SlideShare a Scribd company logo
1 of 1
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

LARGE GRAPH ANALYSIS IN THE GMINE SYSTEM
ABSTRACT:

Current applications have produced graphs on the order of hundreds of thousands of nodes and
millions of edges. To take advantage of such graphs, one must be able to find patterns, outliers,
and communities. These tasks are better performed in an interactive environment, where human
expertise can guide the process. For large graphs, though, there are some challenges: the
excessive processing requirements are prohibitive, and drawing hundred-thousand nodes results
in cluttered images hard to comprehend.

We propose an innovative framework suited for any kind of tree-like graph visual design. GMine
integrates 1) a representation for graphs organized as hierarchies of partitions—the concepts of
SuperGraph and Graph-Tree; and 2) a graph summarization methodology—CEPS. Our graph
representation deals with the problem of tracing the connection aspects of a graph hierarchy with
sub linear complexity, allowing one to grasp the neighborhood of a single node or of a group of
nodes in a single click. As a proof of concept, the visual environment of GMine is instantiated as
a system in which large graphs can be investigated globally and locally.

More Related Content

Similar to Large graph analysis in the g mine system

Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine systemecway
 
Java large graph analysis in the g mine system
Java  large graph analysis in the g mine systemJava  large graph analysis in the g mine system
Java large graph analysis in the g mine systemecwayerode
 
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine systemecway
 
Image size invariant visual cryptography for general access structures subjec...
Image size invariant visual cryptography for general access structures subjec...Image size invariant visual cryptography for general access structures subjec...
Image size invariant visual cryptography for general access structures subjec...Ecwaytech
 
Matlab image size invariant visual cryptography for general access structure...
Matlab  image size invariant visual cryptography for general access structure...Matlab  image size invariant visual cryptography for general access structure...
Matlab image size invariant visual cryptography for general access structure...Ecwaytech
 
Image size invariant visual cryptography for general access structures subjec...
Image size invariant visual cryptography for general access structures subjec...Image size invariant visual cryptography for general access structures subjec...
Image size invariant visual cryptography for general access structures subjec...Ecwayt
 
Dotnet reinforced similarity integration in image-rich information networks
Dotnet  reinforced similarity integration in image-rich information networksDotnet  reinforced similarity integration in image-rich information networks
Dotnet reinforced similarity integration in image-rich information networksEcwaytech
 
The deep learning tour - Q1 2017
The deep learning tour - Q1 2017 The deep learning tour - Q1 2017
The deep learning tour - Q1 2017 Eran Shlomo
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphsEcway2004
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphsecwayprojects
 
Dotnet clustering large probabilistic graphs
Dotnet  clustering large probabilistic graphsDotnet  clustering large probabilistic graphs
Dotnet clustering large probabilistic graphsEcwayt
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphsEcwaytechnoz
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphsEcwayt
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphsEcwayt
 
Dotnet clustering large probabilistic graphs
Dotnet  clustering large probabilistic graphsDotnet  clustering large probabilistic graphs
Dotnet clustering large probabilistic graphsEcwaytech
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphsEcwayt
 
The Future is Big Graphs: A Community View on Graph Processing Systems
The Future is Big Graphs: A Community View on Graph Processing SystemsThe Future is Big Graphs: A Community View on Graph Processing Systems
The Future is Big Graphs: A Community View on Graph Processing SystemsNeo4j
 
Transformer models for FER
Transformer models for FERTransformer models for FER
Transformer models for FERIRJET Journal
 
Matlab rich intrinsic image decomposition of outdoor scenes from multiple views
Matlab  rich intrinsic image decomposition of outdoor scenes from multiple viewsMatlab  rich intrinsic image decomposition of outdoor scenes from multiple views
Matlab rich intrinsic image decomposition of outdoor scenes from multiple viewsEcwaytech
 

Similar to Large graph analysis in the g mine system (20)

Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine system
 
Java large graph analysis in the g mine system
Java  large graph analysis in the g mine systemJava  large graph analysis in the g mine system
Java large graph analysis in the g mine system
 
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine system
 
Image size invariant visual cryptography for general access structures subjec...
Image size invariant visual cryptography for general access structures subjec...Image size invariant visual cryptography for general access structures subjec...
Image size invariant visual cryptography for general access structures subjec...
 
Matlab image size invariant visual cryptography for general access structure...
Matlab  image size invariant visual cryptography for general access structure...Matlab  image size invariant visual cryptography for general access structure...
Matlab image size invariant visual cryptography for general access structure...
 
Image size invariant visual cryptography for general access structures subjec...
Image size invariant visual cryptography for general access structures subjec...Image size invariant visual cryptography for general access structures subjec...
Image size invariant visual cryptography for general access structures subjec...
 
Dotnet reinforced similarity integration in image-rich information networks
Dotnet  reinforced similarity integration in image-rich information networksDotnet  reinforced similarity integration in image-rich information networks
Dotnet reinforced similarity integration in image-rich information networks
 
The deep learning tour - Q1 2017
The deep learning tour - Q1 2017 The deep learning tour - Q1 2017
The deep learning tour - Q1 2017
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphs
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphs
 
Dotnet clustering large probabilistic graphs
Dotnet  clustering large probabilistic graphsDotnet  clustering large probabilistic graphs
Dotnet clustering large probabilistic graphs
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphs
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphs
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphs
 
Dotnet clustering large probabilistic graphs
Dotnet  clustering large probabilistic graphsDotnet  clustering large probabilistic graphs
Dotnet clustering large probabilistic graphs
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphs
 
Null
NullNull
Null
 
The Future is Big Graphs: A Community View on Graph Processing Systems
The Future is Big Graphs: A Community View on Graph Processing SystemsThe Future is Big Graphs: A Community View on Graph Processing Systems
The Future is Big Graphs: A Community View on Graph Processing Systems
 
Transformer models for FER
Transformer models for FERTransformer models for FER
Transformer models for FER
 
Matlab rich intrinsic image decomposition of outdoor scenes from multiple views
Matlab  rich intrinsic image decomposition of outdoor scenes from multiple viewsMatlab  rich intrinsic image decomposition of outdoor scenes from multiple views
Matlab rich intrinsic image decomposition of outdoor scenes from multiple views
 

More from ecwayprojects

Model based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsModel based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsecwayprojects
 
Mining semantic context information for intelligent video surveillance of tra...
Mining semantic context information for intelligent video surveillance of tra...Mining semantic context information for intelligent video surveillance of tra...
Mining semantic context information for intelligent video surveillance of tra...ecwayprojects
 
Localization based radio model calibration for fault-tolerant wireless mesh n...
Localization based radio model calibration for fault-tolerant wireless mesh n...Localization based radio model calibration for fault-tolerant wireless mesh n...
Localization based radio model calibration for fault-tolerant wireless mesh n...ecwayprojects
 
In network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksIn network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksecwayprojects
 
Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...ecwayprojects
 
Idm an indirect dissemination mechanism for spatial voice interaction in netw...
Idm an indirect dissemination mechanism for spatial voice interaction in netw...Idm an indirect dissemination mechanism for spatial voice interaction in netw...
Idm an indirect dissemination mechanism for spatial voice interaction in netw...ecwayprojects
 
Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...ecwayprojects
 
Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...ecwayprojects
 
Finding rare classes active learning with generative and discriminative models
Finding rare classes active learning with generative and discriminative modelsFinding rare classes active learning with generative and discriminative models
Finding rare classes active learning with generative and discriminative modelsecwayprojects
 
Fast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video deliveryFast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video deliveryecwayprojects
 
Fast activity detection indexing for temporal stochastic automaton based acti...
Fast activity detection indexing for temporal stochastic automaton based acti...Fast activity detection indexing for temporal stochastic automaton based acti...
Fast activity detection indexing for temporal stochastic automaton based acti...ecwayprojects
 
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...ecwayprojects
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisecwayprojects
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksecwayprojects
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsecwayprojects
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksecwayprojects
 
Distributed web systems performance forecasting using turning bands method
Distributed web systems performance forecasting using turning bands methodDistributed web systems performance forecasting using turning bands method
Distributed web systems performance forecasting using turning bands methodecwayprojects
 
Distributed processing of probabilistic top k queries in wireless sensor netw...
Distributed processing of probabilistic top k queries in wireless sensor netw...Distributed processing of probabilistic top k queries in wireless sensor netw...
Distributed processing of probabilistic top k queries in wireless sensor netw...ecwayprojects
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksecwayprojects
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksecwayprojects
 

More from ecwayprojects (20)

Model based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsModel based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applications
 
Mining semantic context information for intelligent video surveillance of tra...
Mining semantic context information for intelligent video surveillance of tra...Mining semantic context information for intelligent video surveillance of tra...
Mining semantic context information for intelligent video surveillance of tra...
 
Localization based radio model calibration for fault-tolerant wireless mesh n...
Localization based radio model calibration for fault-tolerant wireless mesh n...Localization based radio model calibration for fault-tolerant wireless mesh n...
Localization based radio model calibration for fault-tolerant wireless mesh n...
 
In network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksIn network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networks
 
Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...
 
Idm an indirect dissemination mechanism for spatial voice interaction in netw...
Idm an indirect dissemination mechanism for spatial voice interaction in netw...Idm an indirect dissemination mechanism for spatial voice interaction in netw...
Idm an indirect dissemination mechanism for spatial voice interaction in netw...
 
Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...
 
Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...
 
Finding rare classes active learning with generative and discriminative models
Finding rare classes active learning with generative and discriminative modelsFinding rare classes active learning with generative and discriminative models
Finding rare classes active learning with generative and discriminative models
 
Fast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video deliveryFast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video delivery
 
Fast activity detection indexing for temporal stochastic automaton based acti...
Fast activity detection indexing for temporal stochastic automaton based acti...Fast activity detection indexing for temporal stochastic automaton based acti...
Fast activity detection indexing for temporal stochastic automaton based acti...
 
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysis
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networks
 
Distributed web systems performance forecasting using turning bands method
Distributed web systems performance forecasting using turning bands methodDistributed web systems performance forecasting using turning bands method
Distributed web systems performance forecasting using turning bands method
 
Distributed processing of probabilistic top k queries in wireless sensor netw...
Distributed processing of probabilistic top k queries in wireless sensor netw...Distributed processing of probabilistic top k queries in wireless sensor netw...
Distributed processing of probabilistic top k queries in wireless sensor netw...
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networks
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 

Large graph analysis in the g mine system

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com LARGE GRAPH ANALYSIS IN THE GMINE SYSTEM ABSTRACT: Current applications have produced graphs on the order of hundreds of thousands of nodes and millions of edges. To take advantage of such graphs, one must be able to find patterns, outliers, and communities. These tasks are better performed in an interactive environment, where human expertise can guide the process. For large graphs, though, there are some challenges: the excessive processing requirements are prohibitive, and drawing hundred-thousand nodes results in cluttered images hard to comprehend. We propose an innovative framework suited for any kind of tree-like graph visual design. GMine integrates 1) a representation for graphs organized as hierarchies of partitions—the concepts of SuperGraph and Graph-Tree; and 2) a graph summarization methodology—CEPS. Our graph representation deals with the problem of tracing the connection aspects of a graph hierarchy with sub linear complexity, allowing one to grasp the neighborhood of a single node or of a group of nodes in a single click. As a proof of concept, the visual environment of GMine is instantiated as a system in which large graphs can be investigated globally and locally.