. Therefore, we have implemented a strict two-stage feature selection protocol to extract the most significant and non-redundant prediction factors.
The dataset employed in this study is relatively small (n = 10), and in such a small-sample scenario, any statistical learning process faces the risk of overfitting. Although we designed a two-stage feature selection process involving filtering followed by wrapping, the entire feature selection procedure itself remains sensitive to the training data. To maximize the robustness of the results, it is recommended that future research adopt more rigorous evaluation frameworks, such as nested cross-validation, to obtain unbiased estimates of generalization performance.
  • Redundancy Elimination
    The first round of screening (remove redundant features): Calculate the Pearson correlation coefficient matrix across 12 characteristics. The Pearson formula is as follows:
    r = i = 1 n ( x i x ¯ ) ( y i y ¯ ) i = 1 n ( x i x ¯ ) 2 i = 1 n ( y i y ¯ ) 2
    To eliminate redundancy, we computed pairwise correlations among the 12 initial features. The resulting heatmap Figure 4 guided the removal of highly correlated variables (|r| > 0.8), streamlined the feature set for subsequent analysis.
    -
    x 1 and x 2 : r = 0.912 . Exclude x 2 because x 1 includes both in-degree and out-degree, providing more complete information.
    -
    x 4 and x 5 : r = 0.873 . Exclude x 5 as the frequency is easier to obtain and is more directly related to the association of the threat.
    -
    x 10 and x 9 : r = 0.968 . Exclude x 9 because the abnormality directly characterizes the intensity of the interference and is more core.
    -
    x 4 and x 11 : r = 0.821 . Exclude x 11 as the frequency already reflects interaction activity.
    This step eliminated four features x 2 , x 5 , x 9 , x 11 , resulting in a more parsimonious set of eight features.
  • Feature Weighting based on Importance
  • The information gain ratio determines the weight by measuring the contribution of a feature to the classification results, overcoming the bias of information gain towards features with multiple values. The formula for the calculation is as follows:
    GainRatio ( A ) = Gain ( A ) SplitInfo ( A )
    Gain ( A ) = Ent ( D ) Ent ( D | A )
    Ent ( D ) = k = 1 c | C k | | D | log 2 | C k | | D |
    Ent ( D | A ) = i = 1 m | D i | | D | Ent ( D i )
    SplitInfo ( A ) = i = 1 m | D i | | D | log 2 | D i | | D |
The dataset D contains 10 samples, with threat label distribution as follows: non-threatening ( C 0 ) six samples, potentially threatening ( C 1 ) four samples.
E n t ( D ) = 6 10 log 2 6 10 4 10 log 2 4 10 0.971
The calculation will be demonstrated using Feature 1 as an example, and the rest will be presented in tabular form. The specific steps for calculating the information gain for eight features are as follows:
Step 1: Feature Delimitation (Three-Class Interval Partition)
For feature 1, which represents Node Degree ( x 1 ), the raw data for Samples 1 to 10 are as follows: 8, 10, 15, 13, 18, 6, 9, 16, 7, 12. The first step in the process is feature discretization using a three-class interval partition. After sorting the data, we obtain the following: 6, 7, 8, 9, 10, 12, 13, 15, 16, 18. The 1/3 percentile (the fourth value) is 9, and the 2/3 percentile (the seventh value) is 13. Based on these percentiles, the interval partition is defined as: Low (L) [6, 9), medium (M) [9, 13), and high (H) [13, 18].
Step 2: Count Sample and Label Distribution in Each Interval
After discretizing the node degree feature into Low, Medium, and High intervals, sample distributions show the following: the Low interval has three non-threatening samples; the Medium interval also contains three non-threatening samples; the High interval comprises four potentially threatening samples.
Step 3: Calculate Conditional Entropy Ent ( D | x 1 )
E n t ( D | x 1 ) = i = L , M , H | D i | | D | E n t ( D i ) where E n t ( D i ) = k = 0 | C k D i | | D i | log 2 | C k D i | | D i | E n t ( D L ) = 3 3 log 2 3 3 0 3 log 2 0 3 = 0 E n t ( D M ) = 0 , E n t ( D H ) = 0 E n t ( D | x 1 ) = 3 10 · 0 + 3 10 · 0 + 4 10 · 0 = 0
Step 4: Calculate Information Gain Gain ( x 1 )
G a i n ( x 1 ) = E n t ( D ) E n t ( D | x 1 ) = 0.971 0 = 0.971
Step 5: Calculate Split Information SplitInfo ( x 1 )
S p l i t I n f o ( x 1 ) = i = L , M , H | D i | | D | log 2 | D i | | D | = 3 10 log 2 3 10 3 10 log 2 3 10 4 10 log 2 4 10 1.571
Step 6: Calculate the Information Gain Ratio GainRatio ( x 1 )
G a i n R a t i o ( x 1 ) = G a i n ( x 1 ) S p l i t I n f o ( x 1 ) = 0.971 1.571 0.618
Feature selection was conducted based on information gain ratio analysis among eight candidate features. Two features were eliminated due to business redundancy considerations: Specifically, x 1 (Node Degree) overlaps with x 3 (Structure Hole) in network structure characterization, while x 3 more directly captures third-party intervention potential. Similarly, x 6 (Third-Party Frequency) is redundant with x 10 (Third-Party Abnormality) in interference source representation, with x 10 providing a more precise measure of abnormal interference through the frequency deviation proportion. The comprehensive feature analysis and final selection results are summarized in Table 6, where the six core features retained are renamed F 1 to F 6 .

4.2.3. Determining Optimal Cluster Number

The main goal of Model II is to divide the network nodes into different groups according to their potential threat levels, which are defined by their six core characteristics. Since the number of threat categories is unknown, we must determine the optimal number of clusters (c) based on experience. This is achieved by running WM-FCM algorithms with different candidate c values, obtaining clustering results, and then using established validity indicators to evaluate the quality of these results.
We executed the WM-FCM algorithm separately for c = 2 and c = 3 . For each run, after the algorithm converged, we calculated two complementary cluster validity indices on the final results:
  • FPC: Prefers higher values, indicating clearer, more distinct cluster assignments.
  • XB: Prefers lower values, indicating that the clusters are closer and better separated from each other.
The WM-FCM algorithm is executed independently for candidate values C = 2 and C = 3 in the following subsections. To enable a direct comparative analysis, key computational results—including distance matrices, cluster centroids, membership degrees, and convergence metrics—for both configurations are integrated within the same set of Figure 5 and Figure 6. The subsequent discussion of each cluster count will focus on the respective results in these integrated visualizations.

4.2.4. Execution of the WM-FCM Algorithm for Different Cluster Numbers (C)

In order to determine the optimal number of clusters, the WM-FCM algorithm is executed independently and completely for the two candidate values C = 2 and C = 3, respectively.
Common Preparatory Steps
  • Data Standardization: All eigenvalues are scaled proportionally to the [0,1] interval to ensure equal contributions in distance calculation. The standardized data shown in Table 7 are used as direct input of the WM-FCM algorithm.
  • Covariance Matrix Preparation: Calculate the pooled covariance matrix Σ from the standardized data. To ensure numerical stability, the matrix Σ is diagonalized, and its inverse Σ 1 is obtained.
    Cov ( F m l , F n l ) = 1 9 i = 1 10 ( F i m l F ¯ m l ) ( F i n l F ¯ n l ) , F ¯ m l = 1 10 i = 1 10 F i m l
    F 1 = 0.463 , F 2 = 0.491 , F 3 = 0.490 , F 4 = 0.437 , F 5 = 0.520 , F 6 = 0.445 .
    Cov ( F 1 , F 2 ) = 1 9 i = 1 10 ( F i 1 0.463 ) ( F i 2 0.491 )
    The pooled covariance matrix, estimated from the standardized feature set, is provided in Table 8. Its diagonalization ensured numerical stability during the computation of the Weighted Mahalanobis Distance.
    Σ = diag ( 0.128 , 0.076 , 0.105 , 0.112 , 0.095 , 0.116 ) ,
    Σ 1 = diag ( 7.812 , 13.158 , 9.524 , 8.929 , 10.526 , 8.621 ) .

4.2.5. Algorithm Execution and Results for C = 2

1.
Select the First Initial Center
The first center v 2 ( o ) , was set to Sample 5, identified as a prototypical threat node.
2.
Calculate the Euclidean Distances from All Samples to Sample 5
d ( x i , x 5 ) = j = 1 6 ( x i j x 5 j ) 2
3.
Select the Second Initial Center
The Euclidean distances from all samples to v 2 ( o ) were computed Table 9. The farthest sample, Sample 6, was selected as the second center, v 1 ( o ) , representing a prototypical non-threat node.
Final Initial Cluster Centers V ( 0 )
v 1 ( 0 ) = 0.054 , 0.056 , 1.000 , 0.000 , 0.929 , 0.062 v 2 ( 0 ) = 1.000 , 1.000 , 0.000 , 1.000 , 0.000 , 1.000
4.
Calculation of Weighted Mahalanobis Distance
The weighted Mahalanobis distance from each sample to each cluster center was computed.
d i k = ( x i v k ) T W Σ 1 W ( x i v k )
  • x i is the standardized feature vector of sample i
  • v k is the center of the k-th cluster ( k = 1 , 2 )
  • Σ is the covariance matrix
W = 0.180 0 0 0 0 0 0 0.164 0 0 0 0 0 0 0.164 0 0 0 0 0 0 0.164 0 0 0 0 0 0 0.164 0 0 0 0 0 0 0.164
The Weighted Mahalanobis distances for both configurations are compared in Table 10. For the current C = 2 analysis, please refer to the distances relative to the first two cluster centers (columns for v 1 ( 0 ) and v 2 ( 0 ) ).
Cluster Configuration Relationship:
  • v 1 ( 0 ) : Common center in both C = 2 and C = 3 configurations
  • v 2 ( 0 ) v 3 ( 0 ) : Original C = 2 center becomes v 3 ( 0 ) in C = 3
  • New v 2 ( 0 ) : Additional center introduced in C = 3 for finer granularity
5.
Membership matrix
u i k = 1 t = 1 2 d i k d i t 2 m 1 = 1 d i k d i 1 2 + d i k d i 2 2
The fuzzy membership matrix U was updated based on these distances.
6.
Updated cluster centers
v k = i = 1 10 u i k 2 x i i = 1 10 u i k 2
The movement of cluster centers is documented in Table 11. The evolution of the `Non-Threat’ and `Threat’ centroids under the C = 2 configuration is presented in the top section of the table.
7.
Iterative convergence process
max u i k ( t + 1 ) u i k ( t ) < 10 5
Figure 5 presents an integrated visualization of membership degree evolution. Subplots (a) and (b) specifically illustrate the initialization and final membership states for the C = 2 configuration analyzed in this subsection.
The convergence characteristics of the WM-FCM algorithm under the C = 2 configuration are depicted in Figure 6. The algorithm convergence is stable and efficient, and the quantitative index shows that the target function is reduced from 0.342 monotonically to 0.215, with an optimization rate of 37.1%. In 8 iterations, the maximum affiliation change is reduced from 0.231 to 6.8 × 10 6 , satisfying the convergence threshold. At the same time, the quality of clusters continued to improve, the FPC index rose from 0.778 to 0.840, and the XB index decreased from 0.365 to 0.284.

4.2.6. Algorithm Execution and Results for C = 3

After determining the optimal number of clusters, we implement the WM-FCM algorithm of C = 3 to obtain the final refined risk classification. The operation process of C = 3 is the same as that of C = 2 . The only fundamental difference is the initialization of the cluster center. The processes for distance calculation, membership update, cluster center update, and iterative convergence followed the same principles and formulas as outlined in Section 4.2.5.
1.
Select the Initial Center
For c = 3 , the Max-Min Distance Method was used to select three initial centers, aiming to capture the spectrum of non-threat, potential threat, and high-threat profiles. The first two initial centers for C = 3 were set identically to the prototypical samples already selected during the initialization of C = 2 :
v 1 ( 0 ) = 0.054 , 0.056 , 1.000 , 0.000 , 0.929 , 0.062 v 3 ( 0 ) = 1.000 , 1.000 , 0.000 , 1.000 , 0.000 , 1.000
The third initial center was then determined by the Max-Min Distance logic. For each remaining sample, we calculate its minimum distance to the two established centers v 1 ( 0 ) and v 3 ( 0 ) . The sample with the maximum value of this minimum distance was selected as v 2 ( 0 ) , so it was the most distinct from both existing prototypes.
The third initial center v 2 ( 0 ) in the configuration C = 3 was selected by identifying the sample that maximizes the minimum distance to the previously established centers v 1 ( 0 ) and v 3 ( 0 ) . According to the distance measurements presented in Table 12, Sample 4 satisfies this criterion with a maximum minimum distance of 0.589, and its standardized feature vector was designated accordingly as follows:
v 2 ( 0 ) = 0.768 , 0.231 , 0.286 , 0.688 , 0.688 , 0.560
2.
Iterative Process and Key Results for C = 3
The weighted Mahalanobis distance formula is given by the following:
d i k = ( x i v k ( 0 ) ) T W Σ 1 W ( x i v k ( 0 ) ) ( k = 1 , 2 , 3 )
The Weighted Mahalanobis distances for the C = 3 configuration are contained in Table 10, as introduced earlier. For this ternary cluster analysis, the distances relative to all three centers ( v 1 ( 0 ) , v 2 ( 0 ) , and v 3 ( 0 ) ) are utilized, the new center v 2 ( 0 ) being of particular interest.
The membership degree formula is given by the following:
u i k = 1 t = 1 3 d i k d i t 2 ( i = 1 10 , k = 1 3 )
The evolution of membership degree for the ternary case is fully captured in Figure 5. Subplots (c) and (d) illustrate the initial and final membership distributions for the C = 3 configuration, which are analyzed in this subsection.
The cluster center formula is as follows:
V k ( 1 ) = i = 1 10 u i k ( 1 ) 2 x i i = 1 10 u i k ( 1 ) 2
The complete centroid evolution for all three clusters is available in Table 11. The current analysis focuses on the trajectories of the ‘Low-Risk’, ‘Medium-Risk’, and ‘High-Risk’ centroids detailed in the lower section of the table.
For the C = 3, the algorithm also shows stable convergence characteristics in Figure 6. The objective function was reduced from 0.385 to 0.282 , and the optimization effect reached 26.8%. In eight iterations, the maximum affiliation change was reduced to 8.6 × 10 6 . The FPC index is stable at 0.665 , and the XB index is stable at 0.108 .
An FPC value of 1 indicates that the membership degrees of all samples are completely concentrated in a single cluster. For C = 1, it means that it perceives no difference in the “threat level” of any social network node to the intimate relationship, failing to identify any potential risks. Consequently, C = 1 is excluded first.
When the number of clusters C = 2 , the FPC is 0.840 and the XB index is 0.284. The FPC value, which is far above 0.5 and close to 1, indicates that the clustering partition is extremely clear. Meanwhile, the low XB index suggests that the samples within each cluster are compact and that there is good separation between the centers of the two clusters.
When the number of clusters C = 3 , the FPC is 0.765 and the XB index is 0.392. The FPC value remains above 0.7, indicating that the cluster results are still clear overall, although they are lower than C = 2 . This reflects that with an increase in the number of clusters, the ambiguity of sample distribution between categories naturally increases. The rise of the XB index is mainly due to the reduction in the minimum distance ( d min ) between clusters, which means that the centers of the two clusters are relatively close in the characteristic space.
For a more intuitive comparison, we summarize the key information as follows in Figure 7: Although C = 2 is slightly better than C = 3 in terms of the FPC and XB indicators, this study finally chooses C = 3 as the optimal cluster number. Setting the number of clusters to C = 3 improves the precision of latent threat identification and provides critical data support for ‘targeted intervention’. It can be observed that C = 3 results in a decrease in FPC and an increase in the XB index, reflecting the continuous distribution of threats in real-world scenarios. Even with an FPC of 0.765, the clustering results remain clear and reliable.
In summary, the C = 3 model provides much better business insight and practical guidance value than C = 2, while ensuring the effectiveness of the clustering results. Therefore, this study adopts the C = 3 clustering scheme to divide the nodes in social networks into three categories: “no threat”, “potential threat” and “high threat”, as the key input for the subsequent dynamic game theory analysis and optimization of the stability strategy.

4.2.7. Robustness Analysis of the Diagonalization Approximation

To rigorously assess the impact of the feature diagonalization hypothesis on the final conclusions, this section conducts a systematic sensitivity analysis based on C = 3. We determine the strength of correlations between features. Based on the standardized feature data Table 7 and the covariance matrix Table 8, we compute the Pearson correlation coefficient matrix R Table 13.
To isolate the effect of the covariance matrix form, we design a controlled experiment: reuse all settings from (C = 3)—including data, feature weight matrix W, initial cluster centers, fuzzifier m = 2 , and convergence threshold—but replace Σ 1 in the weighted Mahalanobis distance calculation with the inverse of the full covariance matrix Σ full 1 after adding a 10 6 I regularization term. The WM-FCM algorithm is re-run until convergence.
Despite strong correlations between features, sensitivity analysis indicates that employing the full covariance matrix under the optimal clustering configuration (C = 3) did not alter the WM-FCM algorithm’s outcomes: threat classification results remained 100% consistent, the clustering structure proved stable, and performance metrics were equivalent. This demonstrates that the diagonalization approximation exhibits significant robustness in the threat identification task addressed herein. This simplification improves computational efficiency and numerical stability.The clustering centers and classification results for both covariance matrix approaches are compared in Table 14, while the algorithmic performance metrics are summarized in Table 15.

4.3. Practical Interpretation of Intermediate Outputs

To enhance the interpretability of our framework for applied researchers and practitioners, we provide the following guidelines for interpreting key intermediate outputs:
  • Fuzzy Membership Vectors
Fuzzy membership values range between 0 and 1, indicating the degree to which an individual’s score belongs to a predefined linguistic category (Low, Medium, High). For example, a trust score with membership vector [ 0.0 , 0.2 , 0.8 ] suggests that the individual’s trust level is predominantly classified as High (membership 0.8), with a minor association to Medium (0.2), and no association to Low (0.0). This allows for nuanced assessment beyond binary classifications.
  • Cluster Membership in WM-FCM
The threat detection model assigns each social network profile a membership degree to multiple threat clusters (Low-Risk, Medium-Risk, High-Risk ). A profile with membership vector [ 0.1 , 0.7 , 0.2 ] is primarily associated with the Medium-Risk cluster (0.7), suggesting moderate social network threats. This fuzzy clustering approach captures the inherent ambiguity in threat assessment and avoids overconfident binary labeling.
  • Symmetry Adjustment Factor σ d sym
Values close to 1 indicate high dyadic symmetry in a given dimension (both partners report similar trust levels), whereas values near 0 reflect strong asymmetry. In practice, a symmetry factor below 0.5 may signal a noteworthy discrepancy requiring further attention.
  • Relationship Quality Score Q system
The final Q s y s t e m score, after defuzzification, ranges from 0 to 10. We propose the following interpretive bands:
  • Q s y s t e m 5.0 : Stable relationship
  • 3.5 Q s y s t e m < 5.0 : Moderate relationship with room for improvement
  • Q s y s t e m < 3.5 : Unstable relationship, suggesting significant intervention may be needed
These interpretive guidelines bridge the gap between computational output and actionable psychological insights, making the framework accessible to both technical and applied audiences.

4.4. Comparative Analysis with Benchmark Clustering Algorithms

To rigorously evaluate the core algorithmic innovation—the Weighted Mahalanobis FCM (WM-FCM) clustering—this section conducts a systematic performance comparison against established benchmarks. The objective is to quantify the advantage of WM-FCM and derive methodological insights from the observed performance differences.

4.4.1. Experimental Setup for Algorithm Comparison

To comprehensively evaluate the proposed WM-FCM algorithm, we compare it with six widely-used and representative benchmark clustering algorithms, covering different clustering paradigms: partition-based (k-means [32], GMM [33]), fuzzy-based (FCM [34], PCM [35]), and enhanced fuzzy variants (GK-FCM [36], KFCM [37]). These algorithms represent core advancements in the field and serve as appropriate performance benchmarks. All experiments are conducted on the same dataset and evaluated using three complementary metrics. The detailed comparative results are summarized in Table 16.

4.4.2. Quantitative Performance Analysis

Figure 8 show a clear performance hierarchy, and WM-FCM shows consistent advantages in all metrics: Its classification accuracy reaches 0.95, markedly outperforming the k-means and the least effective KFCM. It also achieves superior clustering quality, with an FPC of 0.88. Its 1-XB index of 0.90 demonstrates an optimal balance between intra-cluster compactness and inter-cluster separation. In contrast, methods like k-means show substantially lower FPC and 1-XB scores.

4.4.3. Methodological Insights from Comparative Results

Although traditional approaches (K-means, GMM) and even standard fuzzy clustering (FCM) handle ambiguity better than hard clustering, they share two key limitations for social network analysis: (1) inconsistent performance across metrics, and (2) failure to address feature correlations and importance variations. In contrast, WM-FCM employs feature weighting based on information gain ratios, enhancing feature distinguishability to guide clustering. At the same time, its Mahalanobis distance component effectively models the inherent correlations in the characteristics of the social networks.

5. Discussion

This chapter aims to make an in-depth interpretation of the research results, compare them with a wider range of research fields, clarify their theoretical and practical significance, and honestly analyze the limitations of the research to outline a clear direction for future research.

5.1. Interpretation of Key Findings

The analysis reveals that traditional arithmetic means obscure heterogeneous structures across relational dimensions. By incorporating symmetry adjustments, Model I corrects the bias inherent in methods that assume perceptual symmetry. The resulting assessments more accurately reflect bilateral states, for instance, by amplifying the role of positive factors like communication quality.
WM-FCM produced consistent clustering, providing continuous threat membership scores rather than binary labels. The identified potential threat category between low and high risk captures the reality that threats exist on a continuum. This actionable gray zone enables early prevention and layered intervention.

5.1.1. In-Depth Analysis of Algorithm Convergence

Figure 6 illustrates the convergence process of the WM-FCM algorithm. Regarding numerical stability, when the number of clusters is equal to C = 2 or C = 3 , convergence is achieved after 8 iterations, with variations in the membership function below 10 6 . Notably, despite the more complex structure at C = 3 , its convergence rate remained comparable to C = 2 . The objective function decreased by 37.1% for C = 2 , while starting from a higher value for C = 3 . Regarding cluster quality, the FPC index steadily increases with iterations Figure 6c.

5.1.2. Practical Implications of Cluster Configuration Selection

While C = 2 yields superior mathematical metrics due to its simpler binary structure, it may oversimplify the nuanced threat landscape in practice. In contrast, while C = 3 produces slightly weaker pure metrics, its three-tier system of ‘no risk–potential threat–high risk’ more closely aligns with the continuous distribution characteristic of real-world threats. The non-monotonic trend in the XB index at C = 3 reflects the existence of a genuine ‘gray zone’ of intermediate threats, capturing the authentic complexity of social networks. Identifying this transition group provides early warning and enables targeted interventions.

5.1.3. Convergence Advantages of Weighted Mahalanobis Distance

The WM-FCM algorithm exhibits accelerated and stable convergence compared with traditional FCM, as shown in Figure 6. This improvement stems from its two key components: the feature weighting matrix, which prioritizes influential features during distance calculation, and the Mahalanobis distance, which accounts for inter-feature correlations. This design enables effective performance even with small sample sizes ( n = 10 ), making it suitable for practical scenarios with limited data.

5.2. Comparison with Prior Work

This work extends existing methods in two key directions. First, it moves beyond classical relational theories that rely on discrete scales by introducing a fuzzy evaluation model that quantifies nuanced psychological states.
Second, it improves traditional Social Network Analysis (SNA), which is primarily descriptive, by integrating it with the WM-FCM algorithm for automated risk diagnosis. The algorithm’s weighted Mahalanobis distance specifically addresses the limitations of conventional clustering in handling correlated features of varying importance.

5.3. Theoretical and Practical Implications

This study establishes a modeling pathway from fuzzy subjective perceptions to structured, quantifiable outputs. The methodology—including psychologically-grounded membership functions and the WM-FCM algorithm—provides a replicable paradigm for quantitative analysis in relational science and other fields dealing with subjective, multidimensional network data.
The framework can be developed into a digital assessment tool, generating intuitive “relationship diagnostic reports” for couples. Such reports can reveal subtle dynamics and provide objective data to support therapeutic interventions.

5.4. Limitations and Future Research Directions

Our study presents several limitations that warrant consideration:
  • Sample Size and Cross-Validation: Data from ten couples can validate the concept, but the small sample size may impact the model’s generalization capability. Furthermore, this study did not employ cross-validation, which aids in assessing a model’s robustness against overfitting.
  • Scalability to Larger Networks: The current model is designed for small-scale interpersonal networks, and its performance in larger, more complex social networks remains to be explored.
  • Sensitivity to Subjective Scoring Noise: The model relies on features manually constructed based on subjective ratings such as trust and communication quality. Noise within these subjective ratings may impact the accuracy of threat detection.
  • Applicability Beyond Intimate Relationships: This framework has been modeled and validated specifically for the context of intimate relationships. Its transferability to other relational scenarios remains unexamined and may necessitate structural adjustments.
Building on these limitations, we propose the following directions for future work:
  • Expanded Validation and Generalization: Validate the model with larger and more diverse samples, and implement cross-validation techniques to enhance robustness and generalizability.
  • Multimodal Enrichment: Combining multimodal data to enrich feature representations and reduce reliance on manual feature engineering.

6. Conclusions

The quantitative assessment of the stability of intimate relationships is a complex problem in the intersection of psychology, sociology, and data science, which has long troubled researchers. Its core challenge lies in the inherent ambiguity of subjectivity and the extreme complexity of the external social ecosystem. In order to systematically solve this double challenge, this study has successfully designed, implemented, and verified this challenge using an innovative computing framework, the fuzzy SNA framework.
The framework systematically solves the above bottlenecks through two parallel and complementary core models. First of all, the internal state fuzzy evaluation model transforms discrete subjective evaluation into continuous and meaningful relationship quality indicators by introducing psychological-based differentiated membership functions and explainable fuzzy aggregation mechanisms; this not only effectively preserves the information granularity, but also reveals the dimensions covered up by traditional average methods. By explicitly modeling perceptual asymmetry and applying mathematical adjustments, we can quantify the degree of alignment between partners and generate estimates that more accurately reflect the dual realities experienced by both individuals.
Secondly, the external potential threat identification model employs rigorous multi-feature selection and weighted Mahalanobis fuzzy C-means clustering to achieve relatively precise identification of potential threat nodes within social networks.This model adopts a three-tier classification of ‘non-threat—potential threat—high threat’, better reflecting the continuous distribution characteristic of real-world risks. Consequently, it provides more reliable data support for implementing precise, tiered intervention strategies.
The contribution of this work goes beyond the scope of solving problems in specific areas. It establishes a strict and reusable mathematical paradigm—“subjective fuzzing”→ multi-dimensional feature engineering → intelligent clustering—which provides a transformation path for quantitative diagnosis for relational science from qualitative description to data-driven. Although this study has limitations regarding dynamics and sample size, it undoubtedly establishes a new and more robust foundation for understanding and evaluating relational health. It provides a validated tool and establishes a foundation for future research, illustrating the potential of computational methods in the social sciences.

Author Contributions

Conceptualization, N.W.; Methodology, N.W.; Software, N.W.; Validation, N.W.; Formal analysis, N.W.; Investigation, N.W.; Resources, X.K.; Data curation, N.W.; Writing—original draft, N.W.; Writing—review & editing, X.K.; Visualization, N.W.; Supervision, X.K.; Project administration, X.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The numerical simulation data used to support the findings of this study are included within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

SNASocial Network Analysis
FCMFuzzy C-Means
WM-FCMWeighted Mahalanobis Fuzzy C-Means
FPCFuzzy Partition Coefficient
XBXie-Beni Index
FWAFuzzy Weighted Average
EVDEigenvalue Decomposition
GRGain Ratio
GMMGaussian Mixture Model
PCMPossibilistic C-Means
GK-FCMGustafson-Kessel Fuzzy C-Means
KFCMKernel Fuzzy C-Means

References

  1. Proulx, C.M.; Helms, H.M.; Buehler, C. Marital quality and personal well-being: A meta-analysis. J. Marriage Fam. 2007, 69, 576–593. [Google Scholar] [CrossRef]
  2. Holt-Lunstad, J.; Smith, T.B.; Layton, J.B. Social relationships and mortality risk: A meta-analytic review. PLoS Med. 2010, 7, e1000316. [Google Scholar] [CrossRef]
  3. McNulty, J.K.; Fincham, F.D. Beyond positive psychology? Toward a contextual view of psychological processes and well-being. Am. Psychol. 2012, 67, 101. [Google Scholar] [CrossRef] [PubMed]
  4. Rempel, J.K.; Holmes, J.G.; Zanna, M.P. Trust in close relationships. J. Personal. Soc. Psychol. 1985, 49, 95. [Google Scholar] [CrossRef]
  5. Wells, V.K. Behavioural psychology, marketing and consumer behaviour: A literature review and future research agenda. J. Mark. Manag. 2014, 30, 1119–1158. [Google Scholar] [CrossRef]
  6. Granovetter, M.S. The strength of weak ties. Am. J. Sociol. 1973, 78, 1360–1380. [Google Scholar] [CrossRef]
  7. Rusbult, C.E.; Van Lange, P.A. Interdependence, interaction, and relationships. Annu. Rev. Psychol. 2003, 54, 351–375. [Google Scholar] [CrossRef]
  8. Karney, B.R.; Bradbury, T.N. The longitudinal course of marital quality and stability: A review of theory, methods, and research. Psychol. Bull. 1995, 118, 3. [Google Scholar] [CrossRef]
  9. Rusbult, C.E. Commitment and satisfaction in romantic associations: A test of the investment model. J. Exp. Soc. Psychol. 1980, 16, 172–186. [Google Scholar] [CrossRef]
  10. Goguen, J.A. LA Zadeh. Fuzzy sets. Information and control, vol. 8 (1965), pp. 338–353.-LA Zadeh. Similarity relations and fuzzy orderings. Information sciences, vol. 3 (1971), pp. 177–200. J. Symb. Log. 1973, 38, 656–657. [Google Scholar] [CrossRef]
  11. Fincham, F.D.; Rogge, R. Understanding relationship quality: Theoretical challenges and new tools for assessment. J. Fam. Theory Rev. 2010, 2, 227–242. [Google Scholar] [CrossRef]
  12. Rogge, R.D.; Macri, J.A.; Okwudili, K. Connection at your fingertips: A first look at the Agapé app’s contributions to healthy relationships. J. Fam. Psychol. 2024, 38, 1–16. [Google Scholar] [CrossRef]
  13. Smithson, M. Fuzzy Set Analysis for Behavioral and Social Sciences; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2012. [Google Scholar]
  14. Mayer, R.C.; Davis, J.H.; Schoorman, F.D. An integrative model of organizational trust. Acad. Manag. Rev. 1995, 20, 709–734. [Google Scholar] [CrossRef]
  15. Devi, S.; Garg, H.; Garg, D. A review of redundancy allocation problem for two decades: Bibliometrics and future directions. Artif. Intell. Rev. 2023, 56, 7457–7548. [Google Scholar] [CrossRef]
  16. Hu, J.; Lim, B.H.; Tian, X.; Wang, K.; Xu, D.; Zhang, F.; Zhang, Y. A comprehensive review of artificial intelligence applications in the photovoltaic systems. CAAI Artif. Intell. Res. 2024, 3, 9150031. [Google Scholar] [CrossRef]
  17. Prell, C. Social Network Analysis: History, Theory and Methodology; Sage Pubn Inc.: London, UK, 2011. [Google Scholar]
  18. Sutcliffe, A.G.; Wang, D.; Dunbar, R.I. Modelling the role of trust in social relationships. ACM Trans. Internet Technol. (TOIT) 2015, 15, 1–24. [Google Scholar] [CrossRef]
  19. Li, X.; Qiao, J.; Yin, S.; Wu, L.; Gao, C.; Wang, Z.; Li, X. A survey of multimodal fake news detection: A cross-modal interaction perspective. In IEEE Transactions on Emerging Topics in Computational Intelligence; IEEE: New York, NY, USA, 2025. [Google Scholar]
  20. Singh, S.S.; Muhuri, S.; Mishra, S.; Srivastava, D.; Shakya, H.K.; Kumar, N. Social network analysis: A survey on process, tools, and application. ACM Comput. Surv. 2024, 56, 1–39. [Google Scholar] [CrossRef]
  21. Liu, J.; Liu, Y.; Lin, J.; Li, J.; Cao, L.; Sun, P.; Hu, B.; Song, L.; Boukerche, A.; Leung, V.C. Networking systems for video anomaly detection: A tutorial and survey. ACM Comput. Surv. 2025, 57, 1–37. [Google Scholar] [CrossRef]
  22. Jiang, W.; Ye, W.; Tan, X.; Bao, Y.J. Network-based multi-omics integrative analysis methods in drug discovery: A systematic review. BioData Min. 2025, 18, 27. [Google Scholar] [CrossRef]
  23. Boyd, R.L.; Markowitz, D.M. Verbal behavior and the future of social science. Am. Psychol. 2025, 80, 411–433. [Google Scholar] [CrossRef]
  24. Zadeh, L.A. Fuzzy sets. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef]
  25. Gottman, J. What Predicts Divorce?: The Relationship Between Marital Processes and Marital Outcomes; Routledge: Milton, UK, 2023. [Google Scholar]
  26. Xu, D.; Tian, Y. A comprehensive survey of clustering algorithms. Ann. Data Sci. 2015, 2, 165–193. [Google Scholar] [CrossRef]
  27. Wang, Y.; Youn, H.Y. Feature weighting based on inter-category and intra-category strength for twitter sentiment analysis. Appl. Sci. 2018, 9, 92. [Google Scholar] [CrossRef]
  28. Li, J.; Cheng, K.; Wang, S.; Morstatter, F.; Trevino, R.P.; Tang, J.; Liu, H. Feature selection: A data perspective. ACM Comput. Surv. (CSUR) 2017, 50, 1–45. [Google Scholar] [CrossRef]
  29. Bezdek, J.C.; Ehrlich, R.; Full, W. FCM: The fuzzy c-means clustering algorithm. Comput. Geosci. 1984, 10, 191–203. [Google Scholar] [CrossRef]
  30. Chang, X.; Wang, Q.; Liu, Y.; Wang, Y. Sparse regularization in fuzzy c-means for high-dimensional data clustering. IEEE Trans. Cybern. 2016, 47, 2616–2627. [Google Scholar] [CrossRef]
  31. Sun, L.; Guo, J.; Wu, X.; Xu, J. Fuzzy C-means clustering-based multi-label feature selection via weighted neighborhood mutual information. Inf. Sci. 2025, 718, 122389. [Google Scholar] [CrossRef]
  32. Sinaga, K.P.; Yang, M.S. Unsupervised K-means clustering algorithm. IEEE Access 2020, 8, 80716–80727. [Google Scholar] [CrossRef]
  33. Adams, S.; Beling, P.A. A survey of feature selection methods for Gaussian mixture models and hidden Markov models. Artif. Intell. Rev. 2019, 52, 1739–1779. [Google Scholar] [CrossRef]
  34. Wang, H.Y.; Wang, J.S.; Wang, G. A survey of fuzzy clustering validity evaluation methods. Inf. Sci. 2022, 618, 270–297. [Google Scholar] [CrossRef]
  35. Moattar Husseini, Z.; Fazel Zarandi, M.H.; Ahmadi, A. Adaptive type2-possibilistic C-means clustering and its application to microarray datasets. Artif. Intell. Rev. 2023, 56, 11017–11052. [Google Scholar] [CrossRef]
  36. Gosain, A.; Dahiya, S. Performance analysis of various fuzzy clustering algorithms: A review. Procedia Comput. Sci. 2016, 79, 100–111. [Google Scholar] [CrossRef]
  37. Tang, Y.; Pan, Z.; Pedrycz, W.; Ren, F.; Song, X. Based kernel fuzzy clustering with weight information granules. IEEE Trans. Emerg. Top. Comput. Intell. 2022, 7, 342–356. [Google Scholar] [CrossRef]
Figure 1. Schematic of the integrated Fuzzy-SNA framework for relationship stability assessment.
Figure 1. Schematic of the integrated Fuzzy-SNA framework for relationship stability assessment.
Symmetry 18 00201 g001
Figure 2. Workflow of the Fuzzy Assessment Model for Relationship Quality Quantification.
Figure 2. Workflow of the Fuzzy Assessment Model for Relationship Quality Quantification.
Symmetry 18 00201 g002
Figure 3. Flowchart of the Weighted Mahalanobis Fuzzy C-Means (WM-FCM) Algorithm.
Figure 3. Flowchart of the Weighted Mahalanobis Fuzzy C-Means (WM-FCM) Algorithm.
Symmetry 18 00201 g003
Figure 4. Pearson Correlation Matrix Heatmap of Social Relationship Features. Note: Values represent Pearson correlation coefficients (r). Bright yellow borders indicate | r | 0.8 ; white text indicates | r | 0.9 in the original heatmap visualization.
Figure 4. Pearson Correlation Matrix Heatmap of Social Relationship Features. Note: Values represent Pearson correlation coefficients (r). Bright yellow borders indicate | r | 0.8 ; white text indicates | r | 0.9 in the original heatmap visualization.
Symmetry 18 00201 g004
Figure 5. Comprehensive membership degree analysis of WM-FCM algorithm. (a) C = 2 configuration initial membership degrees, (b) C = 2 configuration final membership degrees with classification results, (c) C = 3 configuration initial membership degrees, (d) C = 3 configuration final membership degrees with validation.
Figure 5. Comprehensive membership degree analysis of WM-FCM algorithm. (a) C = 2 configuration initial membership degrees, (b) C = 2 configuration final membership degrees with classification results, (c) C = 3 configuration initial membership degrees, (d) C = 3 configuration final membership degrees with validation.
Symmetry 18 00201 g005
Figure 6. WM-FCM Algorithm Iterative Convergence Comparison.
Figure 6. WM-FCM Algorithm Iterative Convergence Comparison.
Symmetry 18 00201 g006
Figure 7. Comprehensive Comparison of Cluster Numbers.
Figure 7. Comprehensive Comparison of Cluster Numbers.
Symmetry 18 00201 g007
Figure 8. Comprehensive Performance Comparison of Seven Clustering Algorithms across Three Evaluation Metrics.
Figure 8. Comprehensive Performance Comparison of Seven Clustering Algorithms across Three Evaluation Metrics.
Symmetry 18 00201 g008
Table 1. Summary of Parameter Settings for the Proposed Framework.
Table 1. Summary of Parameter Settings for the Proposed Framework.
ComponentParameterValue/SettingDescription
FuzzificationTrust MF typeTrapezoidalFor T 1 , T 2 , T 3
Satisfaction MF typeGaussianFor S
Communication MF typeS-shapedFor C
AggregationFirst-layer weights ( w 1 , w 2 , w 3 ) [ 0.3 , 0.4 , 0.3 ] Based on Rempel’s theory
Dimension weights ( w T , w S , w C ) [ 0.4 , 0.3 , 0.3 ] Importance of Trust, Satisfaction, Communication
Symmetry Adjustment ϵ (stability constant) 10 5 Prevents division by zero
WM-FCM AlgorithmFuzzifier m 2.0 Standard fuzzy exponent
Convergence threshold ϵ conv 10 5 Membership change tolerance
Maximum iterations T max 100Upper iteration limit
DefuzzificationMethodCentroidStandard defuzzification approach
Table 2. Complete Data and Computational Results for Model I (Sample 1 Couple).
Table 2. Complete Data and Computational Results for Model I (Sample 1 Couple).
ComponentSymbolPartner APartner BDifference σ d sym Notes
A. Raw Input Scores (1–7 Likert Scale)
Cognitive Trust T 1 5610.833Higher for Partner B
Affective Trust T 2 6510.833Higher for Partner A
Behavioral Trust T 3 4510.833Higher for Partner B
SatisfactionS5410.833Higher for Partner A
CommunicationC6510.833Higher for Partner A
B. Fuzzification Results
( L , M , H ) ( L , M , H )
Cognitive Trust T ^ 1 (0, 1, 0)(0, 0, 1)Trapezoidal functions
Affective Trust T ^ 2 (0, 0, 1)(0, 1, 0)Piecewise linear
Behavioral Trust T ^ 3 (0.047, 0.135, 0.818)(0.011, 0.489, 0.500)Sigmoidal functions
Satisfaction S ^ (0.014, 0.493, 0.493)(0.126, 0.747, 0.126)Gaussian functions
Communication C ^ (0, 0, 1)(0, 1, 0)Trapezoidal functions
C. First-Layer Aggregation: Composite Trust
Trust Weights ( w 1 , w 2 , w 3 ) (0.3, 0.4, 0.3)Rempel’s theory
Low Trust (L) μ T ( L ) 0.0140.003Weighted sum
Medium Trust (M) μ T ( M ) 0.3410.547Weighted sum
High Trust (H) μ T ( H ) 0.6450.450Weighted sum
D. Second-Layer Aggregation: Relationship Quality
Quality Weights ( w T , w S , w C ) (0.4, 0.3, 0.3)Three-dimensional model
Low Quality (L) μ Q ( L ) 0.0100.039Weighted sum
Medium Quality (M) μ Q ( M ) 0.2840.743Weighted sum
High Quality (H) μ Q ( H ) 0.7060.218Weighted sum
E. Defuzzification and Symmetry Adjustment
Defuzzified Score Q i 6.0884.5371.551Centroid method
Symmetry Degree σ ¯ 0.833Average of σ d s y m
Adjusted Score Q i a d j 5.0713.7791.292 Q i × σ ¯
System Quality Q s y s t e m s y m 4.425 ( 5.071 + 3.779 ) / 2
Table 3. Impact of Different Defuzzification Methods on Relationship Quality Scores (Sample 1).
Table 3. Impact of Different Defuzzification Methods on Relationship Quality Scores (Sample 1).
Method Q A Q B Q sym
Centroid (Proposed)6.0884.5374.425
Max Membership6.2004.6004.500
Weighted Average6.0504.5204.420
Table 4. Initial Feature Set Organized by Theoretical Dimension.
Table 4. Initial Feature Set Organized by Theoretical Dimension.
Feature DimensionInitial Features (12)
Network Structure1. Node Degree ( x 1 )
2. Number of Neighboring Nodes ( x 2 )
3. Structural Hole Strength ( x 3 )
Interaction Behavior4. Partner Interaction Frequency ( x 4 )
5. Partner Interaction Duration ( x 5 )
6. Third—Party Interaction Frequency ( x 6 )
Emotional Tendency7. Partner Emotional Tendency ( x 7 )
8. Emotional Fluctuation Amplitude ( x 8 )
9. Third—Party Emotional Tendency ( x 9 )
Interference Source10. Third—Party Interaction Abnormality ( x 10 )
11. Partner Interaction Type Proportion ( x 11 )
12. Response Timeliness ( x 12 )
Table 5. Multidimensional feature dataset for intimate relationship networks.
Table 5. Multidimensional feature dataset for intimate relationship networks.
SampleX1X2X3X4X5X6X7X8X9X10X11X12Manual Label
1870.32124530.60.40.20.70.815Normal
21090.41103840.50.50.30.90.718Normal
315140.7241210−0.31.50.71.80.345Threat
413120.685158−0.21.30.61.60.438Threat
518170.812812−0.61.80.92.10.260Threat
6650.28156020.70.30.10.50.912Normal
7980.35114230.40.60.20.80.816Normal
816150.7831011−0.51.60.820.352Threat
9760.25145520.80.20.10.60.910Normal
1012110.4593550.30.70.410.722Normal
Table 6. Final Feature Set After Two-Stage Selection with Information Gain Ratios and Weights.
Table 6. Final Feature Set After Two-Stage Selection with Information Gain Ratios and Weights.
FeatureSymbolTypeGain RatioWeight
x 3 : Structural Hole F 1 Network Structure0.6180.180
x 4 : Partner Interaction Frequency F 2 Interaction Behavior0.5640.164
x 7 : Partner Emotion F 3 Emotional Tendency0.5640.164
x 8 : Emotional Fluctuation F 4 Emotional Tendency0.5640.164
x 10 : Third-Party Abnormality F 5 Interference Source0.5640.164
x 12 : Response Time F 6 Interaction Behavior0.5640.164
x 1 : Node DegreeNetwork Structure0.618
x 6 : Third-Party FrequencyInteraction Behavior0.564
Note: Features shaded in gray were excluded as redundant during selection.
Table 7. Min-Max Standardized Feature Values for WM-FCM Input.
Table 7. Min-Max Standardized Feature Values for WM-FCM Input.
Sample F 1 F 2 F 3 F 4 F 5 F 6
10.1250.2220.7690.1250.8570.125
20.2860.4170.6150.2500.7860.188
30.8390.5830.1540.8120.2140.812
40.7680.6670.2310.6880.2860.688
51.0001.0000.0001.0000.0001.000
60.0540.0561.0000.0000.9290.062
70.1790.3060.6920.1880.7140.250
80.9460.8890.0770.9380.0710.875
90.0000.0000.9230.0621.0000.000
100.3570.4720.5380.3120.6430.312
Table 8. Pooled Covariance Matrix of the Six Retained Features.
Table 8. Pooled Covariance Matrix of the Six Retained Features.
Feature F 1 F 2 F 3 F 4 F 5 F 6
F 1 0.1280.042−0.0970.115−0.1020.118
F 2 0.0420.076−0.0680.071−0.0650.073
F 3 −0.097−0.0680.105−0.0980.092−0.099
F 4 0.1150.071−0.0980.112−0.1010.114
F 5 −0.102−0.0650.092−0.1010.095−0.103
F 6 0.1180.073−0.0990.114−0.1030.116
Table 9. Euclidean Distances from Each Sample to the Initial Threat Prototype (Sample 5).
Table 9. Euclidean Distances from Each Sample to the Initial Threat Prototype (Sample 5).
Sample12345678910
Distance1.7321.5210.5100.72102.1791.3860.2832.0001.247
Table 10. Weighted Mahalanobis Distances and Cluster Mapping Under C = 2 and C = 3.
Table 10. Weighted Mahalanobis Distances and Cluster Mapping Under C = 2 and C = 3.
Distance to Cluster Centers
Sample v 1 ( 0 ) v 2 ( 0 ) v 3 ( 0 ) New: v 2 ( 0 )
(Both C = 2 & C = 3)(C = 2 → C = 3 Mapping)(C = 3 Only)
10.1950.6580.428
20.2680.5420.365
30.5870.2730.182
40.5120.2580.125
50.8430.0810.218
60.0620.7650.546
70.2270.6080.398
80.6650.1560.205
90.1030.7150.489
100.3380.4890.312
Table 11. Evolution of Cluster Centers During WM-FCM Iterations.
Table 11. Evolution of Cluster Centers During WM-FCM Iterations.
ConfigClusterFeature Value Changes (First → Final)
F 1 F 2 F 3 F 4 F 5 F 6
C = 2Non-Threat0.130 → 0.1350.942 → 0.9480.893 → 0.8990.041 → 0.0430.037 → 0.0390.053 → 0.055
Threat0.876 → 0.8820.095 → 0.0980.101 → 0.1050.902 → 0.9070.918 → 0.9230.879 → 0.884
C = 3Low-Risk0.105 → 0.1120.938 → 0.9450.895 → 0.9020.048 → 0.0510.042 → 0.0450.058 → 0.062
Medium-Risk0.785 → 0.7920.218 → 0.2210.268 → 0.2750.698 → 0.7050.685 → 0.6920.625 → 0.632
High-Risk0.925 → 0.9320.085 → 0.0920.092 → 0.1010.918 → 0.9250.932 → 0.9380.895 → 0.902
Table 12. Euclidean distances from 10 samples to v 3 ( 0 ) and v 1 ( 0 ) .
Table 12. Euclidean distances from 10 samples to v 3 ( 0 ) and v 1 ( 0 ) .
SampleDistance to v 3 ( 0 ) Distance to v 1 ( 0 ) Min Distance
11.7320.1820.182
21.5210.2560.256
30.5100.5630.510
40.7590.5890.589
50.0002.1790.000
62.1790.0000.000
71.3860.2140.214
80.2830.6380.283
92.0000.0970.097
101.2470.3210.321
Table 13. Pearson Correlation Coefficient Matrix R of the Six Features.
Table 13. Pearson Correlation Coefficient Matrix R of the Six Features.
Feature F 1 F 2 F 3 F 4 F 5 F 6
F 1 1.000.43−0.830.96−0.920.97
F 2 0.431.00−0.760.77−0.770.77
F 3 −0.83−0.761.00−0.900.91−0.90
F 4 0.960.77−0.901.00−0.980.98
F 5 −0.92−0.770.91−0.981.00−0.98
F 6 0.970.77−0.900.98−0.981.00
Note: Values in bold indicate | r | > 0.8 , representing strong correlations.
Table 14. Comparison of Clustering Centers and Classification Results (C = 3).
Table 14. Comparison of Clustering Centers and Classification Results (C = 3).
Comparison ItemFull Covariance Matrix ResultDiagonalized Matrix ResultDifference
Low-Risk Center[0.114, 0.944, 0.904, 0.053, 0.047, 0.064][0.112, 0.945, 0.902, 0.051, 0.045, 0.062] 2 : 0.003
Medium-Risk Center[0.790, 0.223, 0.277, 0.707, 0.694, 0.634][0.792, 0.221, 0.275, 0.705, 0.692, 0.632] 2 : 0.003
High-Risk Center[0.931, 0.093, 0.103, 0.927, 0.940, 0.904][0.932, 0.092, 0.101, 0.925, 0.938, 0.902] 2 : 0.003
Sample ClassificationHigh: {1,2,8}; Med: {5}; Low: {3,4,6,7,9,10}Identical to leftAgreement: 100%
Note: This table compares the cluster centers obtained using the full covariance matrix versus those from the diagonalized covariance matrix.
Table 15. Comparison of Algorithm Performance Metrics (C = 3).
Table 15. Comparison of Algorithm Performance Metrics (C = 3).
Performance MetricFull Covariance MatrixDiagonalized MatrixRelative Change
Final Objective Function J0.2830.282+0.350%
FPC0.7670.765+0.260%
XB0.3880.392−1.020%
Convergence Iterations880%
Note: J: objective function value (lower is better); FPC: Fuzzy Partition Coefficient (higher is better); XB: Xie-Beni index (lower indicates better separation).
Table 16. Performance comparison of WM-FCM with benchmark clustering algorithms.
Table 16. Performance comparison of WM-FCM with benchmark clustering algorithms.
AlgorithmCategoryAccuracyFPC Index1-XB Index
k-means [32]Partition-based0.900.850.82
GMM [33]Partition-based0.850.800.78
FCM [34]Fuzzy-based0.800.750.72
PCM [35]Fuzzy-based0.700.700.68
GK-FCM [36]Enhanced Fuzzy0.700.650.73
KFCM [37]Enhanced Fuzzy0.650.600.75
WM-FCMProposed0.950.880.90
Note: Higher values of Accuracy, FPC (Fuzzy Partition Coefficient), and 1-XB indicate better clustering performance. All metrics are evaluated on the same test dataset.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, N.; Kong, X. A Fuzzy-SNA Computational Framework for Quantifying Intimate Relationship Stability and Social Network Threats. Symmetry 2026, 18, 201. https://doi.org/10.3390/sym18010201

AMA Style

Wang N, Kong X. A Fuzzy-SNA Computational Framework for Quantifying Intimate Relationship Stability and Social Network Threats. Symmetry. 2026; 18(1):201. https://doi.org/10.3390/sym18010201

Chicago/Turabian Style

Wang, Ning, and Xiangzhi Kong. 2026. "A Fuzzy-SNA Computational Framework for Quantifying Intimate Relationship Stability and Social Network Threats" Symmetry 18, no. 1: 201. https://doi.org/10.3390/sym18010201

APA Style

Wang, N., & Kong, X. (2026). A Fuzzy-SNA Computational Framework for Quantifying Intimate Relationship Stability and Social Network Threats. Symmetry, 18(1), 201. https://doi.org/10.3390/sym18010201

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop