An Edge-based Clustering Algorithm to Detect Social Circles in Ego Networks

Size: px
Start display at page:

Download "An Edge-based Clustering Algorithm to Detect Social Circles in Ego Networks"

Transcription

1 JOURNAL OF COMPUTERS, VOL. 8, NO., OCTOBER An Edge-based Clustering Algorithm to Detet Soial Cirles in Ego Networks Yu Wang Shool of Computer Siene and Tehnology, Xidian University Xi an,77, China Shool of Eonomis and Management, Xidian University Xi an 77, China Lin Gao Shool of Computer Siene and Tehnology, Xidian University Xi an,77, China Abstrat Organizing users friends in personal soial networks, i.e., ego networks, into irles is an important task for online soial networks. Soial networking sites allow users to manually ategorize their friends into soial irles. However, it is time onsuming and does not update automatially as a user adds more friends. In this paper, we propose an edge-based lustering algorithm to detet soial irles in ego networks automatially. Firstly, we reonstrut ego networks by prediting the missing links. Then, we define the similarity of adjaent edges and luster edges by single-linkage hierarhial lustering algorithm. Finally, we label eah irle by abstrating its ommon properties to explain why this irle forms. The experimental results demonstrate it is a better way to haraterize soial irles from the respet of edges. Our algorithm outperforms the link ommunity algorithm and low-rank embedding algorithm in terms of auray, and is more effiient than the probabilisti model algorithm. Our proposed method is validated as an effetive algorithm in identifying soial irles. They are serving as a ommuniation and information-sharing platform for their users. Users in suh online soial networks usually have hundreds of their friends and aquaintanes. So it is neessary to organize their friends into what we refer to as soial irles. Deteting soial irles for a speifi user an be formulated as an ego network lustering problem. The ego network of a user is the network of friendships among his friends. An illustration of ego network is shown in Fig.. In this example, user s friends are organized into four irles. The irle of olleagues is overlapped with the irle of ollege friends. Index Terms graph lustering, ego networks, soial irles, link ommunity I. INTRODUCTION Understanding and modeling network strutures have been a fous of attention in a number of diverse fields, inluding physis, biology, omputer siene, statistis, and soial sienes. Soial network analysis started in the 93's and has beome one of the most important topis in soiology [][2]. A fundamental problem in the study of soial networks is ommunity detetion and some algorithms are proposed to solve this problem[3][4][5][6]. Communities an have onrete appliations. For instane, identifying lusters of ustomers with similar interests in the network of purhase relationships between ustomers and produts of online retailers (like, e. g., enables to set up effiient reommendation systems [7], that better guide ustomers through the list of items of the retailer and enhane the business opportunities. In reent years, Soial Networking Servies (SNS) suh as Faebook and Twitter have beome a major part of people s daily life. Fig.. An illustration of ego networks. Previous ommunity detetion methods have two main disadvantages in solving this problem. One flaw is they find dense subgraphs as ommunities in the observed network. However, there are hidden relations in ego networks. For example, some people are friends and form a irle but they have not built onnetions on website yet. If we only onsider the density of subgraphs, we will lose these irles. Another limitation is they don t give explanations about why we organize these people as a irle: they are families, olleagues, living in the same towns or something else. To overome these problems, 23 ACADEMY PUBLISHER doi:34/jp

2 2576 JOURNAL OF COMPUTERS, VOL. 8, NO., OCTOBER 23 additional information suh as user profiles is used. Tetsuya Yoshida [8] proposed low-rank embedding approah to find hidden ommunities based on user profiles. Nevertheless, this approah needs users to speify the number of irles in advane and annot identify the overlapped ommunities. Stephan Günnemann et al. [9] developed the algorithm DB-CSC to find density-based subspae in graphs with feature vetors. This algorithm misses finding irles with small size. These two methods still annot interpret what makes eah irle emerge. Julian MAuley et al. [] suggested a probabilisti model algorithm to disover irles. This approah an not only identify irles, but also expliate what dimensions of the profile aused the irle to form. However, this approah never identifies more than irles per user. What s more, the effiieny of this approah is very low. It needs hours of time to exeute when the size of the ego network is bigger than. Considering the fat that a irle forms beause people in that irle have the same relationship, it is a natural thought to identify irles by finding similar edges, sine edges represent relationships in graph model. In this paper, we detet irles in ego networks by an improved link ommunity algorithm. Cirles we identified are not only densely onneted but its members also share ommon properties. We first reonstrut ego networks to reover the missing relations. Then we give a new similarity definition of the edges and luster edges by link ommunity algorithm. Finally, we label irles to expliate what features aused these irles emergene. The experimental results show that ompared with link ommunity algorithm and low-rank embedding algorithm, our method ahieves a higher auray between the predited irles and the known irles. Our algorithm outperforms the probabilisti model algorithm in terms of running time. Our proposed method is validated as an effetive algorithm in disovering soial irles in ego networks. II. METHODS A. Link Community Algorithm Ahn et al. [] suggested an unorthodox approah whih reinvented ommunities as groups of edges rather than verties. They defined the inlusive neighbors of a vertex i as: n () i { x d(, i x) }, where dix (, ) is + the length of the shortest path between verties i and x. The set simply ontains the vertex itself and its neighbors. From this, they defined the similarity between eah pair of adjaent edges. The similarity between edges e and e ik jk is n () i n ( j) + + Se (, e ) = ik jk n () i n ( j) + +. Single-linkage hierarhial lustering is employed to build a dendrogram where eah leaf is an edge from the original network and branhes represent link ommunities. To solve the problem of utting this dendrogram at whih level, oneptions of link density and partition density are given. For a network with M edges and N verties, P = { P,..., P } C is a partition of the edges into C subsets. The number of edges in subset P is m = P. The number of indued verties, all verties that those edges touh, is n = {, i j}. eij P The link density D of ommunity is m ( n ) D =. n ( n )/2 ( n ) The partition density D is 2 m ( n ) D = m, whih is the average of M ( n 2)( n ) D. The dendrogram ould be ut at the level with maximum partition density, but it doesn t mean it is the only level worth exploring. For example, students at university may organize at multiple sales, from shools, down to the departmental level and then further down to researh groups and small-sale ollaborations. The most modular struture may form at the departmental level, but the strutures of both smaller researh groups and larger shool-wide organization are still relevant. B. Network Reonstrution Ego networks are dynami, and new relationships build over time. A group of friends with relatively sparse relationships now ould be found as a irle later when the network grows with more edges in future. To identify suh irles, we predit those missing links and reonstrut ego networks. We predit there should be an edge between two verties if these two verties are similar in both topologial struture and feature profile. In our datasets, the profile information of all people in an ego network an be represented as a tree. An example is shown in Fig. 2. Users features are lassified. A leaf of the tree represents a speifi feature that at least one person in the ego network has. Note that user profile trees are defined per ego network: while many thousands of olleges (for example) exist among all soial network users, only a small number appear among any partiular user s friends. We use the profile vetor to haraterize a user s feature. If a person x whose hometown is Boston is working as a programmer and has studied in MIT and Stanford, then his profile vetor, profile( x ), is (,,,,,,,). We use Jaard oeffiient to measure the topologial similarity, sine it onsumes little time and performs relatively good among many loal indies [2]. We use osine whih is ommonly used to measure the similarity of two profile vetors. Algorithm is used to reonstrut ego network. For eah pair of diretly linking verties, we ompute the topologial similarity and profile similarity of them in line 2-5. We label the median of all the topologial similarities as M _ VTS and the median of all the profile similarities as M _ VPS in line 6-7. We predit whether there should be a missing link in line 23 ACADEMY PUBLISHER

3 JOURNAL OF COMPUTERS, VOL. 8, NO., OCTOBER For eah pair of verties who has no diret onnetion, if their topologial similarity is bigger than M _ VTS and profile similarity is bigger than M _ VPS, we link these two verties. Fig. 2. An illustration of user profile tree. Algorithm. Ego network reonstruting algorithm. Input: The adjaent matrix A of an ego network G = ( V, E) ; Users profile information. Output: The adjaent matrix RA of the reonstruted ego network RG = ( V, E R ). Steps: : RA = A ; VTS =Φ; VPS = Φ ; //Initialization //Set VTS stores the topologial similarities of verties. //Set VPS stores the profile similarities of verties. 2: for eah edge e E do 3: alulate the topologial similarity of the two verties linked by edge e and insert it in set VTS ; 4: alulate the profile similarity of the two verties linked by edge e and insert it in set VPS ; 5: endfor 6: ompute the median of set VTS, M _ VTS ; 7: ompute the median of set VPS, M _ VTS ; 8: for eah vertex i V do 9: for eah vertex j V do : if vts( i, j) > M_VTS and vps( i, j) > M_VPS do // vts( i, j ) is the topologial similarity of vertex i and // vertex j. // vps( i, j ) is the profile similarity of vertex i and // vertex j. : set RA( i, j ) = ; 2: endif 3: endfor 4: endfor 5: return RA C. Cirle Detetion Our irle detetion algorithm ontains three steps. Firstly, we ompute the similarity of eah pair of edges who have ommon vertex. The similarity of edges onsists of two parts: topologial similarity and profile similarity. The definition of the topologial similarity of two adjaent edges, lts( e, e ), is the same as what in ik jk link ommunity algorithm. The profile similarity of edges e and e is defined as ik jk lps( e, e ) = os( profile( i), profile( j)). We use ik jk parameter α to balane the effet of topologial struture and profile information. The final similarity of edges e and e is ik jk S( e, e ) = α lts( e, e ) + ( α) lps( e, e ). Then ik jk ik jk ik jk we employ single-linkage hierarhial lustering algorithm to partition these edges. The indued verties of similar edges onstitute a irle. To simplify the lustering proess, we utilize similarity threshold parameter τ to deide the luster granularity. Finally, we abstrat ommon features from the edges in a irle to explain why this irle emerges. Algorithm 2 is applied to detet the irles. For eah edge in the reonstruted network RG = ( V, E R ), if it isn t in a known irle, we insert it into an empty set named by edges _ irle in line 5-9. Then we find the edges similar to any of the edge in set edges _ irle, and insert these edges into set edges _ irle in line -2 (When we talk about two edges are similar, we mean the similarity between them is bigger than the parameter τ ). This proess will stop until we ouldn t insert any edge into set edges _ irle. The indued verties of the edges _ irle form a irle and we insert this irle into set CS in line 7. Finally, we obtain the ommon features of the edges in set edges _ irle by the irle feature abstrat proedure in line 8. Algorithm 2. Cirle deteting algorithm Input: The adjaent matrix RA of the reonstruted ego network RG = ( V, E R ); Users profile information; Similarity threshold parameter τ. Output: The set of soial irles, SC ; The set of irle feature vetors, CFV. // Eah irle feature vetor is orresponding to a irle // to interpret the reason this irle exists. Steps: : SC = Φ ; 2: CFV = Φ ; 3: Searhed _ Edges = Φ ; // Set Searhed _ Edges stores the edges in known // ommunities 23 ACADEMY PUBLISHER

4 2578 JOURNAL OF COMPUTERS, VOL. 8, NO., OCTOBER 23 4: ompute the similarity of eah pair of edges in graph RG = ( V, E R ); 5: for eah edge i E do R 6: if i Searhed _ Edges do 7: insert i into Searhed _ Edges ; 8: edges _ irle =Φ; 9: insert i into edges _ irle ; : for eah edge j edges _ irle do : if edge k E and R k Searhed _ Edges and Sk (, j) > τ do 2: insert k into edges _ irle ; 3: insert k into Searhed _ Edges ; 4: endif 5: endfor 6: endif 7: insert the indued verties of edges _ irle into SC ; 8: irle _ feature _ vetor =irle feature abstrat( edges _ irle ); 9: insert irle _ feature _ vetor into CFV ; 2: endfor 2: return SC, CFV A irle forms beause people in this irle have the same relationship. We an explain the meaning of a irle by abstrating the ommon features of the edges in the irle. The feature vetor of an edge e i, j is the ommon features of vertex i and vertex j, whih is defended as edge _ feature _ vetor( e ) = profile () i profile ( j) ij,. In a irle, if there are some features appearing in almost every edge feature vetor, and then it is reasonable to say these features ause the existene of the irle. Algorithm 3 is a subprogram of algorithm 2. It omputes whih dimensions of users profile information lead to densely linked irles. Algorithm 3 returns a vetor, alled irle feature vetor. The value of element i in the vetor is a weight, and it represents the ontribution of feature i to forming the irle. If it is big enough, say,, then we an onsider that feature i should be responsible for the emergene of the irle. The detail of algorithm 3 is as follows: Algorithm 3. Cirle feature abstrat ( ES ) Input: Edge set ES of irle C. Output: The irle feature vetor of irle C. Steps: : sum _ vetor = ; //initialization 2: for eah edge e ES, do 3: sum _ vetor = sum _ vetor + edge _ feature _ vetor( e); 4: endfor sum_ vetor 5: irle _ feature _ vetor = ; ES 6: return irle _ feature _ vetor D. Our Algorithm Individuals an partiipate in multiple irles, but relationships often exist for one dominant reason. It is appropriate to onsider irles as sets of similar onnetion. Based on the analysis above, our method identifies irles by partitioning edges.we give the overall framework of our method in algorithm 4. Algorithm 4. Our algorithm Input: The adjaent matrix A of an ego network G = ( V, E) ; Users profile information; Similarity threshold parameter τ. Output: The set of soial irles; The set of irle feature vetors. Steps:. Run algorithm to get a reonstruted ego network; 2. Run algorithm 2 to detet soial irles and the meaning of eah irle. 3. Return the set of soial irles and the set of irle feature vetors. Our method an detet overlapping and hierarhial 2 irles simultaneously. The time omplexity is Om ( ), whih is relatively high. Here m is the number of edges in the ego network. Fortunately, sine the sale of an ego network is usually not so big, the running time of our algorithm is aeptable. III. EXPERIMENTS AND RESULTS A. Experimental Data We obtained ego networks and ground-truth from Faebook. The ground-truth data work as benhmark. We obtained profile and network data from ego networks, onsisting of 93 irles and 4,39 users. On average, users identified 9 irles in their ego networks, with an average irle size of 22 friends. Examples of suh irles inlude students of ommon universities, sports teams, relatives, et. The same dataset are used in paper 6. B. Evaluation Metris We validate the auray of our algorithm by omparing the set of predited irles P with the set of benhmark irles B. Two evaluation metris are employed, -BER and F-measure. ) -BER To measure the alignment between a predited irle p and a benhmark irle b, we ompute the Balaned Error Rate (BER) between these two irles [3], p\ b b\ p BER( b, p) = +. 2 p b This measure assigns equal importane to false 23 ACADEMY PUBLISHER

5 JOURNAL OF COMPUTERS, VOL. 8, NO., OCTOBER positives and false negatives, so that trivial or random preditions inur an error of on average. Sine we do not know the orrespondene between irles in B and P, we ompute the optimal math via linear assignment by maximizing: max ( BER( p, f ( p))), f : P B f p dom( f ) where f is a (partial) orrespondene between P and B. That is, if the number of predited irles P is less than the number of benhmark irles B, then every irle p P must have a math b B, but if P > B,we do not inur a penalty for additional preditions that ould have been irles but were not inluded in the ground-truth. 2) F-measure To measure whether a predited irle p and a ground-truth irle b are mathed or not, we ompute neighborhood affinity sore (NA) between the two irles, 2 b p NA( p, b) =. If NA( p, b) ω, then they are b p onsidered to be mathing, and ω is usually set as.2. We use N to represent the number of predited irles p whih math at least a real irle. The mathemati N = p p P, b B, NA( p, b) ω. expression is { } p N is the number of real irles whih math at least a b predited one, the mathemati expression is N = { b b B, p P, NA( p, b) ω}. Preision and b reall are defined as [4]: N p Preision = Reall = P B F-measure whih is the harmoni mean of preision and reall is defined as: F measure = 2 Preision Reall /( Preision + Reall ). It is used to evaluate the overall performane of the predit results. C. Our Results ) Parameter analysis Our algorithm employs two parameters, inluding similarity threshold parameter τ used to ontrol lustering granularity and balane parameter α used to balane the effet of topologial struture and profile information. Sine the preferene τ is inherited from link ommunity algorithm, we didn t analyze it in this paper and just set it as the average similarity of edge pairs. To study how the parameter α affets the results, we use. as the step length and inrease α from. to.9 step by step. To explore the relationship between α and the number of predited irles, we randomly hoose 5 ego networks to observe the hanging trends. The experimental results displayed in Fig. 3 illustrate that with the inrement of α, the number of predited irles N b inreases too. This is beause of the way we define the topologial similarity and profile similarity. We sort topologial similarities and profile similarities of all the adjaent edges in an ego network, and find that profile similarity inreases slowly. An example is shown in Fig. 4. We utilize the average topologial similarity and the average profile similarity of edges as the thresholds to ut topologial similarity urve and profile similarity urve respetively. Muh more edge pairs are onsidered dissimilar in the topologial similarity urve, and this may ause relatively small irles. Parameter α is the weight of topologial similarity, so when we set similarity threshold parameter τ as the average similarity of edges, the bigger α is, the more dissimilar edge pairs are. An illustration is displayed in Fig. 5. Then we study how the α affets -BER and F-measure. The experimental results are displayed in Fig. 6 and Fig. 7. In Fig. 6, hanging regulations between α and -BER are not very lear. The same situation is observed in Fig. 7. This is beause the profile and topologial information are not the only effetive fators for users to organize their irles. Many irles are reated using information that users do not expliitly make available on soial networks, suh as a irle of best friends. So we an t give a preise relationship between α and the auray evaluation metris. However, we notie that in our data set, when α is small, say.2 or.3, we get the higher -BER and F-measure. So we set α =.3 in our experiments. number of predited irles ego network ego network 2 ego network 3 ego network 4 ego network parameter alpha Fig. 3. The relationship between parameter α and the number of predited irles. 5 ego networks are employed to illustrate the hanging trend. similarity topologial similarity profile similarity x 4 edge pairs with ommon vertex Fig. 4. The inrement urves of topologial similarity and profile similarity in an ego network. Vertial lines represent utting these two urves with their average similarity. The average similarity of topologial similarity urve is.25, and the similarities of 44 edge 23 ACADEMY PUBLISHER

6 258 JOURNAL OF COMPUTERS, VOL. 8, NO., OCTOBER 23 pairs are lower than.25. The average similarity of profile similarity urve is.36, and the similarities of 383 edge pairs are lower than.36. shool and having the same level of eduation and living together. similarity.9.7 alpha=. alpha=.3 alpha= alpha=.7 alpha=.9 weight same gender same first name Fig edge pairs with ommom vertex x 4 The inrement urves of similarity with different parameter α in an ego network. Vertial lines represent utting these urves with their average similarity respetively. With the inrement of α, there are more and more edge pairs whose similarity is lower than average similarity appear. -BER.9.7 ego network ego network 2 ego network 3 ego network 4 ego network 5 weight same shool feature vetor for a irle (A) work for the same employer feature vetor for a irle (B) same loal parameter alpha.7 same language Fig. 6. The relationship between parameter α and -BER. weight F-measure Fig ego network ego network 2 ego network 3.3 ego network 4 ego network parameter alpha The relationship between parameter α and F-measure. 2) Cirles deteted by our algorithm On average, our algorithm identified 2 irles in ego networks, with an average irle size of 23. It is very lose to the real situation. Our -BER sore is.76 and f-measure sore is 2. Fig. 8 shows the irle feature vetors of 4 irles we deteted. People in Fig. 8 (A) have the same gender and they are relatives. People in Fig. 8(B) are olleagues and they live in the same town. People in Fig. 8(C) are friends who speak the same language. People in Fig. 8(D) are shoolmate. They are onentrating on the same speialty, learning in the same. same onentration weight Fig. 8. feature vetor for a irle (C) same shool same level fo eduation same loal feature vetor for a irle (D) Cirle feature vetors of four irles. D. Experimental Results Comparative Evaluation In this setion, we ompare the performane, inluding auray and running time, of our algorithm with link ommunity, low-rank embedding and probabilisti model algorithm. Fig. 9 shows the results of the omparison of our 23 ACADEMY PUBLISHER

7 JOURNAL OF COMPUTERS, VOL. 8, NO., OCTOBER algorithm and three ompetitive approahes on -BER and F-measure. The -BER sore of our algorithm is.76, whih is 26.7% and 2% higher than link ommunity and low-rank embedding. The F-measure of our algorithm is 2, whih is 25.9%, 88.9% higher than link ommunity and low-rank embedding. In the respet of auray, the probabilisti model is better than us. Our -BER sore and F-measure are 9.5% and.9% lower than that of probabilisti model..2 -BER low-rank embedding probabilisti model our algorithm link ommunity F-meature Fig. 9. The omparisons between link ommunity, probability mode, low-rank embedding and our algorithm on -BER and F-measure. Fig. displays the running time of 4 algorithms. We hoose 3 ego networks with different sales. When the vertex number is 66, the running time of link ommunity, low-rank embedding and our approah is less than seond, while probabilisti mode needs 5 seonds. When the vertex number is 59, our algorithm needs seonds, whih is only a little more than link ommunity. The running time of probabilisti mode is 79 seonds at this sale. When the sale of the network is 46, the running time of our algorithm is 832 seonds. It is almost twie longer than that of low-rank embedding. Probabilisti model approah needs almost 3 hours to exeute the omputing proess. running time (se) our algorithm probabilisti model Low-Rank Embedding link ommunity vertex numbers Fig.. The omparisons between link ommunity, probability mode, low-rank embedding and our algorithm on running time. IV. CONCLUSION AND DISCUSSION One important feature of personal soial networks is the ability to group friends and ontats into irles. Creating and maintaining these irles is a time onsuming business. In this paper, we propose an effiient algorithm to analyze a user s entire list of ontats and automatially divide them up into useful irles. We improve link ommunity algorithm by adding users profile information to detet irles. And alulate what features ause the emergene of a irle. The experimental results show that our algorithm is more aurate than link ommunity and low-rank embedding method. Although our algorithm is less aurate than probabilisti mode approah, it is omparable. And the running time we need is far less than that of probabilisti mode approah. Our method gets a good balane between auray and effiieny. Experimental results demonstrate that haraterizing soial irles from the respet of edge is reasonable. Our proposed method is an effetive algorithm in identifying soial irles. ACKNOWLEDGMENT This work was supported by the National Natural Siene Foundation of China (Nos , 936, 657 and 6246), Provinial Soial Siene Foundation of Shaanxi (No. M6) and the Fundamental Researh Funds for the Central Universities (No. K5564). REFERENCE [] J. Sott, Soial Network Analysis: A Handbook, 2, SAGE Publiations, London, UK. [2] S. Wasserman and K. Faust, Soial network analysis,994, Cambridge University Press, Cambridge, UK. [3] K. P. Reddy, M. Kitsuregawa, P. Sreekanth, and S. S. Rao, A Graph Based Approah to Extrat a Neighborhood Customer Community for Collaborative Filtering, In Proeedings of the Seond International Workshop on Databases in Networked Information Systems, 22, pp [4] M. Girvan and M. Newman, Community struture in soial and biologial networks, Pro Natl Aad Si, Vol. 99, 22, pp [5] Xianghua Fu, Chao Wang, Zhiqiang Wang and Zhong Ming, Threshold Random Walkers for Community Struture Detetion in Complex Networks, Journal of Software, 23, Vol. 8, No. 2, pp [6] Yueping Li, Yunming Ye and Xiaolin Du, A New Vertex Similarity Metri for Community Disovery: a Loal Flow Model, Journal of Software, 2, Vol. 6, No. 8, pp [7] Chengying Mao, A Heuristi Algorithm for Bipartite Community Detetion in Soial Networks, Journal of Software, 22, Vol. 7, No., 24-2 [8] T. Yoshida, Toward finding hidden ommunities based on user profiles, In Proeeding of the IEEE International Conferene on Data Mining Workshops, 2. pp [9] Stephan Günnemann, Brigitte Boden, Thomas Seidl, Finding density-based subspae lusters in graphs with feature vetors, Data Mining and Knowledge Disovery, 22, vol.25, pp [] Julian MAuley and Jure Leskove, Learning to disover soial irles in ego networks, Neural Information Proessing Systems, 22, pp [] Y. Y. Ahn, J. P. Bagrow and S. Lehmann, Link ommunities reveal multisale omplexity in networks, Nature, 2, 466:76 [2] D. Liben-Nowell and J. Kleinberg, The link-predition problem for soial networks, Journal of the Amerian 23 ACADEMY PUBLISHER

8 2582 JOURNAL OF COMPUTERS, VOL. 8, NO., OCTOBER 23 Soiety for Information Siene and Tehnology, 27, 58 (7): pp. 9-3 [3] Y. Chen and C. Lin, Combining SVMs with various feature seletion strategies, Studies in Fuzziness and Soft Computing, 26, Vol. 27, pp [4] C. J. van Rijsbergen, Information Retrieval, Butterworth 979 Yu Wang is urrently a PhD student at the Shool of Computer Siene and Tehnology of Xidian University Xi an, China. She reeived her Master of Management from the Shool of Eonomis and Management of Xidian University (26) and her Bahelor of Management from Shool of Eonomis and Management of Xidian University (23). Her researh interests inlude data mining and omplex network. Lin Gao reeived the B.S and M.S. in Computational Mathematis from Xi an Jiaotong University and Northwest University in 987 and 99, respetively, and the. Ph. D. degree inciruit and System from Eletronis Engineering Institute from Xidian University in 23. She was a visiting sholar at University of Guelph, Canada from 24 to 25. At present, she is a professor in the Department of Computer Siene and Tehnology, Xidian University. Her researh interests inlude bioinformatis, data mining in biologial data, graph theory and intelligene omputation. 23 ACADEMY PUBLISHER

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

A Comprehensive Review of Overlapping Community Detection Algorithms for Social Networks

A Comprehensive Review of Overlapping Community Detection Algorithms for Social Networks International Journal of Engineering Researh and Appliations (IJERA) ISSN: 2248-9622 National Conferene on Advanes in Engineering and Tehnology (AET- 29th Marh 2014) RESEARCH ARTICLE OPEN ACCESS A Comprehensive

More information

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

Social Network Analysis Based on BSP Clustering Algorithm

Social Network Analysis Based on BSP Clustering Algorithm Communiations of the IIMA Volume 7 Issue 4 Artile 5 7 Soial Network Analysis Based on BSP Clustering Algorithm ong Shool of Business Administration China University of Petroleum Follow this and additional

More information

Cluster-Based Cumulative Ensembles

Cluster-Based Cumulative Ensembles Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes Deteting Outliers in High-Dimensional Datasets with Mixed Attributes A. Koufakou, M. Georgiopoulos, and G.C. Anagnostopoulos 2 Shool of EECS, University of Central Florida, Orlando, FL, USA 2 Dept. of

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

arxiv: v1 [cs.db] 13 Sep 2017

arxiv: v1 [cs.db] 13 Sep 2017 An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution

More information

Boosted Random Forest

Boosted Random Forest Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,

More information

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information

the data. Structured Principal Component Analysis (SPCA)

the data. Structured Principal Component Analysis (SPCA) Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving

More information

Approximate logic synthesis for error tolerant applications

Approximate logic synthesis for error tolerant applications Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu

More information

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of

More information

Time delay estimation of reverberant meeting speech: on the use of multichannel linear prediction

Time delay estimation of reverberant meeting speech: on the use of multichannel linear prediction University of Wollongong Researh Online Faulty of Informatis - apers (Arhive) Faulty of Engineering and Information Sienes 7 Time delay estimation of reverberant meeting speeh: on the use of multihannel

More information

Exploring the Commonality in Feature Modeling Notations

Exploring the Commonality in Feature Modeling Notations Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om

More information

Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8

Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8 Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introdution... 1 1.1. Internet Information...2 1.2. Internet Information Retrieval...3 1.2.1. Doument Indexing...4 1.2.2. Doument Retrieval...4

More information

A scheme for racquet sports video analysis with the combination of audio-visual information

A scheme for racquet sports video analysis with the combination of audio-visual information A sheme for raquet sports video analysis with the ombination of audio-visual information Liyuan Xing a*, Qixiang Ye b, Weigang Zhang, Qingming Huang a and Hua Yu a a Graduate Shool of the Chinese Aadamy

More information

Using Augmented Measurements to Improve the Convergence of ICP

Using Augmented Measurements to Improve the Convergence of ICP Using Augmented Measurements to Improve the onvergene of IP Jaopo Serafin, Giorgio Grisetti Dept. of omputer, ontrol and Management Engineering, Sapienza University of Rome, Via Ariosto 25, I-0085, Rome,

More information

An Approach to Physics Based Surrogate Model Development for Application with IDPSA

An Approach to Physics Based Surrogate Model Development for Application with IDPSA An Approah to Physis Based Surrogate Model Development for Appliation with IDPSA Ignas Mikus a*, Kaspar Kööp a, Marti Jeltsov a, Yuri Vorobyev b, Walter Villanueva a, and Pavel Kudinov a a Royal Institute

More information

New Fuzzy Object Segmentation Algorithm for Video Sequences *

New Fuzzy Object Segmentation Algorithm for Video Sequences * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 521-537 (2008) New Fuzzy Obet Segmentation Algorithm for Video Sequenes * KUO-LIANG CHUNG, SHIH-WEI YU, HSUEH-JU YEH, YONG-HUAI HUANG AND TA-JEN YAO Department

More information

Gradient based progressive probabilistic Hough transform

Gradient based progressive probabilistic Hough transform Gradient based progressive probabilisti Hough transform C.Galambos, J.Kittler and J.Matas Abstrat: The authors look at the benefits of exploiting gradient information to enhane the progressive probabilisti

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

Optimization of Two-Stage Cylindrical Gear Reducer with Adaptive Boundary Constraints

Optimization of Two-Stage Cylindrical Gear Reducer with Adaptive Boundary Constraints 5 JOURNAL OF SOFTWARE VOL. 8 NO. 8 AUGUST Optimization of Two-Stage Cylindrial Gear Reduer with Adaptive Boundary Constraints Xueyi Li College of Mehanial and Eletroni Engineering Shandong University of

More information

Particle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating

Particle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating Original Artile Partile Swarm Optimization for the Design of High Diffration Effiient Holographi Grating A.K. Tripathy 1, S.K. Das, M. Sundaray 3 and S.K. Tripathy* 4 1, Department of Computer Siene, Berhampur

More information

Exploiting Enriched Contextual Information for Mobile App Classification

Exploiting Enriched Contextual Information for Mobile App Classification Exploiting Enrihed Contextual Information for Mobile App Classifiation Hengshu Zhu 1 Huanhuan Cao 2 Enhong Chen 1 Hui Xiong 3 Jilei Tian 2 1 University of Siene and Tehnology of China 2 Nokia Researh Center

More information

Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis

Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis Journal of Computer Siene 4 (): 9-97, 008 ISSN 549-3636 008 Siene Publiations Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis Deepti Gaur, Aditya Shastri and Ranjit Biswas Department of Computer

More information

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method 3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr

More information

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq Volume 4 Issue 6 June 014 ISSN: 77 18X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om Medial Image Compression using

More information

Evolutionary Feature Synthesis for Image Databases

Evolutionary Feature Synthesis for Image Databases Evolutionary Feature Synthesis for Image Databases Anlei Dong, Bir Bhanu, Yingqiang Lin Center for Researh in Intelligent Systems University of California, Riverside, California 92521, USA {adong, bhanu,

More information

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT?

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? 3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? Bernd Girod, Peter Eisert, Marus Magnor, Ekehard Steinbah, Thomas Wiegand Te {girod eommuniations Laboratory, University of Erlangen-Nuremberg

More information

Model Based Approach for Content Based Image Retrievals Based on Fusion and Relevancy Methodology

Model Based Approach for Content Based Image Retrievals Based on Fusion and Relevancy Methodology The International Arab Journal of Information Tehnology, Vol. 12, No. 6, November 15 519 Model Based Approah for Content Based Image Retrievals Based on Fusion and Relevany Methodology Telu Venkata Madhusudhanarao

More information

Facility Location: Distributed Approximation

Facility Location: Distributed Approximation Faility Loation: Distributed Approximation Thomas Mosibroda Roger Wattenhofer Distributed Computing Group PODC 2005 Where to plae ahes in the Internet? A distributed appliation that has to dynamially plae

More information

KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION

KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION Cuiui Kang 1, Shengai Liao, Shiming Xiang 1, Chunhong Pan 1 1 National Laboratory of Pattern Reognition, Institute of Automation, Chinese

More information

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University

More information

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of

More information

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

An Efficient and Scalable Approach to CNN Queries in a Road Network

An Efficient and Scalable Approach to CNN Queries in a Road Network An Effiient and Salable Approah to CNN Queries in a Road Network Hyung-Ju Cho Chin-Wan Chung Dept. of Eletrial Engineering & Computer Siene Korea Advaned Institute of Siene and Tehnology 373- Kusong-dong,

More information

Sparse Certificates for 2-Connectivity in Directed Graphs

Sparse Certificates for 2-Connectivity in Directed Graphs Sparse Certifiates for 2-Connetivity in Direted Graphs Loukas Georgiadis Giuseppe F. Italiano Aikaterini Karanasiou Charis Papadopoulos Nikos Parotsidis Abstrat Motivated by the emergene of large-sale

More information

FOREGROUND OBJECT EXTRACTION USING FUZZY C MEANS WITH BIT-PLANE SLICING AND OPTICAL FLOW

FOREGROUND OBJECT EXTRACTION USING FUZZY C MEANS WITH BIT-PLANE SLICING AND OPTICAL FLOW FOREGROUND OBJECT EXTRACTION USING FUZZY C EANS WITH BIT-PLANE SLICING AND OPTICAL FLOW SIVAGAI., REVATHI.T, JEGANATHAN.L 3 APSG, SCSE, VIT University, Chennai, India JRF, DST, Dehi, India. 3 Professor,

More information

Semi-Supervised Affinity Propagation with Instance-Level Constraints

Semi-Supervised Affinity Propagation with Instance-Level Constraints Semi-Supervised Affinity Propagation with Instane-Level Constraints Inmar E. Givoni, Brendan J. Frey Probabilisti and Statistial Inferene Group University of Toronto 10 King s College Road, Toronto, Ontario,

More information

Creating Adaptive Web Sites Through Usage-Based Clustering of URLs

Creating Adaptive Web Sites Through Usage-Based Clustering of URLs Creating Adaptive Web Sites Through Usage-Based Clustering of URLs Bamshad Mobasher Dept. of Computer Siene, DePaul University, Chiago, IL mobasher@s.depaul.edu Robert Cooley, Jaideep Srivastava Dept.

More information

A Method for Measuring Co-authorship Relationships in MediaWiki Libby Veng-Sam Tang Department of Computer and Information Siene Faulty of Siene and Tehnology University of Maau Maau S.A.R., China Tel:

More information

Multi-Channel Wireless Networks: Capacity and Protocols

Multi-Channel Wireless Networks: Capacity and Protocols Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:

More information

A Fast Kernel-based Multilevel Algorithm for Graph Clustering

A Fast Kernel-based Multilevel Algorithm for Graph Clustering A Fast Kernel-based Multilevel Algorithm for Graph Clustering Inderjit Dhillon Dept. of Computer Sienes University of Texas at Austin Austin, TX 78712 inderjit@s.utexas.edu Yuqiang Guan Dept. of Computer

More information

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion

More information

This fact makes it difficult to evaluate the cost function to be minimized

This fact makes it difficult to evaluate the cost function to be minimized RSOURC LLOCTION N SSINMNT In the resoure alloation step the amount of resoures required to exeute the different types of proesses is determined. We will refer to the time interval during whih a proess

More information

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification erformane Improvement of TC on Wireless Cellular Networks by Adaptive Combined with Expliit Loss tifiation Masahiro Miyoshi, Masashi Sugano, Masayuki Murata Department of Infomatis and Mathematial Siene,

More information

Visualization of patent analysis for emerging technology

Visualization of patent analysis for emerging technology Available online at www.sienediret.om Expert Systems with Appliations Expert Systems with Appliations 34 (28) 84 82 www.elsevier.om/loate/eswa Visualization of patent analysis for emerging tehnology Young

More information

A New RBFNDDA-KNN Network and Its Application to Medical Pattern Classification

A New RBFNDDA-KNN Network and Its Application to Medical Pattern Classification A New RBFNDDA-KNN Network and Its Appliation to Medial Pattern Classifiation Shing Chiang Tan 1*, Chee Peng Lim 2, Robert F. Harrison 3, R. Lee Kennedy 4 1 Faulty of Information Siene and Tehnology, Multimedia

More information

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah

More information

Cluster Centric Fuzzy Modeling

Cluster Centric Fuzzy Modeling 10.1109/TFUZZ.014.300134, IEEE Transations on Fuzzy Systems TFS-013-0379.R1 1 Cluster Centri Fuzzy Modeling Witold Pedryz, Fellow, IEEE, and Hesam Izakian, Student Member, IEEE Abstrat In this study, we

More information

Accommodations of QoS DiffServ Over IP and MPLS Networks

Accommodations of QoS DiffServ Over IP and MPLS Networks Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering

More information

Deep Rule-Based Classifier with Human-level Performance and Characteristics

Deep Rule-Based Classifier with Human-level Performance and Characteristics Deep Rule-Based Classifier with Human-level Performane and Charateristis Plamen P. Angelov 1,2 and Xiaowei Gu 1* 1 Shool of Computing and Communiations, Lanaster University, Lanaster, LA1 4WA, UK 2 Tehnial

More information

An Efficient System for Medical Image Retrieval using Generalized Gamma Distribution

An Efficient System for Medical Image Retrieval using Generalized Gamma Distribution I.J. Image, Graphis and Signal Proessing, 05, 6, 5-58 Published Online May 05 in MECS (http://www.mes-press.org/) DOI: 0.585/ijigsp.05.06.07 An Effiient System for Medial Image Retrieval using Generalized

More information

An Interactive-Voting Based Map Matching Algorithm

An Interactive-Voting Based Map Matching Algorithm Eleventh International Conferene on Mobile Data Management An Interative-Voting Based Map Mathing Algorithm Jing Yuan* University of Siene and Tehnology of China Hefei, China yuanjing@mail.ust.edu.n Yu

More information

Vertex Unfoldings of Orthogonal Polyhedra: Positive, Negative, and Inconclusive Results

Vertex Unfoldings of Orthogonal Polyhedra: Positive, Negative, and Inconclusive Results CCCG 2018, Winnipeg, Canada, August 8 10, 2018 Vertex Unfoldings of Orthogonal Polyhedra: Positive, Negative, and Inonlusive Results Luis A. Garia Andres Gutierrrez Isaa Ruiz Andrew Winslow Abstrat We

More information

arxiv: v1 [cs.gr] 10 Apr 2015

arxiv: v1 [cs.gr] 10 Apr 2015 REAL-TIME TOOL FOR AFFINE TRANSFORMATIONS OF TWO DIMENSIONAL IFS FRACTALS ELENA HADZIEVA AND MARIJA SHUMINOSKA arxiv:1504.02744v1 s.gr 10 Apr 2015 Abstrat. This work introdues a novel tool for interative,

More information

Fast Rigid Motion Segmentation via Incrementally-Complex Local Models

Fast Rigid Motion Segmentation via Incrementally-Complex Local Models Fast Rigid Motion Segmentation via Inrementally-Complex Loal Models Fernando Flores-Mangas Allan D. Jepson Department of Computer Siene, University of Toronto {mangas,jepson}@s.toronto.edu Abstrat The

More information

13.1 Numerical Evaluation of Integrals Over One Dimension

13.1 Numerical Evaluation of Integrals Over One Dimension 13.1 Numerial Evaluation of Integrals Over One Dimension A. Purpose This olletion of subprograms estimates the value of the integral b a f(x) dx where the integrand f(x) and the limits a and b are supplied

More information

Graph-Based vs Depth-Based Data Representation for Multiview Images

Graph-Based vs Depth-Based Data Representation for Multiview Images Graph-Based vs Depth-Based Data Representation for Multiview Images Thomas Maugey, Antonio Ortega, Pasal Frossard Signal Proessing Laboratory (LTS), Eole Polytehnique Fédérale de Lausanne (EPFL) Email:

More information

Recommendation Subgraphs for Web Discovery

Recommendation Subgraphs for Web Discovery Reommation Subgraphs for Web Disovery Arda Antikaioglu Department of Mathematis Carnegie Mellon University aantika@andrew.mu.edu R. Ravi Tepper Shool of Business Carnegie Mellon University ravi@mu.edu

More information

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

The Implementation of RRTs for a Remote-Controlled Mobile Robot

The Implementation of RRTs for a Remote-Controlled Mobile Robot ICCAS5 June -5, KINEX, Gyeonggi-Do, Korea he Implementation of RRs for a Remote-Controlled Mobile Robot Chi-Won Roh*, Woo-Sub Lee **, Sung-Chul Kang *** and Kwang-Won Lee **** * Intelligent Robotis Researh

More information

Dubins Path Planning of Multiple UAVs for Tracking Contaminant Cloud

Dubins Path Planning of Multiple UAVs for Tracking Contaminant Cloud Proeedings of the 17th World Congress The International Federation of Automati Control Dubins Path Planning of Multiple UAVs for Traking Contaminant Cloud S. Subhan, B.A. White, A. Tsourdos M. Shanmugavel,

More information

Rotation Invariant Spherical Harmonic Representation of 3D Shape Descriptors

Rotation Invariant Spherical Harmonic Representation of 3D Shape Descriptors Eurographis Symposium on Geometry Proessing (003) L. Kobbelt, P. Shröder, H. Hoppe (Editors) Rotation Invariant Spherial Harmoni Representation of 3D Shape Desriptors Mihael Kazhdan, Thomas Funkhouser,

More information

Relevance for Computer Vision

Relevance for Computer Vision The Geometry of ROC Spae: Understanding Mahine Learning Metris through ROC Isometris, by Peter A. Flah International Conferene on Mahine Learning (ICML-23) http://www.s.bris.a.uk/publiations/papers/74.pdf

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

Semantic Concept Detection Using Weighted Discretization Multiple Correspondence Analysis for Disaster Information Management

Semantic Concept Detection Using Weighted Discretization Multiple Correspondence Analysis for Disaster Information Management Semanti Conept Detetion Using Weighted Disretization Multiple Correspondene Analysis for Disaster Information Management Samira Pouyanfar and Shu-Ching Chen Shool of Computing and Information Sienes Florida

More information

timestamp, if silhouette(x, y) 0 0 if silhouette(x, y) = 0, mhi(x, y) = and mhi(x, y) < timestamp - duration mhi(x, y), else

timestamp, if silhouette(x, y) 0 0 if silhouette(x, y) = 0, mhi(x, y) = and mhi(x, y) < timestamp - duration mhi(x, y), else 3rd International Conferene on Multimedia Tehnolog(ICMT 013) An Effiient Moving Target Traking Strateg Based on OpenCV and CAMShift Theor Dongu Li 1 Abstrat Image movement involved bakground movement and

More information

HIGHER ORDER full-wave three-dimensional (3-D) large-domain techniques in

HIGHER ORDER full-wave three-dimensional (3-D) large-domain techniques in FACTA UNIVERSITATIS (NIŠ) SER.: ELEC. ENERG. vol. 21, no. 2, August 2008, 209-220 Comparison of Higher Order FEM and MoM/SIE Approahes in Analyses of Closed- and Open-Region Eletromagneti Problems Milan

More information

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Ho Wireless Networks Giorgio Quer, Federio Librino, Lua Canzian, Leonardo Badia, Mihele Zorzi, University of California San Diego La

More information

A Dictionary based Efficient Text Compression Technique using Replacement Strategy

A Dictionary based Efficient Text Compression Technique using Replacement Strategy A based Effiient Text Compression Tehnique using Replaement Strategy Debashis Chakraborty Assistant Professor, Department of CSE, St. Thomas College of Engineering and Tehnology, Kolkata, 700023, India

More information

COMBINATION OF INTERSECTION- AND SWEPT-BASED METHODS FOR SINGLE-MATERIAL REMAP

COMBINATION OF INTERSECTION- AND SWEPT-BASED METHODS FOR SINGLE-MATERIAL REMAP Combination of intersetion- and swept-based methods for single-material remap 11th World Congress on Computational Mehanis WCCM XI) 5th European Conferene on Computational Mehanis ECCM V) 6th European

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any urrent or future media, inluding reprinting/republishing this material for advertising

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Improvement of low illumination image enhancement algorithm based on physical mode

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Improvement of low illumination image enhancement algorithm based on physical mode [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 22 BioTehnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(22), 2014 [13995-14001] Improvement of low illumination image enhanement

More information

Improved flooding of broadcast messages using extended multipoint relaying

Improved flooding of broadcast messages using extended multipoint relaying Improved flooding of broadast messages using extended multipoint relaying Pere Montolio Aranda a, Joaquin Garia-Alfaro a,b, David Megías a a Universitat Oberta de Catalunya, Estudis d Informàtia, Mulimèdia

More information

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY Dileep P, Bhondarkor Texas Instruments Inorporated Dallas, Texas ABSTRACT Charge oupled devies (CCD's) hove been mentioned as potential fast auxiliary

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

1 The Knuth-Morris-Pratt Algorithm

1 The Knuth-Morris-Pratt Algorithm 5-45/65: Design & Analysis of Algorithms September 26, 26 Leture #9: String Mathing last hanged: September 26, 27 There s an entire field dediated to solving problems on strings. The book Algorithms on

More information

Directed Rectangle-Visibility Graphs have. Abstract. Visibility representations of graphs map vertices to sets in Euclidean space and

Directed Rectangle-Visibility Graphs have. Abstract. Visibility representations of graphs map vertices to sets in Euclidean space and Direted Retangle-Visibility Graphs have Unbounded Dimension Kathleen Romanik DIMACS Center for Disrete Mathematis and Theoretial Computer Siene Rutgers, The State University of New Jersey P.O. Box 1179,

More information

BENDING STIFFNESS AND DYNAMIC CHARACTERISTICS OF A ROTOR WITH SPLINE JOINTS

BENDING STIFFNESS AND DYNAMIC CHARACTERISTICS OF A ROTOR WITH SPLINE JOINTS Proeedings of ASME 0 International Mehanial Engineering Congress & Exposition IMECE0 November 5-, 0, San Diego, CA IMECE0-6657 BENDING STIFFNESS AND DYNAMIC CHARACTERISTICS OF A ROTOR WITH SPLINE JOINTS

More information

TUMOR DETECTION IN MRI BRAIN IMAGE SEGMENTATION USING PHASE CONGRUENCY MODIFIED FUZZY C MEAN ALGORITHM

TUMOR DETECTION IN MRI BRAIN IMAGE SEGMENTATION USING PHASE CONGRUENCY MODIFIED FUZZY C MEAN ALGORITHM TUMOR DETECTION IN MRI BRAIN IMAGE SEGMENTATION USING PHASE CONGRUENCY MODIFIED FUZZY C MEAN ALGORITHM M. Murugeswari 1, M.Gayathri 2 1 Assoiate Professor, 2 PG Sholar 1,2 K.L.N College of Information

More information

An Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results

An Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results An Alternative Approah to the Fuzziier in Fuzzy Clustering to Obtain Better Clustering Results Frank Klawonn Department o Computer Siene University o Applied Sienes BS/WF Salzdahlumer Str. 46/48 D-38302

More information

Multi-modal Clustering for Multimedia Collections

Multi-modal Clustering for Multimedia Collections Multi-modal Clustering for Multimedia Colletions Ron Bekkerman and Jiwoon Jeon Center for Intelligent Information Retrieval University of Massahusetts at Amherst, USA {ronb jeon}@s.umass.edu Abstrat Most

More information

Cisco Collaborative Knowledge

Cisco Collaborative Knowledge Ciso Collaborative Knowledge Ciso on Ciso: How Ciso Servies Upskilled 14,400 Employees and Transformed into a Consultative, Solutions-Selling Organization. It is estimated that by 2020, roughly four out

More information

Colouring contact graphs of squares and rectilinear polygons de Berg, M.T.; Markovic, A.; Woeginger, G.

Colouring contact graphs of squares and rectilinear polygons de Berg, M.T.; Markovic, A.; Woeginger, G. Colouring ontat graphs of squares and retilinear polygons de Berg, M.T.; Markovi, A.; Woeginger, G. Published in: nd European Workshop on Computational Geometry (EuroCG 06), 0 Marh - April, Lugano, Switzerland

More information