Complex networks provide means to represent different kinds of networks with multiple features. Most biological, sensor and social networks can be represented as a graph depending on the pattern of connections among their elements. The goal of the graph clustering is to divide a large graph into many clusters based on various similarity criteria’s. Political blogs as standard social dataset network, in which it can be considered as blog-blog connection, where each node has political learning beside other attributes. The main objective of work is to introduce a graph clustering method in social network analysis. The proposed Structure-Attribute Similarity (SAS-Cluster) able to detect structures of community, based on nodes similarities. The method combines topological structure with multiple characteristics of nodes, to earn the ultimate similarity. The proposed method is evaluated using well-known evaluation measures, Density, and Entropy. Finally, the presented method was compared with the state-of-art comparative method, and the results show that the proposed method is superior to the comparative method according to the evaluations measures.
Clustering in Aggregated User Profiles across Multiple Social Networks IJECEIAES
A social network is indeed an abstraction of related groups interacting amongst themselves to develop relationships. However, toanalyze any relationships and psychology behind it, clustering plays a vital role. Clustering enhances the predictability and discoveryof like mindedness amongst users. This article’s goal exploits the technique of Ensemble Kmeans clusters to extract the entities and their corresponding interestsas per the skills and location by aggregating user profiles across the multiple online social networks. The proposed ensemble clustering utilizes known K-means algorithm to improve results for the aggregated user profiles across multiple social networks. The approach produces an ensemble similarity measure and provides 70% better results than taking a fixed value of K or guessing a value of K while not altering the clustering method. This paper states that good ensembles clusters can be spawned to envisage the discoverability of a user for a particular interest.
The study about the analysis of responsiveness pair clustering tosocial netwo...acijjournal
In this study, regional (cities, towns and villages
) data and tweet data are obtained from Twitter, an
d
extract information of "purchase information (Where
and what bought)" from the tweet data by
morphological analysis and rule-based dependency an
alysis. Then, the "The regional information" and th
e
"Theinformation of purchase history (Where and wha
t bought information)" are captured as bipartite
graph, and Responsiveness Pair Clustering analysis
(a clustering using correspondence analysis as
similarity measure) is conducted. In this study, si
nce it was found to be difficult to analyze a netwo
rk such
as bipartite graph having limitations in links by u
sing modularity Q, responsiveness is used instead o
f
modularity Q as similarity measure. As a result of
this analysis, "regional information cluster" which
refers
to similar "Theinformation of purchase history" nod
es group is generated. Finally, similar regions are
visualized by mapping the regional information clus
ter on the map. This visualization system is expect
ed to
contribute as an analytical tool for customers’ pur
chasing behaviour and so on.
Centrality Prediction in Mobile Social NetworksIJERA Editor
By analyzing evolving centrality roles using time dependent graphs, researchers may predict future centrality values. This may prove invaluable in designing efficient routing and energy saving strategies and have profound implications on evolving social behavior in dynamic social networks. In this paper, we propose a new method to predict centrality values of nodes in a dynamic environment. The proposed method is based on calculating the correlation between current and past measure of centrality for each corresponding node, which is used to form a composite vector to represent the given state of centralities. The performance of the proposed method is evaluated through simulated predictions on data sets from real mobile networks. Results indicate significantly low prediction error rate occurs, with a suitable implementation of the proposed method.
Clustering in Aggregated User Profiles across Multiple Social Networks IJECEIAES
A social network is indeed an abstraction of related groups interacting amongst themselves to develop relationships. However, toanalyze any relationships and psychology behind it, clustering plays a vital role. Clustering enhances the predictability and discoveryof like mindedness amongst users. This article’s goal exploits the technique of Ensemble Kmeans clusters to extract the entities and their corresponding interestsas per the skills and location by aggregating user profiles across the multiple online social networks. The proposed ensemble clustering utilizes known K-means algorithm to improve results for the aggregated user profiles across multiple social networks. The approach produces an ensemble similarity measure and provides 70% better results than taking a fixed value of K or guessing a value of K while not altering the clustering method. This paper states that good ensembles clusters can be spawned to envisage the discoverability of a user for a particular interest.
The study about the analysis of responsiveness pair clustering tosocial netwo...acijjournal
In this study, regional (cities, towns and villages
) data and tweet data are obtained from Twitter, an
d
extract information of "purchase information (Where
and what bought)" from the tweet data by
morphological analysis and rule-based dependency an
alysis. Then, the "The regional information" and th
e
"Theinformation of purchase history (Where and wha
t bought information)" are captured as bipartite
graph, and Responsiveness Pair Clustering analysis
(a clustering using correspondence analysis as
similarity measure) is conducted. In this study, si
nce it was found to be difficult to analyze a netwo
rk such
as bipartite graph having limitations in links by u
sing modularity Q, responsiveness is used instead o
f
modularity Q as similarity measure. As a result of
this analysis, "regional information cluster" which
refers
to similar "Theinformation of purchase history" nod
es group is generated. Finally, similar regions are
visualized by mapping the regional information clus
ter on the map. This visualization system is expect
ed to
contribute as an analytical tool for customers’ pur
chasing behaviour and so on.
Centrality Prediction in Mobile Social NetworksIJERA Editor
By analyzing evolving centrality roles using time dependent graphs, researchers may predict future centrality values. This may prove invaluable in designing efficient routing and energy saving strategies and have profound implications on evolving social behavior in dynamic social networks. In this paper, we propose a new method to predict centrality values of nodes in a dynamic environment. The proposed method is based on calculating the correlation between current and past measure of centrality for each corresponding node, which is used to form a composite vector to represent the given state of centralities. The performance of the proposed method is evaluated through simulated predictions on data sets from real mobile networks. Results indicate significantly low prediction error rate occurs, with a suitable implementation of the proposed method.
Studies towards heterogeneous Mobile Adhoc Network (MANET) as well as inter-domain routing is still in much infancy stage. After reviewing the existing literaturs, it was found that problems associated with scalability, interoperability, and security is not defined up to the mark as it should be part of pervasive computing in future networks. Moreover, it was found that existing studies do not consider the complexities associated with heterogeneous MANET to a large extent leading to narrowed research scope. Hence, this paper introduces a novel scheme called as Secure, Scalable and Interoperable (SSI )routing, where a joint algorithm is designed, developed, and implemented. The outcome exhibits the correctness of this scheme by simulation assisted by analysis for inter-domain routing.
Scalable Local Community Detection with Mapreduce for Large NetworksIJDKP
Community detection from complex information networks draws much attention from both academia and
industry since it has many real-world applications. However, scalability of community detection algorithms
over very large networks has been a major challenge. Real-world graph structures are often complicated
accompanied with extremely large sizes. In this paper, we propose a MapReduce version called 3MA that
parallelizes a local community identification method which uses the $M$ metric. Then we adopt an
iterative expansion approach to find all the communities in the graph. Empirical results show that for large
networks in the order of millions of nodes, the parallel version of the algorithm outperforms the traditional
sequential approach to detect communities using the M-measure. The result shows that for local community
detection, when the data is too big for the original M metric-based sequential iterative expension approach
to handle, our MapReduce version 3MA can finish in a reasonable time.
Immune-Inspired Method for Selecting the Optimal Solution in Semantic Web Ser...IJwest
The increasing interest in developing efficient and effective optimization techniques has conducted researchers to turn their attention towards biology. It has been noticed that biology offers many clues for designing novel optimization techniques, these approaches exhibit self-organizing capabilities and permit the reachability of promising solutions without the existence of a central coordinator. In this paper we handle the problem of dynamic web service composition, by using the clonal selection algorithm. In order to assess the optimality rate of a given composition, we use the QOS attributes of the services involved in the workflow as well as, the semantic similarity between these components. The experimental evaluation shows that the proposed approach has a better performance in comparison with other approaches such as the genetic algorithm.
The world has many natural systems that are so complex to be understood easily. This creates a need to have simple
principles or systems that capture the complexity of the world. The simple systems make it easier for many people to
understand the world by representing the complex world in a more straightforward way (Stefan, 2003). Many objects
and projects are seen to be a network of processes or substances. Graphs and networks have been used widely in
different projects for different reasons by project managers mostly. There are techniques such as critical path analysis
that make use of graphs and networks and are applied by project managers and all the staff involved in projects. These
methods are used to ensure smooth planning and control of projects. However, the techniques have to be applied
correctly to achieve the desired objective. This paper looks at the impact of graphs and networks in minimizing the costs
of a project or product. From this research, it can be inferred that the techniques such as critical path method, that make
use of graphs and networks, play a significant role in determining and hence reducing the product cost. This is done by
making the right decisions regarding the resources and time most appropriate for a project. The paper shows clearly
how these techniques are applied in a project to determine project duration and hence minimize the cost.
An Improved PageRank Algorithm for Multilayer NetworksSubhajit Sahu
Highlighted notes on An Improved PageRank Algorithm for Multilayer Networks.
While doing research work under Prof. Kishore Kothapalli.
The authors use a layer-layer weight to provide an additional factor to PR which they then use in the 1st step of SpreadMax algorithm to show that their modified pagerank is better than standard PR in selecting key nodes. I didnt properly understand this.
Applications of networks:
Social networks, Air traffic systems, Transportation networks, Citation networks, Biological systems (infection spreading).
Multilayer networks can be thought of as a large graph subdivided into multiple groups (layers). This probably makes it easier to assign common weights to a particular group of nodes, edges.
Recently graph data rises in many applications and there is need to manage such large amount of data by performing various graph operations over graphs using some graph search queries. Many approaches and algorithms serve this purpose but continuously require improvement over it in terms of stability and performance. Such approaches are less efficient when large and complex data is involved. Applications need to execute faster in order to improve overall performance of the system and need to perform many
advanced and complex operations. Shortest path estimation is one of the key search queries in many applications. Here we present a system which will find the shortest path between nodes and contribute to performance of the system with the help of different shortest path algorithms such as bidirectional search and AStar algorithm and takes a relational approach using some new standard SQL queries to solve the
problem, utilizing advantages of relational database which solves the problem efficiently.
Delta-Screening: A Fast and Efficient Technique to Update Communities in Dyna...Subhajit Sahu
Highlighted notes during research with Prof. Dip Sankar Banerjee, Prof. Kishore Kothapalli:
Delta-Screening: A Fast and Efficient Technique to Update Communities in Dynamic Graphs.
https://ieeexplore.ieee.org/document/9384277
There are 3 types of community detection methods:
Divisive, Agglomerative, and Multi-level (usually better).
In this paper, heuristics for skipping out most likely unaffected vertices for a modularity-based community detection method like Louvain and SLM (Smart Local Moving) is given. All edge batches are undirected, and sorted by source vertex id. For edge additions, source vertex i, highest modularity changing edge vertex j*, i's neighbors, and j*'s community are marked as affected. For edge deletions, where i and j must be in the same community, i, j, i's neighbors, and i's community are marked as affected. Performance is compared with static, dynamic baseline (incremental), and this method (both Louvain and SLM). Comparison is also done with "DynaMo" and "Batch" community detection methods.
A Proposed Algorithm to Detect the Largest Community Based On Depth LevelEswar Publications
The incredible rising of online networks show that these networks are complex and involving massive data.Giving a very strong interest to set of techniques developed for mining these networks. The clique problem is a well known NP-Hard problem in graph mining. One of the fundamental applications for it is the community detection. It helps to understand and model the network structure which has been a fundamental problem in several fields. In literature, the exponentially increasing computation time of this problem make the quality of these solutions is limited and infeasible for massive graphs. Furthermore, most of the proposed approaches are able to detect only disjoint communities. In this paper, we present a new clique based approach for fast and efficient overlapping
community detection. The work overcomes the short falls of clique percolation method (CPM), one of most popular and commonly used methods in this area. The shortfalls occur due to brute force algorithm for enumerating maximal cliques and also the missing out many vertices thatleads to poor node coverage. The proposed work overcome these shortfalls producing NMC method for enumerating maximal cliques then detects overlapping communities using three different community scales based on three different depth levels to assure high nodes coverage and detects the largest communities. The clustering coefficient and cluster density are used to measure the quality. The work also provide experimental results on benchmark real world network to
demonstrate the efficiency and compare the new proposed algorithm with CPM method, The proposed algorithm is able to quickly discover the maximal cliques and detects overlapping community with interesting remarks and findings.
A Framework for Visualizing Association Mining Resultsertekg
Download Link > https://ertekprojects.com/gurdal-ertek-publications/blog/a-framework-for-visualizing-association-mining-results/
Association mining is one of the most used data mining techniques due to interpretable and actionable results. In this study we pro-pose a framework to visualize the association mining results, speci¯cally frequent itemsets and association rules, as graphs. We demonstrate the applicability and usefulness of our approach through a Market Basket Analysis (MBA) case study where we visually explore the data mining results for a supermarket data set. In this case study we derive several
interesting insights regarding the relationships among the items and sug-gest how they can be used as basis for decision making in retailing.
Social Network Mining has been an area of interesting research due to billions of people using social media. Community detection is identified as one of the major issues of a social network. Here, a new approach has been presented for community detection which is greedy as well as incremental in nature. The approach is tested on standard datasets and the results are presented as well as analyzed
Semantic Annotation Framework For Intelligent Information Retrieval Using KIM...dannyijwest
Due to the explosion of information/knowledge on the web and wide use of search engines for desired
information,the role of knowledge management(KM) is becoming more significant in an organization.
Knowledge Management in an Organization is used to create ,capture, store, share, retrieve and manage
information efficiently. The semantic web, an intelligent and meaningful web, tend to provide a promising
platform for knowledge management systems and vice versa, since they have the potential to give each
other the real substance for machine-understandable web resources which in turn will lead to an
intelligent, meaningful and efficient information retrieval on web. Today,the challenge for web community
is to integrate the distributed heterogeneous resources on web with an objective of an intelligent web
environment focusing on data semantics and user requirements. Semantic Annotation(SA) is being widely
used which is about assigning to the entities in the text and links to their semantic descriptions. Various
tools like KIM, Amaya etc may be used for semantic Annotation.
Subgraph Frequencies: Mapping the Empirical and Extremal Geography of Large G...Gabriela Agustini
A growing set of on-line applications are generating data that can be viewed as very large collections of small, dense social graphs — these range from sets of social groups, events, or collabora- tion projects to the vast collection of graph neighborhoods in large social networks. A natural question is how to usefully define a domain-independent ‘coordinate system’ for such a collection of graphs, so that the set of possible structures can be compactly rep- resented and understood within a common space. In this work, we draw on the theory of graph homomorphisms to formulate and an- alyze such a representation, based on computing the frequencies of small induced subgraphs within each graph.
Sub-Graph Finding Information over Nebula Networksijceronline
Social and information networks have been extensively studied over years. This paper studies a new query on sub graph search on heterogeneous networks. Given an uncertain network of N objects, where each object is associated with a network to an underlying critical problem of discovering, top-k sub graphs of entities with rare and surprising associations returns k objects such that the expected matching sub graph queries efficiently involves, Compute all matching sub graphs which satisfy "Nebula computing requests" and this query is useful in ranking such results based on the rarity and the interestingness of the associations among nebula requests in the sub graphs. "In evaluating Top k-selection queries, "we compute information nebula using a global structural context similarity, and our similarity measure is independent of connection sub graphs". We need to compute the previous work on the matching problem can be harnessed for expected best for a naive ranking after matching for large graphs. Top k-selection sets and search for the optimal selection set with the large graphs; sub graphs may have enormous number of matches. In this paper, we identify several important properties of top-k selection queries, We propose novel top–K mechanisms to exploit these indexes for answering interesting sub graph queries efficiently.
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKSIJDKP
Community detection from complex information networks draws much attention from both academia and
industry since it has many real-world applications. However, scalability of community detection algorithms
over very large networks has been a major challenge. Real-world graph structures are often complicated
accompanied with extremely large sizes. In this paper, we propose a MapReduce version called 3MA that
parallelizes a local community identification method which uses the $M$ metric. Then we adopt an
iterative expansion approach to find all the communities in the graph. Empirical results show that for large
networks in the order of millions of nodes, the parallel version of the algorithm outperforms the traditional
sequential approach to detect communities using the M-measure. The result shows that for local community
detection, when the data is too big for the original M metric-based sequential iterative expension approach
to handle, our MapReduce version 3MA can finish in a reasonable time.
Studies towards heterogeneous Mobile Adhoc Network (MANET) as well as inter-domain routing is still in much infancy stage. After reviewing the existing literaturs, it was found that problems associated with scalability, interoperability, and security is not defined up to the mark as it should be part of pervasive computing in future networks. Moreover, it was found that existing studies do not consider the complexities associated with heterogeneous MANET to a large extent leading to narrowed research scope. Hence, this paper introduces a novel scheme called as Secure, Scalable and Interoperable (SSI )routing, where a joint algorithm is designed, developed, and implemented. The outcome exhibits the correctness of this scheme by simulation assisted by analysis for inter-domain routing.
Scalable Local Community Detection with Mapreduce for Large NetworksIJDKP
Community detection from complex information networks draws much attention from both academia and
industry since it has many real-world applications. However, scalability of community detection algorithms
over very large networks has been a major challenge. Real-world graph structures are often complicated
accompanied with extremely large sizes. In this paper, we propose a MapReduce version called 3MA that
parallelizes a local community identification method which uses the $M$ metric. Then we adopt an
iterative expansion approach to find all the communities in the graph. Empirical results show that for large
networks in the order of millions of nodes, the parallel version of the algorithm outperforms the traditional
sequential approach to detect communities using the M-measure. The result shows that for local community
detection, when the data is too big for the original M metric-based sequential iterative expension approach
to handle, our MapReduce version 3MA can finish in a reasonable time.
Immune-Inspired Method for Selecting the Optimal Solution in Semantic Web Ser...IJwest
The increasing interest in developing efficient and effective optimization techniques has conducted researchers to turn their attention towards biology. It has been noticed that biology offers many clues for designing novel optimization techniques, these approaches exhibit self-organizing capabilities and permit the reachability of promising solutions without the existence of a central coordinator. In this paper we handle the problem of dynamic web service composition, by using the clonal selection algorithm. In order to assess the optimality rate of a given composition, we use the QOS attributes of the services involved in the workflow as well as, the semantic similarity between these components. The experimental evaluation shows that the proposed approach has a better performance in comparison with other approaches such as the genetic algorithm.
The world has many natural systems that are so complex to be understood easily. This creates a need to have simple
principles or systems that capture the complexity of the world. The simple systems make it easier for many people to
understand the world by representing the complex world in a more straightforward way (Stefan, 2003). Many objects
and projects are seen to be a network of processes or substances. Graphs and networks have been used widely in
different projects for different reasons by project managers mostly. There are techniques such as critical path analysis
that make use of graphs and networks and are applied by project managers and all the staff involved in projects. These
methods are used to ensure smooth planning and control of projects. However, the techniques have to be applied
correctly to achieve the desired objective. This paper looks at the impact of graphs and networks in minimizing the costs
of a project or product. From this research, it can be inferred that the techniques such as critical path method, that make
use of graphs and networks, play a significant role in determining and hence reducing the product cost. This is done by
making the right decisions regarding the resources and time most appropriate for a project. The paper shows clearly
how these techniques are applied in a project to determine project duration and hence minimize the cost.
An Improved PageRank Algorithm for Multilayer NetworksSubhajit Sahu
Highlighted notes on An Improved PageRank Algorithm for Multilayer Networks.
While doing research work under Prof. Kishore Kothapalli.
The authors use a layer-layer weight to provide an additional factor to PR which they then use in the 1st step of SpreadMax algorithm to show that their modified pagerank is better than standard PR in selecting key nodes. I didnt properly understand this.
Applications of networks:
Social networks, Air traffic systems, Transportation networks, Citation networks, Biological systems (infection spreading).
Multilayer networks can be thought of as a large graph subdivided into multiple groups (layers). This probably makes it easier to assign common weights to a particular group of nodes, edges.
Recently graph data rises in many applications and there is need to manage such large amount of data by performing various graph operations over graphs using some graph search queries. Many approaches and algorithms serve this purpose but continuously require improvement over it in terms of stability and performance. Such approaches are less efficient when large and complex data is involved. Applications need to execute faster in order to improve overall performance of the system and need to perform many
advanced and complex operations. Shortest path estimation is one of the key search queries in many applications. Here we present a system which will find the shortest path between nodes and contribute to performance of the system with the help of different shortest path algorithms such as bidirectional search and AStar algorithm and takes a relational approach using some new standard SQL queries to solve the
problem, utilizing advantages of relational database which solves the problem efficiently.
Delta-Screening: A Fast and Efficient Technique to Update Communities in Dyna...Subhajit Sahu
Highlighted notes during research with Prof. Dip Sankar Banerjee, Prof. Kishore Kothapalli:
Delta-Screening: A Fast and Efficient Technique to Update Communities in Dynamic Graphs.
https://ieeexplore.ieee.org/document/9384277
There are 3 types of community detection methods:
Divisive, Agglomerative, and Multi-level (usually better).
In this paper, heuristics for skipping out most likely unaffected vertices for a modularity-based community detection method like Louvain and SLM (Smart Local Moving) is given. All edge batches are undirected, and sorted by source vertex id. For edge additions, source vertex i, highest modularity changing edge vertex j*, i's neighbors, and j*'s community are marked as affected. For edge deletions, where i and j must be in the same community, i, j, i's neighbors, and i's community are marked as affected. Performance is compared with static, dynamic baseline (incremental), and this method (both Louvain and SLM). Comparison is also done with "DynaMo" and "Batch" community detection methods.
A Proposed Algorithm to Detect the Largest Community Based On Depth LevelEswar Publications
The incredible rising of online networks show that these networks are complex and involving massive data.Giving a very strong interest to set of techniques developed for mining these networks. The clique problem is a well known NP-Hard problem in graph mining. One of the fundamental applications for it is the community detection. It helps to understand and model the network structure which has been a fundamental problem in several fields. In literature, the exponentially increasing computation time of this problem make the quality of these solutions is limited and infeasible for massive graphs. Furthermore, most of the proposed approaches are able to detect only disjoint communities. In this paper, we present a new clique based approach for fast and efficient overlapping
community detection. The work overcomes the short falls of clique percolation method (CPM), one of most popular and commonly used methods in this area. The shortfalls occur due to brute force algorithm for enumerating maximal cliques and also the missing out many vertices thatleads to poor node coverage. The proposed work overcome these shortfalls producing NMC method for enumerating maximal cliques then detects overlapping communities using three different community scales based on three different depth levels to assure high nodes coverage and detects the largest communities. The clustering coefficient and cluster density are used to measure the quality. The work also provide experimental results on benchmark real world network to
demonstrate the efficiency and compare the new proposed algorithm with CPM method, The proposed algorithm is able to quickly discover the maximal cliques and detects overlapping community with interesting remarks and findings.
A Framework for Visualizing Association Mining Resultsertekg
Download Link > https://ertekprojects.com/gurdal-ertek-publications/blog/a-framework-for-visualizing-association-mining-results/
Association mining is one of the most used data mining techniques due to interpretable and actionable results. In this study we pro-pose a framework to visualize the association mining results, speci¯cally frequent itemsets and association rules, as graphs. We demonstrate the applicability and usefulness of our approach through a Market Basket Analysis (MBA) case study where we visually explore the data mining results for a supermarket data set. In this case study we derive several
interesting insights regarding the relationships among the items and sug-gest how they can be used as basis for decision making in retailing.
Social Network Mining has been an area of interesting research due to billions of people using social media. Community detection is identified as one of the major issues of a social network. Here, a new approach has been presented for community detection which is greedy as well as incremental in nature. The approach is tested on standard datasets and the results are presented as well as analyzed
Semantic Annotation Framework For Intelligent Information Retrieval Using KIM...dannyijwest
Due to the explosion of information/knowledge on the web and wide use of search engines for desired
information,the role of knowledge management(KM) is becoming more significant in an organization.
Knowledge Management in an Organization is used to create ,capture, store, share, retrieve and manage
information efficiently. The semantic web, an intelligent and meaningful web, tend to provide a promising
platform for knowledge management systems and vice versa, since they have the potential to give each
other the real substance for machine-understandable web resources which in turn will lead to an
intelligent, meaningful and efficient information retrieval on web. Today,the challenge for web community
is to integrate the distributed heterogeneous resources on web with an objective of an intelligent web
environment focusing on data semantics and user requirements. Semantic Annotation(SA) is being widely
used which is about assigning to the entities in the text and links to their semantic descriptions. Various
tools like KIM, Amaya etc may be used for semantic Annotation.
Subgraph Frequencies: Mapping the Empirical and Extremal Geography of Large G...Gabriela Agustini
A growing set of on-line applications are generating data that can be viewed as very large collections of small, dense social graphs — these range from sets of social groups, events, or collabora- tion projects to the vast collection of graph neighborhoods in large social networks. A natural question is how to usefully define a domain-independent ‘coordinate system’ for such a collection of graphs, so that the set of possible structures can be compactly rep- resented and understood within a common space. In this work, we draw on the theory of graph homomorphisms to formulate and an- alyze such a representation, based on computing the frequencies of small induced subgraphs within each graph.
Sub-Graph Finding Information over Nebula Networksijceronline
Social and information networks have been extensively studied over years. This paper studies a new query on sub graph search on heterogeneous networks. Given an uncertain network of N objects, where each object is associated with a network to an underlying critical problem of discovering, top-k sub graphs of entities with rare and surprising associations returns k objects such that the expected matching sub graph queries efficiently involves, Compute all matching sub graphs which satisfy "Nebula computing requests" and this query is useful in ranking such results based on the rarity and the interestingness of the associations among nebula requests in the sub graphs. "In evaluating Top k-selection queries, "we compute information nebula using a global structural context similarity, and our similarity measure is independent of connection sub graphs". We need to compute the previous work on the matching problem can be harnessed for expected best for a naive ranking after matching for large graphs. Top k-selection sets and search for the optimal selection set with the large graphs; sub graphs may have enormous number of matches. In this paper, we identify several important properties of top-k selection queries, We propose novel top–K mechanisms to exploit these indexes for answering interesting sub graph queries efficiently.
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKSIJDKP
Community detection from complex information networks draws much attention from both academia and
industry since it has many real-world applications. However, scalability of community detection algorithms
over very large networks has been a major challenge. Real-world graph structures are often complicated
accompanied with extremely large sizes. In this paper, we propose a MapReduce version called 3MA that
parallelizes a local community identification method which uses the $M$ metric. Then we adopt an
iterative expansion approach to find all the communities in the graph. Empirical results show that for large
networks in the order of millions of nodes, the parallel version of the algorithm outperforms the traditional
sequential approach to detect communities using the M-measure. The result shows that for local community
detection, when the data is too big for the original M metric-based sequential iterative expension approach
to handle, our MapReduce version 3MA can finish in a reasonable time.
Web Graph Clustering Using Hyperlink Structureaciijournal
Now, information is useful for every environment in which time similarity is more important case. The most
of people are strongly interested in Internet. Web pages in the Internet are linked thorough hyperlinks that
contain useful information. By using hyperlinks, web graphs are constructed for time similarity web links in
which webs have been seen by users at past. These activities are needed to use for tracing who used the
websites for something at the time. So this paper provides the history of users who connect the person
started the news. We found that the normalized-cut method with the new similarity metric is particularly
effective, as demonstrated on a web log file
GRAPH ALGORITHM TO FIND CORE PERIPHERY STRUCTURES USING MUTUAL K-NEAREST NEIG...ijaia
Core periphery structures exist naturally in many complex networks in the real-world like social,
economic, biological and metabolic networks. Most of the existing research efforts focus on the
identification of a meso scale structure called community structure. Core periphery structures are another
equally important meso scale property in a graph that can help to gain deeper insights about the
relationships between different nodes. In this paper, we provide a definition of core periphery structures
suitable for weighted graphs. We further score and categorize these relationships into different types based
upon the density difference between the core and periphery nodes. Next, we propose an algorithm called
CP-MKNN (Core Periphery-Mutual K Nearest Neighbors) to extract core periphery structures from
weighted graphs using a heuristic node affinity measure called Mutual K-nearest neighbors (MKNN).
Using synthetic and real-world social and biological networks, we illustrate the effectiveness of developed
core periphery structures.
Graph Algorithm to Find Core Periphery Structures using Mutual K-nearest Neig...gerogepatton
Core periphery structures exist naturally in many complex networks in the real-world like social,
economic, biological and metabolic networks. Most of the existing research efforts focus on the
identification of a meso scale structure called community structure. Core periphery structures are another
equally important meso scale property in a graph that can help to gain deeper insights about the
relationships between different nodes. In this paper, we provide a definition of core periphery structures
suitable for weighted graphs. We further score and categorize these relationships into different types based
upon the density difference between the core and periphery nodes. Next, we propose an algorithm called
CP-MKNN (Core Periphery-Mutual K Nearest Neighbors) to extract core periphery structures from
weighted graphs using a heuristic node affinity measure called Mutual K-nearest neighbors (MKNN).
Using synthetic and real-world social and biological networks, we illustrate the effectiveness of developed
core periphery structures.
Graph Algorithm to Find Core Periphery Structures using Mutual K-nearest Neig...gerogepatton
Core periphery structures exist naturally in many complex networks in the real-world like social, economic, biological and metabolic networks. Most of the existing research efforts focus on the identification of a meso scale structure called community structure. Core periphery structures are another equally important meso scale property in a graph that can help to gain deeper insights about the relationships between different nodes. In this paper, we provide a definition of core periphery structures suitable for weighted graphs. We further score and categorize these relationships into different types based upon the density difference between the core and periphery nodes. Next, we propose an algorithm called CP-MKNN (Core Periphery-Mutual K Nearest Neighbors) to extract core periphery structures from weighted graphs using a heuristic node affinity measure called Mutual K-nearest neighbors (MKNN). Using synthetic and real-world social and biological networks, we illustrate the effectiveness of developed core periphery structures.
The community detection in complex networks has attracted a growing interest and is the subject of several
researches that have been proposed to understand the network structure and analyze the network
properties. In this paper, we give a thorough overview of different community discovery strategies, we
propose taxonomy of these methods, and we specify the differences between the suggested classes which
helping designers to compare and choose the most suitable strategy for the various types of network
encountered in the real world.
A Novel Approach for Clustering Big Data based on MapReduce IJECEIAES
Clustering is one of the most important applications of data mining. It has attracted attention of researchers in statistics and machine learning. It is used in many applications like information retrieval, image processing and social network analytics etc. It helps the user to understand the similarity and dissimilarity between objects. Cluster analysis makes the users understand complex and large data sets more clearly. There are different types of clustering algorithms analyzed by various researchers. Kmeans is the most popular partitioning based algorithm as it provides good results because of accurate calculation on numerical data. But Kmeans give good results for numerical data only. Big data is combination of numerical and categorical data. Kprototype algorithm is used to deal with numerical as well as categorical data. Kprototype combines the distance calculated from numeric and categorical data. With the growth of data due to social networking websites, business transactions, scientific calculation etc., there is vast collection of structured, semi-structured and unstructured data. So, there is need of optimization of Kprototype so that these varieties of data can be analyzed efficiently.In this work, Kprototype algorithm is implemented on MapReduce in this paper. Experiments have proved that Kprototype implemented on Mapreduce gives better performance gain on multiple nodes as compared to single node. CPU execution time and speedup are used as evaluation metrics for comparison.Intellegent splitter is proposed in this paper which splits mixed big data into numerical and categorical data. Comparison with traditional algorithms proves that proposed algorithm works better for large scale of data.
Application Areas of Community Detection: A Review : NOTESSubhajit Sahu
This is a short review of Community detection methods (on graphs), and their applications. A **community** is a subset of a network whose members are *highly connected*, but *loosely connected* to others outside their community. Different community detection methods *can return differing communities* these algorithms are **heuristic-based**. **Dynamic community detection** involves tracking the *evolution of community structure* over time.
https://gist.github.com/wolfram77/09e64d6ba3ef080db5558feb2d32fdc0
Communities can be of the following **types**:
- Disjoint
- Overlapping
- Hierarchical
- Local.
The following **static** community detection **methods** exist:
- Spectral-based
- Statistical inference
- Optimization
- Dynamics-based
The following **dynamic** community detection **methods** exist:
- Independent community detection and matching
- Dependent community detection (evolutionary)
- Simultaneous community detection on all snapshots
- Dynamic community detection on temporal networks
**Applications** of community detection include:
- Criminal identification
- Fraud detection
- Criminal activities detection
- Bot detection
- Dynamics of epidemic spreading (dynamic)
- Cancer/tumor detection
- Tissue/organ detection
- Evolution of influence (dynamic)
- Astroturfing
- Customer segmentation
- Recommendation systems
- Social network analysis (both)
- Network summarization
- Privary, group segmentation
- Link prediction (both)
- Community evolution prediction (dynamic, hot field)
<br>
<br>
## References
- [Application Areas of Community Detection: A Review : PAPER](https://ieeexplore.ieee.org/document/8625349)
Graphs have become the dominant life-form of many tasks as they advance a
structure to represent many tasks and the corresponding relations. A powerful
role of networks/graphs is to bridge local feats that exist in vertices as they
blossom into patterns that help explain how nodal relations and their edges
impacts a complex effect that ripple via a graph. User cluster are formed as a
result of interactions between entities. Many users can hardly categorize their
contact into groups today such as “family”, “friends”, “colleagues” etc. Thus,
the need to analyze such user social graph via implicit clusters, enables the
dynamism in contact management. Study seeks to implement this dynamism
via a comparative study of deep neural network and friend suggest algorithm.
We analyze a user’s implicit social graph and seek to automatically create
custom contact groups using metrics that classify such contacts based on a
user’s affinity to contacts. Experimental results demonstrate the importance
of both the implicit group relationships and the interaction-based affinity in
suggesting friends.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGdannyijwest
Social Networks has become one of the most popular platforms to allow users to communicate, and share their interests without being at the same geographical location. With the great and rapid growth of Social Media sites such as Facebook, LinkedIn, Twitter…etc. causes huge amount of user-generated content. Thus, the improvement in the information quality and integrity becomes a great challenge to all social media sites, which allows users to get the desired content or be linked to the best link relation using improved search / link technique. So introducing semantics to social networks will widen up the representation of the social networks. In this paper, a new model of social networks based on semantic tag ranking is introduced. This model is based on the concept of multi-agent systems. In this proposed model the representation of social links will be extended by the semantic relationships found in the vocabularies which are known as (tags) in most of social networks.The proposed model for the social media engine is based on enhanced Latent Dirichlet Allocation(E-LDA) as a semantic indexing algorithm, combined with Tag Rank as social network ranking algorithm. The improvements on (E-LDA) phase is done by optimizing (LDA) algorithm using the optimal parameters. Then a filter is introduced to enhance the final indexing output. In ranking phase, using Tag Rank based on the indexing phase has improved the output of the ranking. Simulation results of the proposed model have shown improvements in indexing and ranking output.
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGIJwest
Social Networks has become one of the most popular platforms to allow users to communicate, and share their interests without being at the same geographical location. With the great and rapid growth of Social Media sites such as Facebook, LinkedIn, Twitter…etc. causes huge amount of user-generated content. Thus, the improvement in the information quality and integrity becomes a great challenge to all social media sites, which allows users to get the desired content or be linked to the best link relation using improved search / link technique. So introducing semantics to social networks will widen up the representation of the social networks. In this paper, a new model of social networks based on semantic tag ranking is introduced. This model is based on the concept of multi-agent systems. In this proposed model the representation of social links will be extended by the semantic relationships found in the vocabularies which are known as (tags) in most of social networks.The proposed model for the social media engine is based on enhanced Latent Dirichlet Allocation(E-LDA) as a semantic indexing algorithm, combined with Tag Rank as social network ranking algorithm. The improvements on (E-LDA) phase is done by optimizing (LDA) algorithm using the optimal parameters. Then a filter is introduced to enhance the final indexing output. In ranking phase, using Tag Rank based on the indexing phase has improved the output of the ranking. Simulation results of the proposed model have shown improvements in indexing and ranking output.
Similar to Community detection of political blogs network based on structure-attribute graph clustering model (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 3, June 2019 : 2121 - 2130
2122
similarities of the topological structures and the nodes attributes. Two concepts are introduced in this paper
the Mean Gravity and the Path Degree, which are used to increase the community structure cohesiveness.
The contributions of this paper are summarized below:
a. A new graph clustering algorithm is proposed which considers the structural similarity and the nodes
attributes.
b. Two concepts (Mean Gravity and Path Degree) are introduced which are used to increase the
cohesiveness of the structure of the clusters.
The remaining sections of this paper are arranged as follows. Section 2 introduces a review of some
most recent related works. Section 3 focuses on the graph clustering technique. Section 4 describes Political
Blogosphere Network. Section 5 introduces the proposed method. Section 6 reviews the experimental results.
Finally, section 7 concludes this paper.
2. RELATED WORKS
This section reviews a summary of most recent related works concerning the graph clustering
methods of social networks. The goal of graph clustering is to group the nodes of the network that have
denser connections among them. Some methods such as Clique Peculation Methods CPM focus on
internal/external edge counting [3] while ignoring the interactions and vertex characteristics, in [14] the
authors propose a clique method on co-purchased network weighted graph, to find micro-cluster, the
algorithm works in two phases graph polishing to enumerate intersections of neighbors and clique
enumeration to count maximum cliques.
Newman-Girvan is considered as well-known divisive algorithm [15] for community detection
which based on two main steps; first detects some edges based on betweenness measure then splits the
network into communities based on the detected edges finally it requires betweenness recalculation after each
splitting, the quality of the communities is measured using the maximal modularity. However, the method is
not suitable for large networks and it suffers from the resolution limit.
In ABCD [6], the authors introduced new algorithm based on bi-directional connections and nodes
features to detect community attractiveness of OSN, the algorithm was validated in SNAP platform and
compared with CNM [5], according to the researcher ABCD is outperformed CNM and it can discover
smaller communities in contrast with CNM, however, the method was not shown the comparative results of
the modularity values to prove its effectiveness.
The k-prototype algorithm ISCD+ [16] an iterative model for fast graph clustering, the authors
introduce a new idea for detecting communities, the algorithm imposes two factors namely local importance
and importance concentration to select nodes with different weights to represent communities.
The KNN-based algorithms in [12] the authors propose a directed weighted graph clustering
algorithm for community detection, the algorithm considers network topology only and it is significantly
focused on the path traversed frequency and neighborhood nodes, nevertheless, the method suffers from
computational complexity since it is based on k-nearest neighbors’ computations.
In [10] the authors introduced a new approach for community detection in social network websites.
besides structure similarity a frequent pattern mining of nodes contents was contributed, the algorithm is
implemented in four steps, preprocessing, frequent pattern computing to obtain harmonious groups,
extending harmonious groups into small communities, finally small communities expansion, however, the
method suffers from some disadvantages such as, time complexity which is caused by the input parameters, a
trial, and error concept was used to determine the appropriate parameters.
Roy et al. in [17] proposed a graph-based spectral clustering model, the method uses novel affinity
matrix for spatial clustering with Mahalanobis distance, however, the method has some limitations, the
distance metric can only measure from a single point, this reduces results quality.
Jinarat et al. in [18] have introduced a graph clustering algorithm for web search results, the core
idea of the method is to combine web search results with external knowledge data from Wikipedia to attain
better clustering quality. the method uses graph-based construction for text clustering to connect related
documents, nevertheless, the similarity threshold parameter for subgraph detection must be in a certain range,
when the threshold parameter increases, the clustering quality decreases.
3. GRAPH CLUSTERING TECHNIQUE
An indirect weighted graph { , , , },G V E W where | |V is a set of vertices. | |E set of edges. | |W
set of edges weights. Each edge | |ie E maps two vertices ( , )i jv v to be connected with specific weight ijw ,
where , | |i jv v V and | |ijw W . Each vertex in a graph is associated with a set of attributes, in such that the
3. Int J Elec & Comp Eng ISSN: 2088-8708
Community detection of political blogs network based on structure-attribute… (Ahmed F. Al-Mukhtar)
2123
term 1 2 3{ , , , , }nattr attr attr attr where
1
( )
n
i i j
j
v v attr
The purpose of graph clustering is to partition a
graph into k-disjoint subgraphs, depending on some topological structures and attributes similarity measures,
the communities should have the following aspects;
a. Similar vertices should be participated in a similar group, while the dissimilar ones should go to different
groups.
b. The vertices that belong to the community should be densely connected to each other and sparsely
connected to the other vertices within different communities.
The goal of the proposed algorithm is to introduce a weighted measure. Thus can effectively reflects
the characteristics of network topology and vertices features to strengthen the similarity cohesiveness. The
strategy of clustering and the similarity measure will be discussed in the next section.
3.1. Contrast comparative method
W-Cluster [9] is an emerged algorithm of SA-Cluster, which considers both structures and attributes
aspects by applying a unified distance measure and neighborhood random walk strategy. The method uses the
probability of edge belongs to the community to Measure link strength and Jaccard coefficient similarity to
estimate content similarity. Eventually, W-cluster can automatically learn the degree of both topological
similarities and attribute similarity through utilizing the probability transition matrix to build unified distance
measure. The method partition large graph into numbers of clusters.
3.2. Evaluation measures
To evaluate the clusters quality results of the SAS-Cluster, two evaluation measures are used for this
purpose; Density [1] and Entropy [19]. Both measures have the following definitions. Density measure is
used to estimate the structural closeness to each cluster. Density is denoted in Equation (1).
1
1
( , )
({ } )
| |
k
k m n
c c
c
v v
Density v
E
(1)
where c is a number of clusters {1,2,3, , }k , cv represents the number of vertices belongs to the certain
cluster. ,m nv v are two vertices, , | |m nv v V and ( , )m n cv v v . ( , )m nv v represents an edge | |E .
Entropy measure is used to determine the relevance of attributes among vertices in each cluster.
Entropy can be defined in Equation (2) and Equation (3).
1
1 1
1
| |
({ } ) ( , )
| |
m k
k ac i
c c im
c i
al
l
w v
V E ac v
V
w
(2)
2
1
( , ) log ( )
nc
i cin cin
n
E ac v P P
(3)
where i is the number of clusters in the range {1,2,3, , }k , ac is the attribute value at index number in
range the [1,2,3, , ]m . n is the attribute values. ,m nc is a number of attribute values. cinP is the
percentage of cluster vertices that have th
n attribute value on ac
4. POLITICAL BLOGOSPHERE NETWORK
The political web-blogs have played an important role in US Presidential Elections since the year of
2000 and after, and it is gained more influence at the 2004 US Presidential Elections. First, the blog can be
understood as an informational website placed on World Wide Web WWW which is devoted to publishing a
diary-style text or posts, sometimes contains links to other websites.
According to Adamic et al. in [20] the year 2004 demonstrated a rapid increase in the popularity of
blogs, accordingly, the significant fraction of internet traffic was directed to these blogs. However, there is
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 3, June 2019 : 2121 - 2130
2124
9% of internet users acknowledged that they read political blogs during US Political Campion. Therefore, the
weblogs may be followed by a small number of readers but its influence extends beyond that.
To discover the behavior of Blogosphere network, Adamic et al. in [20], have analyzed the
landscape of most influential political blogs in two months before the US Presidential Elections. The analysis
was based on the topics of the discussion and linking structure among blogs. The top 40 influential blogs
were considered and added to the original list.
According to Adamic et al. a set of URLs was gathered from seven online weblog directories
including, eTalkingHead, BlogCatalog, CampaignLine, and Blogarama. Each URL represents the political
weblog. A one-day snapshot is taken for URLs, for each downloaded page, the citation was considered, and
any newly discovered page was added to the list.
Next step, for all the discovered blogs, the citations are counted up, if the discovered page was cited
for 17 times or more, then, its orientation is labeled manually depending on blogrolls and posts and added to
the original list. The final set consists of 1494 blogs, divided into 759 liberals and 735 conservative blogs.
The pattern in which the blogs are linked together was done, by counting the number of posts in such that
each blog cites to another blog is counted as an edge between the two blogs. However, the link was not
duplicated if the blog was cited by another blog more than once within the same post.
Figure 1. The community structures of the political blogs extracted from [20]. The colors reflect political
orientations, the red for conservatives, the blue for liberals, the color purple from conservatives to liberals
and the color orange from liberals to conservatives
Finally, the authors concluded network description, in such that, each political learning is more
likely to talk about certain topics, one can notice an interesting pattern which is conservative bloggers tend to
link to other conservative blogs and it is more densely linked (Table 1).
Table 1. Frequently used Items and their Descriptions
Symbols Description
m n
v v Vertices with a direct connection
m nv v Vertices with an indirect connection
m nv v Disconnected vertices
( )md v Number of ties connected to vertex m
( )mc v Closeness centrality to vertex j
S Topological structure similarity
A attribute similarity
5. Int J Elec & Comp Eng ISSN: 2088-8708
Community detection of political blogs network based on structure-attribute… (Ahmed F. Al-Mukhtar)
2125
5. THE PROPOSED METHOD
5.1. Block diagram
In Figure 2 we can see the SAS-Cluster block diagram.
Figure 2. SAS-Cluster block diagram
5.2. SAS-cluster
Graphically, social networks can be modeled as complex networks, where both network topology
and vertex properties can be contained. The relationship among vertices is represented as edges. The
proposed SAS-Cluster algorithm achieves the following properties:
a. The vertices within the same cluster are close to each other concerning the structural similarity and
dissimilar to other vertices outside the cluster.
b. vertices in the same cluster are close to each other in terms of attribute similarity and far from each other
among the different clusters.
The core idea is to define the Gravity factor, to identify the power of the relationship concerning
each pair of directly connected vertices in the topology of the structure.
Definition 1 (Gravity Factor). In the indirect weighted graph, the relation between two directly
connected vertices exposes the strength of the relationship. Let mv and nv are two directly connected vertices.
( )md v is the degree of the vertex mv . ( )ic v is considered the closeness measure of iv , which refers to the
inverse sum of all shortest paths among iv and all other vertices in the graph. mnw is the weight associated
with the edge ( , )m ne v v . The Gravity Factor is defined in Equation (4).
( )
1
( )
( , ) ln 1 * ,
( )
m
m
m n mn m nd v
j
d v
g v v w v v
c j
(4)
Definition 2 (Mean Gravity). Let mv and are two directly connected vertices. Mean gravity can
be defined in Equation (5).
( , ) ( , )
( , ) ,
2
m n n m
m n m n
g v v g v v
m v v v v
(5)
where ( ) ( ), thus one can determine which vertex is more important.
Definition 3 (Path Degree). Let mv and are two indirectly connected vertices. For a given path
( , , , , , )1 2v v v v vm m m m i n , path degree can be defined in Equation (6).
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 3, June 2019 : 2121 - 2130
2126
( , ) ( , ),
n
m
v
m n m n m n
v
p v v g v v v v (6)
where path is taken into account as the weighted shortest path between a pair of indirectly connected vertices.
Structural/Attribute Similarity (SAS), in the proposed method, the Jaccard similarity coefficient is
adopted to compute the similarity measure, as defined in Equation (7).
| |
( , )
X Y
sim X Y
X Y
(7)
where ,X Y are vertices, , | |X Y V , Jaccard similarity in the equation (7) is a well-known similarity
measure, therefore it has been used to find out the relevance among vertices. There are two main similarity
calculations are taken into account. Directly connection Equation (8). To calculate the similarity between a
pair of directly connected vertices.
1 1
( , ) ,
m n
mn
m n m nv v
mi nj mn
i j
w
sim v v v v
w w w
(8)
where , | |.m nv v V miw is the weight of the edge between the vertex mv and all S
i vertices that are directly
connected to mv . njw is the weight of the edge between the vertex nv and all S
j vertices that are directly
connected to nv and mnw is the associated weight of the edge ( , )m ne v v . Indirectly connection Equation (9).
The similarity is calculated based on the shortest path between mv and nv .
1( , ) ( , ),
n
m
v
m n l l m n
l v
sim v v sim v v v v
(9)
where , | |v v Vm n represent the similarity between two indirectly connected vertices.
After obtaining the Mean Gravity Equation (5) and Path Degree Equation (6), the structural
similarity is defined in Equation (10).
( , ) ( , ),
( , ) ( , ) ( , ),
0,
m n m n m n
m n S m n m n m n
m n
sim v v m v v v v
sim v v sim v v p v v v v
v v
(10)
Next, the vertices attributes are considered. Each vertex is characterized by multiple attributes.
Obtaining attribute similarity increases the cohesiveness among vertices. Attributes values can be either 1 or
0 reflect the appearance or disappearance of that attribute at a certain vertex. The mathematical formulations
of the attribute similarity are defined in Equation (11) and Equation (12).
1, ,
( , )
0,
th
m n
m n
if v v have value on i attr
v v
otherwise
(11)
7. Int J Elec & Comp Eng ISSN: 2088-8708
Community detection of political blogs network based on structure-attribute… (Ahmed F. Al-Mukhtar)
2127
| |
1
| |
1
1
( , )
,
( , )
( , ) ,
n
m
m
n m ai
i
m nm
aj
m n A
j
v
l l A m n l
l v
v v w
v v
wsim v v
sim v v v v and v V
(12)
where , | |m nv v V . m is the number of attributes associated with mv . aw represents the attribute value
usually either 0 or 1. By combining Equation (10) and Equation (12) the final mathematical description of the
structure attribute similarity is defined in Equation (13).
( , ) ( , ) ( , )m n m n s m n ASAS v v sim v v sim v v (13)
where ( , )m nSAS v v is the structure attribute similarity between a pair of vertices m
v and n
v .
5.3. Algorithm description
After obtaining final similarity value among vertices, by applying Equation (13). now one can get
the distance value among vertices which is defined in Equation (14), but first, the similarity value has to be
normalized to be in the range of [0, 1].
1 ( )
( , )
,
m n
m n
norm SAS
SAS D v v
v v
(14)
( , )m n
SAS D v v is the Distance value between the two vertices mv and nv . ( ) 0m
d v and ( ) 0n
d v .
In prior, the number of centroids k are selected randomly, at each iteration these centroids are
updated, the rest of vertices are assigned to the nearest centroid based on minimum distance.
Algorithm 1. SAS-Cluster
Input: undirected, weighted* and multi-attribute Graph G , clusters number k , the weight factor , max iteration number MAX
Output: 1 2, , kk clusters C C C
1. Initialization: vertices 1{ } 0n
i iv , distance [ ][ ] 0i jD v v , vertices attributes , 1[ ] 0m
i wattrj jv , 1 ,
[] 0ClusterSentroid .
2. Graph creation:
2.1. Add vertex:
If NewNodenot in vertices{ }iv
Vertices{ }iv NewNode
End if
2.2. Add Edge
If ,i jv v in vertices{ }iv
Create ( , )i jv v link & ( , )j iv v link
End if
3. Similarity computation:
For each vertex iv & jv in | |V where i j
( , ) ( , ) ( , )i j i j s i j ASAS v v sim v v sim v v
( , ) 1 ( ( , ))i j i j
SAS D v v Norm SAS v v
End for
4. SAS-Cluster:
Select k randomly from vertices | |V as initial centroids for 1 2, , kC C C
[] ( )kClusterSentroid k c
While not end OR there is no change in the MIN distance
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 3, June 2019 : 2121 - 2130
2128
For each | |jv in V
[ ] min { ( , )}ijCluster j D i j for all centroids 1i k
End for
For each cluster ,i i k
If the SUM of distances is minimum
Update [ ]ClusterSentroid i
End if
End for
End While
Return 1 2, , kk clusters C C C
Initially and regarding
Figure 2, SAS-Cluster algorithm requires two predetermined parameters α and number of clusters k.
at step one algorithm reads the raw data to create the network and determines the number of attributes
associated with each vertex. Step two multiple paths among nodes are considered, many calculations must be
insured, Mean Gravity Equation (5) and Path Degree Equation (6), are required to establish SAS similarity
calculations as in Equation (13), Distance values among each couple of vertices in Equation (14) are
computed based on SAS similarity results. All data must be stored in the database. Step four and regarding
the number of k and distance values, the communities are extracted from the original graph. Finally, and
concerning the Equations (1), (2) and (3), the results are evaluated using Density and Entropy.
6. EXPERIMENTAL RESULTS
In this section, extensive experiments are performed to evaluate the performance of the SAS-Cluster
method. All experiments are conducted on PC with Windows 10 Pro 64 bit, an i7-6700 HG CPU (260 GHz,
and 16 GB RAM. The programming environment is Python 3.6.2 (MSC v.1900 32 bit (Intel)).
6.1. Dataset
Political Blogs Dataset, as real network dataset, which is used to for the evaluation and analyzing
the proposed method. The dataset is based on blog-blog connection [20]. It consists of 1,490 nodes and each
node contains an attributes description to characterize its political learning, which is either conservative or
democrat.
6.2. Results
The proposed SAS-Cluster algorithm is extensively evaluated with the state-of-art method
W-cluster [9] through well-known evaluating measures, Density, and Entropy. The density as given in
Equation (1), reflects the extent of how tight structure is connected among vertices in each cluster, the higher
density value reflects the community structure cohesiveness. The entropy that is described in Equation (2)
and Equation (3), which is used to rate the attribute relationship among vertices, low entropy reflects better
relevance among vertices in each cluster. Figure 3 and Figure 4 show the performance of SAS-Cluster
concerning Density and Entropy, where the number of clusters 3,5,7,9k . is set in the range [0, 1] and
1 . The algorithm is run for at least three iterations.
Figure 3, reviews the density values. When setting to 0 the density value is the lowest, this
because of the similarity of the structural topology is not taken into account. At 3k the density values
declines when is set to 0.6 or 0.7. At 5,7,9k and 0.5 the density values drops down.
Figure 4, reviews the entropy values, the best-given values when α equal to 0, since the algorithm is
run based on the attribute similarity only. In contrast, when α equal to 1 the given-values is the worst this
because the attribute similarity is not taken into the account. At 3,5,7,9k the best given-results when is
set to 0.5 or 0.8. While the quality of the results tends to decrease when 0.8 . As illustrated in Figure 3
and Figure 4, the best performance for SAS-Cluster when is either 0.5 or 0.8.
9. Int J Elec & Comp Eng ISSN: 2088-8708
Community detection of political blogs network based on structure-attribute… (Ahmed F. Al-Mukhtar)
2129
Figure 3. Impact factor α on the political blog.
Clarifies Density results for SAS-Cluster
Figure 4. Impact factor α on the political blog.
Clarifies Entropy results for SAS-Cluster
To show the effectiveness of the proposed method, SAS-Cluster is compared with the state-of-art
method, W-cluster. Both methods are tested for a fixed number of clusters 3,5,7,9k and is set to 0.5.
Figure 5 and Figure 6 illustrate the comparison results of the density and the entropy respectively for
each of SAS-Cluster and W-cluster. All results have shown that SAS-Cluster outperformed W-Cluster
concerning the density and the entropy measures.
Figure 5. Density comparison values on political blogs Figure 6. Entropy comparison values on political blogs
7. CONCLUSION
Nowadays, social networks have become more influential in individual’s opinion, decisions, and
their lifestyle. Therefore, and with the accelerated increase in social networks data, it is important to adopt a
more reliable graph clustering methods for community detection. In this paper, a graph clustering method for
community detection is proposed. The method introduces two concepts, Gravity degree and Path degree, to
increase the structural similarities within the detected communities. In addition, the adopted method
combines structural similarities with the multiple attributes of nodes to attain more cohesiveness similarity.
The experimental results have shown that SAS-Cluster is better than W-cluster according to Density and
Entropy evaluation measures.
REFERENCES
[1] P. Mrutyunjaya, et al., “Social Networking,” Book of Springer International Publishing, vol. 65, pp. 45-83, 2014.
[2] S. S. Elisa, “Graph Clustering,” Computer Science Review, vol. 1, pp. 27-64, 2007.
[3] F. Santo and H. Darko, “Community detection in networks: A user guide,” Physics Reports, vol. 659, pp. 1-45,
2016.
[4] Girvan M. and Newman M. E., “Community structure in social and biological networks,” Proceedings of the
national academy of sciences, vol. 99, pp. 7821-7826, 2002.
[5] Clauset, et al., “Finding community structure in very large networks,” Physical review E, vol. 70, pp. 1-6, 2004.
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
DENSITY
ΑLPHA
k = 3
k = 5
k = 7
k = 9
0
0.1
0.2
0.3
0.4
0.5
0.6
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
ENTROPY
ALPHA
k = 3
k = 5
k = 7
k = 9
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
3 5 7 9
Density
No. of clusters k
SAS-Cluster
W-cluster
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
3 5 7 9
Entropy
No. of clustersk
SAS-Cluster
W-cluster
10. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 3, June 2019 : 2121 - 2130
2130
[6] Liu, et al., “Weighted Graph Clustering for Community Detection of Large Social Networks,” Procedia Computer
Science, vol. 31, pp. 85-94, 2014.
[7] Lambiotte, et al., “Random Walks, Markov Processes and the Multiscale Modular Organization of Complex
Networks,” IEEE Transactions on Network Science and Engineering, vol. 1, pp. 76-90, 2014.
[8] Boobalan, et al., “Graph clustering using k-Neighbourhood Attribute Structural similarity,” Applied Soft
Computing, vol. 47, pp. 216-223, 2016.
[9] Cheng, et al., “Clustering Large Attributed Graphs: A Balance between Structural and Attribute Similarities,” ACM
Transactions on Knowledge Discovery from Data, vol. 5, pp. 1-33, 2011.
[10] Moosavi, et al., “Community detection in social networks using user frequent pattern mining,” Knowledge and
Information Systems, vol. 51, pp. 159-186, 2017.
[11] Chen, et al., “Study on similarity based on connection degree in social network,” Cluster Computing, vol. 20, pp.
167-178, 2017.
[12] Parimala, et al., “K-Neighbourhood Structural Similarity Approach for Spatial Clustering,” Indian Journal of
Science and Technology, vol. 8, 2015.
[13] Tian, et al., “Efficient aggregation for graph summarization,” Proceedings of the 2008 ACM SIGMOD
international conference on Management of data - SIGMOD '08, pp. 567-580, 2008.
[14] Yamazaki, et al., “Weighted Micro-Clustering: Application to Community Detection in Large-Scale Co-Purchasing
Networks with User Attributes,” Proceedings of the 25th International Conference Companion on World Wide
Web, pp. 131-132, 2016.
[15] Newman M. E. and Girvan M., “Finding and evaluating community structure in networks,” Physical Review E, vol.
69, pp. 026113, 2004.
[16] Bai, et al., “Fast graph clustering with a new description model for community detection,” Information Sciences,
vol. 388-389, pp. 37-47, 2017.
[17] Mandal J. K. and Roy P., “A novel spectral clustering based on local distribution,” International Journal of
Electrical and Computer Engineering, vol. 5, pp. 361, 2015.
[18] J. Supakpong and H. Choochart, “Graph-Based Concept Clustering for Web Search Results,” International Journal
of Electrical and Computer Engineering, vol. 5, pp. 1536-1544, 2015.
[19] F. Santo, “Community detection in graphs,” Physics Reports, vol. 486, pp. 75-174, 2010.
[20] Adamic, et al., “The political blogosphere and the 2004 US election: divided they blog,” Proceedings of the 3rd
international workshop on Link discovery, pp. 36-43, 2005.