METHOD FOR DETECTING KEY NODES WHO OCCUPY STRUCTURAL HOLES IN SOCIAL NETWORK SITES

Size: px
Start display at page:

Download "METHOD FOR DETECTING KEY NODES WHO OCCUPY STRUCTURAL HOLES IN SOCIAL NETWORK SITES"

Transcription

1 Assocaton for Informaton Systems AIS Electronc Lbrary (AISeL) PACIS 2016 Proceedngs Pacfc Asa Conference on Informaton Systems (PACIS) Summer METHOD FOR DETECTING KEY NODES WHO OCCUPY STRUCTURAL HOLES IN SOCIAL NETWORK SITES Ltng Dng Behang Unversty, Jun Wang Behang Unversty,, We We Behang Unversty, Follow ths and addtonal works at: Recommended Ctaton Dng, Ltng; Wang, Jun; and We, We, "METHOD FOR DETECTING KEY NODES WHO OCCUPY STRUCTURAL HOLES IN SOCIAL NETWORK SITES" (2016). PACIS 2016 Proceedngs Ths materal s brought to you by the Pacfc Asa Conference on Informaton Systems (PACIS) at AIS Electronc Lbrary (AISeL). It has been accepted for ncluson n PACIS 2016 Proceedngs by an authorzed admnstrator of AIS Electronc Lbrary (AISeL). For more nformaton, please contact elbrary@asnet.org.

2 METHOD FOR DETECTING KEY NODES WHO OCCUPY STRUCTURAL HOLES IN SOCIAL NETWORK SITES Ltng Dng, Department of Informaton Systems, Behang Unversty, Beng, Chna, Jun Wang, Department of Informaton Systems, Behang Unversty, Beng, Chna, We We, Department of Informaton Systems, Behang Unversty, Beng, Chna, Abstract It s sgnfcantly meanngful for mprovng nformaton transmsson n socal network ste(sns) to detect the most nfluental nodes. The key nodes who occupy structural holes are easer to acqure nformaton benefts and control benefts from ther relatonshp network. Ths study summarzes the exstng structural holes measurng methods based on Burt s structural holes theory, and provdes a new mproved method accordng to the features of SNS, whch consders the degree of nodes and the topologcal structure of ther neghbor nodes. In addton, to evaluate the accuracy of those measurng methods, the susceptble-nfected-recovered(sir) model s used to smulate experment n four real data sets of socal network. The expermental result shows that our method has a better accuracy and applcablty. Ths paper comes up wth a new dea and method for detectng key nodes who occupy structural holes n SNS. Keywords: structural holes, key nodes, socal network, nformaton transmsson.

3 1 INTRODUCTION Wth the development of SNS and vrtual communty, how to detect key nodes attracts a wde spread attenton. Those key nodes play very mportant roles n whether promotng the actveness of socal networks users or nformaton transmsson. The methods of detectng key nodes can be dvded nto 3 knds roughly: system scence analyss method, the nformaton search analyss method and the socal network analyss method (Newman, 2003), of whch the system scence analyss method measures the mportance of nodes through computng the damage degree of network after detectng the nodes; The most representatve nformaton search analyss methods are PageRank (Page, 1999) and HITS (Klenberg, 1999). Besdes, the socal network analyss method s more general and more sutable for the analyss of bg data n complex networks. The term Socal networks was used by the Brtsh anthropology Brown at the earlest (Brown, 1952). And ts vewpont attracted a wde attenton by the academa n 60-70s of 20th century. The socal network analyss methods measure network structure of the ego networks or the whole networks based on node and relatonshp of networks, of whch mportant measurement ndexes nclude degree, densty, centralty, brdge, betweenness and so on (Newman, 2010). The most famous socal network structure theores are weak tes theory (Granovetter, 1973) and structural holes theory (Burt, 1992). The two theores are relevant, but weak tes theory focuses on the strength of the relatonshp. The occupants of structural holes n the socal networks can get more opportuntes, ncludng nformaton benefts and control benefts (Burt, 2005). Detectng key nodes who occupy structural holes has a gudng sgnfcance on enhancng knowledge transmsson of SNS. Recently, structural holes theory has attracted wdely attenton. However, t s usually used to analyze relatonshp structure of enterprse employees and enterprse resources rather than relatonshp networks of SNS. Thus, ths paper summarzes the exstng structural holes measurng methods, and provdes a new mproved method accordng to the features of SNS, and also evaluates measurng method and analyzes the expermental results through the actual socal network data sets. The paper s organzed as follows: the next secton dscusses the research background, Secton 3 presents the mproved method of detectng key nodes who occupy structural holes, and secton 4 descrbes the data sets and the evaluaton methodology. The emprcal analyss and dscusson are examned n Secton 5. Fnally, we present our conclusons n Secton 6. 2 THEORETICAL BACKGROUND 2.1 The structural holes theory The structural holes theory was mentoned by Ronald Burt n hs book-structural Holes: The Socal Structure of Competton (Burt, 1992). Structural hole descrbes the non-repettve relatonshp between two players of networks. Burt thnks t lke a buffer, an nsulator n an electrc crcut (Burt, Klduff & Tassell, 2013). The strong tes of socal networks mean the lack of structural holes. Burt consders socal network s a knd of socal captal. The players who access to structural holes possess more opportuntes and valuable nformaton, and thus gan compettve advantages (Burt, 2015). Wth the development of the theory, some measurement ndexes of structural holes are mentoned by Burt, whch nclude Constrant (CS), Herarchy (HA), Effectve Sze(ES) and Effcent (EC) (Burt, 2004). In addton, betweenness centralty (BC) mentoned by Freeman (Freeman, 1977) and PageRank are also used to research the nfluence of nodes n socal networks (Brn & Page, 1998). Su and Song (2015) also came up wth a method based on the local centrcty of the neghbourhood. Lou and Tang (2013) dscovered two algorthms to detect the structural holes n the large-scale socal networks based on the nformaton flow theory and mnmal cut theory. As we can see, the measurement ndexes of structural holes have been wdely dscussed recently. However, n the related research, enterprse employees were usually regarded as the research obects, Burt also encouraged the rch network data n vrtual worlds to be used for better understandng networks n the real world (Burt, 2014). Fndng the key nodes based on

4 structural holes theory n SNS s a new research dea. But the relatonshp among the dfferent measurng methods and ther applcaton stll need further research. 2.2 The exstng measurng methods of key nodes who occupy structural holes We summarze 7 exstng measurng methods n table 1. Table 1. The exstng measurng methods of key nodes who occupy structural holes Proposers Name Computng methods Bref ntroducton It expresses the rato of nonredundant relaton of the player s networks. Effectve and are the neghbour Sze ES (1 Pqm q ), q, nodes of. q (ES) s the redundancy Burt Freeman Page Su & Song Effcency (EC) Constrant (CS) Herarchy (HA) Betweenness Centralty (BC) PageRank (PR) N-Burt (NB) HI ES EC n P Z Z q q C ( P P P ) q q q 2 q Pm q q q of node and. It reflects the rato of effectve sze to actual sze. It shows the extent to whch a player s network tme and energy are concentrated n others. s the constrant of to C. Z s the relatonshp C C, strength between and. s the rado of the nvestment of to to ts total network nvestment. C C C ln C The Coleman-Thel nequalty ndex s used to N N Nln N descrbe the herarchy. BC PR P d Q P 1 n It reflects the control degree to network resources of node (Freeman, 1979). st 2 n n 1 st gst P PR P v L P k w v 1 d N Qv Q P The core part of the search rankng technology of Google. Q( ) s the sum of degree neghbor nodes of. kw ( ) s the degree of node w. And s the set of neghbour nodes of. The C s the same as Burt s Constrant.

5 3 THE IMPROVED MEASURING METHOD OF KEY NODES WHO OCCUPY STRUCTURAL HOLES IN SNS The above measurng methods all have some applcablty. But the measurement ndexes of structural holes mentoned by Burt only consder the approxmal nodes, and betweenness centralty would be computed for the mmedate network around a person, whch maybe not be accurate n the large-scale SNS. Combng wth the features of relatonshp networks n SNS, we come up wth a new method to detect the key nodes who occupy structural holes, whch s descrbed as follow n detal. 3.1 V-Constrant (VC) The most mportant ndex n the measurement ndexes of structural holes mentoned by Burt s Constrant. However, Burt usually detects structural holes of the relatonshp networks n enterprses, and assumes one player spends hmself/herself tme and energy on the players who have a drect connecton wth hs/her. Nevertheless, n the SNS, the frendshp means a strong te between two nodes. Thanks to the prevalence of Internet and socal software, t s easy for a user to come nto contact wth other user nodes takng advantage of hs/her frends, and then spend hs/her tme and energy on those user nodes. Take Facebook or Twtter as an example, there are two users who are not frends or don t follow each other n a SNS. But a user can browse to the other user's nformaton easly through hs/her frends shared or forwarded nformaton. Those nvestments of tme and energy should also belong to the nvestment of users spend on ther socal networks. G A B H L F E D C The fgure Burt used to descrbe how to calculate Constrant M Fgure 1. Computng the constrant As we can see from fgure 1, the dashed area s the fgure Burt used to descrbe how to calculate Constrant. Because node E and F have the same neghbour node A wth the purple node. Accordng 2 to the formula of Constrant, CE CF (1/ 6 (1/ 6) (1/ 4)) That s to say, node spends the same tme and energy on node E and F. If node E and F connect to a dfferent number of nodes, t s convenent for node to access the adacent node (G, H, L, M ) of node E and F. Specfcally, when F has more adacent nodes than E, and those adacent nodes don t have relaton wth node and node F are more lkely to share new thngs and nformaton to node so that more tme and energy mantanng relatonshp wth node F. It s a pty that those stuatons cannot be showed n Burt s Constrant. wll spend Therefore, 1, 2 are used to reflect the proporton of users nvestment on ther drect relatons and ndrect relatons s s used to descrbe the nvestment proporton of to hs/her total nvestment n the socal networks for mantanng the relatonshp wth, whch s defned as follow: s p p R (1) 1 2

6 R reflects the rato of the numbers of frends of to the all numbers of frends of adacent nodes of. Those numbers of frends are exclusve of and the common adacent nodes of and F, whch s computed through the ndrect nvestment proporton Here k( ) s the degree of node, and n s the set of neghbour nodes of node. Then, Where q s the common adacent nodes of and. We can survey the users of SNS to get the value of s s q q q,. That s: L k n (2) means the number of common adacent nodes of R L L v and (3) v 2 C s sqsq, q (4) q 1 and typcal users are nvestgated to calculate the average value of 4 SIMULATION AND EXPERIMENT 4.1 Data sets 2. Samplng survey s used. A part of the 1 and 2. To evaluate those several measurng methods, we chose 4 real socal networks to do smulaton experment. The 4 data sets are Zachary's karate club (Zachary, 1977), Dolphn socal networks (Lusseau et al, 2003), coauthorshps n network scence (Of whch the bggest connected subset, called Netscence ) (Newman, 2006) and a connected subset of Twtter user relatonshp networks (Hopcroft, Lou & Tang, 2011). We collected the frst three data sets from the webste: and the last one s from The basc statstcal characterstcs of networks are shown n table 2. Table 2. The basc statstcal characterstcs of networks Name Nodes Edges Average degree Average path length Karate Dolphns Netscence Twtter The evaluaton methodology We use pearson s correlaton coeffcent to analyze the correlaton of the results of those dfferent measurng methods. Besdes, SIR model s usually used to research the nformaton transmsson. Accordng to Burt s structural holes theory, the nodes occupy structural holes are those nodes who can nfluence the.

7 nformaton transmsson of socal networks. Thus, we choose SIR model to smulate the process of nformaton transmsson (Anderson & Mary, 1992; Dekmann & Heesterbeek, 2000; Pastor-Satorrasr, 2001). There are 3 states of SIR model: the state of S (susceptble), I(nfected) and R(recovered). We set one node as the ntal nfected node, ts neghbour nodes can be nfected n a probablty of, and the nfected nodes can be changed to the state of recovered n a probablty of. After a certan tme t, the total number of nodes n state I and R s used to descrbe the actual transmsson capacty of the node. We also sort the actual transmsson capacty of nodes, and have a comparson wth the orderng results of methods of measurng methods of key nodes who occupy structural holes. Kendall tau rank correlaton coeffcent s used to evaluate the valdty of the orderng results (Knght, 1966). 5 THE EXPERIMENTAL RESULTS AND ANALYSIS 5.1 The correlaton analyss of the dfferent measurng methods We evaluate the correlaton of measurng methods based on pearson s correlaton coeffcent as we mentoned n secton 4.2. Take the data set of Twtter as an example, the results of correlaton of measurng methods are shown n table 3. The smlar results are obtaned from the rest 3 data sets. In the method of VC, we set ω 1 = 0.9, and ω 2 = 0.1. Table 3. The results of correlaton of measurng methods of key nodes who occupy structural holes ES EC CS HA BC NB VC PR ES ** ** ** ** **.985 ** EC *.451 ** * * CS * **.926 **.994 ** ** HA * BC ** **.924 ** NB ** ** VC ** PR The smulaton experment analyss of SIR model 2 We set the transmsson tme t 10, the threshold value of nfecton rate ~ k / k. The actual nfecton rate should slghtly bgger than the threshold value so that the nformaton can transmt normally. The recovery rate =0.01. We repeat the experment 100 tmes n term of each node, after that we get the average value of the number of nodes n state I and R, whch s recorded as AT. Then Kendall tau rank correlaton coeffcent s used to calculate the correlaton of orderng results. Fgure 3 shows the results of pearson s correlaton coeffcent of measurng methods and AT (Due to lmted space, only the tow results of Netscence networks are shown here). We only analyze the Constrant, the most representatve measurement ndex of Burt s structural holes theory, and the rest measurng methods. We can see from the results that the actual transmsson capacty has a negatve correlaton wth Constrant, N-Burt and V-Constrant, postve correlaton wth Betweenness Centralty and PageRank. It shows that the several measurng methods can also detect the structural holes nodes whch can mprove the nformaton transmsson. Partcularly, the V-Constrant we came up n ths paper has a more deal result, whch consders the topologcal structure of neghbour nodes, so that can better adapt to the stuaton of Internet and SNS.

8 Fgure 3. The results of pearson s correlaton coeffcent of measurng methods and AT We also compare the experment results of smulaton experment n term of dfferent measurng methods. Due to the lmted space, we only show two of the result fgures n fgure 4. The coordnate of color stands for the actual transmsson capacty of node. It can be seen that the smaller the results of V- Constrant or N-Burt and the bgger the results of PageRank, the AT bgger. Fgure 4. The experment results of smulaton experment n term of dfferent measurng methods Table 4. The results of Kendall tau rank correlaton coeffcent of measurng methods and AT Name (CS, AT) (BC, AT) (NB, AT) (VC, AT) (PR, AT) Karate Dolphns Netscence Twtter Table 4 shows the results of Kendall tau rank correlaton coeffcent. The second column s the nfecton rate we set for the networks. The bgger the absolute value of results of Kendall tau rank correlaton coeffcent s, the rankng results of measurng methods and the actual transmsson ablty are closer. Table 4 reflects that N-Burt and V-Constrant have the good accuracy of orderng results.

9 What s more, to llustrate the real value of several measurng methods, we statstcs the top-5 key nodes occupy structural holes n Netscence data sets n term of N-Burt and V-Constrant, whch have a better performance n the above analyss. As we can see n the table 5, the frst column s the names of authors, column 2 and 3 s the rankng and the last column s the poston Summary of authors. Name Table 5. The top-5 key nodes occupy structural holes n Netscence data sets Rankng NB VC Ttle M. E. J. Newman 1 1 Dstngushed Professor(Unversty of Mchgan) A.-L. Barabás 2 2 Hawoong Jeong 3 3 Romualdo Pastor-Satorras Dstngushed Professor (Northeastern Unversty) Drector(Center for Complex Network Research, Northeastern Unversty) Professor(Korea Advanced Insttute of Scence and Technology) 5 4 Assocate Professor(Unverstat Poltècnca de Catalunya) Stefano Boccalett 4 5 Professor(Unversdad de Navarra) Through the two measurng methods, we fnd several promnent scholars n the felds of complex networks, systems engneerng and physcs. Several emprcal studes also have demonstrated structural holes s postvely relate to a seres of ndcators of socal success (Burt, 2004; Podolny & Baron, 1996). It s vsble that N-Burt and V-Constrant have wonderful practcal value, whch can be used to detect key nodes who occupy structural holes advantages n the socal networks. 6 CONCLUSION AND LIMITATION It s of mportant sgnfcance to detect key nodes n the socal networks for mprovng the effcency of nformaton transmsson. Detectng the key nodes and the sequencng problem of key nodes have been the research hotspot n recent years. In our study, we analyze the Burt s structural holes measurement ndexes, summarze the exstng measurng methods, and come up wth a new measurng method that combnes wth the characterstcs of SNS. Through the smulaton experment wth SIR model, we can prove that our measurng method have a better performance and applcablty than others. Compared wth prevous measurng methods, V-Constrant takes the topologcal structure of neghbour nodes nto account. It can gve a gudance for detectng key nodes n SNS and mprovng the users actveness and nformaton transmsson n SNS. For SNS managers, focusng on key users of the webstes can contrbute to knowledge sharng, controllng rumours and so on. Key users who occupy structural holes wll also be pad attenton by advertsng agences to mprove the effect of advertsement. As for what the user characterstcs of those key nodes who occupy structural holes are, and how to mprove nformaton transmsson, s our future research drectons. Besdes, V-Constrant stll need to mprove to deal wth more complex topologcal structure of nodes. Acknowledgement The work descrbed n ths paper was supported by the Natonal Natural Scence Foundaton of Chna under Grant No and No

10 References Anderson, R. M., & May, R. M. (1992). Infectous dseases of humans: dynamcs and control. Infectous Dseases of Humans Dynamcs & Control, 108(2), Brn, S., & Page, L. (1998). The anatomy of a large-scale hypertextual web search engne. Computer Networks & Isdn Systems, 30(98), Borgatt, S. P., & Everett, M. G. (1997). Network analyss of 2-mode data. Socal Networks, 19(3), Burt, R. S. (1992). The socal structure of competton. Eds., Networks and Organzatons: Structure, Form, and Acton. Burt, R. S. (2004). Structural holes and good deas1. Amercan ournal of socology, 110(2), Burt, R. S. (2005). Brokerage and closure: An ntroducton to socal captal. Oxford Unversty Press. Burt, R. S. (2014). Structural Holes n Vrtual Worlds. Workng paper. Oxford Unversty Press. Burt, R. S. (2015). Renforced structural holes. Socal Networks, 43, Burt, R. S, Klduff, M. & Tassell, S. (2013). Socal Network Analyss: Foundatons and Fronters on Advantage. Dekmann, O., & Heesterbeek, J. A. P. (2000). Mathematcal epdemology of nfectous dseases: model buldng, analyss and nterpretaton. Chchester: John Wley & Sons,303 (1), 186. Freeman, L. C. (1977). A set of measures of centralty based on betweenness. 40(1), Freeman, L. C. (1979). Centralty n socal networks:. conceptual clarfcaton. Socal Networks, 1(3), Granovetter, M. S. (1973). The strength of weak tes. Socal Scence Electronc Publshng, 13(2), Hopcroft, J., Lou, T., & Tang, J. (2011). Who wll follow you back? recprocal relatonshp predcton. In Proceedngs of the 20th ACM nternatonal conference on Informaton and knowledge management, Klenberg, J. M. (1999). Authortatve sources n a hyperlnked envronment. Journal of the Acm, 46(5), Knght, W. R. (1966). A computer method for calculatng kendall's tau wth ungrouped data. Journal of the Amercan Statstcal Assocaton, 61(314), Lou, T., & Tang, J. (2013, May). Mnng structural hole spanners through nformaton dffuson n socal networks. In Proceedngs of the 22nd nternatonal conference on World Wde Web, Lusseau, D., Schneder, K., Bosseau, O. J., Haase, P., Slooten, E., & Dawson, S. M. (2003). The bottlenose dolphn communty of doubtful sound features a large proporton of long-lastng assocatons: can geographc solaton explan ths unque trat?, Behavoral Ecology & Socobology, 54(4), Newman, M. E. J. (2006). Fndng communty structure n networks usng the egenvectors of matrces. Physcal revew E, 74(3), Newman, M. E. J. (2003). The Structure and Functon of Complex Networks. Sam Revew, 45(2), Newman, M. E. J. (2010). Networks: An Introducton. Oxford Unversty Press, Inc. Page, L. (1999). The PageRank Ctaton Rankng: Brngng Order to the Web. Stanford InfoLab,9, Pastorsatorras, R. & Vespgnan, A. (2001). Epdemc spreadng n scale-free networks. Physcal Revew Letters, 86(14) Podolny, J. & Baron, J. (1996). Resources and Relatonshps: Socal Networks and Moblty n the Workplace. Amercan Socologcal Revew, 62(5), Radclffe-Brown A R. (1952). Structure and functon n prmtve socety. Amercan Anthropologst, 56(1), Su, X. P., & Song, Y. R. (2015). Leveragng neghborhood "structural holes" to dentfyng key spreaders n socal networks. Acta Physca Snca -Chnese Edton-, 64(2), Zachary, W. W. (1977). An nformaton flow model for conflct and fsson n small groups1. J.anthropolog.res, 33(4), 473.

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented

More information

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 97-735 Volume Issue 9 BoTechnology An Indan Journal FULL PAPER BTAIJ, (9), [333-3] Matlab mult-dmensonal model-based - 3 Chnese football assocaton super league

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Finite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c

Finite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c Advanced Materals Research Onlne: 03-06-3 ISSN: 66-8985, Vol. 705, pp 40-44 do:0.408/www.scentfc.net/amr.705.40 03 Trans Tech Publcatons, Swtzerland Fnte Element Analyss of Rubber Sealng Rng Reslence Behavor

More information

Structure Formation of Social Network

Structure Formation of Social Network Structure Formaton of Socal Network DU Nan 1, FENG Hu 2, HUANG Zgang 3, Sally MAKI 4, WANG Ru(Ruby) 5, and ZHAO Hongxa (Melssa) 6 1 Bejng Unversty of Posts and Telecommuncatons, Chna 2 Fudan Unversty,

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Identifying Top-k Most Influential Nodes by using the Topological Diffusion Models in the Complex Networks

Identifying Top-k Most Influential Nodes by using the Topological Diffusion Models in the Complex Networks (IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, Vol. 8, No., 07 Identfyng Top-k Most Influental Nodes by usng the Topologcal Dffuson Models n the Complex Networks Maryam Padar,

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

Study on Properties of Traffic Flow on Bus Transport Networks

Study on Properties of Traffic Flow on Bus Transport Networks Study on Propertes of Traffc Flow on Bus Transport Networks XU-HUA YANG, JIU-QIANG ZHAO, GUANG CHEN, AND YOU-YU DONG College of Computer Scence and Technology Zhejang Unversty of Technology Hangzhou, 310023,

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

A Simulation Study for Emergency/Disaster Management by Applying Complex Networks Theory

A Simulation Study for Emergency/Disaster Management by Applying Complex Networks Theory A Smulaton Study for Emergency/Dsaster Management by Applyng Complex Networks Theory L Jn 1, Wang Jong 2 *, Da Yang 3, Wu Huapng 4 and Dong We 5 1,4 Earthquake Admnstraton of Guangdong Provnce Key Laboratory

More information

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,

More information

Design of Structure Optimization with APDL

Design of Structure Optimization with APDL Desgn of Structure Optmzaton wth APDL Yanyun School of Cvl Engneerng and Archtecture, East Chna Jaotong Unversty Nanchang 330013 Chna Abstract In ths paper, the desgn process of structure optmzaton wth

More information

On Some Entertaining Applications of the Concept of Set in Computer Science Course

On Some Entertaining Applications of the Concept of Set in Computer Science Course On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

An Algorithm for Weighted Positive Influence Dominating Set Based on Learning Automata

An Algorithm for Weighted Positive Influence Dominating Set Based on Learning Automata 4 th Internatonal Conference on Knowledge-Based Engneerng and Innovaton (KBEI-2017) Dec. 22 th, 2017 (Iran Unversty of Scence and Technology) Tehran, Iran An Algorthm for Weghted Postve Influence Domnatng

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

A Growing Network Model with High Hub Connectivity and Tunable Clustering Coefficient

A Growing Network Model with High Hub Connectivity and Tunable Clustering Coefficient Manuscrpt receved Aug. 23, 2007; revsed ov. 29, 2007 A Growng etwork Model wth Hgh Hub Connectvty and Tunable Clusterng Coeffcent YIHJIA TSAI, PIG-A HSIAO Department of Computer Scence and Informaton Engneerng

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Significance of Eigenvector Centrality for Routing in a Delay Tolerant Network

Significance of Eigenvector Centrality for Routing in a Delay Tolerant Network Journal of Computatons & Modellng, vol.1, no.1, 2011, 91-100 ISSN: 1792-7625 (prnt), 1792-8850 (onlne) Internatonal Scentfc Press, 2011 Sgnfcance of Egenvector Centralty for Routng n a Delay Tolerant Network

More information

COMPARISON OF TWO MODELS FOR HUMAN EVACUATING SIMULATION IN LARGE BUILDING SPACES. University, Beijing , China

COMPARISON OF TWO MODELS FOR HUMAN EVACUATING SIMULATION IN LARGE BUILDING SPACES. University, Beijing , China COMPARISON OF TWO MODELS FOR HUMAN EVACUATING SIMULATION IN LARGE BUILDING SPACES Bn Zhao 1, 2, He Xao 1, Yue Wang 1, Yuebao Wang 1 1 Department of Buldng Scence and Technology, Tsnghua Unversty, Bejng

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Study of Data Stream Clustering Based on Bio-inspired Model

Study of Data Stream Clustering Based on Bio-inspired Model , pp.412-418 http://dx.do.org/10.14257/astl.2014.53.86 Study of Data Stream lusterng Based on Bo-nspred Model Yngme L, Mn L, Jngbo Shao, Gaoyang Wang ollege of omputer Scence and Informaton Engneerng,

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton

More information

UB at GeoCLEF Department of Geography Abstract

UB at GeoCLEF Department of Geography   Abstract UB at GeoCLEF 2006 Mguel E. Ruz (1), Stuart Shapro (2), June Abbas (1), Slva B. Southwck (1) and Davd Mark (3) State Unversty of New York at Buffalo (1) Department of Lbrary and Informaton Studes (2) Department

More information

Effectiveness of Information Retraction

Effectiveness of Information Retraction Effectveness of Informaton on Cndy Hu, Malk Magdon-Ismal, Mark Goldberg and Wllam A. Wallace Department of Industral and Systems Engneerng Rensselaer Polytechnc Insttute Troy, New York Emal: huc@rp.edu,

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1 A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent

More information

Professional competences training path for an e-commerce major, based on the ISM method

Professional competences training path for an e-commerce major, based on the ISM method World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

A Deflected Grid-based Algorithm for Clustering Analysis

A Deflected Grid-based Algorithm for Clustering Analysis A Deflected Grd-based Algorthm for Clusterng Analyss NANCY P. LIN, CHUNG-I CHANG, HAO-EN CHUEH, HUNG-JEN CHEN, WEI-HUA HAO Department of Computer Scence and Informaton Engneerng Tamkang Unversty 5 Yng-chuan

More information

RESEARCH ON EQUIVALNCE OF SPATIAL RELATIONS IN AUTOMATIC PROGRESSIVE CARTOGRAPHIC GENERALIZATION

RESEARCH ON EQUIVALNCE OF SPATIAL RELATIONS IN AUTOMATIC PROGRESSIVE CARTOGRAPHIC GENERALIZATION RESEARCH ON EQUIVALNCE OF SPATIAL RELATIONS IN AUTOMATIC PROGRESSIVE CARTOGRAPHIC GENERALIZATION Guo Qngsheng Du Xaochu Wuhan Unversty Wuhan Unversty ABSTRCT: In automatc cartographc generalzaton, the

More information

Ranking Techniques for Cluster Based Search Results in a Textual Knowledge-base

Ranking Techniques for Cluster Based Search Results in a Textual Knowledge-base Rankng Technques for Cluster Based Search Results n a Textual Knowledge-base Shefal Sharma Fetch Technologes, Inc 841 Apollo St, El Segundo, CA 90254 +1 (310) 414-9849 ssharma@fetch.com Sofus A. Macskassy

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Locating Software Faults Based on Control Flow and Data Dependence

Locating Software Faults Based on Control Flow and Data Dependence JOURNAL OF COMPUTERS, VOL. 9, NO. 12, DECEMBER 2014 2797 Locatng Software Faults Based on Control Flow and Data Dependence Chenghu Hu Lab of Intellgent Computng and Software Engneerng Zhejang Sc-Tech Unversty

More information

Evaluation of the application of BIM technology based on PCA - Q Clustering Algorithm and Choquet Integral

Evaluation of the application of BIM technology based on PCA - Q Clustering Algorithm and Choquet Integral IETI Transactons on Busness and Management Scences, 2016, Volume 1, Issue 1, 47-55. http://www.et.net/tc An Internatonal Open Access Journal Evaluaton of the applcaton of BIM technology based on PCA -

More information

ANALYSIS OF THE COMPLEX MATERIAL FLOW NETWORKS IN TYPICAL STEEL ENTERPRISE

ANALYSIS OF THE COMPLEX MATERIAL FLOW NETWORKS IN TYPICAL STEEL ENTERPRISE ANALYSIS OF THE COMPLEX MATERIAL FLOW NETWORKS IN TYPICAL STEEL ENTERPRISE 1 YEQING ZHAO, 2 GUIHONG BI 1 School of Computer and Informaton Engneerng, Anyang Normal Unversty, Anyang 455002, Henan, Chna

More information

Querying by sketch geographical databases. Yu Han 1, a *

Querying by sketch geographical databases. Yu Han 1, a * 4th Internatonal Conference on Sensors, Measurement and Intellgent Materals (ICSMIM 2015) Queryng by sketch geographcal databases Yu Han 1, a * 1 Department of Basc Courses, Shenyang Insttute of Artllery,

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI 216 Jont Internatonal Conference on Artfcal Intellgence and Computer Engneerng (AICE 216) and Internatonal Conference on etwork and Communcaton Securty (CS 216) ISB: 978-1-6595-362-5 A Model Based on Mult-agent

More information

Optimizing Document Scoring for Query Retrieval

Optimizing Document Scoring for Query Retrieval Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Learning-Based Top-N Selection Query Evaluation over Relational Databases Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

Application of Clustering Algorithm in Big Data Sample Set Optimization

Application of Clustering Algorithm in Big Data Sample Set Optimization Applcaton of Clusterng Algorthm n Bg Data Sample Set Optmzaton Yutang Lu 1, Qn Zhang 2 1 Department of Basc Subjects, Henan Insttute of Technology, Xnxang 453002, Chna 2 School of Mathematcs and Informaton

More information

Study on base-core Mode Coupling Networks

Study on base-core Mode Coupling Networks Study on base-core Mode Couplng Networks XU-HUA YANG, JIU-QIANG ZHAO, GUANG CHEN College of Computer Scence and Technology Zheang Unversty of Technology Hangzhou, 30023, Chna P.R.Chna xhyang@zut.edu.cn

More information

A Method of Query Expansion Based on Event Ontology

A Method of Query Expansion Based on Event Ontology A Method of Query Expanson Based on Event Ontology Zhaoman Zhong, Cunhua L, Yan Guan, Zongtan Lu A Method of Query Expanson Based on Event Ontology 1 Zhaoman Zhong, 1 Cunhua L, 1 Yan Guan, 2 Zongtan Lu,

More information

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty

More information

The Effect of Similarity Measures on The Quality of Query Clusters

The Effect of Similarity Measures on The Quality of Query Clusters The effect of smlarty measures on the qualty of query clusters. Fu. L., Goh, D.H., Foo, S., & Na, J.C. (2004). Journal of Informaton Scence, 30(5) 396-407 The Effect of Smlarty Measures on The Qualty of

More information

A fast algorithm for color image segmentation

A fast algorithm for color image segmentation Unersty of Wollongong Research Onlne Faculty of Informatcs - Papers (Arche) Faculty of Engneerng and Informaton Scences 006 A fast algorthm for color mage segmentaton L. Dong Unersty of Wollongong, lju@uow.edu.au

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

Heterogeneity in Vulnerable Hosts Slows Down Worm Propagation

Heterogeneity in Vulnerable Hosts Slows Down Worm Propagation Heterogenety n Vulnerable Hosts Slows Down Worm Propagaton Zesheng Chen and Chao Chen Department of Engneerng Indana Unversty - Purdue Unversty Fort Wayne, Indana 4685 Emal: {zchen, chen}@engr.pfw.edu

More information

Growth model for complex networks with hierarchical and modular structures

Growth model for complex networks with hierarchical and modular structures Growth model for complex networks wth herarchcal and modular structures Q Xuan, Yanjun L,* and Te-Jun Wu Natonal Laboratory of Industral Control Technology, Insttute of Intellgent Systems & Decson Makng,

More information

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm , pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,

More information

THE PATH PLANNING ALGORITHM AND SIMULATION FOR MOBILE ROBOT

THE PATH PLANNING ALGORITHM AND SIMULATION FOR MOBILE ROBOT Journal of Theoretcal and Appled Informaton Technology 30 th Aprl 013. Vol. 50 No.3 005-013 JATIT & LLS. All rghts reserved. ISSN: 199-8645 www.jatt.org E-ISSN: 1817-3195 THE PATH PLANNING ALGORITHM AND

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information

Domain Thesaurus Construction from Wikipedia *

Domain Thesaurus Construction from Wikipedia * Internatonal Conference on Computer, Networks and Communcaton Engneerng (ICCNCE 2013) Doman Thesaurus Constructon from Wkpeda * WenKe Yn 1, Mng Zhu 2, TanHao Chen 2 1 Department of Electronc Engneerng

More information

Enhancement of Infrequent Purchased Product Recommendation Using Data Mining Techniques

Enhancement of Infrequent Purchased Product Recommendation Using Data Mining Techniques Enhancement of Infrequent Purchased Product Recommendaton Usng Data Mnng Technques Noraswalza Abdullah, Yue Xu, Shlomo Geva, and Mark Loo Dscplne of Computer Scence Faculty of Scence and Technology Queensland

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

A Clustering Algorithm Solution to the Collaborative Filtering

A Clustering Algorithm Solution to the Collaborative Filtering Internatonal Journal of Scence Vol.4 No.8 017 ISSN: 1813-4890 A Clusterng Algorthm Soluton to the Collaboratve Flterng Yongl Yang 1, a, Fe Xue, b, Yongquan Ca 1, c Zhenhu Nng 1, d,* Hafeng Lu 3, e 1 Faculty

More information

USING GRAPHING SKILLS

USING GRAPHING SKILLS Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp

More information

A CO-TRAINING METHOD FOR IDENTIFYING THE SAME PERSON ACROSS SOCIAL NETWORKS

A CO-TRAINING METHOD FOR IDENTIFYING THE SAME PERSON ACROSS SOCIAL NETWORKS A CO-TRAINING METHOD FOR IDENTIFYING THE SAME PERSON ACROSS SOCIAL NETWORKS Zheng Fang 1,2, Yanan Cao 2, Yanmn Shang 2, Yanbng Lu 2, Janlong Tan 2, L Guo 2 1 School of Cyber Securty, Unversty of Chnese

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Application of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling

Application of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling , pp.40-45 http://dx.do.org/10.14257/astl.2017.143.08 Applcaton of Improved Fsh Swarm Algorthm n Cloud Computng Resource Schedulng Yu Lu, Fangtao Lu School of Informaton Engneerng, Chongqng Vocatonal Insttute

More information

SURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB

SURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB SURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB V. Hotař, A. Hotař Techncal Unversty of Lberec, Department of Glass Producng Machnes and Robotcs, Department of Materal

More information

The impact of network characteristics on the diffusion of innovations. Renana Peres

The impact of network characteristics on the diffusion of innovations. Renana Peres The mpact of network characterstcs on the dffuson of nnovatons Renana Peres School of Busness Admnstraton Hebrew Unversty of Jerusalem, Jerusalem, Israel 91905 peresren@huj.ac.l August 2013 1 The mpact

More information

Empirical Distributions of Parameter Estimates. in Binary Logistic Regression Using Bootstrap

Empirical Distributions of Parameter Estimates. in Binary Logistic Regression Using Bootstrap Int. Journal of Math. Analyss, Vol. 8, 4, no. 5, 7-7 HIKARI Ltd, www.m-hkar.com http://dx.do.org/.988/jma.4.494 Emprcal Dstrbutons of Parameter Estmates n Bnary Logstc Regresson Usng Bootstrap Anwar Ftranto*

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Modular PCA Face Recognition Based on Weighted Average

Modular PCA Face Recognition Based on Weighted Average odern Appled Scence odular PCA Face Recognton Based on Weghted Average Chengmao Han (Correspondng author) Department of athematcs, Lny Normal Unversty Lny 76005, Chna E-mal: hanchengmao@163.com Abstract

More information

A high precision collaborative vision measurement of gear chamfering profile

A high precision collaborative vision measurement of gear chamfering profile Internatonal Conference on Advances n Mechancal Engneerng and Industral Informatcs (AMEII 05) A hgh precson collaboratve vson measurement of gear chamferng profle Conglng Zhou, a, Zengpu Xu, b, Chunmng

More information

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT 3. - 5. 5., Brno, Czech Republc, EU APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT Abstract Josef TOŠENOVSKÝ ) Lenka MONSPORTOVÁ ) Flp TOŠENOVSKÝ

More information

3D Virtual Eyeglass Frames Modeling from Multiple Camera Image Data Based on the GFFD Deformation Method

3D Virtual Eyeglass Frames Modeling from Multiple Camera Image Data Based on the GFFD Deformation Method NICOGRAPH Internatonal 2012, pp. 114-119 3D Vrtual Eyeglass Frames Modelng from Multple Camera Image Data Based on the GFFD Deformaton Method Norak Tamura, Somsangouane Sngthemphone and Katsuhro Ktama

More information

Data Preprocessing Based on Partially Supervised Learning Na Liu1,2, a, Guanglai Gao1,b, Guiping Liu2,c

Data Preprocessing Based on Partially Supervised Learning Na Liu1,2, a, Guanglai Gao1,b, Guiping Liu2,c 6th Internatonal Conference on Informaton Engneerng for Mechancs and Materals (ICIMM 2016) Data Preprocessng Based on Partally Supervsed Learnng Na Lu1,2, a, Guangla Gao1,b, Gupng Lu2,c 1 College of Computer

More information