The incredible rising of online networks show that these networks are complex and involving massive data.Giving a very strong interest to set of techniques developed for mining these networks. The clique problem is a well known NP-Hard problem in graph mining. One of the fundamental applications for it is the community detection. It helps to understand and model the network structure which has been a fundamental problem in several fields. In literature, the exponentially increasing computation time of this problem make the quality of these solutions is limited and infeasible for massive graphs. Furthermore, most of the proposed approaches are able to detect only disjoint communities. In this paper, we present a new clique based approach for fast and efficient overlapping
community detection. The work overcomes the short falls of clique percolation method (CPM), one of most popular and commonly used methods in this area. The shortfalls occur due to brute force algorithm for enumerating maximal cliques and also the missing out many vertices thatleads to poor node coverage. The proposed work overcome these shortfalls producing NMC method for enumerating maximal cliques then detects overlapping communities using three different community scales based on three different depth levels to assure high nodes coverage and detects the largest communities. The clustering coefficient and cluster density are used to measure the quality. The work also provide experimental results on benchmark real world network to
demonstrate the efficiency and compare the new proposed algorithm with CPM method, The proposed algorithm is able to quickly discover the maximal cliques and detects overlapping community with interesting remarks and findings.
Scalable Local Community Detection with Mapreduce for Large NetworksIJDKP
ย
Community detection from complex information networks draws much attention from both academia and
industry since it has many real-world applications. However, scalability of community detection algorithms
over very large networks has been a major challenge. Real-world graph structures are often complicated
accompanied with extremely large sizes. In this paper, we propose a MapReduce version called 3MA that
parallelizes a local community identification method which uses the $M$ metric. Then we adopt an
iterative expansion approach to find all the communities in the graph. Empirical results show that for large
networks in the order of millions of nodes, the parallel version of the algorithm outperforms the traditional
sequential approach to detect communities using the M-measure. The result shows that for local community
detection, when the data is too big for the original M metric-based sequential iterative expension approach
to handle, our MapReduce version 3MA can finish in a reasonable time.
Efficient routing mechanism using cycle based network and k hop security in a...ijait
ย
In a multi-domain network, Topology Aggregation (TA) may be adopted to provide limited information
regarding intra cluster connectivity without revealing detailed topology information. Nodes are grouped
into the cluster. Every cluster has border nodes, which is used for data transmission between source and
destination. The K-hop security can be used for the purpose of securing the data communication. The
topologies are spanning tree and balanced tree that can be used to reduce bandwidth overhead, delivery
delay and to increase throughput and packet delivery ratio. The shortest path can be found using
Bhandariโs algorithm and Cycle-Based Minimum-Cost Domain-Disjoint Paths (CMCDP) Algorithm for
establish the second path in the network . These topologies are compared to demonstrate the advantage of
finding shortest path using Bhandariโs algorithm.
Collective navigation of complex networks: Participatory greedy routingKolja Kleineberg
ย
Many networks are used to transfer information or goods, in other words, they are navigated. The larger the network, the more difficult it is to navigate efficiently. Indeed, information routing in the Internet faces serious scalability problems due to its rapid growth, recently accelerated by the rise of the Internet of Things. Large networks like the Internet can be navigated efficiently if nodes, or agents, actively forward information based on hidden maps underlying these systems. However, in reality most agents will deny to forward messages, which has a cost, and navigation is impossible. Can we design appropriate incentives that lead to participation and global navigability? Here, we present an evolutionary game where agents share the value generated by successful delivery of information or goods. We show that global navigability can emerge, but its complete breakdown is possible as well. Furthermore, we show that the system tends to self-organize into local clusters of agents who participate in the navigation. This organizational principle can be exploited to favor the emergence of global navigability in the system.
Hidden geometric correlations in real multiplex networksKolja Kleineberg
ย
Read the paper at http://www.nature.com/nphys/journal/vaop/ncurrent/full/nphys3812.html
Real networks often form interacting parts of larger and more complex systems. Examples can be found in different domains, ranging from the Internet to structural and functional brain networks. Here, we show that these multiplex systems are not random combinations of single network layers. Instead, they are organized in specific ways dictated by hidden geometric correlations between the layers. We find that these correlations are significant in different real multiplexes, and form a key framework for answering many important questions. Specifically, we show that these geometric correlations facilitate the definition and detection of multidimensional communities, which are sets of nodes that are simultaneously similar in multiple layers. They also enable accurate trans-layer link prediction, meaning that connections in one layer can be predicted by observing the hidden geometric space of another layer. And they allow efficient targeted navigation in the multilayer system using only local knowledge, outperforming navigation in the single layers only if the geometric correlations are sufficiently strong.
MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK csandit
ย
Mobility is attracting more and more interests due to its importance for data forwarding
mechanisms in many networks such as mobile opportunistic network. In everyday life mobile
nodes are often carried by human. Thus, mobile nodesโ mobility pattern is inevitable affected by
human social character. This paper presents a novel mobility model (HNGM) which combines
social character and Gauss-Markov process together. The performance analysis on this
mobility model is given and one famous and widely used mobility model (RWP) is chosen to
make comparison..
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Scalable Local Community Detection with Mapreduce for Large NetworksIJDKP
ย
Community detection from complex information networks draws much attention from both academia and
industry since it has many real-world applications. However, scalability of community detection algorithms
over very large networks has been a major challenge. Real-world graph structures are often complicated
accompanied with extremely large sizes. In this paper, we propose a MapReduce version called 3MA that
parallelizes a local community identification method which uses the $M$ metric. Then we adopt an
iterative expansion approach to find all the communities in the graph. Empirical results show that for large
networks in the order of millions of nodes, the parallel version of the algorithm outperforms the traditional
sequential approach to detect communities using the M-measure. The result shows that for local community
detection, when the data is too big for the original M metric-based sequential iterative expension approach
to handle, our MapReduce version 3MA can finish in a reasonable time.
Efficient routing mechanism using cycle based network and k hop security in a...ijait
ย
In a multi-domain network, Topology Aggregation (TA) may be adopted to provide limited information
regarding intra cluster connectivity without revealing detailed topology information. Nodes are grouped
into the cluster. Every cluster has border nodes, which is used for data transmission between source and
destination. The K-hop security can be used for the purpose of securing the data communication. The
topologies are spanning tree and balanced tree that can be used to reduce bandwidth overhead, delivery
delay and to increase throughput and packet delivery ratio. The shortest path can be found using
Bhandariโs algorithm and Cycle-Based Minimum-Cost Domain-Disjoint Paths (CMCDP) Algorithm for
establish the second path in the network . These topologies are compared to demonstrate the advantage of
finding shortest path using Bhandariโs algorithm.
Collective navigation of complex networks: Participatory greedy routingKolja Kleineberg
ย
Many networks are used to transfer information or goods, in other words, they are navigated. The larger the network, the more difficult it is to navigate efficiently. Indeed, information routing in the Internet faces serious scalability problems due to its rapid growth, recently accelerated by the rise of the Internet of Things. Large networks like the Internet can be navigated efficiently if nodes, or agents, actively forward information based on hidden maps underlying these systems. However, in reality most agents will deny to forward messages, which has a cost, and navigation is impossible. Can we design appropriate incentives that lead to participation and global navigability? Here, we present an evolutionary game where agents share the value generated by successful delivery of information or goods. We show that global navigability can emerge, but its complete breakdown is possible as well. Furthermore, we show that the system tends to self-organize into local clusters of agents who participate in the navigation. This organizational principle can be exploited to favor the emergence of global navigability in the system.
Hidden geometric correlations in real multiplex networksKolja Kleineberg
ย
Read the paper at http://www.nature.com/nphys/journal/vaop/ncurrent/full/nphys3812.html
Real networks often form interacting parts of larger and more complex systems. Examples can be found in different domains, ranging from the Internet to structural and functional brain networks. Here, we show that these multiplex systems are not random combinations of single network layers. Instead, they are organized in specific ways dictated by hidden geometric correlations between the layers. We find that these correlations are significant in different real multiplexes, and form a key framework for answering many important questions. Specifically, we show that these geometric correlations facilitate the definition and detection of multidimensional communities, which are sets of nodes that are simultaneously similar in multiple layers. They also enable accurate trans-layer link prediction, meaning that connections in one layer can be predicted by observing the hidden geometric space of another layer. And they allow efficient targeted navigation in the multilayer system using only local knowledge, outperforming navigation in the single layers only if the geometric correlations are sufficiently strong.
MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK csandit
ย
Mobility is attracting more and more interests due to its importance for data forwarding
mechanisms in many networks such as mobile opportunistic network. In everyday life mobile
nodes are often carried by human. Thus, mobile nodesโ mobility pattern is inevitable affected by
human social character. This paper presents a novel mobility model (HNGM) which combines
social character and Gauss-Markov process together. The performance analysis on this
mobility model is given and one famous and widely used mobility model (RWP) is chosen to
make comparison..
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Testing and Improving Local Adaptive Importance Sampling in LFJ Local-JT in M...csandit
ย
Multiply Sectioned Bayesian Network (MSBN) provides
a model for probabilistic reasoning in
multi-agent systems. The exact inference is costly
and difficult to be applied in the context of
MSBNs as the size of problem domain becomes larger
and complex. So the approximate
techniques are used as an alternative in such cases
. Recently, for reasoning in MSBNs, LJF-
based Local Adaptive Importance Sampler (LLAIS) has
been developed for approximate
reasoning in MSBNs. However, the prototype of LLAIS
is tested only on Alarm Network (37
nodes). But further testing on larger networks has
not been reported yet, so the scalability and
reliability of algorithm remains questionable. Henc
e, we tested LLAIS on three large networks
(treated as local JTs) namely Hailfinder (56 nodes)
, Win95pts (76 nodes) and PathFinder(109
nodes). From the experiments done, it is seen that
LLAIS without parameters tuned shows good
convergence for Hailfinder and Win95pts but not for
Pathfinder network. Further when these
parameters are tuned the algorithm shows considerab
le improvement in its accuracy and
convergence for all the three networks tested.
DYNAMIC ADDRESS ROUTING FOR SCALABLE AD HOC NETWORKSIAEME Publication
ย
With todayโs rapidly improving link - layer technology, and the widespread adoption of wireless networking, the creation of large - scale ad hoc networks could be construed as all but inevitable . Current ad hoc protocol suites do not scale to work efficiently in networks of more than a few hundred nodes. We believe the main reason behind the lack of scalability is that current protocols use flat an d static addressing. In this paper, we provide an initial design of a routing layer based on dynamic addressing by providing a separation between address and identity . Each node has a unique permanent identifier and a transient routing address, which indicates its location in the network at any given time. We propose mechanisms to implement dynamic addressing efficiently. Our initial design suggests that dynamic addressing is a promising approach and worth further examination
Key management in information centric networkingIJCNCJournal
ย
Information centric networking (ICN) has been in the spotlight of recent research. It is an emerging
communication paradigm that relays on the concept of publish and subscribe. It aims to revise the current
Internet with a new clean slate architecture where the design is completely different from todayโs location
based model. To secure the forwarding plan in this network, it is vital to have a time based transient
forwarding identifiers by periodically changing the network link identifiers. This assumes shared keys to be
distributed prior the communications between an entity termed topology manager (TM) and each forwarder
in the network. Exchanging and sharing a secret key between two parties is one of most critical functions in
cryptography that needs to be more concerned when integrating cryptographic functions into the system. As
ICN is brand new Internet architecture, many existing cryptography protocols may need to be redesigned
to fit this new architecture. Therefore, this paper focuses on the security aspect of ICN and proposes an
initial design to deploy the integrated Diffie-Hellman-DSA key exchange protocol as a key distributions
mechanism.
Subgraph Frequencies: Mapping the Empirical and Extremal Geography of Large G...Gabriela Agustini
ย
A growing set of on-line applications are generating data that can be viewed as very large collections of small, dense social graphs โ these range from sets of social groups, events, or collabora- tion projects to the vast collection of graph neighborhoods in large social networks. A natural question is how to usefully define a domain-independent โcoordinate systemโ for such a collection of graphs, so that the set of possible structures can be compactly rep- resented and understood within a common space. In this work, we draw on the theory of graph homomorphisms to formulate and an- alyze such a representation, based on computing the frequencies of small induced subgraphs within each graph.
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Yayah Zakaria
ย
Wireless Mesh Networks (WMN) consists of wireless stations that are connected with each other in a semi-static configuration. Depending on the configuration of a WMN, different paths between nodes offer different levels of efficiency. One areas of research with regard to WMN is cost minimization. A Modified Binary Particle Swarm Optimization (MBPSO) approach was used to optimize cost. However, minimized cost does not
guarantee network performance. This paper thus, modified the minimization function to take into consideration the distance between the different nodes so as to enable better performance while maintaining cost balance. The results were positive with the PDR showing an approximate increase of 17.83% whereas the E2E delay saw an approximate decrease of 8.33%.
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...IEEEGLOBALSOFTTECHNOLOGIES
ย
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
AOTO: Adaptive overlay topology optimization in unstructured P2P systemsZhenyun Zhuang
ย
IEEE GLOBECOM 2003
Peer-to-Peer (P2P) systems are self-organized and
decentralized. However, the mechanism of a peer randomly
joining and leaving a P2P network causes topology mismatch-
ing between the P2P logical overlay network and the physical
underlying network. The topology mismatching problem brings
great stress on the Internet infrastructure and seriously limits
the performance gain from various search or routing tech-
niques. We propose the Adaptive Overlay Topology Optimiza-
tion (AOTO) technique, an algorithm of building an overlay
multicast tree among each source node and its direct logical
neighbors so as to alleviate the mismatching problem by choos-
ing closer nodes as logical neighbors, while providing a larger
query coverage range. AOTO is scalable and completely dis-
tributed in the sense that it does not require global knowledge
of the whole overlay network when each node is optimizing the
organization of its logical neighbors. The simulation shows that
AOTO can effectively solve the mismatching problem and re-
duce more than 55% of the traffic generated by the P2P system itself.
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...Eswar Publications
ย
The transmission of a traffic flows with a certain bandwidth demand over a single network path is either not possible or not cost-effective. In these cases, it is veritably periodic usable to improve focus the network's bandwidth appliance by breaking the traffic flow upon multiple qualified paths. Using multiple paths for the equivalent traffic flow increases the certainty of the network, it absorbs deluxe forwarding resources from the
network nodes and also it overcomes link failure provide security. In this paper, we illustrate several problems related to splitting a traffic flow over multiple paths while minimizing the absorption of forwarding resources mitigates failures and implementing security.
Defeating jamming with the power of silence a gametheoretic analysisranjith kumar
ย
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. Itโs certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...IJLT EMAS
ย
Mobile ad-hoc network characterized as a homogenous and heterogeneous on the basis of node capabilities. Heterogeneity property may make issues for mobile ad-hoc network in context of coverage area, link stability, lifetime etc. To resolve these issues, require a mechanism to adapt different characteristics and make decision for smooth functioning. Heterogeneity also leads effective routing problem that occurs instability in route or path. Though to make effective routing in this situation, efficient clustering algorithm may be apply. In this paper, the effects of heterogeneity property are studied and analyzed. A cluster head algorithm is also suggested to deal with the effects of the property. Suggested algorithm is simulated in network simulation and performance is evaluated in context of computation cost, lifetime and number of clusters.
Structure and dynamics of multiplex networks: beyond degree correlationsKolja Kleineberg
ย
The organization of constituent network layers to multiplex networks has recently attracted a lot of attention. Here, we show empirical evidence for the existence of relations between the layers of real multiplex networks that go beyond degree correlations. These relations consist of correlations in hidden metric spaces that underlie the observed topology. We discuss the impact and applications of these relations for trans-layer link prediction, community detection, navigation, game theory, and especially for the robustness of multiplex networks against random failures and targeted attacks. We show that these relations lead to fundamentally new behaviors, which emphasizes the importance to consider organizational principles of multiplex networks beyond degree correlations in future research.
Sub-Graph Finding Information over Nebula Networksijceronline
ย
Social and information networks have been extensively studied over years. This paper studies a new query on sub graph search on heterogeneous networks. Given an uncertain network of N objects, where each object is associated with a network to an underlying critical problem of discovering, top-k sub graphs of entities with rare and surprising associations returns k objects such that the expected matching sub graph queries efficiently involves, Compute all matching sub graphs which satisfy "Nebula computing requests" and this query is useful in ranking such results based on the rarity and the interestingness of the associations among nebula requests in the sub graphs. "In evaluating Top k-selection queries, "we compute information nebula using a global structural context similarity, and our similarity measure is independent of connection sub graphs". We need to compute the previous work on the matching problem can be harnessed for expected best for a naive ranking after matching for large graphs. Top k-selection sets and search for the optimal selection set with the large graphs; sub graphs may have enormous number of matches. In this paper, we identify several important properties of top-k selection queries, We propose novel topโK mechanisms to exploit these indexes for answering interesting sub graph queries efficiently.
Network clustering is an important technique used in many large-scale distributed systems. Given good design and implementation, network clustering can significantly enhance the system\'s scalability and efficiency. However, it is very challenging to design a good clustering protocol for networks that scale fast and change continuously. In this paper, we propose a distributed network clustering protocol SDC targeting large-scale decentralized systems. In SDC, clusters are dynamically formed and adjusted based on SCM, a practical clustering accuracy measure. Based on SCM, each node can join or leave a cluster such that the clustering accuracy of the whole network can be improved. A big advantage of SDC is it can recover accurate clusters from node dynamics with very small message overhead. Through extensive simulations, we conclude that SDC is able to discover good quality clusters very efficiently.
Testing and Improving Local Adaptive Importance Sampling in LFJ Local-JT in M...csandit
ย
Multiply Sectioned Bayesian Network (MSBN) provides
a model for probabilistic reasoning in
multi-agent systems. The exact inference is costly
and difficult to be applied in the context of
MSBNs as the size of problem domain becomes larger
and complex. So the approximate
techniques are used as an alternative in such cases
. Recently, for reasoning in MSBNs, LJF-
based Local Adaptive Importance Sampler (LLAIS) has
been developed for approximate
reasoning in MSBNs. However, the prototype of LLAIS
is tested only on Alarm Network (37
nodes). But further testing on larger networks has
not been reported yet, so the scalability and
reliability of algorithm remains questionable. Henc
e, we tested LLAIS on three large networks
(treated as local JTs) namely Hailfinder (56 nodes)
, Win95pts (76 nodes) and PathFinder(109
nodes). From the experiments done, it is seen that
LLAIS without parameters tuned shows good
convergence for Hailfinder and Win95pts but not for
Pathfinder network. Further when these
parameters are tuned the algorithm shows considerab
le improvement in its accuracy and
convergence for all the three networks tested.
DYNAMIC ADDRESS ROUTING FOR SCALABLE AD HOC NETWORKSIAEME Publication
ย
With todayโs rapidly improving link - layer technology, and the widespread adoption of wireless networking, the creation of large - scale ad hoc networks could be construed as all but inevitable . Current ad hoc protocol suites do not scale to work efficiently in networks of more than a few hundred nodes. We believe the main reason behind the lack of scalability is that current protocols use flat an d static addressing. In this paper, we provide an initial design of a routing layer based on dynamic addressing by providing a separation between address and identity . Each node has a unique permanent identifier and a transient routing address, which indicates its location in the network at any given time. We propose mechanisms to implement dynamic addressing efficiently. Our initial design suggests that dynamic addressing is a promising approach and worth further examination
Key management in information centric networkingIJCNCJournal
ย
Information centric networking (ICN) has been in the spotlight of recent research. It is an emerging
communication paradigm that relays on the concept of publish and subscribe. It aims to revise the current
Internet with a new clean slate architecture where the design is completely different from todayโs location
based model. To secure the forwarding plan in this network, it is vital to have a time based transient
forwarding identifiers by periodically changing the network link identifiers. This assumes shared keys to be
distributed prior the communications between an entity termed topology manager (TM) and each forwarder
in the network. Exchanging and sharing a secret key between two parties is one of most critical functions in
cryptography that needs to be more concerned when integrating cryptographic functions into the system. As
ICN is brand new Internet architecture, many existing cryptography protocols may need to be redesigned
to fit this new architecture. Therefore, this paper focuses on the security aspect of ICN and proposes an
initial design to deploy the integrated Diffie-Hellman-DSA key exchange protocol as a key distributions
mechanism.
Subgraph Frequencies: Mapping the Empirical and Extremal Geography of Large G...Gabriela Agustini
ย
A growing set of on-line applications are generating data that can be viewed as very large collections of small, dense social graphs โ these range from sets of social groups, events, or collabora- tion projects to the vast collection of graph neighborhoods in large social networks. A natural question is how to usefully define a domain-independent โcoordinate systemโ for such a collection of graphs, so that the set of possible structures can be compactly rep- resented and understood within a common space. In this work, we draw on the theory of graph homomorphisms to formulate and an- alyze such a representation, based on computing the frequencies of small induced subgraphs within each graph.
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Yayah Zakaria
ย
Wireless Mesh Networks (WMN) consists of wireless stations that are connected with each other in a semi-static configuration. Depending on the configuration of a WMN, different paths between nodes offer different levels of efficiency. One areas of research with regard to WMN is cost minimization. A Modified Binary Particle Swarm Optimization (MBPSO) approach was used to optimize cost. However, minimized cost does not
guarantee network performance. This paper thus, modified the minimization function to take into consideration the distance between the different nodes so as to enable better performance while maintaining cost balance. The results were positive with the PDR showing an approximate increase of 17.83% whereas the E2E delay saw an approximate decrease of 8.33%.
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...IEEEGLOBALSOFTTECHNOLOGIES
ย
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
AOTO: Adaptive overlay topology optimization in unstructured P2P systemsZhenyun Zhuang
ย
IEEE GLOBECOM 2003
Peer-to-Peer (P2P) systems are self-organized and
decentralized. However, the mechanism of a peer randomly
joining and leaving a P2P network causes topology mismatch-
ing between the P2P logical overlay network and the physical
underlying network. The topology mismatching problem brings
great stress on the Internet infrastructure and seriously limits
the performance gain from various search or routing tech-
niques. We propose the Adaptive Overlay Topology Optimiza-
tion (AOTO) technique, an algorithm of building an overlay
multicast tree among each source node and its direct logical
neighbors so as to alleviate the mismatching problem by choos-
ing closer nodes as logical neighbors, while providing a larger
query coverage range. AOTO is scalable and completely dis-
tributed in the sense that it does not require global knowledge
of the whole overlay network when each node is optimizing the
organization of its logical neighbors. The simulation shows that
AOTO can effectively solve the mismatching problem and re-
duce more than 55% of the traffic generated by the P2P system itself.
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...Eswar Publications
ย
The transmission of a traffic flows with a certain bandwidth demand over a single network path is either not possible or not cost-effective. In these cases, it is veritably periodic usable to improve focus the network's bandwidth appliance by breaking the traffic flow upon multiple qualified paths. Using multiple paths for the equivalent traffic flow increases the certainty of the network, it absorbs deluxe forwarding resources from the
network nodes and also it overcomes link failure provide security. In this paper, we illustrate several problems related to splitting a traffic flow over multiple paths while minimizing the absorption of forwarding resources mitigates failures and implementing security.
Defeating jamming with the power of silence a gametheoretic analysisranjith kumar
ย
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. Itโs certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...IJLT EMAS
ย
Mobile ad-hoc network characterized as a homogenous and heterogeneous on the basis of node capabilities. Heterogeneity property may make issues for mobile ad-hoc network in context of coverage area, link stability, lifetime etc. To resolve these issues, require a mechanism to adapt different characteristics and make decision for smooth functioning. Heterogeneity also leads effective routing problem that occurs instability in route or path. Though to make effective routing in this situation, efficient clustering algorithm may be apply. In this paper, the effects of heterogeneity property are studied and analyzed. A cluster head algorithm is also suggested to deal with the effects of the property. Suggested algorithm is simulated in network simulation and performance is evaluated in context of computation cost, lifetime and number of clusters.
Structure and dynamics of multiplex networks: beyond degree correlationsKolja Kleineberg
ย
The organization of constituent network layers to multiplex networks has recently attracted a lot of attention. Here, we show empirical evidence for the existence of relations between the layers of real multiplex networks that go beyond degree correlations. These relations consist of correlations in hidden metric spaces that underlie the observed topology. We discuss the impact and applications of these relations for trans-layer link prediction, community detection, navigation, game theory, and especially for the robustness of multiplex networks against random failures and targeted attacks. We show that these relations lead to fundamentally new behaviors, which emphasizes the importance to consider organizational principles of multiplex networks beyond degree correlations in future research.
Sub-Graph Finding Information over Nebula Networksijceronline
ย
Social and information networks have been extensively studied over years. This paper studies a new query on sub graph search on heterogeneous networks. Given an uncertain network of N objects, where each object is associated with a network to an underlying critical problem of discovering, top-k sub graphs of entities with rare and surprising associations returns k objects such that the expected matching sub graph queries efficiently involves, Compute all matching sub graphs which satisfy "Nebula computing requests" and this query is useful in ranking such results based on the rarity and the interestingness of the associations among nebula requests in the sub graphs. "In evaluating Top k-selection queries, "we compute information nebula using a global structural context similarity, and our similarity measure is independent of connection sub graphs". We need to compute the previous work on the matching problem can be harnessed for expected best for a naive ranking after matching for large graphs. Top k-selection sets and search for the optimal selection set with the large graphs; sub graphs may have enormous number of matches. In this paper, we identify several important properties of top-k selection queries, We propose novel topโK mechanisms to exploit these indexes for answering interesting sub graph queries efficiently.
Network clustering is an important technique used in many large-scale distributed systems. Given good design and implementation, network clustering can significantly enhance the system\'s scalability and efficiency. However, it is very challenging to design a good clustering protocol for networks that scale fast and change continuously. In this paper, we propose a distributed network clustering protocol SDC targeting large-scale decentralized systems. In SDC, clusters are dynamically formed and adjusted based on SCM, a practical clustering accuracy measure. Based on SCM, each node can join or leave a cluster such that the clustering accuracy of the whole network can be improved. A big advantage of SDC is it can recover accurate clusters from node dynamics with very small message overhead. Through extensive simulations, we conclude that SDC is able to discover good quality clusters very efficiently.
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...ijfcstjournal
ย
In this paper, we analyze the evolution of a small-world network and its subsequent transformation to a
random network using the idea of link rewiring under the well-known Watts-Strogatz model for complex
networks. Every link u-v in the regular network is considered for rewiring with a certain probability and if
chosen for rewiring, the link u-v is removed from the network and the node u is connected to a randomly
chosen node w (other than nodes u and v). Our objective in this paper is to analyze the distribution of the
maximal clique size per node by varying the probability of link rewiring and the degree per node (number
of links incident on a node) in the initial regular network. For a given probability of rewiring and initial
number of links per node, we observe the distribution of the maximal clique per node to follow a Poisson
distribution. We also observe the maximal clique size per node in the small-world network to be very close
to that of the average value and close to that of the maximal clique size in a regular network. There is no
appreciable decrease in the maximal clique size per node when the network transforms from a regular
network to a small-world network. On the other hand, when the network transforms from a small-world
network to a random network, the average maximal clique size value decreases significantly
Distribution of maximal clique size underijfcstjournal
ย
In this paper, we analyze the evolution of a small-world network and its subsequent transformation to a
random network using the idea of link rewiring under the well-known Watts-Strogatz model for complex
networks. Every link u-v in the regular network is considered for rewiring with a certain probability and if
chosen for rewiring, the link u-v is removed from the network and the node u is connected to a randomly
chosen node w (other than nodes u and v). Our objective in this paper is to analyze the distribution of the
maximal clique size per node by varying the probability of link rewiring and the degree per node (number
of links incident on a node) in the initial regular network. For a given probability of rewiring and initial
number of links per node, we observe the distribution of the maximal clique per node to follow a Poisson
distribution. We also observe the maximal clique size per node in the small-world network to be very close
to that of the average value and close to that of the maximal clique size in a regular network. There is no
appreciable decrease in the maximal clique size per node when the network transforms from a regular
network to a small-world network. On the other hand, when the network transforms from a small-world
network to a random network, the average maximal clique size value decreases significantly.
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKSIJDKP
ย
Community detection from complex information networks draws much attention from both academia and
industry since it has many real-world applications. However, scalability of community detection algorithms
over very large networks has been a major challenge. Real-world graph structures are often complicated
accompanied with extremely large sizes. In this paper, we propose a MapReduce version called 3MA that
parallelizes a local community identification method which uses the $M$ metric. Then we adopt an
iterative expansion approach to find all the communities in the graph. Empirical results show that for large
networks in the order of millions of nodes, the parallel version of the algorithm outperforms the traditional
sequential approach to detect communities using the M-measure. The result shows that for local community
detection, when the data is too big for the original M metric-based sequential iterative expension approach
to handle, our MapReduce version 3MA can finish in a reasonable time.
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...csandit
ย
The high-level contributions of this paper are as f
ollows: We modify an existing branch-and-
bound based exact algorithm (for maximum clique siz
e of an entire graph) to determine the
maximal clique size that the individual vertices in
the graph are part of. We then run this
algorithm on six real-world network graphs (ranging
from random networks to scale-free
networks) and analyze the distribution of the maxim
al clique size of the vertices in these graphs.
We observe five of the six real-world network graph
s to exhibit a Poisson-style distribution for
the maximal clique size of the vertices. We analyze
the correlation between the maximal clique
size and the clustering coefficient of the vertices
, and find these two metrics to be poorly
correlated for the real-world network graphs. Final
ly, we analyze the Assortativity index of the
vertices of the real-world network graphs and obser
ve the graphs to exhibit positive
assortativity with respect to maximal clique size a
nd negative assortativity with respect to node
degree; nevertheless, we observe the Assortativity
index of the real-world network graphs with
respect to both the maximal clique size and node de
gree to increase with decrease in the
spectral radius ratio for node degree, indicating a
positive correlation between the maximal
clique size and node degree.
Distribution of maximal clique size of theIJCNCJournal
ย
Our primary objective in this paper is to study the distribution of the maximal clique size of the vertices in complex networks. We define the maximal clique size for a vertex as the maximum size of the clique that the vertex is part of and such a clique need not be the maximum size clique for the entire network. We determine the maximal clique size of the vertices using a modified version of a branch-and-bound based exact algorithm that has been originally proposed to determine the maximum size clique for an entire network graph. We then run this algorithm on two categories of complex networks: One category of networks capture the evolution of small-world networks from regular network (according to the well-known Watts-Strogatz model) and their subsequent evolution to random networks; we show that the distribution of
the maximal clique size of the vertices follows a Poisson-style distribution at different stages of the evolution of the small-world network to a random network; on the other hand, the maximal clique size of the vertices is observed to be in-variant and to be very close to that of the maximum clique size for the entire network graph as the regular network is transformed to a small-world network. The second category
of complex networks studied are real-world networks (ranging from random networks to scale-free networks) and we observe the maximal clique size of the vertices in five of the six real-world networks to follow a Poisson-style distribution. In addition to the above case studies, we also analyze the correlation between the maximal clique size and clustering coefficient as well as analyze the assortativity index of the
vertices with respect to maximal clique size and node degree.
COMPARATIVE PERFORMANCE ANALYSIS OF RNSC AND MCL ALGORITHMS ON POWER-LAW DIST...acijjournal
ย
Cluster analysis of graph related problems is an important issue now-a-day. Different types of graph
clustering techniques are appeared in the field but most of them are vulnerable in terms of effectiveness
and fragmentation of output in case of real-world applications in diverse systems. In this paper, we will
provide a comparative behavioural analysis of RNSC (Restricted Neighbourhood Search Clustering) and
MCL (Markov Clustering) algorithms on Power-Law Distribution graphs. RNSC is a graph clustering
technique using stochastic local search. RNSC algorithm tries to achieve optimal cost clustering by
assigning some cost functions to the set of clusterings of a graph. This algorithm was implemented by A.
D. King only for undirected and unweighted random graphs. Another popular graph clustering
algorithm MCL is based on stochastic flow simulation model for weighted graphs. There are plentiful
applications of power-law or scale-free graphs in nature and society. Scale-free topology is stochastic i.e.
nodes are connected in a random manner. Complex network topologies like World Wide Web, the web of
human sexual contacts, or the chemical network of a cell etc., are basically following power-law
distribution to represent different real-life systems. This paper uses real large-scale power-law
distribution graphs to conduct the performance analysis of RNSC behaviour compared with Markov
clustering (MCL) algorithm. Extensive experimental results on several synthetic and real power-law
distribution datasets reveal the effectiveness of our approach to comparative performance measure of
these algorithms on the basis of cost of clustering, cluster size, modularity index of clustering results and
normalized mutual information (NMI).
Simulator for Energy Efficient Clustering in Mobile Ad Hoc Networkscscpconf
ย
The research on various issues in Mobile ad hoc networks is getting popular because of its
challenging nature and all time connectivity to communicate. Network simulators provide the
platform to analyse and imitate the working of the nodes in the networks along with the traffic
and other entities. The current work proposes the design of a simulator for the mobile ad hoc
networks that provides a test bed for the energy efficient clustering in the dynamic network.
Node parameters like degree of connectivity and average transmission power are considered for
calculating the energy consumption of the mobile devices. Nodes that consume minimum energy among their 1-hop neighbours are selected as the cluster heads.
A network is said to haveย community structureย if the nodes of the network can be easily grouped into (potentially overlapping)a sets of nodes such that each set of nodes is densely connected internally.
Community detection of political blogs network based on structure-attribute g...IJECEIAES
ย
Complex networks provide means to represent different kinds of networks with multiple features. Most biological, sensor and social networks can be represented as a graph depending on the pattern of connections among their elements. The goal of the graph clustering is to divide a large graph into many clusters based on various similarity criteriaโs. Political blogs as standard social dataset network, in which it can be considered as blog-blog connection, where each node has political learning beside other attributes. The main objective of work is to introduce a graph clustering method in social network analysis. The proposed Structure-Attribute Similarity (SAS-Cluster) able to detect structures of community, based on nodes similarities. The method combines topological structure with multiple characteristics of nodes, to earn the ultimate similarity. The proposed method is evaluated using well-known evaluation measures, Density, and Entropy. Finally, the presented method was compared with the state-of-art comparative method, and the results show that the proposed method is superior to the comparative method according to the evaluations measures.
An Integrated Distributed Clustering Algorithm for Large Scale WSN...................................................1
S. R. Boselin Prabhu, S. Sophia, S. Arthi and K. Vetriselvi
An Efficient Connection between Statistical Software and Database Management System ................... 1
Sunghae Jun
Pragmatic Approach to Component Based Software Metrics Based on Static Methods ......................... 1
S. Sagayaraj and M. Poovizhi
SDI System with Scalable Filtering of XML Documents for Mobile Clients ............................................... 1
Yi Yi Myint and Hninn Aye Thant
An Easy yet Effective Method for Detecting Spatial Domain LSB Steganography .................................... 1
Minati Mishra and Flt. Lt. Dr. M. C. Adhikary
Minimizing the Time of Detection of Large (Probably) Prime Numbers ................................................... 1
Dragan Vidakovic, Dusko Parezanovic and Zoran Vucetic
Design of ATL Rules for TransformingUML 2 Sequence Diagrams into Petri Nets..................................... 1
Elkamel Merah, Nabil Messaoudi, Dalal Bardou and Allaoua Chaoui
Machine learning in Dynamic Adaptive Streaming over HTTP (DASH)Eswar Publications
ย
Recently machine learning has been introduced into the area of adaptive video streaming. This paper explores a novel taxonomy that includes six state of the art techniques of machine learning that have been applied to Dynamic Adaptive Streaming over HTTP (DASH): (1) Q-learning, (2) Reinforcement learning, (3) Regression, (4) Classification, (5) Decision Tree learning, and (6) Neural networks.
Maximizing network capacity and reliable transmission in mimo cooperative net...eSAT Journals
ย
Abstract Network capacity is an important factor to measure the performance of a network. Cooperative networking is a phenomenon which helps network to have significant gains in terms of transmission reliability and network capacity. Cooperating networking has been applied to multi-hop ad hoc networks. However, the existing works have two limitations. They support only single antenna model and three node relay scheme. The reason behind this limitation due to lack of complete understands of optimal power allocation structure Multiple Input and Multiple Output (MIMO) cooperative networks. Recently Liu et al. studied structural properties with respect to MIMO cooperative networks in presence of node power constraints. Each power allocation at source follows corresponding MIMO structure so as to ensure optimal power allocation. They establish relationship between cooperative relay and pure relay to quantify performance gain. In this paper we did experiments on this concept. Our simulations reveal that the proposed system for cooperative network is able to achieve both transmission reliability and network capacity. Keywords โCooperative networking, MIMO, optimal power allocation, transmission reliability
Similar to A Proposed Algorithm to Detect the Largest Community Based On Depth Level (20)
Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images in various research areas. In CBIR systems features such as shape, texture and color are used. The extraction of features is the main step on which the retrieval results depend. Color features in CBIR are used as in the color histogram, color moments, conventional color correlogram and color histogram. Color space selection is used to represent the information of color of the pixels of the query image. The shape is the basic characteristic of segmented regions of an image. Different methods are introduced for better retrieval using different shape representation techniques; earlier the global shape representations were used but with time moved towards local shape representations. The local shape is more related to the expressing of result instead of the method. Local shape features may be derived from the texture properties and the color derivatives. Texture features have been used for images of documents, segmentation-based recognition,and satellite images. Texture features are used in different CBIR systems along with color, shape, geometrical structure and sift features.
The cyber attacks have become most prevalent in the past few years. During this time, attackers have discovered new vulnerabilities to carry out malicious activities on the internet. Both the clients and the servers have been victimized by the attackers. Clickjacking is one of the attacks that have been adopted by the attackers to deceive the innocuous internet users to initiate some action. Clickjacking attack exploits one of the vulnerabilities existing in the web applications. This attack uses a technique that allows cross domain attacks with the help of userinitiated clicks and performs unintended actions. This paper traces out the vulnerabilities that make a website vulnerable to clickjacking attack and proposes a solution for the same.
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
ย
The audio and video synchronization plays an important role in speech recognition and multimedia communication. The audio-video sync is a quite significant problem in live video conferencing. It is due to use of various hardware components which introduces variable delay and software environments. The objective of the synchronization is used to preserve the temporal alignment between the audio and video signals. This paper proposes the audio-video synchronization using spreading codes delay measurement technique. The performance of the proposed method made on home database and achieves 99% synchronization efficiency. The audio-visual
signature technique provides a significant reduction in audio-video sync problems and the performance analysis of audio and video synchronization in an effective way. This paper also implements an audio- video synchronizer and analyses its performance in an efficient manner by synchronization efficiency, audio-video time drift and audio-video delay parameters. The simulation result is carried out using mat lab simulation tools and simulink. It is automatically estimating and correcting the timing relationship between the audio and video signals and maintaining the Quality of Service.
Due to the availability of complicated devices in industry, models for consumers at lower cost of resources are developed. Home Automation systems have been developed by several researchers. The limitations of home automation includes complexity in architecture, higher costs of the equipment, interface inflexibility. In this paper as we have proposed, the working protocol of PIC 16F72 technology is which is secure, cost efficient, flexible that leads to the development of efficient home automation systems. The system is operational to control various home appliances like fans, Bulbs, Tube light. The following paper describes about components used and working of all components connected. The home automation system makes use of Android app entitled โHome Appโ which gives
flexibility and easy to use GUI.
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
ย
E-learning plays an important role in providing required and well formed knowledge to a learner. The medium of e- learning has achieved advancement in various fields such as adaptive e-learning systems. The need for enhancing e-learning semantically can enhance the retrieval and adaptability of the learning curriculum. This paper provides a semantically enhanced module based e-learning for computer science programme on a learnercentric perspective. The learners are categorized based on their proficiency for providing personalized learning environment for users. Learning disorders on the platform of e-learning still require lots of research. Therefore, this paper also provides a personalized assessment theoretical model for alphabet learning with learning objects for
childrenโs who face dyslexia.
Agriculture plays an important role in the economy of our country. Over 58 percent of the rural households depend on the agriculture sector as their means of livelihood. Agriculture is one of the major contributors to Gross Domestic Product(GDP). Seeds are the soul of agriculture. This application helps in reducing the time for the researchers as well as farmers to know the seedling parameters. The application helps the farmers to know about the percentage of seedlings that will grow and it is very essential in estimating the yield of that particular crop. Manual calculation may lead to some error, to minimize that error, the developed app is used. The scientist and farmers require the app to know about the physiological seed quality parameters and to take decisions regarding their farming activities. In this article a desktop app for seed germination percentage and vigour index calculation are developed in PHP scripting language.
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
ย
Competition among adaptive video streaming players severely diminishes user-QoE. When players compete at a bottleneck link many do not obtain adequate resources. This imbalance eventually causes ill effects such as screen flickering and video stalling. There have been many attempts in recent years to overcome some of these problems. However, added to the competition at the bottleneck link there is also the possibility of varying network bandwidth which can make the situation even worse. This work focuses on such a situation. It evaluates current heuristic adaptive video players at a bottleneck link with time-varying bandwidth conditions. Experimental setup includes the TAPAS player and emulated network conditions. The results show PANDA outperforms FESTIVE, ELASTIC and the Conventional players.
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
ย
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPAโs KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate.
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
ย
This report present the outcome of an investigative research conducted to examine the modu-operandi of academic staff union of polytechnics (ASUP) YabaTech. The investigation covered the logistics and cost implication for spreading union activities among members. It was discovered that cost of management and dissemination of information to members was at high side, also logistics problem constitutes to loss of information in transit hence cut away some members from union activities. To curtail the problem identified, we proposed the
design of secure and dynamic website for spreading union activities among members and public. The proposed system was implemented using HTML5 technology, interface frameworks like Bootstrap and j query which enables the responsive feature of the application interface. The backend was designed using PHPMYSQL. It was discovered from the evaluation of the new system that cost of managing information has reduced considerably, and logistic problems identified in the old system has become a forgotten issue.
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
ย
Nowadays organizations are using information systems for optimizing processes in order to increase coordination and interoperability across the organizations. Since Oil and Gas Industry is one of the large industries in whole of the world, there is a need to compatibility of its Information Systems (IS) which consists three categories of systems: Field IS, Plant IS and Enterprise IS to create interoperability and approach the
optimizing processes as its result. In this paper we introduce the different models of information systems integration, identify the types of information systems that are using in the upstream and downstream sectors of petroleum industry, and finally based on expertโs opinions will identify a suitable model for information systems integration in this industry.
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
ย
This work illustrates the AOMDV routing protocol. Its ancestor, the AODV routing protocol is also described. This tutorial demonstrates how forward and reverse paths are created by the AOMDV routing protocol. Loop free paths formulation is described, together with node and link disjoint paths. Finally, the performance of the AOMDV routing protocol is investigated along link and node disjoint paths. The WSN with the AOMDV routing protocol using link disjoint paths is better than the WSN with the AOMDV routing protocol using node disjoint paths for energy consumption.
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
ย
To identify the importance of node of a network, several centralities are used. Majority of these centrality measures are dominated by components' degree due to their nature of looking at networksโ topology. We propose a centrality to identification model, bridging centrality, based on information flow and topological aspects. We apply bridging centrality on real world networks including the transportation network and show that the nodes distinguished by bridging centrality are well located on the connecting positions between highly connected regions. Bridging centrality can discriminate bridging nodes, the nodes with more information flowed through them and locations between highly connected regions, while other centrality measures cannot.
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
ย
In past couple of decades, there is immediate growth in field of agricultural technology. Utilization of proper method of irrigation by drip is very reasonable and proficient. A various drip irrigation methods have been proposed, but they have been found to be very luxurious and dense to use. The farmer has to maintain watch on irrigation schedule in the conventional drip irrigation system, which is different for different types of crops. In remotely monitored embedded system for irrigation purposes have become a new essential for farmer to accumulate his energy, time and money and will take place only when there will be requirement of water. In this approach, the soil test for chemical constituents, water content, and salinity and fertilizer requirement data collected by wireless and processed for better drip irrigation plan. This paper reviews different monitoring systems and proposes an automatic monitoring system model using Wireless Sensor Network (WSN) which helps the farmer to improve the yield.
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
ย
With the advent of cloud computing the big data has emerged as a very crucial technology. The certain type of cloud provides the consumers with the free services like storage, computational power etc. This paper is intended to make use of infrastructure as a service where the storage service from the public cloud providers is going to leveraged by an individual or organization. The paper will emphasize the model which can be used by anyone without any cost. They can store the confidential data without any type of security issue, as the data will be altered
in such a way that it cannot be understood by the intruder if any. Not only that but the user can retrieve back the original data within no time. The proposed security model is going to effectively and efficiently provide a robust security while data is on cloud infrastructure as well as when data is getting migrated towards cloud infrastructure or vice versa.
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
ย
The financial services industry is experiencing rapid changes in services delivery and channels usage, and financial companies and users of financial services are looking at new technologies as they emerge and deciding whether or not to embrace them and the new opportunities to save and manage enormous time, cost and stress.
There is no doubt about the favourable and manifold impact of technology on e-banking as pictured in this review paper, almost all banks are with the least and most access e-banking Technological equipments like ATMs and Cards. On the other Hand cheap and readily available technology has opened a favourable competition in ebanking services business with a lot of wide range competitors competing with Commercial Banks in Cameroon in providing digital financial services.
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
ย
Attribute or feature selection plays an important role in the process of data mining. In general the data set contains more number of attributes. But in the process of effective classification not all attributes are relevant.
Attribute selection is a technique used to extract the ranking of attributes. Therefore, this paper presents a comparative evaluation study of classification algorithms before and after attribute selection using Waikato Environment for Knowledge Analysis (WEKA). The evaluation study concludes that the performance metrics of the classification algorithm, improves after performing attribute selection. This will reduce the work of processing irrelevant attributes.
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
ย
In todayโs world migration of people from rural areas to urban areas is quite common. Health care services are one of the most challenging aspect that is must require to the people with abnormal health. Advancements in the technologies lead to build the smart homes, which contains various sensor or smart meter devices to automate the process of other electronic device. Additionally these smart meters can be able to capture the daily activities of the patients and also monitor the health conditions of the patients by mining the frequent patterns and
association rules generated from the smart meters. In this work we proposed a model that is able to monitor the activities of the patients in home and can send the daily activities to the corresponding doctor. We can extract the frequent patterns and association rules from the log data and can predict the health conditions of the patients and can give the suggestions according to the prediction. Our work is divided in to three stages. Firstly, we used to record the daily activities of the patient using a specific time period at three regular intervals. Secondly we applied the frequent pattern growth for extracting the association rules from the log file. Finally, we applied k means clustering for the input and applied Bayesian network model to predict the health behavior of the patient and precautions will be given accordingly.
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
ย
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
Microstrip patch antennas are recently used in wireless detection applications due to their low power consumption, low cost, versatility, field excitation, ease of fabrication etc. The microstrip patch antennas are also called as printed antennas which is suffer with an array elements of antenna and narrow bandwidth. To overcome the above drawbacks, Flame Retardant Material is used as the substrate. Rectangular shape of microstrip patch antenna with FR4 material as the substrate which is more suitable for the explosive detection applications. The proposed printed antenna was designed with the dimension of 60 x 60 mm2. FR-4 material has a dielectric constant value of 4.3 with thickness 1.56 mm, length and width 60 mm and 60 mm respectively. One side of the substrate contains the ground plane of dimensions 60 x60 mm2 made of copper and the other side of the substrate contains the patch which have dimensions 34 x 29 mm2 and thickness 0.03mm which is also made of copper. RMPA without slot, Vertical slot RMPA, Double horizontal slot RMPA and Centre slot RMPA structures were
designed and the performance of the antennas were analysed with various parameters such as gain, directivity, Efield, VSWR and return loss. From the performance analysis, double horizontal slot RMPA antenna provides a better result and it provides maximum gain (8.61dB) and minimum return loss (-33.918dB). Based on the E-field excitation value the SEMTEX explosive material is detected and it was simulated using CST software.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
ย
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Automobile Management System Project Report.pdfKamal Acharya
ย
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. โAutomobile Management Systemโ is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Event Management System Vb Net Project Report.pdfKamal Acharya
ย
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named โEvent Management Systemโ is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Final project report on grocery store management system..pdfKamal Acharya
ย
In todayโs fast-changing business environment, itโs extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
ย
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
ย
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Forklift Classes Overview by Intella PartsIntella Parts
ย
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
ย
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Vaccine management system project report documentation..pdfKamal Acharya
ย
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
A Proposed Algorithm to Detect the Largest Community Based On Depth Level
1. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3362-3375 (2017) ISSN: 0975-0290
3362
A Proposed Algorithm to Detect the Largest
Community Based On Depth Level (LC-BDL)
Mohamed H. Farrag
Canadian International College, Cairo, Egypt.
Email:Mohamed_farrag @cic-cairo.com
Mona M. Nasr
Faculty of Computers and Information, Helwan University Cairo, Egypt.
Email:m.nasr@helwan.edu.eg
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
The incredible rising of online networks show that these networks are complex and involving massive data.Giving
a very strong interest to set of techniques developed for mining these networks. The clique problem is a well-
known NP-Hard problem in graph mining. One of the fundamental applications for it is the community detection.
It helps to understand and model the network structure which has been a fundamental problem in several ๏ฌelds.
In literature, the exponentially increasing computation time of this problem make the quality of these solutions is
limited and infeasible for massive graphs. Furthermore, most of the proposed approaches are able to detect only
disjoint communities. In this paper, we present a new clique based approach for fast and ef๏ฌcient overlapping
community detection. The work overcomes the short falls of clique percolation method (CPM), one of most
popular and commonly used methods in this area. The shortfalls occur due to brute force algorithm for
enumerating maximal cliques and also the missing out many vertices thatleads to poor node coverage. The
proposed work overcome these shortfalls producing NMC method for enumerating maximal cliques then detects
overlapping communities using three different community scales based on three different depth levels to assure
high nodes coverage and detects the largest communities. The clustering coefficient and cluster density are used to
measure the quality. The work also provide experimental results on benchmark real world network to
demonstrate the ef๏ฌciency and compare the new proposed algorithm with CPM method, The proposed algorithm
is able to quickly discover the maximal cliques and detects overlapping community with interesting remarks and
findings.
Keywords -Graph Mining, Maximal clique problem, Overlapping community detection, Social network analysis
---------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: Sep 14, 2017 Date of Acceptance: Sep 26, 2017
---------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
There are several factors that has made the study of
mining and analyzing large scale online communities gain
enormous importance like availableness of huge amount of
those large scale on-line communitiesโ data. This massive
data makes the graphs representing these networks are
getting terribly complicated, millions of nodes are present
across many various scientific domains. This results in
increase computation time and makes most existing
algorithms become impractical once the input graph is too
complex. The clique problem, and the related maximal
clique ๏ฌnd applications in a wide variety of domains as
information retrieval, community detection in networks,
data mining, bioinformatics, disease classi๏ฌcation , pattern
recognition and analysis of ๏ฌnancial networks.
Particularly community detection in networks is one
amongst the elemental applications for cliqueโs problems.
This problem is very hard and not
nonetheless satisfactorily resolved, despite the large effort
of a large interdisciplinary community of scientists
performing on it over the past few years. the invention of
those communities in large scale online communities can
will more and more being leveraged as a strong,
inexpensive tool for enterprises to drive business as rating
prediction, Top-N recommendation, and link
recommendation, trend analysis in citation networks and
additionally improving recommender systems. One
among largely used and common method in community
detection is clique percolation method (CPM), is a simple
algorithm which has been used often as a clique based
approach for overlapping community detection. However
this algorithm suffers from several shortfalls that make
CPM is appropriate for networks with dense connected
elements only and due to large scale of real networks and
the exponentially increasing computation time,makes
CPM algorithm impractical within real-world scenarios.
The short falls of clique percolation method happens first
as a result to the approach of enumerating maximal clique,
it based on brute force algorithm its cost is proportional to
the number of candidate solutions. The brute force
algorithm becomes impractical for massive networks and
unsuitable in real-world scenarios. For instance, for an
entire graph of only 100 nodes, the algorithm will generate
a minimum of 299
- 1 different cliques.[5] A second
shortage of CPM method happens because of the problem
of missing out several vertices as a result to the restriction
of using threshold value. Whereas CPM only considers
the totally connected sub graphs of size k the neglect Sub
graphs containing several cliques which can be a part
of existing community or generate new communities
within the existing graph. This would possibly provide a
2. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3362-3375 (2017) ISSN: 0975-0290
3363
not clear community structure therefore the poor nodes
coverage problem. To overcome the shortcomings
mentioned earlier, the proposed algorithm in first part of
the work propose NMC method to enhance the way of
enumerating maximal clique in CPM method by reducing
the search vertices and pruning specific nodes and edges
which will not be a part of a maximal clique for this node
to make the process of enumerating maximal cliques fast
and efficient. second part of the work, The proposed
algorithm efficiently detects overlapping communities
using three different community scales based on three
different depth levels to detect the largest community in
given network and assures high nodes coverage for
connected network that overcomes the poor coverage
problem of the CPM method. This paper is organized as
follows: section two discusses background and related
work, section three demonstrates the proposed algorithm
and section four explains the experiment while conclusion
and future work are in the last section.
II. BACKGROUND AND RELATED WORK
Some main aspects concerning the nature and the structure
of on-line networks that these network modeled by a
graph that are the foremost usually used abstract data
structures within the field of computer science, they enable
a more complicated and wide-ranging presentation of data
compared to link tables and tree structures. [1, 16, 17] A
network is usually presented as a graph ๐บ , , where
is set of nodes and is set of m edges. Graph ๐บ
consisting of n number of nodes denoting individuals or
the participants in the network. The connection between
node and node is represented by the edge of the
graph. The graph areoften represented by an adjacency
matrix in which = 1 in case there is an edge between
and else = 0 [1, 3, 5].Another aspect is Cliques,is
defined as โa set of vertices in which every pair of vertices
is connected by an edgeโ.[5] Clique is a complete sub
graph of ๐บ or in different words โis a maximum complete
sub graph in which all nodes are adjacent to each otherโ ,
in a clique of size , each node maintains degree โ .
Normally use cliques as a core or a seed to seek out larger
communities. [5, 6, 12] another formal definition โA
clique is a fully connected sub graph a set of nodes all of
which are connected to each other. โ [7, 15]K-cliques are
often outlined as complete graph with vertices. [12] K-
cliques are main structures in complicatednetworks, and a
good way to seek out community structure. [7,
12]Maximal Clique โis a clique that's contained in no
larger cliqueโ.[7, 12, 14] Every maximal clique is a clique,
by definition, however the other doesn't hold. Therefore
there are always more cliques than maximal cliques. In
different words โa clique is said to be maximal if it not
contained in any other clique.โ [7]Adjacent k-cliques, we
are able to define adjacent K-cliques by two k-cliques that
share โ nodes. [7, 12]K-clique community (cluster or
component),outlinedas โa union of all k-cliques that may
be reached from each other through a series of adjacent k-
cliques.โ or โIt is the union of all k-cliques that are k-
Clique-connected to a particular k-clique.โ [8, 12]
Community detection, real world
complicated systems may be represented within the form
of networks. To comprehend the in-depth structure of
those systems, itโs necessary to review and analyze the
networks. A trivial property of those networks is
community structure obtained by splitting the network into
many parts, within which connection between nodes are
more dense than the remainder of the network. The sets of
this sort of grouping are commonly referred as
communities, however additionally called clusters,
cohesive groups, or modules as there is no globally
accepted unique de๏ฌnition. One among the restrictions of
graph partitioning methods is that they typically need the
user to specify the number of partitions, which cannot
be identified before. One solution proposed to this
problem is to use goodness metric as modularity to
evaluate the partition of the graph at every step. However,
this is often computationally expensive and might be
infeasible for massive graphs. however just in case of
community detection, it's not known that how many
communities are present in the network and it is not at all
obligatory for them to be of same size. The community
detection approach assumes that almost all of real world
networks, divide naturally into groups of nodes
(community) with dense connections internally and
sparser connections between groups, and therefore the
experimenterโs job is only to find these already formed
groups. The number of partitions and size of them are
settled by the network itself and not set by the
experimenter. So community detection is โthe technique
which aims to discover natural divisions of networks into
groups based on strength of connection between vertices.โ
[1, 13]No formal definition of community is universally
accepted, communities will have numerous properties, and
community detection has been approached from many
alternative views. Community detection is one among the
foremost wide researched issues. Straightforward
definition โA community is a densely connected group of
nodes that is sparsely connected to the rest of the networkโ
[18], Generally spoken community as โa module or
cluster is typically thought of as a group of nodes with
more and/or better interactions amongst its members than
between its members and the remainder of the networkโ.
[16] Primarily, community may be divided into two types;
disjoint communities and overlapping communities. In
disjoint communities nodes can be part of only a single
community. A non-overlapping community structure or
disjoint community structure may be outlined as โset of
communities such that all vertices are included in exactly
one community.โ [2] However in overlapping
communities partitions aren't essentially disjoint. There
might be nodes that belong to more than one community
[4, 18]. Usually in any on-line network a node may be part
of more than one different group or community,
thus for on-line networks, overlapping community
detection technique ought to be thought of disjoint
community detection technique. A number of community
detection algorithms and methods have been proposed and
deployed for the identi๏ฌcation of communities in
3. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3362-3375 (2017) ISSN: 0975-0290
3364
literature. There have also been modi๏ฌcations and
revisions to many methods and algorithms already
proposed. Two views to divide the previous work in
literature, first one depending on the nature of the relation
between cluster members. This view divided into four
categories. First category is node centric community
detection wherever nodes satisfy different properties as
complete mutuality which implies cliques; another
property is reachability of members as k-
clique [13]. Second category is group centric community
detection (Density-Based Groups), it needs the total group
to satisfy an explicit condition for instance the group
density greater than or equal a given threshold and take
away nodes with degree under the typical average degree.
Third category is network centric community detection,
must take into account connections within a network
globally. Its goal to partition nodes of a network into
disjoint sets, five different approaches utilized in network-
centric community detection. First approach is clustering
supported vertex similarity using Jaccard similarity and
Cosine similarity. Second approach is Latent space models
supported k-means clustering. Third approach is block
model approximation based on exchangeable graph
models. Fourth approach is spectral clustering are using
minimum cut problem that the number of edges between
the two sets is reduced. The fifth approach is modularity
maximization by measures the strength of a community
partition by taking into consideration the degree
distribution. While the fourth category is hierarchy centric
community detection, aims to build a hierarchical structure
of communities supported network topology to permit the
analysis of a network at different resolutions two
representative approaches first divisive hierarchical
clustering (top-down) and agglomerative hierarchical
clustering (bottom-up). [3, 13] The strength of a tie
is measured by edge betweenness that is the number of
shortest paths that pass along with the edge. A summary of
most algorithm used in community detection are shown in
Table 1.
Table1. Summary of most algorithms used in community
detection, indicates that the algorithm identifies :
overlapping communities or : disjoint communities, can
be run on : directed or : weighted graphs and if it
requires input P: parameter. [18]
From the second view we can divide the methods for
detecting overlapping communities in two categories.
Clique based methods and non-clique based methods. [1]
Table2. Summary for Clique based methods for
overlapping community detection [1]
In clique based methods for overlapping community
detection a community may be consider as โa union of
smaller, complete (fully connected) sub graphs that share
nodesโ.[1] A k-clique is a fully connected sub graph
consisting of k nodes[12]. Also we can consider โA k-
clique community can be de๏ฌned as a union of all k-
cliques that can be reached from each other through a
series of adjacent k-cliquesโ. [1] One of the most widely
used techniques to discover overlapping communities is
the clique percolation method (CPM). [9, 18] CPMis an
efficient algorithm in discovering overlapping
communities; it has a wide range of application in social
networks and biological networks. The basic idea of this
method is that the idea of a k-clique community
that was outlined as the union of all k-cliques (complete
sub graphs of size ) that can be reached from each other
through a series of adjacent k-cliques (where adjacency
means sharing โ vertices). The k-clique community
may be thought of a usual module (community, cluster or
complex) because of its dense internal links and sparse
external linkage with other part of the whole network.
Then build the overlap matrix of thosek-cliques. Finally, a
number of k-clique communities are detected by analysis
the overlap matrix. [9, 10] CPM algorithm ๏ฌrst detects all
complete sub graphs of the network that are not parts of
greater complete sub graphs. These maximal complete sub
graphs are known as cliques, after the cliques are settled,
the clique-clique overlap matrix is ready.In this symmetric
matrix every row (and column) represents a clique and the
matrix elements are equal to the number of shared vertices
between the corresponding two cliques, and the diagonal
entries are equal to the size of the clique. The k-clique-
communities for a given value of are equal to such
connected clique components in which the neighboring
cliques are linked to each other by at least โ shared
nodes. These components can be found by removing each
off-diagonal entry. [1, 8, 12]a straightforward illustration
for the extraction of the k-clique communities at =
using the clique clique overlap matrix.We tend to use a
Author (Algorithm) Approach Parameters
Palla et al. (CPM) ,
Clique percolation
method Nodes
threshold weight
Lancichinetti et al. Fitness function Fitness function
Du et al. (ComTector)
Kernels-based
clustering
Set of all kernels
Shen at al (EAGLE)
Agglomerative
hierarchical clustering
Similarity between two
communities
Evans et al.
Line graph, clique
graph
Links, partition
Lee et al. (GCE)
Cliques-based
expansion
Fitness function
Gregory et al. (CONGA,
CONGO, Peacock
algorithm)
Split betweenness
vertex
Short paths ratio of max. Edge
betweenness and max. split
betweenness
Algorithm year
Speakerโlistener label
propagation (SLPA)
yes Yes yes yes yes 2012
Top graph clusters
(TopGC)
yes yes yes yes 2010
SVINET yes yes yes 2013
Multithreaded (MCD) yes yes 2012
Core Groups Graph
clusters (CGGC-RG)
yes 2012
Complex Network
Cluster Detection
yes yes 2011
Dense sub graph
extraction (DSE)
yes yes 2012
Speed and
Performance in
clustering (SPICI)
yes yes 2010
CFinder yes 2005
Fast Greedy yes 2004
Label Propagation yes yes 2007
Leading eigenvector
(LE)
2006
4. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3362-3375 (2017) ISSN: 0975-0290
3365
sample network consists of eighteen nodes and thirty six
edges as shown in Table3.
Table3. Sample network edge list
๏ญ Uncover maximal cliques
CPM finds all cliques using brute-force algorithm starting
by set A initially contains vertex v, Set B contains
neighbors of v. then transfer one vertex w from B to A and
remove vertices that are not neighbors of w from B. Then
repeat until a reaches desired size if fail, step back and try
other possibilities. [8, 12] The seven maximal cliques
detected by CPM for the sample network are {N3, N6, N8,
N9, N10}, {N3, N6, N7, N8}, {N2, N3, N9, N10}, {N3, N4,
N6}, {N11, N12, N17}, {N11, N12, N13, N14}, {N12, N14,
N15}.
๏ญ Maximal Cliques to k-Clique Communities
A straightforward illustration Table4 shows the steps of
extraction of K-cliques communities at = using the
clique overlap matrix. [12]
Table4. CPM steps to extract communities at = [8, 12, 28]
M 1 2 3 4 5 6 7 M 1 2 3 4 5 6 7
1 5 1 5 3 3 2 0 0 0
2 4 2 3 4 1 2 0 0 0
3 4 3 3 1 4 1 0 0 0
4 3 4 2 2 1 3 0 0 0
5 3 5 0 0 0 0 3 2 1
6 4 6 0 0 0 0 2 4 1
7 3 7 0 0 0 0 1 1 3
Step1: count nodes for each maximal
cliques
Step2: Calculate the intersection nodes
between each two maximal cliques
M 1 2 3 4 5 6 7 M 1 2 3 4 5 6 7
1 5 3 3 2 0 0 0 1 5 3 3 0 0 0 0
2 3 4 1 2 0 0 0 2 3 4 0 0 0 0 0
3 3 1 4 1 0 0 0 3 3 0 4 0 0 0 0
4 2 2 1 0 0 0 0 4 0 0 0 0 0 0 0
5 0 0 0 0 0 2 1 5 0 0 0 0 0 0 0
6 0 0 0 0 2 4 1 6 0 0 0 0 0 4 0
7 0 0 0 0 1 1 0 7 0 0 0 0 0 0 0
Step3: K=4 Change to zero any maximal
clique less than 4
Step4: K=4 Change to zero any intersection
between maximal clique less than K-1 =3
M 1 2 3 4 5 6 7
Results:
(M1,M1)-(M1,M2)-(M1,M3)-(M6,M6)
Community1:(M1,M2,M3)
Community2:(M6)
1 1 1 1 0 0 0 0
2 1 1 0 0 0 0 0
3 1 0 1 0 0 0 0
4 0 0 0 0 0 0 0
5 0 0 0 0 0 0 0
6 0 0 0 0 0 1 0
7 0 0 0 0 0 0 0
Step5: K=4 Change all non-zero to 1
The final K-cliques communities at = using
CPM.Consists of two communities. = {N2, N3, N6, N7,
N8, N9, N10} and = {N11, N12, N13, N14}.
Another techniques are employed in literature as
a clique based overlapping communities like the algorithm
projected by Lancichinetti et al.[19] It performs a local
exploration in order to ๏ฌnd the community for each of the
nodes. During this method, the nodes could also be
revisited any number of times. The target was to detect
local maximal based on a ๏ฌtness function.
AlsoCFindersoftware system was developed supporting
CPM for overlapping community detection. Then Du et al.
[20] proposed Comtectorto detect the overlapping
communities using maximal cliques. At first, all maximal
cliques within the network that form the kernels of a
possible community are detect. Then, the agglomerative
procedure is iteratively used to add the vertices left to their
nearest kernels. The obtained clusters are adjusted by
merging a combine of fractional communities to optimize
the modularity of the network.EAGLE is another work
using agglomerative hierarchical clustering based on
maximal clique algorithm has been projected by Shen et
al. [21] Firstly, maximal cliques are detected, and those
smaller than a threshold are neglected. Then Subordinate
maximal cliques are neglected, and the remaining give the
initial communities. The similarity is found between these
communities, and communities are repeatedly
integrated along on the premise of this similarity. This is
often used until one community remains at the end. Evans
et al. [22] proposed that by partitioning the links of a
network, the overlapping communities is also discovered.
In another work, Evans et al. [23] used weighted line
graphs. In another work, Evans [24] used clique graphs to
discover the overlapping communities in real-world
networks. Also Greedy clique expansion [25] at the ๏ฌrst
detect cliques in a network. These cliques act as seeds for
expansion along with the greedy optimization of a ๏ฌtness
function. A community is discovered by expanding the
selected seed and performing its greedy optimization via
the ๏ฌtness function proposed by Lancichinetti et al. [19]
another work is Cluster-overlap Newman Girvan
algorithm (CONGA) was proposed by Gregory. This
algorithm was based on the split- betweenness algorithm
of GirvanโNewman. CONGO optimized the proposed
algorithm [26], which used a local betweenness measure,
giving an improved complexity. A two-phase Peacock
algorithm for overlapping community detection is
proposed in Gregory [27] using disjoint community-
detection methods. In the ๏ฌrst phase, the network
transformation was performed using the split betweenness
concept proposed earlier by the author. Within the second
phase, the remodeled network is processed by a disjoint
community detection algorithm, and the discovered
communities were transformed back to overlapping
communities of the original network. [1]
III. LC-BDL (LARGEST COMMUNITY BASED
ON DEPTH LEVEL) ALGORITHM
In this work, we propose LC-BDL (largest community
based on depth level) algorithm which a new clique based
algorithm for overlapping community detection, LC-BDL
based on the assumption of one of the ๏ฌrst and most
popular and commonly used algorithm for overlapping
community detection clique percolation method
(CPM).[12] the assumption that a community is โunion of
all k-cliques (complete sub graphs of size ) that can be
reached from each other through a series of adjacent k-
cliquesโ, (where adjacency means sharing k-1 vertices).
The k-clique community can be considered as a usual
module (community, cluster) because of its dense internal
Network Edges
N1,N2 N2,N10 N3,N9 N6,N8 N8,N9 N12,N13
N1,N3 N2,N18 N3,N10 N6,N9 N8,N10 N12,N14
N1,N4 N3,N4 N4,N5 N6,N10 N9,N10 N12,N15
N2,N3 N3,N6 N4,N6 N7,N8 N11,N12 N13,N14
N2,N4 N3,N7 N5,N6 N17,N11 N11,N13 N14,N15
N2,N9 N3,N8 N6,N7 N17,N12 N11,N14 N15,N16
5. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3362-3375 (2017) ISSN: 0975-0290
3366
--------------------------------------------------------------------------------------
Method: NMC (Nodes maximal cliques) for ๏ฌnding the maximal
clique in a graph
Input: Input: Graph ๐บ = ,
Output: Nodes maximal cliques
--------------------------------------------------------------------------------------
1. For = :
2. = { โ }
3. for each node in Set
4. = { | + ( ) โ โ }
5. = โ
6. Loop
7. Let be an elementary element of
8. For = : | |
9. = |{ | ( ) โ โ }
10. If Then
11. = { | ( ) }
12. For each node in Set
13. โฒ
= { | + โ โ }
14. โฒ
= โ โฒ
15. Loop
16. Let be an elementary element of โฒ
17. ๐ผ = โฒ
18. = | |
19. ๐ผ = |{ | = ๐ผ โ โ โฒ}|
20. If = ๐ผ then
21. =
22. Else
23. = { | โ ๐ผ โ โ โฒ
}
24. Else
25. Loop
26. Loop
-------------------------------------------------------------------------------
links and sparse external linkage with other part of the
whole network. Clique percolation method (CPM) is a
simple algorithm which has been used often in this area.
However this algorithm suffers from several consideration
that make CPM is appropriate for networks with dense
connected parts only and due to large scale of real
networks and the exponentially increasing computation
time it makes CPM algorithms impractical in the real-
world scenarios. First consideration concern to the way of
detecting the maximal cliques which based on brute force
algorithm as a general problem-solving technique consists
of systematically enumerating all possible candidates for
the solution and checking whether each candidate satisfies
the problem's statement. While this algorithm will always
find a solution if it exists, its cost is proportional to the
number of candidate solutions which in many practical
problems tends to grow very quickly as the size of the
problem increases. CPM starts to determine the largest
possible clique size in the studied graph from the degree-
sequence. Starting with this clique size, CPM algorithm
repeatedly chooses a node, extracts every clique of this
size containing that node, For instance, for a complete
graph of only 100 nodes, the algorithm will generate at
least 299
- 1 different cliques starting from any node in the
graph.Deletes the node and its edges. When no nodes are
left, the clique size is decreased by one and the clique
๏ฌnding procedure is restarted on the original graph. [5]
The already found cliquesโ in๏ฌuence the further search
since the yet unrevealed (smaller) cliques cannot be
subsets of them. In the first part of the work the proposed
algorithm produce the method NMC to overcome this
point of consideration by enhancing the way of
enumerating maximal cliques by reducing the search
vertices and pruning the nodes and edges that will not be a
part of a maximal clique for each node to make the process
of enumerating maximal cliques fast and efficient. Second
consideration concern to the way of creating the
communities, occurs due to the problem of missing out
many vertices as a result for restriction of using threshold
value which might give a not clear community structure
and the poor nodes coverage problem. While CPM only
considers the fully connected sub graphs of size the
neglect Sub graph containing many cliques which may be
part of existing community or generate new communities
in the existing graph. It may happen that a clique of size
smaller than but it adjacent to a series of adjacent sub
cliques to another maximal clique of size . To overcome
this consideration in the second part of the work LC-BDL
produce three different community scales depending on
the target depth level for generating these communities.
First "Restricted community scale" in which the depth
level value equal zero it means that it detects the
communities among only maximal cliques of threshold
size . Second "Flexible community scale" in which the
depth level value is variant and flexible according to
business target for detecting the communities, it means
that it detects the communities among maximal cliques of
threshold size and its adjacent sub cliques of size equal
maximal clique size till given depth . This may lead to
enlarge the detected communities in restricted scale by
integrating these communities into larger communities and
detect the hidden pattern of relation among these
communities was discovered in restricted community
scale. Third "Power community scale" in which the depth
level value is the maximum to detect the largest
communities could be reached by test all the maximal
cliques adjacent sub cliques of size equal three since that
the triangle structure or 3-clique is a basic sub-structure of
any clique of size is larger than three to assure that no
adjacent sub cliques of a maximal clique belongs to series
of adjacent sub cliques for another maximal clique that
helps to detect the largest communities in a given network
without restriction to threshold size . Also help to avoid
the problem of poor node and cliquesโ coverage that may
be part of existing community or generate new
communities in the existing graph. In the following
section, we present our LC-BDLalgorithm as a clique
based algorithm overlapping community detection. LC-
BDLalgorithm consists of two phases, in the ๏ฌrst phase the
algorithm enumerate nodes maximal cliques using
NMCmethod, while phase two aims to discover the
communities among the discovered maximal cliques in
phase one according to three different community scales.
Let be the number of vertices of the input graph๐บ =
, where = { , , โฆ , ๐} and
= { , , , , โฆ , ๐ง , โฆ , ๐โ , ๐ } denote
the set of vertices and edges, respectively. The set of
vertices adjacent to a vertex , the set of its neighbors is
defined as = { ๐ง| โ }and the cardinality of
6. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3362-3375 (2017) ISSN: 0975-0290
3367
is denoted by , the maximal cliques denotes
by โ V. The community detection problem is typically
formulated as finding a partition = { , , โฆ , }of ๐บ,
where โ โ ๐บ. is also known as a clustering of ๐บ. We
use to denote the number of resulting communities, that
is | | = .
3.1. Phase1: Enumerate Maximal Cliques
NMC method aims to optimize the process of enumerating
the maximal cliques to reduce time cost and enhance
performance of the algorithm. To discover nodes maximal
cliques NMC method reducing the search vertices and
pruning the nodes and edges that will not be a part of a
maximal clique for each node in two steps, first step
generate set = { โ } then compute equal
the cardinality of for each member in set . Then
set sorted descending according to . The method
iterate the next procedure till by let
equal cardinality of nodes in set that its ( )
then compare against , if is greater
than or equal the method returns set = { | ( )
} by remove all nodes that will not be a part of a
maximal clique for this vertex in case else the method uses
the next .
In second step for each node in Set the method
assign โฒ
equal for each member in set . Then let
โฒ
= โ โฒ
Then set sorted descending according to
. Then three variables are used first ๐ผ equal the
minimum value in โฒ
, equal the cardinality of
set and ๐ผ equal the cardinality of set
where โฒ
= ๐ผ . Then compare against
๐ผ , if is equal ๐ผ the
method returns maximal clique equal set case else the
method exclude all vertices where its equal to the
๐ผ and returns maximal clique equal set where
โ ๐ผ . Finally define the set
= { , , โฆ , ๐ค}.
A straightforward illustration, LC-BDL algorithm uses a
tiny network consists of eighteen nodes and thirty six
edges as shown in Table3.
For the node the method begins togenerate set ,
= { , , , , 7, } then compute
equal the cardinality of . Then set sorted
descending according to as shown in Table5.
Table5. For the set sorted descending according to ๐ ๐จ๐
The method iterate the next procedure till by
let equal cardinality of nodes in set that its
( ) then compare against , if is
greater than or equal the method returns set =
{ | ( ) } by removing all the nodes that will not
be a part of a maximal clique for node , if the
condition is not satisfied the method uses the next . The
result is set = { , , , } excluding nodes
{ , 7} from set as shown in Table6.
Table6. Iteration for generating set
Nodes that satisfy set
5 1 N12
{ N12,N11,N14,N13}4 3 N12,N11,N14
3 4 N12,N11,N14,N13
In second step for each node in Set the method
assign โฒ
equal for each member in set . Then
let โฒ
= โ โฒ
then set sorted descending according to
as shown in Table7.
Table7. For the set sorted descending according to
For the set
= โฒ
3 3 3 3
Then three variables are used first ๐ผ equal the
minimum value in โฒ
, equal the cardinality of
set and ๐ผ equal the cardinality of set
where โฒ
= ๐ผ . Then compare against
๐ผ , if is equal ๐ผ the
method returns maximal clique equal set case else the
method exclude all vertices where its equal to the
๐ผ and returns maximal clique equal set
where โ ๐ผ .As a result ๐ผ = , =
and ๐ผ = while = ๐ผ the
method returns set as maximal clique ={ , ,
, }.As a final result for phase one NMC method
returns seven maximal cliques as
={(N11,N12,N13,N14),(N12,N14,N15),(N11,N12,
N17),(N10, N2, N3 ,N9),(N10,N3,
N6,N8,N9),(N3,N4,N6),(N3,N6,N7,N8)} for the given
sample network.
3.2. Phase2: Discover the communities
LC-BDL algorithm aims to discover the communities
among the discovered maximal cliques in phase one
according to three different community scales in two steps.
Step1 aims to create test cliques list and generate adjacent
list among them. This may be generated according to one
of three different community scales depending on the
target depth level for generating these communities. First
"Restricted community scale" in which the depth level
value equal zero it means that it detects the communities
among only maximal cliques of threshold size . Second
"Flexible community scale" in which the depth level value
is variant and flexible according to business target for
detecting the communities, it means that it detects the
communities among maximal cliques of threshold size
and its adjacent sub cliques of size equal maximal clique
size till given depth . Third "Power community scale"in
which the depth level value is the maximum value to
detect the largest communities could be reached by testing
all the maximal cliques adjacent sub cliques of size equal
three since that the triangle structure or 3-clique is a basic
sub-structure of any clique whose size is greater than three
to assure that no sub cliques of a maximal clique belongs
to series of adjacent sub cliques for another maximal
clique. This helps to detect the largest communities in a
For the set
7
= 5 4 4 3 2 2
7. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3362-3375 (2017) ISSN: 0975-0290
3368
given network without restriction to threshold value .
While step two aims to generate the communities among
adjacent sub cliques of step one by detecting the
communitiesโ seeds then generate communities among the
discovered seeds.
3.2.1. "Restricted community Scale" - Zero Depth
level
Depth level = in the restricted community scale, it
means that it detects the communities among only
maximal cliques of threshold size .
Step 1: Generate adjacent list
The algorithm in the restricted community scale aims first
to generate the test maximal cliques among only the
maximal cliques was detected in first phase and according
to threshold of size where = , , โฆ < โ and
depth level where โ โ = , , , . . < โ . We
denote test maximal cliques by is the set of maximal
cliques of size greater than or equal .
= { || | }
As a simple illustration, we use = and depth level
= , it means that the algorithm will select all maximal
cliques its size greater than or equal four among the seven
maximal cliques was detected in previous phase for the
given sample network, = {N11, N12, N13, N14},
{N10, N2, N3, N9}, {N10, N3, N6, N8, N9}, and {N3, N6,
N7, N8}. Then LC-BDL algorithm generates adjacent test
list by first generates is all possible sub cliques of
size equal โ , where is the โ
tuple in ,
using the power set . we can write
= { โ || |
= | | โ }
Therefore the depth level equal zero in the restricted
community scale thus = = {N11, N12, N13,
N14}, {N10, N2, N3, N9}, {N10, N3, N6, N8, N9}, and
{N3, N6, N7, N8}.
Now define a set
= { , , โฆ , โ}
Consider the set
= { , , , , โฆ , โ, โ }
Then LC-BDL algorithm define adjacent test list by the set
as a list of testing each sub clique of with the
rest of union sub clique with itself.
= { โ || | = โ }
= {( ๐ , ), ( ๐ , ), โฆ , ( ๐๐, ๐)}
Finally to generate the adjacent list the algorithm perform
the needed computation for each tuple in by detecting
the cardinality for each sub clique andcalculate the
adjacently vertices between these two sub cliques for the
โ
tuple to be considered adjacent if one of two sub
cliques share greater than or equal its cardinality -1. LC-
BDL algorithm produce only six adjacent sub cliques
among the ten tuples in as final adjacent list for the
restricted community scale using the sample network as
shown in Table8.
Table8. Step1 result for restricted community scale using the sample
network where the cardinality of the first sub clique is| ๐ |the
cardinality of the second sub clique is| |, ( ๐ , ) is the
adjacent vertices between the two sub cliques and the R column equal 0
for non-adjacent tuples and 1 show the adjacent tuples.
๐จ ๐๐ |๐จ ๐๐| ๐จ ๐๐ |๐จ ๐๐| ๐ (๐จ ๐๐, ๐จ ๐๐) R
1 4 1 4 4 1
1 4 2 4 0 0
1 4 3 5 0 0
1 4 4 4 0 0
2 4 2 4 4 1
2 4 3 5 3 1
2 4 4 4 1 0
3 5 3 5 5 1
3 5 4 4 3 1
4 4 4 4 4 1
Step2: Detect the communities
Step2 aims to generate the communities among the
adjacent tuples was detected in previous step. First by
detect the communitiesโ seeds and then uses these seeds to
generate the final communities.
A. Detect communities' seeds
LC-BDL algorithm creates communitiesโ seeds by
selecting the sub cliques without duplicates among the
adjacent list was created in the previous step. Then
retrieve back the maximal cliques instead of sub
cliques.LC-BDL algorithm detects four seeds from sub
cliques in adjacent tuples {1, 4, 5, 7}.
B. Generate communities
Merge each two communities' seeds if they share one
adjacent sub clique and loop until no possible merge to
produce the largest community among these communities'
seeds.LC-BDLresults for restricted community scalewith
depth level equal zero and threshold equal four
is| | = , = {N11, N12, N13, N14} an = {N10, N2,
N3, N6, N7, N8, N9} .
3.2.2. "Flexible community Scale" โ variant depth
level
The depth level value is variant and flexible according to
business target in "Flexible community scale". Detecting
communities in this scale based on detects the
communities among only maximal cliques of threshold
and its adjacent sub cliques of size equal maximal clique
size till given depth . If the maximal clique size is seven
and the depth level is 2 it means that the list will contain
all adjacent sub cliques for this maximal clique of size
equal five. This give the algorithm the ability to check if
there is any adjacent sub clique of size โ which
already are adjacent cliques because it belongs to a
sequences of adjacent sub cliques from one maximal
clique. To check if these sub cliques are adjacent with the
rest of all other maximal cliques or its adjacent sub
cliques. This gives LC-BDL algorithm the ability to detect
this type of communities that consists of a series of
adjacent sub cliques till given depth level.
Step 1: Generate adjacent list
The algorithm in the flexible community scale aims first to
generate the test maximal cliques among only the maximal
cliques was detected in first phase and according to
threshold of size where = , , โฆ < โ and depth
level where โ โ = , , , . . < โ . We
8. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3362-3375 (2017) ISSN: 0975-0290
3369
denote test maximal cliques by is the set of maximal
cliques of size greater than or equal .
= { || | }
As a simple illustration, we use equal four and since that
the triangle structure or 3-clique is a basic sub-structure of
any clique whose size is larger than three the depth level
equal one. it means that the algorithm will select all
maximal cliques its size greater than or equal four among
the seven maximal cliques was detected in previous phase
for the given sample network = {N11, N12, N13,
N14}, {N10, N2, N3, N9}, {N10, N3, N6, N8, N9}, and
{N3, N6, N7, N8}. Then LC-BDL algorithm generates
adjacent test list by first generates is all possible
sub cliques of size equal โ , where is the โ
tuple in , using the power set . we can
write = { โ || | = | | โ }.
As an illustration for contains vertices { N10, N3,
N6, N8, N9} the algorithm uses only all the five adjacent
sub cliques of size equal four ={(N10, N3, N6 ,
N8), (N10, N3 , N6 , N9), (N10, N3 , N8, N9 ), (N10, N6,
N8, N9 ), (N3, N6 , N8 , N9)}. Now define a set
= { , , โฆ , โ}
= {N11, N12, N13}, {N11, N12, N14},
{N11,N13,N14}, {N12, N13, N14}, {N10, N2, N3}, {N10,
N2, N9}, {N10, N3, N9}, {N2, N3, N9}, {N10, N3, N6, N8},
{N10, N3, N6, N9}, {N10, N3, N9, N8}, {N9, N3, N6, N8},
{ N3, N6, N7},{ N3, N6, N8}, { N3, N8, N7}, { N8, N6,
N7}. Consists of seventeen sub cliques for the four
maximal cliques when = and = . Then LC-BDL
algorithm define adjacent test list by the set as a list of
testing each sub clique of with the rest of .
= { โ || | = }
= {( ๐ , ), ( ๐ , ), โฆ , ( ๐๐, ๐)}
But to enhance the performance and computation cost the
LC-BDL algorithm avoids generating a test case between
two sub cliques if they belong to the same , in some
cases the depth level is greater than one the algorithm uses
only the minimum size for the adjacent sub cliques
because the goal is to check if any adjacent sub clique of a
maximal clique is adjacent to another maximal clique or
even belongs to a series of adjacent sub cliques to another
maximal clique. So the small adjacent sub cliques is better
to use instead of using all possible sub cliques for a
maximal clique to enhance the performance and reduce
computation cost to be available to use in real world
networks.
Finally to generate the adjacent list the algorithm perform
the needed computation for each tuple in by detecting
the cardinality for each sub clique andcalculate the
adjacently vertices between these two sub cliques for the
โ
tuple to be considered adjacent if one of two sub
cliques share greater than or equal its cardinality -1. LC-
BDL algorithm produce only twenty eight adjacent sub
cliques among the one hundred and eight tuples in as
final adjacent list for the flexible community scale using
the sample network as shown in Table9.
Table9. Step1 result for adjacent tuples in flexible community scale using
the sample network where the cardinality of the first sub clique
is| ๐ |the cardinality of the second sub clique is| |, ( ๐ , )
is the adjacent vertices between the two sub cliques.
๐ | ๐ | | | ( ๐ , ) ๐ | ๐ | | | ( ๐ , )
2 3 3 4 2 7 4 10 3 3
2 3 7 4 2 7 4 14 3 2
2 3 11 4 2 8 3 11 4 2
3 4 4 3 2 8 3 15 4 2
3 4 8 3 3 8 3 17 4 3
3 4 10 3 2 10 3 11 4 3
3 4 12 3 2 10 3 15 4 2
3 4 16 3 2 10 3 17 4 2
4 3 7 4 2 11 4 12 3 2
4 3 17 4 2 11 4 14 3 2
6 3 7 4 2 12 3 17 4 2
6 3 11 4 2 14 3 17 4 2
6 3 15 4 2 15 4 16 3 2
7 4 8 3 2 16 3 17 4 2
Step2: Detecting the communities.
Step2 aims to generate the communities among the
adjacent tuples was detected in previous step. First by
detect the communitiesโ seeds and then uses these seeds to
generate the final communities.
A. Detect communities' seeds
LC-BDL algorithm creates communitiesโ seeds by
selecting the sub cliques without duplicates among the
adjacent list was created in the previous step, then retrieve
back the main maximal clique instead of adjacent sub
clique.LC-BDL algorithm detects four seeds in adjacent
tuples {1, 4, 5, 7}.
B. Generate communities
Merge each two communities' seeds if they share one
adjacent sub clique and loop until no possible merge to
produce the largest community among these communities'
seeds. LC-BDLresults for flexible community scalewith
depth level equal one and threshold equal four is
| | = , = {N11, N12, N13, N14} an = {N10, N2,
N3, N6, N7, N8, N9}.
3.2.3. "Power community scale" - Maximum depth
level
The depth level value in power community scale is
maximum, This scale based on detect the communities
among all the maximal cliquesโ adjacent sub cliques of
size equal three since that the triangle structure or 3-clique
is a basic sub-structure of any clique whose size is larger
than three to check that no sub cliques of a maximal clique
belongs to series of adjacent sub cliques for another
maximal clique. It helps to detect the largest communities
in a given network without restriction for threshold size
as the restricted community scale where depth level equal
zero or even in the flexible community scale where depth
level is variant.
Step 1: Generate adjacent list
The algorithm in the power community scale aims first to
generate the test maximal cliques among the maximal
cliques was detected in first phase and according to
threshold of size where = , , โฆ < โ and depth
level where โ โ = , , , . . < โ. We denote
test maximal cliques by is the set of maximal cliques
of size greater than or equal .
=
As a simple illustration, we use TMCset equal MC set was
created in first phase it means that the algorithm will select
all the seven maximal cliques was detected in previous
9. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3362-3375 (2017) ISSN: 0975-0290
3370
phase for the given sample network, = { N11, N12,
N13, N14},{ N12, N14, N15},{ N11, N12, N17},{ N10, N2,
N3, N9},{ N10, N3, N6, N8, N9},{ N3, N4, N6} and { N3,
N6, N7, N8}. Then LC-BDL algorithm generates adjacent
test list by first generates is all possible sub cliques
of size equal 3, where is the โ
tuple in , using
the power set . we can write = { โ
|| | = }.As an illustration for ={N11,
N12, N13, N14} the algorithm uses only all the four
adjacent sub cliques of size equal three = {(N11,
N12, N13), (N11, N12, N14), (N11, N13, N14), (N12, N13,
N14)}.Now define a set
= { , , โฆ , โ}
Therefore the depth level equal max in the power
community scale thus consists of twenty five sub
cliques for the seven maximal cliques. = {(N11,
N12, N13), (N12, N14, N15), (N11, N12, N17), (N10, N2,
N3), (N10, N3, N6), (N3, N4, N6), (N3, N6, N7), (N11,
N12, N14), (N10, N2, N9), (N10, N3, N8), (N3, N6, N8),
(N11, N13, N14), (N10, N3, N9), (N10, N6, N8), (N3, N7,
N8), (N12, N13, N14), (N2, N3, N9), ( N3, N6, N8), (N6,
N7, N8), (N10, N3, N9), (N10, N6, N9), (N3, N6, N9),
(N10, N8, N9), (N3, N8, N9), (N6, N8, N9)}. Consider the
set
= { , , , , โฆ,
โ, โ }.
Then LC-BDL algorithm define adjacent test list by the set
as a list of testing each sub clique of with the
rest of .
= { โ || | = }
= {( ๐ , ), ( ๐ , ), โฆ , ( ๐๐, ๐)}
Two main enhancement used in the algorithm to enhance
the performance and reduce computation cost. The LC-
BDL algorithm avoids generating a test case between two
sub cliques if they belong to the same . The
algorithm also uses the smallest adjacent sub cliques for
each maximal clique instead of testing all adjacent sub
clique which increase the time and computation cost and
therefore make the suitable to use on real networks.
Finally to generate the adjacent list the algorithm perform
the needed computation for each tuple in by detecting
the cardinality for each sub clique andcalculate the
adjacently vertices between these two sub cliques for the
โ
tuple to be considered adjacent if one of two sub
cliques share greater than or equal its cardinality -1. LC-
BDL algorithm produces forty one adjacent sub cliques
among the two hundred and thirty seven tuples in as
final adjacent list for the power community scale using the
sample network as shown in Table10.
Table10. A sample of step1 result for adjacent tuples in Power
community scale using the sample network where the cardinality of the
first sub clique is| ๐ |the cardinality of the second sub clique is| |,
( ๐ , ) is the adjacent vertices between the two sub cliques.
๐ | ๐ | | | ( ๐ , )
1 3 3 3 2
2 3 8 3 2
2 3 16 3 2
3 3 8 3 2
4 3 5 3 2
4 3 10 3 2
4 3 20 3 2
Step2: Detecting the communities.
Step2 aims to generate the communities among the
adjacent tuples was detected in previous step. First by
detect the communitiesโ seeds and then uses these seeds to
generate the final communities.
A. Detect communities' seeds
LC-BDL algorithm creates communitiesโ seeds by
selecting the sub cliques without duplicates among the
adjacent list was created in the previous step. Then
retrieve back main maximal clique instead of sub
cliques.LC-BDL algorithm detects seven seeds in adjacent
tuples {1, 2, 3, 4, 5, 6, 7}.
B. Generate communities
Merge each two communities' seeds if they share one
adjacent sub clique and loop until no possible merge to
produce the largest community among these communities'
seeds.LC-BDLresults for flexible community scaleis| | =
, = {N11, N12, N13, N14, N15, N17} and = {N10,
N2, N3, N4, N6, N7, N8, N9}.
IV. EXPERIMENT
To evaluate the efficiency and simplicity of the proposed
algorithm, Zacharyโs Karate Club Network isa standard
real world networks generally considered as benchmark
for community detection are used as experimental dataset
for the algorithm implementation.It is an undirected, un-
weighted network having 34 nodes and 78 edges as shown
in Table11. [11]
Table11.Zacharyโs Karate Club Network edges. [11]
Zacharyโs Karate Club Network edges
2, 1 7, 6 11, 6 18, 1 28, 25 33, 3 33, 32 34, 24
3, 1 8, 1 12, 1 18, 2 29, 3 33, 1 34, 9 34, 27
3, 2 8, 2 13, 1 20, 1 30, 24 33, 15 34, 10 34, 28
4, 1 8, 3 13, 4 20, 2 30, 27 33, 16 34, 14 34, 29
4, 2 8, 4 14, 1 22, 1 31, 2 33, 19 34, 15 34, 30
4, 3 9, 1 14, 2 22, 2 31, 9 33, 21 34, 16 34, 31
5, 1 9, 3 14, 3 26, 24 32, 1 33, 23 34, 19 34, 32
6, 1 10, 3 14, 4 26, 25 32, 25 33, 24 34, 20 34, 33
7, 1 11, 1 17, 6 28, 3 32, 26 33, 30 34, 21
7, 5 11, 5 17, 7 28, 24 32, 29 33, 31 34, 23
4.1. Phase1: Enumerate Maximal Cliques
NMC method discovers thirteen maximal cliques in a
Zacharyโs Karate Club network. As a final result for phase
one, ={1, 13, 4}, {1, 14, 2, 3, 4}, {17, 6, 7}, {1, 18, 2},
{1, 2, 20}, {1, 2, 22}, {25, 26, 32}, {24, 28, 34}, {29, 32,
34}, {24, 30, 33, 34}, {31, 33, 34, 9}, {1, 6, 7} and {1, 2, 3,
4, 5}.
4.2. Phase2: Discover the communities
4.2.1. "Restricted community Scale" - Zero depth
level
Step 1: Generate adjacent list
The algorithm uses = and depth level = in
restricted community scale and according to =
{ || | }, is all maximal cliques its size
greater than or equal four among the thirteen maximal
cliques was detected in previous phase for Zacharyโs
Karate Club network ={{1, 14, 2, 3, 4}, {24, 30, 33,
34}, {31, 33, 34, 9} and {1, 2, 3, 4, 5}. Then LC-BDL
algorithm generates adjacent test list by first generates
10. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3362-3375 (2017) ISSN: 0975-0290
3371
, where = { โ || | = | | โ
}. Therefore the depth level = thus = =
{{1, 14, 2, 3, 4}, {24, 30, 33, 34}, {31, 33, 34, 9} and {1, 2,
3, 4, 5}}. Then LC-BDL algorithm define adjacent test list
by the set and produce only five adjacent sub cliques
among the ten tuples in as final adjacent list for the
restricted community scale using the Zacharyโs Karate
Club network as shown in Table12.
Table12. Step1 result for restricted community scale using
the Zachary network where the cardinality of the first sub
clique is| ๐ |, the cardinality of the second sub clique
is| |, ( ๐ , ) is the adjacent vertices between
the two sub cliques and the R column equal 0 for non-
adjacent tuples and 1 show the adjacent tuples.
๐จ ๐๐ |๐จ ๐๐| ๐จ ๐๐ |๐จ ๐๐| ๐ (๐จ ๐๐, ๐จ ๐๐) R
1 5 1 5 5 1
1 5 3 4 0 0
1 5 4 4 0 0
1 5 5 5 4 1
3 4 3 4 4 1
3 4 4 4 2 0
3 4 5 5 0 0
4 4 4 4 4 1
4 4 5 5 0 0
5 5 5 5 5 1
Step2: Detecting the communities.
A. Detect communities' seeds
LC-BDL algorithm detects four seeds in adjacent tuples in
set {2, 10, 11, 13}.
B. Generate communities
LC-BDL results for restricted community scalewith depth
level = and threshold = is| | = , = {1, 2, 3, 4,
8, 14}, = {24, 30, 33, 34} and = {9, 31, 33, 34}.
4.2.2. "Flexible community Scale" โ variant depth level
Step 1: Generate adjacent list
The algorithm uses = and since that the triangle
structure or 3-clique is a basic sub-structure of any clique
whose size is larger than three the depth level = . And
according to = { || | }, = {{1, 14, 2,
3, 4}, {24, 30, 33, 34}, {31, 33, 34, 9} and {1, 2, 3, 4, 5}.
Then LC-BDL algorithm generates adjacent test list by
first generates is = { โ || | =
| | โ }, Now define a set
= { , , โฆ , โ} then ={(1,
14, 2, 3), (24, 30, 33), (31, 33, 34), (1, 2, 3, 4), (1, 14, 2,
4),(24, 30, 34), (31,33,9),(1, 2, 3, 8), (1, 14, 3, 4), (24, 33,
34), (31, 34, 9),(1, 2, 4, 8), (1, 2, 3, 4), (30, 33, 34), (33,
34, 9), (1, 3, 4, 8), (14, 2, 3, 4), (2, 3, 4,8)}. Consists of
eighteen sub cliques for the four maximal cliques when
= and = . Then LC-BDL algorithm define
adjacent test list by the set and produce only seventeen
adjacent sub cliques among the one hundred and twenty
tuples in as final adjacent list for flexible community
scale using the sample network as shown in Table13.
Table13. Step1 result for flexible community scale using
the Zachary network where the cardinality of the first sub
clique is| ๐ |the cardinality of the second sub clique
is| |, ( ๐ , ) is the adjacent vertices between
the two sub cliques.
๐ | ๐ | | | ( ๐ , )
1 4 4 4 3
1 4 8 4 3
3 3 10 3 2
3 3 14 3 2
4 4 5 4 3
4 4 9 4 3
4 4 13 4 4
4 4 17 4 3
5 4 12 4 3
8 4 13 4 3
9 4 16 4 3
10 3 15 3 2
12 4 13 4 3
13 4 16 4 3
13 4 18 4 3
14 3 15 3 2
17 4 18 4 3
Step2: Detecting the communities.
A. Detect communities' seeds
LC-BDL algorithm detects four seeds from sub cliques
was created in the previous step by retrieve back the
maximal cliques instead of sub cliques in adjacent tuples
in set{2, 10, 11, 13}.
B. Generate communities
LC-BDLresults for flexible community scalewith depth
level = and threshold = is | | = , = {1, 2, 3, 4,
8, 14} and = {9, 24, 30, 31, 33, 34}.
4.2.3. "Power community scale" - Maximum depth
level
Step 1: Generate adjacent list
According to = , the algorithm select the thirteen
maximal cliques was detected in previous phase , =
{1, 13, 4}, {1, 14, 2, 3, 4}, {17, 6, 7}, {1, 18, 2}, {1, 2, 20},
{1, 2, 22}, {25, 26, 32}, {24, 28, 34}, {29, 32, 34}, {24, 30,
33, 34}, {31, 33, 34, 9}, {1, 6, 7} and {1, 2, 3, 4, 5}. Then
LC-BDL algorithm generates adjacent test list by first
generates where = { โ || | =
}. Now define a set
= { , , โฆ , โ}. Therefore the
depth level equal max in the power community scale
thus consists of thirty seven sub cliques for the
thirteen maximal cliques as shown in Table14.
Table14. Thirty seven test sub cliques adjacent sub cliques
for the thirteen maximal cliques for power community
scale
๐ด๐ช
{1,13,4} {14,2,4} {1,2,22} {30,33,34} {1,2,4} {2,4,8}
{1,14,2} {1,3,4} {25,26,32} {31,33,34} {1,3,4} {3,4,8}
{1,14,3} {14,3,4} {24,28,34} {31,33,9} {2,3,4}
{1,2,3} {2,3,4} {29,32,34} {31,34,9} {1,2,8}
{14,2,5} {17,6,7} {24,30,33} {33,34,9} {1,3,8}
{1,14,4} {1,18,2} {24,30,34} {1,6,7} {2,3,8}
{1,2,4} {1,2,20} {24,33,34} {1,2,3} {1,4,8}
Then LC-BDL algorithm define adjacent test list by the set
and produces eighty tuples cliques among the five
hundred and sixty four tuples in as final adjacent list
11. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3362-3375 (2017) ISSN: 0975-0290
3372
for the power community scale using Zacharyโs Karate
Club network.
Table15.A sample of Step1 result for adjacent tuples in
power community scale using the Zachary network where
the cardinality of the first sub clique is| ๐ |the
cardinality of the second sub clique is| |,
( ๐ , ) is the adjacent vertices between the two
sub cliques.
๐ | ๐ | | | ( ๐ , )
1 3 6 3 2
1 3 7 3 2
1 3 9 3 2
1 3 29 3 2
1 3 30 3 2
1 3 35 3 2
2 3 13 3 2
2 3 14 3 2
2 3 15 3 2
2 3 28 3 2
2 3 29 3 2
2 3 32 3 2
3 3 28 3 2
3 3 30 3 2
3 3 33 3 2
Step2: Detecting the communities.
A. Detect communities' seeds
LC-BDL algorithm detects thirteen seeds in adjacent
tuples {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13}.
B. Generate communities
LC-BDLresults for power community scaleis| | = ,
={1, 2, 3, 4, 8, 13, 14, 18, 20}, ={1, 6, 7, 17}, ={25,
26, 32}, ={9, 24, 28, 30, 31, 33, 34} and ={29, 32, 34}.
V. RESULTS AND EVALUATION
Communities are detected for Zacharyโs Karate Club
network using the proposed algorithm and CPM method,
in literature it is found that generally value of ranges
from 3 to 6. Here value is taken as 4. First part of the
work success to overcome the shortfalls of CPM method
as a result to the way of enumerating maximal clique,
which based on brute force algorithm its cost is
proportional to the number of candidate solutions. For
instance, for a complete graph of only 100 nodes, the
algorithm will generate at least 299
- 1 different cliques. [5]
The proposed method NMC succeeded to discover and
enumerate maximal cliques producing the same result as
the brute force algorithm of CPM method but without need
to evaluate all the number of candidate solutions as brute
force algorithm. NMC method discovers thirteen maximal
cliques in a Zacharyโs Karate Club network, = {1, 13,
4}, {1, 14, 2, 3, 4}, {17, 6, 7}, {1, 18, 2}, {1, 2, 20}, {1, 2,
22}, {25, 26, 32}, {24, 28, 34}, {29, 32, 34}, {24, 30, 33,
34}, {31, 33, 34, 9}, {1, 6, 7} and {1, 2, 3, 4, 5}.
Second part of the work success to overcome the shortfall
of CPM method occurs due to the problem of missing out
many vertices as a result to the restriction of using
threshold value. While CPM only considers the fully
connected sub graphs of size the neglect Sub graphs
containing many cliques which may be part of existing
community or generate new communities in the existing
graph. This might give a not clear community structure
and the poor nodes coverage problem. To overcome the
shortcoming mentioned earlier the proposed algorithm
produce three different scales with three different depth
levels for the discoveredcommunities.First "restricted
community scale" in which the depth level value equal
zero it means that it detects the communities among only
maximal cliques of threshold size and depth level
equal zero. Second "flexible community scale" in which
the depth level value is variant and flexible according to
business target for detecting the communities, it means
that it detects the communities among maximal cliques of
threshold size and its adjacent sub cliques of size equal
maximal clique size till given depth . This leads to
enlarge the detected communities in restricted community
scale by integrating these communities into larger
communities and detect the hidden pattern of relation
among these communities was discovered in restricted
community scale. Third "power community scale"in which
the depth level value is maximum to detect the largest
communities could be reached by testing all the maximal
cliques adjacent sub cliques of size equal three since that
the triangle structure or 3-clique is a basic sub-structure of
any clique of size is larger than three. This checks that no
adjacent sub cliques for a maximal clique belongs to series
of adjacent sub cliques for another maximal clique. This
helps to detect the largest communities in a given network
without restriction to threshold size and help to avoid
neglected nodes or cliques that may be part of existing
community or generate new communities in the existing
graph. CPM detects three communities| | = , ={1, 2,
3, 4, 8, 14}, ={24, 30, 33, 34}, ={9, 31, 33, 34}.
Vertices 33 and 34 are overlapped between last two
communities. Total 22 vertices among 34 vertices are not
included in any community though they are connected to
the network. The covered nodes percentage equal 35.2%.
The proposed algorithm cover this shortcoming by
producing three different community scales as follow
trying to include these vertices to the detected
communities or even detect new communities among
them on the basis of their depth level as discussed earlier.
Initially with = , LC-BDL restricted community scale
produce same result as CPM method but without the cost
of computing the adjacently matrix as CPM, it detects
three communities| | = which are ={1, 2, 3, 4, 8,
14}, ={24, 30, 33, 34}, ={9, 31, 33, 34}. Vertices 33
and 34 are overlapped between last two communities.
Total 22 vertices among 34 vertices are not included in
any community and the covered nodes percentage equal
35.2%. Flexible community scale successes to integrate the
three discovered communities in the CPM method and
restricted community scale with threshold = and
depth level = in two large communities, LC-BDL
flexible community scale result is | | = , = {1, 2, 3, 4,
8, 14} and = {9, 24, 30, 31, 33, 34} with the same
covered nodes percentage equal 35.2%, no overlapping
nodes between the discovered communities. While the
power community scale success to double the node
covered ratio, make it equal 70.50% with total 24 vertices
among 34 vertices are included in the discovered
communities and also success to change the community
12. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3362-3375 (2017) ISSN: 0975-0290
3373
structure discovered by CPM method and the two previous
community scales, LC-BDL power community scale result
is| | = , ={1, 2, 3, 4, 8, 13, 14, 18, 20}, ={1, 6, 7,
17}, ={25, 26, 32}, ={9, 24, 28, 30, 31, 33, 34} and
={29, 32, 34} with 6 vertices are overlapped between
discovered communities. The details of community
structures detected by CPM and LC-BDL algorithm for
Zacharyโs Karate Club network for k value as 4 are
summarized and compared in Table16 and Fig. [1-3].
Table16. . : depth level; : threshold value; | |:
tuples cardinality of adjacent test list; |๐ |: adjacent
tuples cardinality of adjacent test list; : number of
maximal clique seeds; | |: number of discovered
communities; : number of vertices covered; : % of
nodes covered; : Number of nodes uncovered; :
Number of overlapped nodes
Algorithm . | | |๐ | | |
CPM 4 - - - 3 12 22 2
35.2%
LC-BDL
R.C.S
0 4 10 5 4 3 12 22 2
35.2%
F.C.S
1 4 121 17 4 2 12 22 -
35.2%
P.C.S
Max - 564 80 13 5 24 10 6
70.5%
Figure1.| | Number of discovered communities
Figure2.CRdenote % of nodes covered
Figure3.OV Number of overlapped nodes
The LC-BDL set two types of parameters to ensure the
quality of the goodness and performance metrics, while
our algorithm detects cliques, adjacent k-cliques and
overlapping communities, which all have clear definitions
so the evaluation will depend on verify whether extracted
communities satisfy the definition or not. While to
evaluate the suitability and validity of our proposed
algorithm in identifying the overlapping community
detection in large scale networks, the average clustering
coefficient and cluster density are used. For both CPM
method and LC-BDL algorithm with value as 4, LC-
BDL algorithm and CPM have the same results in
restricted community scale. And very high ratio for
flexible and power community scale. The details are
summarized and compared in Table17 and Fig. 4.
Table17.| |denotes number of discovered communities;
: % of the community density;
: % of the community cluster
coefficient
โ | |
CPM 3
0.933 0.933
1.000 1.000
1.000 1.000
LC-BDL
R.C.S 3
0.933 0.933
1.000 1.000
1.000 1.000
F.C.S 2
0.933 0.933
0.733 0.867
P.C.S 5
0.488888889 0.836
0.833333333 0.833
1 1.000
0.619047619 0.819
1 1.000
0
5
10
CPM RCS FCS PCS
|๐ถ|
|C|
0.00
50.00
100.00
CPM RCS FCS PCS
CR
CR
0.00
5.00
10.00
CPM RCS FCS PCS
OV
OV
13. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3362-3375 (2017) ISSN: 0975-0290
3374
Figure4.| | % of the average cluster coefficient (CC) and
density for discovered communities.
VI. CONCLUSION AND FUTURE WORK
In this work overlapping communities are identi๏ฌed in
large scale online networks. New proposed clique based
overlapping community detection algorithm has been
studied. To quantify the discovered community structure
the average clustering coefficient and cluster density are
used. A benchmark classic real world network is used to
test the algorithms. In the ๏ฌrst part of work, a new method
is proposed for the maximal clique problem which
overcomes the problem of enumerating maximal clique in
CPM method which based on brute force algorithm
systematically enumerating all possible candidates for the
solution and checking whether each candidate satisfies the
problem's statement. While this algorithm will always find
a solution if it exists, its cost is proportional to the number
of candidate solutions the brute force algorithm becomes
impractical for large networks. For instance, for a
complete graph of only 100 nodes, the algorithm will
generate at least 299
- 1 different cliques starting from any
node in the graph. The proposed NMC method enhances
the process of enumerating maximal cliques compared to
the brute force algorithm by pruning specific nodes and
edges. The proposed NMC method based on enumerating
vertices maximal cliques by reducing the search vertices in
two steps, first selects only the adjacent vertices for the
tested vertex and excludes the vertices cannot be a part of
existing maximal clique for this vertex. Then generate
maximal clique among the rest vertices according to
simple and native mathematical computation instead of
test all candidate solutions as CPM method and make the
process of enumerating maximal cliques fast and efficient.
Hence, for large graphs many nodes and edges will be
pruned, which will reduce the computation drastically. In
second part of the work, The proposed algorithm
efficiently detects overlapping communities using three
different community scales based on three different depth
level to detect the largest community in given network and
assures high vertices coverage for connected network
which overcomes the poor coverage problem of the CPM
method. It is observed that based on the average
clustering coefficient, cluster density and vertices
coverage, proposed method gives better community
structure compared to the clique percolation method. It can
be concluded from the result that the community structure
depends on the depth level for these communities and
given threshold . The community structure discovered by
the CPM method integrated into larger communities and
new communities discovered with high vertices cover ratio
using LC-BDL algorithm.
Overlapping community detection is still a challenge.
Though there are several proposed methods, but most of
them not applicable to use for real large scale graphs due
to the massive data for these graphs. Taking a huge
amount of processing time. So emphasis should be given
to e๏ฌ ective algorithms which will be able to detect
communities in large scale online networks in allowable
time. In this work only un-weighted and undirected
network has been taken into consideration. In future
weighted and directed networks are needed to be
considered for community detection. Also not covered
vertices in the network may be assigned to the discovered
communities using one of similarity measure to increase
the vertices cover ratio. It is a suggested to apply the
proposed LC-BDL algorithm using different data domains
and study its accuracy and capacity on different scopes
and natures.
REFERENCES
[1] Bedi, Punam, and Chhavi Sharma. "Community
detection in social networks."Wiley Interdisciplinary
Reviews: Data Mining and Knowledge Discovery 6.3
(2016): 115-135.
[2] Cuvelier, Etienne, and Marie-AudeAufaure. "Graph
mining and communities detection." Business
Intelligence.Springer Berlin Heidelberg, 2012.117-
138.
[3] Adedoyin-Olowe, Mariam, Mohamed MedhatGaber,
and Frederic Stahl. "A survey of data mining
techniques for social media analysis." arXiv preprint
arXiv:1312.4617 (2013).
[4] Afsarmanesh, Nazanin, and MatteoMagnani.
"Finding overlapping communities in multiplex
networks." arXiv preprint arXiv:1602.03746 (2016).
[5] Zafarani, Reza, Mohammad Ali Abbasi, and Huan
Liu. Social media mining: an introduction.
Cambridge University Press, 2014.
[6] McCreesh, Ciaran, et al. "Clique and constraint
models for maximum common (connected) subgraph
problems." International Conference on Principles
and Practice of Constraint Programming.Springer
International Publishing, 2016.
[7] Reid, Fergal, Aaron McDaid, and Neil Hurley.
"Percolation computation in complex
networks." Advances in Social Networks Analysis
and Mining (ASONAM), 2012 IEEE/ACM
International Conference on. IEEE, 2012.
0.000
0.200
0.400
0.600
0.800
1.000
CPM RCS FCS PCS
Avg(Density) Avg(CC)
14. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3362-3375 (2017) ISSN: 0975-0290
3375
[8] Palla, Gergely, et al. "k-clique Percolation and
Clustering." Handbook of Large-Scale Random
Networks.Springer Berlin Heidelberg, 2008.369-408.
[9] Wang, Jianxin, et al. "Identifying protein complexes
from interaction networks based on clique
percolation and distance restriction." BMC
genomics 11.2 (2010): S10.
[10] McDaid, Aaron, and Neil Hurley. "Detecting highly
overlapping communities with model-based
overlapping seed expansion." Advances in Social
Networks Analysis and Mining (ASONAM), 2010
International Conference on. IEEE, 2010.
[11] Zachary, Wayne W. "An information flow model for
conflict and fission in small groups." Journal of
anthropological research 33.4 (1977): 452-473.
[12] Palla, Gergely, et al. "Uncovering the overlapping
community structure of complex networks in nature
and society." arXiv preprint physics/0506133 (2005).
[13] Nandi, G., and A. Das. "A survey on using data
mining techniques for online social network
analysis." Int. J. Comput. Sci. Issues (IJCSI) 10.6
(2013): 162-167.
[14] Pattabiraman, Bharath, et al. "Fast Algorithms for the
Maximum Clique Problem on Massive Sparse
Graphs." WAW. 2013.
[15] Palsetia, Diana, et al. "Clique guided community
detection." Big Data (Big Data), 2014 IEEE
International Conference on.IEEE, 2014.
[16] Leskovec, Jure, Kevin J. Lang, and Michael
Mahoney. "Empirical comparison of algorithms for
network community detection." Proceedings of the
19th international conference on World wide web.
ACM, 2010.
[17] Yang, Jaewon, Julian McAuley, and Jure Leskovec.
"Community detection in networks with node
attributes." Data Mining (ICDM), 2013 IEEE 13th
international conference on.IEEE, 2013.
[18] Harenberg, Steve, et al. "Community detection in
largeโscale networks: a survey and empirical
evaluation." Wiley Interdisciplinary Reviews:
Computational Statistics 6.6 (2014): 426-439.
[19] Lancichinetti, Andrea, Santo Fortunato, and
JรกnosKertรฉsz. "Detecting the overlapping and
hierarchical community structure in complex
networks." New Journal of Physics 11.3 (2009):
033015.
[20] Du, Nan, et al. "Community detection in large-scale
social networks." Proceedings of the 9th WebKDD
and 1st SNA-KDD 2007 workshop on Web mining
and social network analysis.ACM, 2007.
[21] Shen, Huawei, et al. "Detect overlapping and
hierarchical community structure in
networks." Physica A: Statistical Mechanics and its
Applications 388.8 (2009): 1706-1712.
[22] Evans, T. S., and Renaud Lambiotte. "Line graphs,
link partitions, and overlapping
communities." Physical Review E 80.1 (2009):
016105.
[23] Evans, Tim S., and Renaud Lambiotte. "Line graphs
of weighted networks for overlapping
communities." The European Physical Journal B-
Condensed Matter and Complex Systems 77.2
(2010): 265-272.
[24] Evans, Tim S. "Clique graphs and overlapping
communities." Journal of Statistical Mechanics:
Theory and Experiment 2010.12 (2010): P12037.
[25] Lee, Conrad, et al. "Detecting highly overlapping
community structure by greedy clique
expansion." arXiv preprint arXiv:1002.1827 (2010).
[26] Gregory, Steve. "A fast algorithm to find overlapping
communities in networks." Machine learning and
knowledge discovery in databases (2008): 408-423.
[27] Gregory, Steve. "Finding overlapping communities
using disjoint community detection
algorithms." Complex networks (2009): 47-61.
[28] Adamcsek, Balรกzs, et al. "CFinder: locating cliques
and overlapping modules in biological
networks." Bioinformatics 22.8 (2006): 1021-10