Social Network Analysis Based on BSP Clustering Algorithm
|
|
- Denis Chapman
- 6 years ago
- Views:
Transcription
1 Communiations of the IIMA Volume 7 Issue 4 Artile 5 7 Soial Network Analysis Based on BSP Clustering Algorithm ong Shool of Business Administration China University of Petroleum Follow this and additional works at: htt://sholarworks.lib.susb.edu/iima Reommended Citation, ong (7) "Soial Network Analysis Based on BSP Clustering Algorithm," Communiations of the IIMA: Vol. 7: Iss. 4, Artile 5. Available at: htt://sholarworks.lib.susb.edu/iima/vol7/iss4/5 his Artile is brought to you for free and oen aess by CSUSB SholarWorks. It has been aeted for inlusion in Communiations of the IIMA by an authorized administrator of CSUSB SholarWorks. For more information, lease ontat sholarworks@susb.edu.
2 Soial Network Analysis Based on BSP Clustering Algorithm ong Shool of Business Administration China University of Petroleum ABSRAC Soial network analysis is a new researh field in data mining. he lustering in soial network analysis is different from traditional lustering. It requires grouing obets into lasses based on their links as well as their attributes. While traditional lustering algorithms grou obets only based on obets similarity, and it an't be alied to soial network analysis. So on the basis of BSP (business system lanning) lustering algorithm, a soial network lustering analysis algorithm is roosed. he roosed algorithm, different from traditional lustering algorithms, an grou obets in a soial network into different lasses based on their links and identify relation among lasses. INRODUCION Soial network analysis, whih an be alied to analysis of the struture and the roerty of ersonal relationshi, web age links, and the sread of messages, is a researh field in soiology. Reently soial network analysis has attrated inreasing attention in the data mining researh ommunity. From the viewoint of data mining, a soial network is a heterogeneous and multi-relational dataset reresented by grah (Han & Kamber, 6). Researh on soial network analysis in the data mining ommunity inludes following areas: lustering analysis (Bhattaharya & etoor, 5; Kubia, Moore and Shneider, 3), lassifiation (Lu & etoor, 3), link redition (Liben-Nowell & Kleinberg, 3; Krebs, ). Other ahievements inlude PageRank (Page, Brin, Motwani and Winograd, 998) and Hub-Authority (Kleinberg, 999) in web searh engine. In this aer, lustering analysis of soial network is studied. In the seond setion, a soial network lustering algorithm is roosed based on BSP lustering algorithm. he algorithm an grou obets in a soial network into different lasses based on their links, and it an also identify the relations among lasses. In the third setion, an examle of soial network lustering algorithm is resented, and then the onlusion and the future work diretion are given. SOCIAL NEWORK ANALYSIS BASED ON BSP CLUSERIN here has been extensive researh work on lustering in data mining. raditional lustering algorithms (Han & Kamber, 6) divide obets into lasses based on their similarity. Obets in a lass are similar to eah other and are very dissimilar from obets in different lasses. Soial network lustering analysis, whih is different from traditional lustering roblem, divides obets into lasses based on their links as well as their attributes. he biggest hallenge of soial network lustering analysis is how to divide obets into lasses based on obets links, thus we need find algorithms that an meet this hallenge. he BSP (business system lanning) lustering algorithm (ao, Wu and, ) is roosed by IBM. It designed to define information arhiteture for the firm in business system lanning. his algorithm analyses business roess and their data lasses, luster business roess into sub-systems, and define the relationshi of these sub-systems. Basially BSP lustering algorithm uses obets(business roesses)and links among obets(data lasses)to make lustering analysis. Similarly soial network also inludes obets and links among these obets. In view of the same re-ondition, the BSP lustering algorithm an be used in soial network lustering analysis. Communiations of the IIMA 39 7 Volume 7 Issue 4
3 Aording to grah theory, soial network is a direted grah omosed by obets and their relationshi. Figure shows a samle of soial network, the irle in the figure reresents an obet; the line with arrow is an edge of the grah, and it reresents direted link between two obets, so a soial network is a direted grah. Figure : A samle of soial network. O O E E E3 E4 O3 E5 E6 O4 E7 E8 E9 E O6 O5 In figure, Let Oi be an obet in soial network ( i... m ), let E whih means direted link between two obets, be a direted edge of the grah (... n ). After definition of obets and direted edges, we an also define reahable relation between two obets. here are two kinds of reahable relation among obets, shown as following: ) One-ste reahable relation: if there has direted link fromo i too through one and only one direted edge, then Oi to O is a one-ste reahable relation. For instane in figure there has a direted link from O too through the direted edge E, O too is one-ste reahable relation. ) Multi-stes reahable relation: if there has direted link from O i to O through two or more direted edges, then O i to O is a multi-stes reahable relation. For instane in figure has a direted link from O too4 through direted edges E and E 5, theno too4 is a -stes reahable relation. After these definitions, we an use BSP lustering algorithm to analyses a soial network. he analysis roesses are as following stes: enerate edge reation matrix and edge ointed matrix First aording to the obets and edges in the grah, define two matrix L and L. Let L be a m n matrix whih means the reation of edges. In the matrix, L ) denotes obetoi onnets with the tail of edge E, whih means that obetoi reates the direted edge E. L ) denotesoi doesn t onnet with the tail of edge E, whih means E isn t reated by obeto. For examle in figure obet O onnets with the tail of E, then it means O reates E, so L (,) ; O doesn t onnet with the tail of edge E, then it means E is not reated byo, so L (,). i Communiations of the IIMA 4 7 Volume 7 Issue 4
4 Let L be a m n matrix whih means the ointed relations of edges. In the matrix, L ) denotes obet Oi onnets with the head of edge E, whih means obet O i is ointed to by the direted edge E. L ) denotesoi doesn t onnet with the head of edge E, whih means E doesn t oint too i. For examle in figure obet O onnets with the head of E, whih means O is ointed to by E, so L (,). But O doesn t onnet with the head of edge E, then it means E doesn t oint to O, so L,). ( Calulate one-ste reahable matrix between obets After the definition of L and L, we an alulate one-ste reahable matrix between obets through the following equation. n L L gi ( l k) l ( k, )), i,..., m,,..., m k, () is Boolean rodut, is Boolean sum. ) O too is a one-ste reahable relation, ) means i means there hasn t a one-ste reahable relation fromo too. hrough, we an alulate all one-ste reahable relation between obets. i Calulate multi-stes reahable matrix between obets Besides one-ste reahable relation, there are multi-stes reahable relations between obets too. We also need alulate multi-stes reahable matries (-stes, 3-stes,, m--stes). Aording to grah theory and the BSP lustering algorithm, we an alulate multi-stes reahable 3 4 m matrix. Following equations show the alulation of multi-stes reahable matrix:,,,..., m g i, ( g( i, k) g( k, )), i,..., m,,..., m k m m () hese matries inlude -stes, 3-stes m--stes reahable relations between obets. Now we an know n-stes 3 4 m reahable relation between two obets through,,,...,. Calulate reahable matrix Beause we only onsider whether reahable relations exist between two obets, but do not are these relations are 3 4 m one-ste or multi-stes, so we need alulate reahable matrix R based on,,,,...,. he alulation of R is shown as following equation: m R I... (3) Communiations of the IIMA 4 7 Volume 7 Issue 4
5 is Boolean sum, I is unit matrix. R ) means reahable relation exists from i O too, but the reahable relations existing in matrix R is not mutual, for instane R ) means reahable relation exists from O i to O,but it doesn t means reahable relation exists fromo too. Mutual reahable relations between two obets are imortant in a soial network, so i we need alulate mutual reahable matrix based on R. Calulate mutual reahable matrix and generate lusters he mutual reahable matrix an be alulated through following alulate equation. Q R R (4) means Boolean rodut In the matrixq ) means there are mutual reahable relation betweeno i ando. In a soial network if two obets that have mutual reahable relation, they should belong to the same lass, thus we an luster based onq. hus aording to mutual reahable matrixq, we an divide a soial network into lasses based on strong submatries inq or adustedq. While strong sub-matrix is defined as follows. Strong sub-matrix: if all elements in a sub-matrix ofq are, this sub matrix is strong sub-matrix. Identify relationshis among lasses After lustering of soial network, we also need identify relationshi among lusters. his an be done through generated lusters and one-ste reahable matrix. If there is one-ste reahable relation between two obets in different lasses, we an say direted links exist between lasses. hrough we an identify all relations among lasses. After ervious 6 stes, we an divide a soial network into lasses. Soial network lustering analysis algorithm an be given: Inut: L : Edge reation Matrix L : Edge ointed matrix Begin L L u for k3 to m do k k m R I... Q R R Q > C k C,Q )->Relation ( C ) ( k End k Communiations of the IIMA 4 7 Volume 7 Issue 4
6 Communiations of the IIMA 43 7 Volume 7 Issue 4 Q > C k means generating lusters through mutual reahable matrix Q, and ( k C, Q )->Relation( k C ) means identifying relationshis among lusters base on lusters and one-ste reahable matrix. EXAMPLE Now an examle is given to show roess of the luster analysis of soial network. Suose a soial network as figure shows. Aording to the figure, we an give the edge reation matrix L and edge ointed matrix L as following. L L Aording to the soial network lustering algorithm, L and L, lustering the soial network show as following stes: Calulate one-ste reahable matrix between obets Calulate multi-stes reahable matrix between obets
7 Communiations of the IIMA 44 7 Volume 7 Issue 4 Calulate reahable matrix based on one-ste and multi-stes reahable matrix... 5 I R Calulate mutual reahable matrix, generate lusters R R Q Aording the mutual reahable matrixq, it inludes two strong sub matries. So we an divide figure to two lasses, the first lass C inludes obet 3,, O O O, and the seond lass C inludes 6 5 4,, O O O. Identify relationshis among lasses Aording to one-ste reahable matrix, there have one-ste reahable relations between to lasses ( 4 O O > and 4 3 O O > ), so we an identify relations between two lusters C and C, as figure shows. Figure : Identify relationshis between two lusters. C oints to C In figure, but C not oints to C, so we an identify relations between two lasses. C O O O 3 C O 4 O 5 O 6
8 CONCLUSION In this aer based on BSP lustering algorithm, an algorithm of soial network lustering analysis is roosed. It divides a soial network into different lasses aording to obets in the soial network and links between obets, and it also an identify relations among lusters. Main disadvantage of this algorithm is that it uses matries to store edges and reahable relations, in a real soial network these matries will be very huge, an t load into main memory. But beause these matries are very sarse, so we an design an effiient data struture to overome this shortoming. Also in our algorithm the edges between obets have same weight, however in real world suh edges may have different weights. Meanwhile the roerty of eah luster has not been analyzed. these will be solved in our future researh. REFERENCES Bhattaharya I, etoor L.(4). Iterative Reord Linkage for Cleaning and Integration. Proeeding SIMOD 4 worksho on researh issues on data mining and knowledge disovery, Paris, Frane,-8. ao X, Wu S, B. (). Management Information System. Beiing: Eonomy and Management Press (in Chinese). Han J, Kamber M. (6). Data Mining: Conets and ehniques nd edition. San Franiso: he Morgan Kaufmann Publishers. Kleinberg J. ( 999). Authoritative soures in a hyerlinked environment. Journal of the ACM, 5, Krebs V. (). Maing networks of terrorist ells. Connetions,4,43-5. Kubia J, Moore A, Shneider J. (3). ratable rou Detetion on Large Link Data Sets. Proeeding 3rd IEEE international onferene on data mining, Melbourne, FL, Liben-Nowell D, Kleinberg J. (3). he Link redition roblem for soial networks. Proeeding 3 international onferene on information and knowledge management, New Orleans, LA, Lu Q, etoor L. Link-based lassifiation. (3). Proeeding 3 international onferene on mahine learning, Washington DC, Page L, Brin S, Motwani R, Winograd. (998). he PageRank itation ranking: Bring order to the web. ehnial reort, Stanford University. Communiations of the IIMA 45 7 Volume 7 Issue 4
9 Communiations of the IIMA 46 7 Volume 7 Issue 4
Weighted Page Rank Algorithm based on In-Out Weight of Webpages
Indian Journal of Science and Technology, Vol 8(34), DOI: 10.17485/ijst/2015/v8i34/86120, December 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 eighted Page Rank Algorithm based on In-Out eight
More informationExponential Particle Swarm Optimization Approach for Improving Data Clustering
International Journal of Eletrial and Eletronis Engineering 3:4 9 Exonential Partile Swarm Otimization Aroah for Imroving Data Clustering eveen I. Ghali, ahed El-Dessoui, Mervat A.., and Lamiaa Barawi
More informationAn Edge-based Clustering Algorithm to Detect Social Circles in Ego Networks
JOURNAL OF COMPUTERS, VOL. 8, NO., OCTOBER 23 2575 An Edge-based Clustering Algorithm to Detet Soial Cirles in Ego Networks Yu Wang Shool of Computer Siene and Tehnology, Xidian University Xi an,77, China
More informationVolume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm
More informationEvent Detection Using Local Binary Pattern Based Dynamic Textures
Event Detetion Using Loal Binary Pattern Based Dynami Textures Abstrat Deteting susiious events from video surveillane ameras has been an imortant task reently. Many trajetory based desritors were develoed,
More informationParallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup
Parallelizing Frequent Web Aess Pattern Mining with Partial Enumeration for High Peiyi Tang Markus P. Turkia Department of Computer Siene Department of Computer Siene University of Arkansas at Little Rok
More informationA DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR
Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and
More informationarxiv: v1 [cs.db] 13 Sep 2017
An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution
More informationp[4] p[3] p[2] p[1] p[0]
CMSC 425 : Sring 208 Dave Mount and Roger Eastman Homework Due: Wed, Marh 28, :00m. Submit through ELMS as a df file. It an either be distilled from a tyeset doument or handwritten, sanned, and enhaned
More informationReconfigurable Shape-Adaptive Template Matching Architectures
Reonfigurable Shae-Adative Temlate Mathing Arhitetures Jörn Gause 1, Peter Y.K. Cheung 1, Wayne Luk 2 1 Deartment of Eletrial and Eletroni Engineering, Imerial College, London SW7 2BT, England. 2 Deartment
More informationA Comprehensive Review of Overlapping Community Detection Algorithms for Social Networks
International Journal of Engineering Researh and Appliations (IJERA) ISSN: 2248-9622 National Conferene on Advanes in Engineering and Tehnology (AET- 29th Marh 2014) RESEARCH ARTICLE OPEN ACCESS A Comprehensive
More informationA CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH
A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu
More informationBias Error Reduction of Digital Image Correlation Based on Kernel
Vol.81 (CST 15),.16- htt://dx.doi.org/1.1457/astl.15.81.4 Bias Error Redution of Digital Image Correlation Based on Kernel Huan Shen 1,, eize Zhang 1, and Xiang Shen 1 Energy and ower College, anjing Uniersity
More informationBoosted Random Forest
Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,
More informationApproximate Labeling via the Primal-Dual Schema
Aroximate Labeling via the Primal-Dual Shema Nikos Komodakis and Georgios Tziritas Tehnial Reort CSD-TR-2005-01 February 1, 2005 Aroximate Labeling via the Primal-Dual Shema Nikos Komodakis and Georgios
More informationProjector Calibration for 3D Scanning Using Virtual Target Images
INTERNATIONAL JOURNAL OF RECISION ENGINEERING AND MANUFACTURING Vol. 13, No. 1,. 125-131 JANUARY 2012 / 125 DOI: 10.1007/s12541-012-0017-3 rojetor Calibration for 3D Sanning Using Virtual Target Images
More informationA Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering
A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,
More informationWeb Structure Mining using Link Analysis Algorithms
Web Structure Mining using Link Analysis Algorithms Ronak Jain Aditya Chavan Sindhu Nair Assistant Professor Abstract- The World Wide Web is a huge repository of data which includes audio, text and video.
More informationFacility Location: Distributed Approximation
Faility Loation: Distributed Approximation Thomas Mosibroda Roger Wattenhofer Distributed Computing Group PODC 2005 Where to plae ahes in the Internet? A distributed appliation that has to dynamially plae
More informationVisualization of patent analysis for emerging technology
Available online at www.sienediret.om Expert Systems with Appliations Expert Systems with Appliations 34 (28) 84 82 www.elsevier.om/loate/eswa Visualization of patent analysis for emerging tehnology Young
More informationDECT Module Installation Manual
DECT Module Installation Manual Rev. 2.0 This manual desribes the DECT module registration method to the HUB and fan airflow settings. In order for the HUB to ommuniate with a ompatible fan, the DECT module
More informationA Novel Validity Index for Determination of the Optimal Number of Clusters
IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers
More informationNaïve Bayesian Rough Sets Under Fuzziness
IJMSA: Vol. 6, No. 1-2, January-June 2012, pp. 19 25 Serials Publiations ISSN: 0973-6786 Naïve ayesian Rough Sets Under Fuzziness G. GANSAN 1,. KRISHNAVNI 2 T. HYMAVATHI 3 1,2,3 Department of Mathematis,
More informationRandomized algorithms: Two examples and Yao s Minimax Principle
Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum
More informationRun-time Evaluation of Opportunities for Object Inlining in Java
Run-time Evaluation o Oortunities or Objet Inlining in Java Ondřej Lhoták Laurie Hendren Sable Researh Grou Shool o Comuter Siene MGill University Montreal, Canada {olhotak,hendren@sable.mgill.a ABSTRACT
More informationCOMP5331: Knowledge Discovery and Data Mining
COMP5331: Knowledge Discovery and Data Mining Acknowledgement: Slides modified based on the slides provided by Lawrence Page, Sergey Brin, Rajeev Motwani and Terry Winograd, Jon M. Kleinberg 1 1 PageRank
More informationPipelined Multipliers for Reconfigurable Hardware
Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,
More informationSemantic Concept Detection Using Weighted Discretization Multiple Correspondence Analysis for Disaster Information Management
Semanti Conept Detetion Using Weighted Disretization Multiple Correspondene Analysis for Disaster Information Management Samira Pouyanfar and Shu-Ching Chen Shool of Computing and Information Sienes Florida
More informationExtracting Partition Statistics from Semistructured Data
Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk
More informationLearning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract
CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and
More informationHEXA: Compact Data Structures for Faster Packet Processing
Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for
More informationPROJECT PERIODIC REPORT
FP7-ICT-2007-1 Contrat no.: 215040 www.ative-projet.eu PROJECT PERIODIC REPORT Publishable Summary Grant Agreement number: ICT-215040 Projet aronym: Projet title: Enabling the Knowledge Powered Enterprise
More informationThe Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines
The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer
More informationParticle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating
Original Artile Partile Swarm Optimization for the Design of High Diffration Effiient Holographi Grating A.K. Tripathy 1, S.K. Das, M. Sundaray 3 and S.K. Tripathy* 4 1, Department of Computer Siene, Berhampur
More information1. Introduction. 2. The Probable Stope Algorithm
1. Introdution Optimization in underground mine design has reeived less attention than that in open pit mines. This is mostly due to the diversity o underground mining methods and omplexity o underground
More informationChapter 7, Part B Sampling and Sampling Distributions
Slides Preared by JOHN S. LOUCKS St. Edward s University Slide 1 Chater 7, Part B Samling and Samling Distributions Samling Distribution of Proerties of Point Estimators Other Samling Methods Slide 2 Samling
More informationRobust Multithreaded Object Tracker through Occlusions for Spatial Augmented Reality
ETRI Journal, Volume 40, Number 2, Aril, 2018 246 Robust Multithreaded Objet Traker through Olusions for Satial Augmented Reality Ahyun Lee and Insung Jang A satial augmented reality (SAR) system enables
More informationIncremental Mining of Partial Periodic Patterns in Time-series Databases
CERIAS Teh Report 2000-03 Inremental Mining of Partial Periodi Patterns in Time-series Dataases Mohamed G. Elfeky Center for Eduation and Researh in Information Assurane and Seurity Purdue University,
More informationAutomatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)
Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University
More informationWhole Numbers. Whole Numbers. Solutions. Curriculum Ready.
Whole Numbers Whole Numbers Solutions Curriulum Ready www.mathletis.om Copyright 009 P Learning. All rights reserved. First edition printed 009 in Australia. A atalogue reord for this book is available
More informationExploring the Commonality in Feature Modeling Notations
Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om
More informationIMPROVED FUZZY CLUSTERING METHOD BASED ON INTUITIONISTIC FUZZY PARTICLE SWARM OPTIMIZATION
Journal of Theoretial and Applied Information Tehnology IMPROVED FUZZY CLUSTERING METHOD BASED ON INTUITIONISTIC FUZZY PARTICLE SWARM OPTIMIZATION V.KUMUTHA, 2 S. PALANIAMMAL D.J. Aademy For Managerial
More informationColouring contact graphs of squares and rectilinear polygons de Berg, M.T.; Markovic, A.; Woeginger, G.
Colouring ontat graphs of squares and retilinear polygons de Berg, M.T.; Markovi, A.; Woeginger, G. Published in: nd European Workshop on Computational Geometry (EuroCG 06), 0 Marh - April, Lugano, Switzerland
More informationA New RBFNDDA-KNN Network and Its Application to Medical Pattern Classification
A New RBFNDDA-KNN Network and Its Appliation to Medial Pattern Classifiation Shing Chiang Tan 1*, Chee Peng Lim 2, Robert F. Harrison 3, R. Lee Kennedy 4 1 Faulty of Information Siene and Tehnology, Multimedia
More informationsplit split (a) (b) split split (c) (d)
International Journal of Foundations of Comuter Science c World Scientic Publishing Comany ON COST-OPTIMAL MERGE OF TWO INTRANSITIVE SORTED SEQUENCES JIE WU Deartment of Comuter Science and Engineering
More informationDETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT
DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,
More informationPageRank and related algorithms
PageRank and related algorithms PageRank and HITS Jacob Kogan Department of Mathematics and Statistics University of Maryland, Baltimore County Baltimore, Maryland 21250 kogan@umbc.edu May 15, 2006 Basic
More informationDr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq
Volume 4 Issue 6 June 014 ISSN: 77 18X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om Medial Image Compression using
More informationA Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks
A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr
More informationA rich discrete labeling scheme for line drawings of curved objects
A rih disrete labeling sheme for line drawings of urved objets Martin C. Cooer, IRIT, University of Toulouse III, 31062 Toulouse, Frane ooer@irit.fr Abstrat We resent a disrete labeling sheme for line
More informationUplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks
62 Uplink Channel Alloation Sheme and QoS Management Mehanism for Cognitive Cellular- Femtoell Networks Kien Du Nguyen 1, Hoang Nam Nguyen 1, Hiroaki Morino 2 and Iwao Sasase 3 1 University of Engineering
More informationExploiting Enriched Contextual Information for Mobile App Classification
Exploiting Enrihed Contextual Information for Mobile App Classifiation Hengshu Zhu 1 Huanhuan Cao 2 Enhong Chen 1 Hui Xiong 3 Jilei Tian 2 1 University of Siene and Tehnology of China 2 Nokia Researh Center
More informationDetecting Outliers in High-Dimensional Datasets with Mixed Attributes
Deteting Outliers in High-Dimensional Datasets with Mixed Attributes A. Koufakou, M. Georgiopoulos, and G.C. Anagnostopoulos 2 Shool of EECS, University of Central Florida, Orlando, FL, USA 2 Dept. of
More informationThe official electronic file of this thesis or dissertation is maintained by the University Libraries on behalf of The Graduate School at Stony Brook
Stony Brook University The offiial eletroni file of this thesis or dissertation is maintained by the University Libraries on behalf of The Graduate Shool at Stony Brook University. Alll Rigghht tss Reesseerrvveedd
More informationDisplacement-based Route Update Strategies for Proactive Routing Protocols in Mobile Ad Hoc Networks
Displaement-based Route Update Strategies for Proative Routing Protools in Mobile Ad Ho Networks Mehran Abolhasan 1 and Tadeusz Wysoki 1 1 University of Wollongong, NSW 2522, Australia E-mail: mehran@titr.uow.edu.au,
More information3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT?
3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? Bernd Girod, Peter Eisert, Marus Magnor, Ekehard Steinbah, Thomas Wiegand Te {girod eommuniations Laboratory, University of Erlangen-Nuremberg
More informationIntegration of scientific and social networks
World Wide Web (2014) 17:1051 1079 DOI 10.1007/s11280-013-0229-1 Integration of sientifi and soial networks Mahmood Neshati Djoerd Hiemstra Ehsaneddin Asgari Hamid Beigy Reeived: 31 August 2012 / Revised:
More informationEstablishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments
Establishing Seure Ethernet LANs Using Intelligent Swithing Hubs in Internet Environments WOEIJIUNN TSAUR AND SHIJINN HORNG Department of Eletrial Engineering, National Taiwan University of Siene and Tehnology,
More informationA Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks
International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 213 A Multi-Head Clustering Algorithm in Vehiular Ad Ho Networks Shou-Chih Lo, Yi-Jen Lin, and Jhih-Siao Gao Abstrat Clustering
More informationOn Optimal Total Cost and Optimal Order Quantity for Fuzzy Inventory Model without Shortage
International Journal of Fuzzy Mathemat and Systems. ISSN 48-9940 Volume 4, Numer (014, pp. 193-01 Researh India Puliations http://www.ripuliation.om On Optimal Total Cost and Optimal Order Quantity for
More informationPartial Character Decoding for Improved Regular Expression Matching in FPGAs
Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia
More informationStructural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques
Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology,
More informationA scheme for racquet sports video analysis with the combination of audio-visual information
A sheme for raquet sports video analysis with the ombination of audio-visual information Liyuan Xing a*, Qixiang Ye b, Weigang Zhang, Qingming Huang a and Hua Yu a a Graduate Shool of the Chinese Aadamy
More informationINFLUENCE POWER-BASED CLUSTERING ALGORITHM FOR MEASURE PROPERTIES IN DATA WAREHOUSE
The International Archives of the Photogrammetry, Remote Sensing and Satial Information Sciences, Vol. 38, Part II INFLUENCE POWER-BASED CLUSTERING ALGORITHM FOR MEASURE PROPERTIES IN DATA WAREHOUSE Min
More informationA Method for Measuring Co-authorship Relationships in MediaWiki Libby Veng-Sam Tang Department of Computer and Information Siene Faulty of Siene and Tehnology University of Maau Maau S.A.R., China Tel:
More information1 The Knuth-Morris-Pratt Algorithm
5-45/65: Design & Analysis of Algorithms September 26, 26 Leture #9: String Mathing last hanged: September 26, 27 There s an entire field dediated to solving problems on strings. The book Algorithms on
More informationThe Research on Curling Track Empty Value Fill Algorithm Based on Similar Forecast
Research Journal of Alied Sciences, Engineering and Technology 6(8): 1472-1478, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: October 31, 2012 Acceted: January
More informationBENDING STIFFNESS AND DYNAMIC CHARACTERISTICS OF A ROTOR WITH SPLINE JOINTS
Proeedings of ASME 0 International Mehanial Engineering Congress & Exposition IMECE0 November 5-, 0, San Diego, CA IMECE0-6657 BENDING STIFFNESS AND DYNAMIC CHARACTERISTICS OF A ROTOR WITH SPLINE JOINTS
More informationTMIX: Temporal Model for Indexing XML Documents
TMIX: Temporal Model for Indexing XML Douments Rasha Bin-Thalab Department of Information System Faulty of omputers and Information Cairo University, Egypt azi_z30@yahoo.om Neamat El-Tazi Department of
More informationChapter 7b - Point Estimation and Sampling Distributions
Chater 7b - Point Estimation and Samling Distributions Chater 7 (b) Point Estimation and Samling Distributions Point estimation is a form of statistical inference. In oint estimation we use the data from
More informationProgramming Guide SDN Programming Guide
Programming Guide SIFI Programming Guide CONTENT Overview............................................................................... Pg 2 - System Requirements Installation..............................................................................
More informationCluster-Based Cumulative Ensembles
Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,
More informationTime delay estimation of reverberant meeting speech: on the use of multichannel linear prediction
University of Wollongong Researh Online Faulty of Informatis - apers (Arhive) Faulty of Engineering and Information Sienes 7 Time delay estimation of reverberant meeting speeh: on the use of multihannel
More informationAn Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results
An Alternative Approah to the Fuzziier in Fuzzy Clustering to Obtain Better Clustering Results Frank Klawonn Department o Computer Siene University o Applied Sienes BS/WF Salzdahlumer Str. 46/48 D-38302
More informationA Congestion Control Scheme for LTE/SAE
2011 International Conerene on Comuter Siene and Inormation Tehnology (ICCSIT 2011) IPCSIT vol. 51 (2012) (2012) IACSIT Press, Singaore DOI: 10.7763/IPCSIT.2012.V51.67 A Congestion Control Sheme or LTE/SAE
More informationControl CPR: A Branch Height Reduction Optimization for EPIC Architectures
Control CPR: A Branh Height Redution Otimization for EPIC Arhitetures Mihael Shlansker, Sott Mahlke, Rihard Johnson HP Laboratories Palo Alto HPL-1999-34 February, 1999 E-mail: [shlansk,mahlke]@hl.h.om
More informationAn Efficient and Scalable Approach to CNN Queries in a Road Network
An Effiient and Salable Approah to CNN Queries in a Road Network Hyung-Ju Cho Chin-Wan Chung Dept. of Eletrial Engineering & Computer Siene Korea Advaned Institute of Siene and Tehnology 373- Kusong-dong,
More informationThe Implementation of RRTs for a Remote-Controlled Mobile Robot
ICCAS5 June -5, KINEX, Gyeonggi-Do, Korea he Implementation of RRs for a Remote-Controlled Mobile Robot Chi-Won Roh*, Woo-Sub Lee **, Sung-Chul Kang *** and Kwang-Won Lee **** * Intelligent Robotis Researh
More informationContents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8
Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introdution... 1 1.1. Internet Information...2 1.2. Internet Information Retrieval...3 1.2.1. Doument Indexing...4 1.2.2. Doument Retrieval...4
More informationPREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS
PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links
More informationBioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Improvement of low illumination image enhancement algorithm based on physical mode
[Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 22 BioTehnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(22), 2014 [13995-14001] Improvement of low illumination image enhanement
More informationWeighted Page Rank Algorithm Based on Number of Visits of Links of Web Page
International Journal of Soft Computing and Engineering (IJSCE) ISSN: 31-307, Volume-, Issue-3, July 01 Weighted Page Rank Algorithm Based on Number of Visits of Links of Web Page Neelam Tyagi, Simple
More informationthe data. Structured Principal Component Analysis (SPCA)
Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving
More informationKERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION
KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION Cuiui Kang 1, Shengai Liao, Shiming Xiang 1, Chunhong Pan 1 1 National Laboratory of Pattern Reognition, Institute of Automation, Chinese
More informationA Multiagent Solution to Overcome Selfish Routing In Transportation Networks
A Multiagent olution to Overome elfish Routing In Transportation Networks Mohammad Rashedul Hasan University of Nebraska-Linoln Linoln, NE 68588, UA Email: hasan@unl.edu Ana L. C. Bazzan PPGC / UFRG CP
More informationConnection Guide. Installing the printer locally (Windows) What is local printing? Installing the printer using the Software and Documentation CD
Page 1 of 7 Connetion Guide Installing the printer loally (Windows) Note: When installing a loally attahed printer, if the operating system is not supported y the Software and Doumentation CD, then the
More informationDynamic Programming. Lecture #8 of Algorithms, Data structures and Complexity. Joost-Pieter Katoen Formal Methods and Tools Group
Dynami Programming Leture #8 of Algorithms, Data strutures and Complexity Joost-Pieter Katoen Formal Methods and Tools Group E-mail: katoen@s.utwente.nl Otober 29, 2002 JPK #8: Dynami Programming ADC (214020)
More informationAn Efficient Coding Method for Coding Region-of-Interest Locations in AVS2
An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China
More informationImproved flooding of broadcast messages using extended multipoint relaying
Improved flooding of broadast messages using extended multipoint relaying Pere Montolio Aranda a, Joaquin Garia-Alfaro a,b, David Megías a a Universitat Oberta de Catalunya, Estudis d Informàtia, Mulimèdia
More informationTorpedo Trajectory Visual Simulation Based on Nonlinear Backstepping Control
orpedo rajetory Visual Simulation Based on Nonlinear Bakstepping Control Peng Hai-jun 1, Li Hui-zhou Chen Ye 1, 1. Depart. of Weaponry Eng, Naval Univ. of Engineering, Wuhan 400, China. Depart. of Aeronautial
More informationMulti-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality
INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of
More informationThe PageRank Citation Ranking: Bringing Order to the Web
The PageRank Citation Ranking: Bringing Order to the Web Marlon Dias msdias@dcc.ufmg.br Information Retrieval DCC/UFMG - 2017 Introduction Paper: The PageRank Citation Ranking: Bringing Order to the Web,
More informationSVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections
SVC-DASH-M: Salable Video Coding Dynami Adaptive Streaming Over HTTP Using Multiple Connetions Samar Ibrahim, Ahmed H. Zahran and Mahmoud H. Ismail Department of Eletronis and Eletrial Communiations, Faulty
More informationRecursion examples: Problem 2. (More) Recursion and Lists. Tail recursion. Recursion examples: Problem 2. Recursion examples: Problem 3
Reursion eamples: Problem 2 (More) Reursion and s Reursive funtion to reverse a string publi String revstring(string str) { if(str.equals( )) return str; return revstring(str.substring(1, str.length()))
More informationBayesian Belief Networks for Data Mining. Harald Steck and Volker Tresp. Siemens AG, Corporate Technology. Information and Communications
Bayesian Belief Networks for Data Mining Harald Stek and Volker Tresp Siemens AG, Corporate Tehnology Information and Communiations 81730 Munih, Germany fharald.stek, Volker.Trespg@mhp.siemens.de Abstrat
More informationThe application of Randomized HITS algorithm in the fund trading network
The application of Randomized HITS algorithm in the fund trading network Xingyu Xu 1, Zhen Wang 1,Chunhe Tao 1,Haifeng He 1 1 The Third Research Institute of Ministry of Public Security,China Abstract.
More informationCollaborative filtering based on a random walk model on a graph
Collaborative filtering based on a random walk model on a graph Marco Saerens, Francois Fouss, Alain Pirotte, Luh Yen, Pierre Dupont (UCL) Jean-Michel Renders (Xerox Research Europe) Some recent methods:
More informationChromaticity-matched Superimposition of Foreground Objects in Different Environments
FCV216, the 22nd Korea-Japan Joint Workshop on Frontiers of Computer Vision Chromatiity-mathed Superimposition of Foreground Objets in Different Environments Yohei Ogura Graduate Shool of Siene and Tehnology
More informationOn the Relationship Between Dual Photography and Classical Ghost Imaging
1 On the Relationshi Between Dual Photograhy and Classial Ghost Imaging Pradee Sen University of California, Santa Barbara arxiv:1309.3007v1 [hysis.otis] 12 Se 2013 Abstrat Classial ghost imaging has reeived
More informationDetection and Recognition of Non-Occluded Objects using Signature Map
6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,
More information