SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
INTERNATIONALComputer Engineering and Technology ENGINEERING
  International Journal of JOURNAL OF COMPUTER (IJCET), ISSN 0976-
  6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
                            & TECHNOLOGY (IJCET)

ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)                                                  IJCET
Volume 4, Issue 2, March – April (2013), pp. 135-141
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
                                                                      ©IAEME
www.jifactor.com




       FORMULATION OF MODULARITY FACTOR FOR COMMUNITY
          DETECTION APPLYING MULTIRESOLUTION ON MOI
                         ALGORITHM


                K. Senthil Kumar1, K. S. Suganthi2, C. Suchitra3, S. Sharmili4
  1
      (Assistant Professor, Department of Information Technology, SMVEC, Pondicherry, India)
               2
                (Department of Information Technology, SMVEC, Pondicherry, India)
               3
                 (Department of Information Technology, SMVEC, Pondicherry, India)
               4
                (Department of Information Technology, SMVEC, Pondicherry, India)



  ABSTRACT

           Community structure is one of the most important properties in social networks,
  and has received an enormous amount of attention in recent years. Community Detection,
  a form of clustering, is a technique which is used for the discovery of the naturally
  occurring associations between vertices in a given network. Initially, algorithms were
  developed with the intention of detecting communities in static networks. This slowly
  evolved into detecting communities in dynamic environments as the nature of the network
  itself, in general, is dynamic. Community detection in dynamic networks with better
  performance and better accuracy is a problem for which the authors have proposed an
  idea involving the combination of two techniques: local community measurement of
  multi resolution applied in multi – objective immune algorithm, replacing the current
  local search strategy. Also, this proposal is phase one of the algorithm as the second
  phase is still under work, without which the complete solution cannot be resolved.

  Keywords: Community Detection, Graph Partition, Modularity, Networking




                                              135
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME

I.       INTRODUCTION

          In recent years, the research on social networks is gaining utmost importance. Social
 networks are usually represented by graphs where nodes represent individuals and edges
 represent relationships and interactions among individuals. Community Detection is sometimes
 also referred to as clustering, but we largely avoid this term to prevent confusion. Both Graph
 Partitioning and community detection refer to the division of vertices in a network into groups or
 clusters or communities. Such groups are tightly knit with many edges inside groups and only a
 few edges between the groups. The ability to discover groups or cluster within a network proves
 to be a useful tool for revealing the network’s structure and organization at a larger scale than of a
 single vector. Clusters can also be defined as the group of vertices having association between the
 vertices based on certain identified similarity. The basic formation or the initial representation of
 communities was hierarchical clustering. The defect with hierarchical clustering was that they
 had overlapping communities in their clusters. This is a disadvantage because; the idea of
 community detection was developed so as to provide better understanding of the network
 structure and organization when viewed by a network administrator for its activities. But this is
 possible only if the communities are non – overlapping. Non – overlapping communities refer to
 those communities in which the vertices of one community are present solely in that community.
 In hierarchical clustering the vertices are clustered together but they do not form a coherent
 network upon completion. As we have overlapping communities in hierarchical clustering, it is
 not efficient as its latter developments of graph partitioning and community detection. Hence the
 methods of graph partitioning and community detection of networks came into existence.
          Graph partitioning is a classic problem of dividing the vertices of a network into non –
 overlapping groups of given sizes so that number of edges between groups is minimized. The
 main disadvantage in graph partitioning is that it is expected to specify the size of the community
 and the number of communities in the network. Community Detection is a method that searches
 for naturally occurring groups in a network without any regard to their size or number. This is
 used for discovering and understanding the large scale structure of networks. The advantage is
 that the number and the size of the communities are not fixed and the size of the community need
 not be specified. One of the most widely used methods is simulated annealing. But it has the
 drawback of being slow. Another general optimization method is genetic algorithm. It provides
 high quality results but is also very slow. This method is applicable to a network of few 100
 vertices. The third method is by using greedy algorithm and it is simple. This gives a reasonable
 division of networks but the modularity values achieved are lower than those obtained by the
 previous methodologies. But the runtime is the best of any current algorithm.
          Multi-Objective evolutionary algorithm aims in the integration of dynamic and multi
 objective algorithms in dynamic environments. It uses genetic mechanism – locus based
 adjacency encoding scheme. Dynamic changing nature is not considered. A multi objective
 immune algorithm can solve the community detection problem in dynamic social networks. Its
 objective is to maximize the community quality and minimize the temporal cost. It can achieve
 better accuracy in community extraction and capture community evolution more faithfully.
 Online multi-resolution algorithm can identify both overlapping and non-overlapping
 communities. It is fast and scalable in large-scale networks. It can be used freely to acquire
 communities at any resolution. The contents mentioned above give an insight into the
 proceedings so far in the domain of community detection. The purpose of this paper is to resolve
 the disadvantages met in the previous methodologies followed for community detection.




                                                  136
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-    0976
  6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME

II.      ARCHITECTURE DIAGRAM

          The proposed model for the implementation of multiresolution parameters in multi
                                                         multiresolution
  objective immune algorithm consists of three modules. The initial input network is integrated
  with the first module where the modularity and betweenness values are calculated, the
  modularity is calculated by Newman – Girvan formula of,
                                     k
                                            l    d i 
                                                                2   
                                   ∑        i − 
                                            L
                                                       
                                                  2 L 
                                                                    
                                                                    
                                    i=1                            
         The basic calculation of betweenness centrality is done by the formula,
                                                                        formula
                                              n (n − 1 )
                                                     2
          The second module is associated with the identification of high similarity vertex
  pairs. This is done so as to segregate them separately from the other vertices in the chosen
  network. But the process does not stop there as the remaining vertices have to be segregated
  using the same methodology. It is a cyclic process until all similar vertices have been
  segregated.




                         Fig. 1: Architecture Design of the Proposed Model
                               :

         The process starts under three conditions. Consider Qn to be the modularity factor that
  has been calculated using the Newman – Girvan formula for modularity, we have,

                                               137
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
   6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME

               •   Qm <= -1, indicating that the community so formed will be a weak structure
                   and can be easily subjected to frequent changes resulting in the instability.
               • Qm = 0, indicating that no more community structures can be extracted from
                   the given network.
               • Qm >= 1, indicating that the structures so formed are strong and are not
                   subjected to any frequent changes.
          In the third module, there exists the regrouping of the isolated vertices based on the
   high similarity of their respective modularity values. This finally gives us the required output
   network.

III.      ALGORITHM FOR MODULARITY CALCULATION

          In context with social networking that can be best cited for the concept proposed the
   parameters taken into consideration includes tags in the photos posted, comments received on
   the photos posted and related posts that have been shared or agreed upon. There are the
   parameters that help in calculating the parameter that helps in calculating the edges cost
   between two vertices. This helps in analyzing the strength of the link of the considered
   network. The algorithm given below has been developed with the Newman – Girvan as its
   base.

          Input: Text file containing the cluster
          Output: Detection if the cluster is strong or weak

          1:       Initialize i = 0, cluster_link = 0, net_link = 0
          2:                 while ( ! EOF)
          3:                 Initialize j = 0
          4:                 while ( ! null)
          5:                          Store the values in multi – dimensional array
          6:                          Increment j by 1
          7:       Increment i by 1
          8:       Calculate total_cost for each vertex using the multi – dimensional array
          9:       if (total_cost [vertex] >= limit)
         10:       edge [vertex] = 1
         11:       else
         12:       edge [vertex] = 0
         13:       Initialize count to 0
         14:       for m = 1 to n do
         15:                 if edge [m] = 1
         16:                 Increment count by 1
         17:       if (count) not equal to 0
         18:       cluster_link = count
         19:       else
         20:       cluster does not exist
         21:       Obtain max (neighbour_values) and store as degree of the respective cluster
         22:       Repeat steps 1 to 21 for all existing clusters in the considered network
         23:       From step 22, obtain net_link value
         24:       Use cluster_link, net_link and degree values to calculate Qm
         25:       Check the Qm value to see if the cluster is weak or strong
         26:       Stop


                                                   138
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-    0976
  6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME

         In the algorithm the multi – dimensional array stores the values of tags, comments
  and shares of that selected node. This is done in context with the social networking. These
  values are used to calculate the cost or edge cost between two vertices in a network. The
                    o
  existence of a weak or strong edge is determined by the limit value that is set. When an
  edge exists as a strong edge between two vertices the edge count is incremented by one.
         When the edge count for a cluster is null then no community structure can be
  acquired out of it. But in existence of a valid edge count it is nothing but the number of
  links existing with the chosen cluster and its value is stored in cluster_link. After the
                                                                                          th
  acquisition of the cluster_link, we also require the degree of the cluster. This can be
  acquired by choosing the maximum value out of all the neighbor values
  (neighbour_values). The net_link refers to the number of links present in the entire
  network. With the use of these values, the modularity factor can be calculated.
               th

IV.      CASE STUDY: SOCIAL NETWORKING (FACE BOOK)

         The social networking site taken into consideration for this particular case study is
  Facebook. In this, the authors have considered each member as a vertex of the network.
  As given below in Fig.1, Facebook represents the undeterminable dynamic network as
                          1,
  users tend to log in and log off at their interest. This is what provides the dynamicity of
  the network. Under such circumstances the network siz is unknown.
                                                        size




                              Fig. 2: Randomized Network Structure
                                   2

           From that a random network is chosen, say students of a particular university.
  Once this has been obtained, the next is the random selection of a cluster. In this cluster,
  each student is a separate vertex. The aim is to characterize them based on their activities,
  that is to say, detecting the communities under which the fall. Once the communities have

                                              139
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME

 been detected for a particular cluster, the same procedure is followed with other clusters
 randomly chosen from the network. When all such communities from clusters have been
 detected, the network as a whole can be viewed based on its detected communities. Given
 below is a table, showing a set of sample data with respect to the considered scenario.

            Table 1: Vertices associated with Random Selected Vertex from the Social
                                      Networking site

                  NUMBER        NUMBER
                                                  NUMBER          TOTAL        STRONG /
                     OF            OF
     VERTEX                                       OF POSTS        EDGE          WEAK
                  PICTURES     COMMENTS
                                                  SHARED           COST          EDGE
                   TAGGED        GIVEN
       Kethar
                      10             25              13             48          STRONG
     Raghubalan

      Sasikala
                      2               8               9             19           WEAK
       Palani

     Ankit Shah       13              5               8             26          STRONG

      Hismath
                      21             18               2             41          STRONG
      Begum

       Dinesh
                      5               1               6             12           WEAK
     Santhanam

        In the above table, the sample data shows the working of the proposed algorithm
 in determining the strength of the considered cluster of the network. From this, three edge
 connections are determined to be strong while two of them are determined to be weak,
 and are hence not considered for the community formation, as they exist as sole
 communities with a single vertex.

V.        CONCLUSION

        The algorithm proposed above, as mentioned in the abstract, is only the first phase
 towards achieving the objective of resolving the disadvantage of the multi objective
 immune algorithm. The second phase of this algorithm is under process, and will be
 submitted shortly. The second phase includes the proposal of an algorithm for the
 removal or segregation of vertices into their corresponding communities. Also, currently
 the tool being developed by the authors is for static purposes and work has been
 commenced for enhancing it for dynamic purposes, wherein the communities are at
 constant change depending upon the node activities.



                                            140
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME

REFERENCES

Books

[1]     M. E. J. Newman, Networks – An Introduction (Oxford)

Journal Papers

[2]    Keehyung Kim, Ri McKay, and Byung – Ro Moon, Multiobjective Evolutionary
Algorithms for Dynamic Social Netowork Clustering, ACM 2010.
[3]    Mao – Guo Gong, Ling – Jun Zhang, Jing Jing - Ma, and Li – Cheng Jiao,
Community Detection in Dynamic Social Networks based on Multiobjective Immune
Algorithm, Journal of Computer Science and Technology, May 2012.
[4]    Jianbin Huang, Heli Sun, Yaguang Liu, Qinbao Song, and Tim Weninger, Towards
Online Multiresolution Community Detection in Large – Scale Networks, August 2011.
[5]    M. E. J. Newman and M. Girvan, Finding and evaluating community structure in
networks, August 2003.
[6]    M. E. J. Newman, Fast algorithm for detecting community structure in networks,
September 2003.
[7]    C. O. Dorso and A. D. Menus, Community Detection in Networks, International
Journal of Bifurcation and Chaos, 2010.
[8]    K. Sendil Kumar, K. S. Suganthi, C. Suchitra and S. Sharmili, An Analysis for the
Detection of Network Communities in Dynamic Environments, International Journal of
Applied Information Sciences, February 2013.




                                          141

Mais conteúdo relacionado

Mais procurados

On the Internet Delay Space Dimensionality
On the Internet Delay Space DimensionalityOn the Internet Delay Space Dimensionality
On the Internet Delay Space DimensionalityBruno Abrahao
 
New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...
New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...
New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...ijasuc
 
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...IRJET Journal
 
IRJET- Machine Learning based Object Identification System using Python
IRJET- Machine Learning based Object Identification System using PythonIRJET- Machine Learning based Object Identification System using Python
IRJET- Machine Learning based Object Identification System using PythonIRJET Journal
 
IRJET- Visual Question Answering using Combination of LSTM and CNN: A Survey
IRJET- Visual Question Answering using Combination of LSTM and CNN: A SurveyIRJET- Visual Question Answering using Combination of LSTM and CNN: A Survey
IRJET- Visual Question Answering using Combination of LSTM and CNN: A SurveyIRJET Journal
 
Automated Neural Image Caption Generator for Visually Impaired People
Automated Neural Image Caption Generator for Visually Impaired PeopleAutomated Neural Image Caption Generator for Visually Impaired People
Automated Neural Image Caption Generator for Visually Impaired PeopleChristopher Mehdi Elamri
 
Soft computing
Soft computingSoft computing
Soft computingCSS
 
Brain structural connectivity and functional default mode network in deafness
Brain structural connectivity and functional default mode network in deafnessBrain structural connectivity and functional default mode network in deafness
Brain structural connectivity and functional default mode network in deafnessAntonio Carlos da Silva Senra Filho
 
Ijarcet vol-2-issue-2-855-860
Ijarcet vol-2-issue-2-855-860Ijarcet vol-2-issue-2-855-860
Ijarcet vol-2-issue-2-855-860Editor IJARCET
 
Optimizing community detection in social networks using antlion and K-median
Optimizing community detection in social networks using antlion and K-medianOptimizing community detection in social networks using antlion and K-median
Optimizing community detection in social networks using antlion and K-medianjournalBEEI
 
EVALUATING SYMMETRIC INFORMATION GAP BETWEEN DYNAMICAL SYSTEMS USING PARTICLE...
EVALUATING SYMMETRIC INFORMATION GAP BETWEEN DYNAMICAL SYSTEMS USING PARTICLE...EVALUATING SYMMETRIC INFORMATION GAP BETWEEN DYNAMICAL SYSTEMS USING PARTICLE...
EVALUATING SYMMETRIC INFORMATION GAP BETWEEN DYNAMICAL SYSTEMS USING PARTICLE...Zac Darcy
 
An Empirical Study for Defect Prediction using Clustering
An Empirical Study for Defect Prediction using ClusteringAn Empirical Study for Defect Prediction using Clustering
An Empirical Study for Defect Prediction using Clusteringidescitation
 
A survey on clustering techniques for identification of
A survey on clustering techniques for identification ofA survey on clustering techniques for identification of
A survey on clustering techniques for identification ofeSAT Publishing House
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...ijwmn
 
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...IJCNCJournal
 
Scalable community detection with the louvain algorithm
Scalable community detection with the louvain algorithmScalable community detection with the louvain algorithm
Scalable community detection with the louvain algorithmNavid Sedighpour
 

Mais procurados (19)

On the Internet Delay Space Dimensionality
On the Internet Delay Space DimensionalityOn the Internet Delay Space Dimensionality
On the Internet Delay Space Dimensionality
 
New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...
New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...
New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...
 
F1074547
F1074547F1074547
F1074547
 
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
 
IRJET- Machine Learning based Object Identification System using Python
IRJET- Machine Learning based Object Identification System using PythonIRJET- Machine Learning based Object Identification System using Python
IRJET- Machine Learning based Object Identification System using Python
 
IRJET- Visual Question Answering using Combination of LSTM and CNN: A Survey
IRJET- Visual Question Answering using Combination of LSTM and CNN: A SurveyIRJET- Visual Question Answering using Combination of LSTM and CNN: A Survey
IRJET- Visual Question Answering using Combination of LSTM and CNN: A Survey
 
Automated Neural Image Caption Generator for Visually Impaired People
Automated Neural Image Caption Generator for Visually Impaired PeopleAutomated Neural Image Caption Generator for Visually Impaired People
Automated Neural Image Caption Generator for Visually Impaired People
 
Soft computing
Soft computingSoft computing
Soft computing
 
Brain structural connectivity and functional default mode network in deafness
Brain structural connectivity and functional default mode network in deafnessBrain structural connectivity and functional default mode network in deafness
Brain structural connectivity and functional default mode network in deafness
 
Ijarcet vol-2-issue-2-855-860
Ijarcet vol-2-issue-2-855-860Ijarcet vol-2-issue-2-855-860
Ijarcet vol-2-issue-2-855-860
 
Optimizing community detection in social networks using antlion and K-median
Optimizing community detection in social networks using antlion and K-medianOptimizing community detection in social networks using antlion and K-median
Optimizing community detection in social networks using antlion and K-median
 
EVALUATING SYMMETRIC INFORMATION GAP BETWEEN DYNAMICAL SYSTEMS USING PARTICLE...
EVALUATING SYMMETRIC INFORMATION GAP BETWEEN DYNAMICAL SYSTEMS USING PARTICLE...EVALUATING SYMMETRIC INFORMATION GAP BETWEEN DYNAMICAL SYSTEMS USING PARTICLE...
EVALUATING SYMMETRIC INFORMATION GAP BETWEEN DYNAMICAL SYSTEMS USING PARTICLE...
 
An Empirical Study for Defect Prediction using Clustering
An Empirical Study for Defect Prediction using ClusteringAn Empirical Study for Defect Prediction using Clustering
An Empirical Study for Defect Prediction using Clustering
 
A survey on clustering techniques for identification of
A survey on clustering techniques for identification ofA survey on clustering techniques for identification of
A survey on clustering techniques for identification of
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
 
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
 
Scalable community detection with the louvain algorithm
Scalable community detection with the louvain algorithmScalable community detection with the louvain algorithm
Scalable community detection with the louvain algorithm
 
StrucA final report
StrucA final reportStrucA final report
StrucA final report
 

Destaque

Implementation of fuzzy logic using mems accelerometer for controlling bldc
Implementation of fuzzy logic using mems accelerometer for controlling bldcImplementation of fuzzy logic using mems accelerometer for controlling bldc
Implementation of fuzzy logic using mems accelerometer for controlling bldcIAEME Publication
 
Applying semantic web services
Applying semantic web servicesApplying semantic web services
Applying semantic web servicesIAEME Publication
 
A study on users of moodle through sarasin model
A study on users of moodle through sarasin modelA study on users of moodle through sarasin model
A study on users of moodle through sarasin modelIAEME Publication
 
Securing tesla broadcast protocol with diffie hellman key exchange
Securing tesla broadcast protocol with diffie hellman key exchangeSecuring tesla broadcast protocol with diffie hellman key exchange
Securing tesla broadcast protocol with diffie hellman key exchangeIAEME Publication
 
Eye tracking and detection by using fuzzy template matching and parameter bas...
Eye tracking and detection by using fuzzy template matching and parameter bas...Eye tracking and detection by using fuzzy template matching and parameter bas...
Eye tracking and detection by using fuzzy template matching and parameter bas...IAEME Publication
 
Fabrication and characterisation of in situ al-tic composite
Fabrication and characterisation of in situ al-tic compositeFabrication and characterisation of in situ al-tic composite
Fabrication and characterisation of in situ al-tic compositeIAEME Publication
 
Design & characterization of high speed power efficient cmos comparator
Design & characterization of high speed power efficient cmos comparatorDesign & characterization of high speed power efficient cmos comparator
Design & characterization of high speed power efficient cmos comparatorIAEME Publication
 
Feasibility of direct pumping for irrigation improvement projects
Feasibility of direct pumping for irrigation improvement projectsFeasibility of direct pumping for irrigation improvement projects
Feasibility of direct pumping for irrigation improvement projectsIAEME Publication
 
Study of loop formation process on 1 x1 v bed rib knitting machine
Study of loop formation process on 1 x1 v bed rib knitting machineStudy of loop formation process on 1 x1 v bed rib knitting machine
Study of loop formation process on 1 x1 v bed rib knitting machineIAEME Publication
 
Tapered circular microstrip antenna with modified ground plane
Tapered circular microstrip antenna with modified ground planeTapered circular microstrip antenna with modified ground plane
Tapered circular microstrip antenna with modified ground planeIAEME Publication
 
A study on the leadership behavior of bank branch managers ncr, india and i...
A study on the leadership behavior of bank branch managers  ncr, india  and i...A study on the leadership behavior of bank branch managers  ncr, india  and i...
A study on the leadership behavior of bank branch managers ncr, india and i...IAEME Publication
 
Ciberespacio y dia del internet
Ciberespacio y dia del internetCiberespacio y dia del internet
Ciberespacio y dia del internetaimeeruyan
 
Jkjj
JkjjJkjj
Jkjjcefic
 
La contaduria como carrera profesional
La contaduria como carrera profesionalLa contaduria como carrera profesional
La contaduria como carrera profesionaljmvelaa
 
Principios 28 febrero
Principios 28 febreroPrincipios 28 febrero
Principios 28 febrerocefic
 
Gobierno Egipcio
Gobierno EgipcioGobierno Egipcio
Gobierno EgipcioRufoyPedro
 
Tegnologia y desarrollo tecnoeconomi
Tegnologia y desarrollo tecnoeconomiTegnologia y desarrollo tecnoeconomi
Tegnologia y desarrollo tecnoeconomicarloscolmenarezelec
 
Brecha digital, sociedad de la información, ciberespacio.
Brecha digital, sociedad de la información, ciberespacio.Brecha digital, sociedad de la información, ciberespacio.
Brecha digital, sociedad de la información, ciberespacio.aimeeruyan
 

Destaque (20)

Implementation of fuzzy logic using mems accelerometer for controlling bldc
Implementation of fuzzy logic using mems accelerometer for controlling bldcImplementation of fuzzy logic using mems accelerometer for controlling bldc
Implementation of fuzzy logic using mems accelerometer for controlling bldc
 
Applying semantic web services
Applying semantic web servicesApplying semantic web services
Applying semantic web services
 
A study on users of moodle through sarasin model
A study on users of moodle through sarasin modelA study on users of moodle through sarasin model
A study on users of moodle through sarasin model
 
Securing tesla broadcast protocol with diffie hellman key exchange
Securing tesla broadcast protocol with diffie hellman key exchangeSecuring tesla broadcast protocol with diffie hellman key exchange
Securing tesla broadcast protocol with diffie hellman key exchange
 
Eye tracking and detection by using fuzzy template matching and parameter bas...
Eye tracking and detection by using fuzzy template matching and parameter bas...Eye tracking and detection by using fuzzy template matching and parameter bas...
Eye tracking and detection by using fuzzy template matching and parameter bas...
 
Fabrication and characterisation of in situ al-tic composite
Fabrication and characterisation of in situ al-tic compositeFabrication and characterisation of in situ al-tic composite
Fabrication and characterisation of in situ al-tic composite
 
Design & characterization of high speed power efficient cmos comparator
Design & characterization of high speed power efficient cmos comparatorDesign & characterization of high speed power efficient cmos comparator
Design & characterization of high speed power efficient cmos comparator
 
Feasibility of direct pumping for irrigation improvement projects
Feasibility of direct pumping for irrigation improvement projectsFeasibility of direct pumping for irrigation improvement projects
Feasibility of direct pumping for irrigation improvement projects
 
Study of loop formation process on 1 x1 v bed rib knitting machine
Study of loop formation process on 1 x1 v bed rib knitting machineStudy of loop formation process on 1 x1 v bed rib knitting machine
Study of loop formation process on 1 x1 v bed rib knitting machine
 
Tapered circular microstrip antenna with modified ground plane
Tapered circular microstrip antenna with modified ground planeTapered circular microstrip antenna with modified ground plane
Tapered circular microstrip antenna with modified ground plane
 
A study on the leadership behavior of bank branch managers ncr, india and i...
A study on the leadership behavior of bank branch managers  ncr, india  and i...A study on the leadership behavior of bank branch managers  ncr, india  and i...
A study on the leadership behavior of bank branch managers ncr, india and i...
 
A empresa glocal
A empresa glocalA empresa glocal
A empresa glocal
 
O porquê ..
O porquê ..O porquê ..
O porquê ..
 
Ciberespacio y dia del internet
Ciberespacio y dia del internetCiberespacio y dia del internet
Ciberespacio y dia del internet
 
Jkjj
JkjjJkjj
Jkjj
 
La contaduria como carrera profesional
La contaduria como carrera profesionalLa contaduria como carrera profesional
La contaduria como carrera profesional
 
Principios 28 febrero
Principios 28 febreroPrincipios 28 febrero
Principios 28 febrero
 
Gobierno Egipcio
Gobierno EgipcioGobierno Egipcio
Gobierno Egipcio
 
Tegnologia y desarrollo tecnoeconomi
Tegnologia y desarrollo tecnoeconomiTegnologia y desarrollo tecnoeconomi
Tegnologia y desarrollo tecnoeconomi
 
Brecha digital, sociedad de la información, ciberespacio.
Brecha digital, sociedad de la información, ciberespacio.Brecha digital, sociedad de la información, ciberespacio.
Brecha digital, sociedad de la información, ciberespacio.
 

Semelhante a Formulation of modularity factor for community detection applying

AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS
AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS
AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS csandit
 
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKS
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKSSCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKS
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKSIJDKP
 
Scalable Local Community Detection with Mapreduce for Large Networks
Scalable Local Community Detection with Mapreduce for Large NetworksScalable Local Community Detection with Mapreduce for Large Networks
Scalable Local Community Detection with Mapreduce for Large NetworksIJDKP
 
Community detection in social networks an overview
Community detection in social networks an overviewCommunity detection in social networks an overview
Community detection in social networks an overvieweSAT Publishing House
 
Detecting root of the rumor in social network using GSSS
Detecting root of the rumor in social network using GSSSDetecting root of the rumor in social network using GSSS
Detecting root of the rumor in social network using GSSSIRJET Journal
 
Delta-Screening: A Fast and Efficient Technique to Update Communities in Dyna...
Delta-Screening: A Fast and Efficient Technique to Update Communities in Dyna...Delta-Screening: A Fast and Efficient Technique to Update Communities in Dyna...
Delta-Screening: A Fast and Efficient Technique to Update Communities in Dyna...Subhajit Sahu
 
Community Detection in Networks Using Page Rank Vectors
Community Detection in Networks Using Page Rank Vectors Community Detection in Networks Using Page Rank Vectors
Community Detection in Networks Using Page Rank Vectors ijbbjournal
 
Community Detection in Networks Using Page Rank Vectors
Community Detection in Networks Using Page Rank Vectors Community Detection in Networks Using Page Rank Vectors
Community Detection in Networks Using Page Rank Vectors ijbbjournal
 
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...IJECEIAES
 
New Similarity Index for Finding Followers in Leaders Based Community Detection
New Similarity Index for Finding Followers in Leaders Based Community DetectionNew Similarity Index for Finding Followers in Leaders Based Community Detection
New Similarity Index for Finding Followers in Leaders Based Community DetectionIRJET Journal
 
Vol 16 No 2 - July-December 2016
Vol 16 No 2 - July-December 2016Vol 16 No 2 - July-December 2016
Vol 16 No 2 - July-December 2016ijcsbi
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Knowledge extraction from numerical data an abc
Knowledge extraction from numerical data an abcKnowledge extraction from numerical data an abc
Knowledge extraction from numerical data an abcIAEME Publication
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
SDC: A Distributed Clustering Protocol
SDC: A Distributed Clustering ProtocolSDC: A Distributed Clustering Protocol
SDC: A Distributed Clustering ProtocolCSCJournals
 
Taxonomy and survey of community
Taxonomy and survey of communityTaxonomy and survey of community
Taxonomy and survey of communityIJCSES Journal
 
16 zaman nips10_workshop_v2
16 zaman nips10_workshop_v216 zaman nips10_workshop_v2
16 zaman nips10_workshop_v2talktoharry
 
84cc04ff77007e457df6aa2b814d2346bf1b
84cc04ff77007e457df6aa2b814d2346bf1b84cc04ff77007e457df6aa2b814d2346bf1b
84cc04ff77007e457df6aa2b814d2346bf1bPRAWEEN KUMAR
 

Semelhante a Formulation of modularity factor for community detection applying (20)

AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS
AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS
AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS
 
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKS
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKSSCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKS
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKS
 
Scalable Local Community Detection with Mapreduce for Large Networks
Scalable Local Community Detection with Mapreduce for Large NetworksScalable Local Community Detection with Mapreduce for Large Networks
Scalable Local Community Detection with Mapreduce for Large Networks
 
Community detection in social networks an overview
Community detection in social networks an overviewCommunity detection in social networks an overview
Community detection in social networks an overview
 
Detecting root of the rumor in social network using GSSS
Detecting root of the rumor in social network using GSSSDetecting root of the rumor in social network using GSSS
Detecting root of the rumor in social network using GSSS
 
Delta-Screening: A Fast and Efficient Technique to Update Communities in Dyna...
Delta-Screening: A Fast and Efficient Technique to Update Communities in Dyna...Delta-Screening: A Fast and Efficient Technique to Update Communities in Dyna...
Delta-Screening: A Fast and Efficient Technique to Update Communities in Dyna...
 
Community Detection in Networks Using Page Rank Vectors
Community Detection in Networks Using Page Rank Vectors Community Detection in Networks Using Page Rank Vectors
Community Detection in Networks Using Page Rank Vectors
 
Community Detection in Networks Using Page Rank Vectors
Community Detection in Networks Using Page Rank Vectors Community Detection in Networks Using Page Rank Vectors
Community Detection in Networks Using Page Rank Vectors
 
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...
 
New Similarity Index for Finding Followers in Leaders Based Community Detection
New Similarity Index for Finding Followers in Leaders Based Community DetectionNew Similarity Index for Finding Followers in Leaders Based Community Detection
New Similarity Index for Finding Followers in Leaders Based Community Detection
 
Vol 16 No 2 - July-December 2016
Vol 16 No 2 - July-December 2016Vol 16 No 2 - July-December 2016
Vol 16 No 2 - July-December 2016
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Knowledge extraction from numerical data an abc
Knowledge extraction from numerical data an abcKnowledge extraction from numerical data an abc
Knowledge extraction from numerical data an abc
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
SDC: A Distributed Clustering Protocol
SDC: A Distributed Clustering ProtocolSDC: A Distributed Clustering Protocol
SDC: A Distributed Clustering Protocol
 
C1804011117
C1804011117C1804011117
C1804011117
 
Taxonomy and survey of community
Taxonomy and survey of communityTaxonomy and survey of community
Taxonomy and survey of community
 
16 zaman nips10_workshop_v2
16 zaman nips10_workshop_v216 zaman nips10_workshop_v2
16 zaman nips10_workshop_v2
 
84cc04ff77007e457df6aa2b814d2346bf1b
84cc04ff77007e457df6aa2b814d2346bf1b84cc04ff77007e457df6aa2b814d2346bf1b
84cc04ff77007e457df6aa2b814d2346bf1b
 

Mais de IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mais de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Formulation of modularity factor for community detection applying

  • 1. INTERNATIONALComputer Engineering and Technology ENGINEERING International Journal of JOURNAL OF COMPUTER (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) IJCET Volume 4, Issue 2, March – April (2013), pp. 135-141 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) ©IAEME www.jifactor.com FORMULATION OF MODULARITY FACTOR FOR COMMUNITY DETECTION APPLYING MULTIRESOLUTION ON MOI ALGORITHM K. Senthil Kumar1, K. S. Suganthi2, C. Suchitra3, S. Sharmili4 1 (Assistant Professor, Department of Information Technology, SMVEC, Pondicherry, India) 2 (Department of Information Technology, SMVEC, Pondicherry, India) 3 (Department of Information Technology, SMVEC, Pondicherry, India) 4 (Department of Information Technology, SMVEC, Pondicherry, India) ABSTRACT Community structure is one of the most important properties in social networks, and has received an enormous amount of attention in recent years. Community Detection, a form of clustering, is a technique which is used for the discovery of the naturally occurring associations between vertices in a given network. Initially, algorithms were developed with the intention of detecting communities in static networks. This slowly evolved into detecting communities in dynamic environments as the nature of the network itself, in general, is dynamic. Community detection in dynamic networks with better performance and better accuracy is a problem for which the authors have proposed an idea involving the combination of two techniques: local community measurement of multi resolution applied in multi – objective immune algorithm, replacing the current local search strategy. Also, this proposal is phase one of the algorithm as the second phase is still under work, without which the complete solution cannot be resolved. Keywords: Community Detection, Graph Partition, Modularity, Networking 135
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME I. INTRODUCTION In recent years, the research on social networks is gaining utmost importance. Social networks are usually represented by graphs where nodes represent individuals and edges represent relationships and interactions among individuals. Community Detection is sometimes also referred to as clustering, but we largely avoid this term to prevent confusion. Both Graph Partitioning and community detection refer to the division of vertices in a network into groups or clusters or communities. Such groups are tightly knit with many edges inside groups and only a few edges between the groups. The ability to discover groups or cluster within a network proves to be a useful tool for revealing the network’s structure and organization at a larger scale than of a single vector. Clusters can also be defined as the group of vertices having association between the vertices based on certain identified similarity. The basic formation or the initial representation of communities was hierarchical clustering. The defect with hierarchical clustering was that they had overlapping communities in their clusters. This is a disadvantage because; the idea of community detection was developed so as to provide better understanding of the network structure and organization when viewed by a network administrator for its activities. But this is possible only if the communities are non – overlapping. Non – overlapping communities refer to those communities in which the vertices of one community are present solely in that community. In hierarchical clustering the vertices are clustered together but they do not form a coherent network upon completion. As we have overlapping communities in hierarchical clustering, it is not efficient as its latter developments of graph partitioning and community detection. Hence the methods of graph partitioning and community detection of networks came into existence. Graph partitioning is a classic problem of dividing the vertices of a network into non – overlapping groups of given sizes so that number of edges between groups is minimized. The main disadvantage in graph partitioning is that it is expected to specify the size of the community and the number of communities in the network. Community Detection is a method that searches for naturally occurring groups in a network without any regard to their size or number. This is used for discovering and understanding the large scale structure of networks. The advantage is that the number and the size of the communities are not fixed and the size of the community need not be specified. One of the most widely used methods is simulated annealing. But it has the drawback of being slow. Another general optimization method is genetic algorithm. It provides high quality results but is also very slow. This method is applicable to a network of few 100 vertices. The third method is by using greedy algorithm and it is simple. This gives a reasonable division of networks but the modularity values achieved are lower than those obtained by the previous methodologies. But the runtime is the best of any current algorithm. Multi-Objective evolutionary algorithm aims in the integration of dynamic and multi objective algorithms in dynamic environments. It uses genetic mechanism – locus based adjacency encoding scheme. Dynamic changing nature is not considered. A multi objective immune algorithm can solve the community detection problem in dynamic social networks. Its objective is to maximize the community quality and minimize the temporal cost. It can achieve better accuracy in community extraction and capture community evolution more faithfully. Online multi-resolution algorithm can identify both overlapping and non-overlapping communities. It is fast and scalable in large-scale networks. It can be used freely to acquire communities at any resolution. The contents mentioned above give an insight into the proceedings so far in the domain of community detection. The purpose of this paper is to resolve the disadvantages met in the previous methodologies followed for community detection. 136
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 0976 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME II. ARCHITECTURE DIAGRAM The proposed model for the implementation of multiresolution parameters in multi multiresolution objective immune algorithm consists of three modules. The initial input network is integrated with the first module where the modularity and betweenness values are calculated, the modularity is calculated by Newman – Girvan formula of, k  l  d i  2  ∑  i −   L   2 L    i=1   The basic calculation of betweenness centrality is done by the formula, formula n (n − 1 ) 2 The second module is associated with the identification of high similarity vertex pairs. This is done so as to segregate them separately from the other vertices in the chosen network. But the process does not stop there as the remaining vertices have to be segregated using the same methodology. It is a cyclic process until all similar vertices have been segregated. Fig. 1: Architecture Design of the Proposed Model : The process starts under three conditions. Consider Qn to be the modularity factor that has been calculated using the Newman – Girvan formula for modularity, we have, 137
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME • Qm <= -1, indicating that the community so formed will be a weak structure and can be easily subjected to frequent changes resulting in the instability. • Qm = 0, indicating that no more community structures can be extracted from the given network. • Qm >= 1, indicating that the structures so formed are strong and are not subjected to any frequent changes. In the third module, there exists the regrouping of the isolated vertices based on the high similarity of their respective modularity values. This finally gives us the required output network. III. ALGORITHM FOR MODULARITY CALCULATION In context with social networking that can be best cited for the concept proposed the parameters taken into consideration includes tags in the photos posted, comments received on the photos posted and related posts that have been shared or agreed upon. There are the parameters that help in calculating the parameter that helps in calculating the edges cost between two vertices. This helps in analyzing the strength of the link of the considered network. The algorithm given below has been developed with the Newman – Girvan as its base. Input: Text file containing the cluster Output: Detection if the cluster is strong or weak 1: Initialize i = 0, cluster_link = 0, net_link = 0 2: while ( ! EOF) 3: Initialize j = 0 4: while ( ! null) 5: Store the values in multi – dimensional array 6: Increment j by 1 7: Increment i by 1 8: Calculate total_cost for each vertex using the multi – dimensional array 9: if (total_cost [vertex] >= limit) 10: edge [vertex] = 1 11: else 12: edge [vertex] = 0 13: Initialize count to 0 14: for m = 1 to n do 15: if edge [m] = 1 16: Increment count by 1 17: if (count) not equal to 0 18: cluster_link = count 19: else 20: cluster does not exist 21: Obtain max (neighbour_values) and store as degree of the respective cluster 22: Repeat steps 1 to 21 for all existing clusters in the considered network 23: From step 22, obtain net_link value 24: Use cluster_link, net_link and degree values to calculate Qm 25: Check the Qm value to see if the cluster is weak or strong 26: Stop 138
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 0976 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME In the algorithm the multi – dimensional array stores the values of tags, comments and shares of that selected node. This is done in context with the social networking. These values are used to calculate the cost or edge cost between two vertices in a network. The o existence of a weak or strong edge is determined by the limit value that is set. When an edge exists as a strong edge between two vertices the edge count is incremented by one. When the edge count for a cluster is null then no community structure can be acquired out of it. But in existence of a valid edge count it is nothing but the number of links existing with the chosen cluster and its value is stored in cluster_link. After the th acquisition of the cluster_link, we also require the degree of the cluster. This can be acquired by choosing the maximum value out of all the neighbor values (neighbour_values). The net_link refers to the number of links present in the entire network. With the use of these values, the modularity factor can be calculated. th IV. CASE STUDY: SOCIAL NETWORKING (FACE BOOK) The social networking site taken into consideration for this particular case study is Facebook. In this, the authors have considered each member as a vertex of the network. As given below in Fig.1, Facebook represents the undeterminable dynamic network as 1, users tend to log in and log off at their interest. This is what provides the dynamicity of the network. Under such circumstances the network siz is unknown. size Fig. 2: Randomized Network Structure 2 From that a random network is chosen, say students of a particular university. Once this has been obtained, the next is the random selection of a cluster. In this cluster, each student is a separate vertex. The aim is to characterize them based on their activities, that is to say, detecting the communities under which the fall. Once the communities have 139
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME been detected for a particular cluster, the same procedure is followed with other clusters randomly chosen from the network. When all such communities from clusters have been detected, the network as a whole can be viewed based on its detected communities. Given below is a table, showing a set of sample data with respect to the considered scenario. Table 1: Vertices associated with Random Selected Vertex from the Social Networking site NUMBER NUMBER NUMBER TOTAL STRONG / OF OF VERTEX OF POSTS EDGE WEAK PICTURES COMMENTS SHARED COST EDGE TAGGED GIVEN Kethar 10 25 13 48 STRONG Raghubalan Sasikala 2 8 9 19 WEAK Palani Ankit Shah 13 5 8 26 STRONG Hismath 21 18 2 41 STRONG Begum Dinesh 5 1 6 12 WEAK Santhanam In the above table, the sample data shows the working of the proposed algorithm in determining the strength of the considered cluster of the network. From this, three edge connections are determined to be strong while two of them are determined to be weak, and are hence not considered for the community formation, as they exist as sole communities with a single vertex. V. CONCLUSION The algorithm proposed above, as mentioned in the abstract, is only the first phase towards achieving the objective of resolving the disadvantage of the multi objective immune algorithm. The second phase of this algorithm is under process, and will be submitted shortly. The second phase includes the proposal of an algorithm for the removal or segregation of vertices into their corresponding communities. Also, currently the tool being developed by the authors is for static purposes and work has been commenced for enhancing it for dynamic purposes, wherein the communities are at constant change depending upon the node activities. 140
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME REFERENCES Books [1] M. E. J. Newman, Networks – An Introduction (Oxford) Journal Papers [2] Keehyung Kim, Ri McKay, and Byung – Ro Moon, Multiobjective Evolutionary Algorithms for Dynamic Social Netowork Clustering, ACM 2010. [3] Mao – Guo Gong, Ling – Jun Zhang, Jing Jing - Ma, and Li – Cheng Jiao, Community Detection in Dynamic Social Networks based on Multiobjective Immune Algorithm, Journal of Computer Science and Technology, May 2012. [4] Jianbin Huang, Heli Sun, Yaguang Liu, Qinbao Song, and Tim Weninger, Towards Online Multiresolution Community Detection in Large – Scale Networks, August 2011. [5] M. E. J. Newman and M. Girvan, Finding and evaluating community structure in networks, August 2003. [6] M. E. J. Newman, Fast algorithm for detecting community structure in networks, September 2003. [7] C. O. Dorso and A. D. Menus, Community Detection in Networks, International Journal of Bifurcation and Chaos, 2010. [8] K. Sendil Kumar, K. S. Suganthi, C. Suchitra and S. Sharmili, An Analysis for the Detection of Network Communities in Dynamic Environments, International Journal of Applied Information Sciences, February 2013. 141