Loop-based Module Detection in Directed Networks
نویسندگان
چکیده
We present a new cycle flow based method for finding fuzzy partitions of weighted directed networks coming from time series data. We show that this method overcomes essential problems of most existing clustering approaches, which tend to ignore important directional information by considering only one-step, one-directional node connections. Our method introduces a novel measure of communication between nodes using multi-step, bidirectional transitions encoded by a cycle decomposition of the probability flow. Symmetric properties of this measure enable us to construct an undirected graph that captures information flow of the original graph seen by the data and apply clustering methods designed for undirected graphs. Finally, we demonstrate our algorithm by analyzing earthquake time series data, which naturally induce (time-)directed networks. This article has been published originally in EPL, DOI: 10.1209/0295-5075/108/68008. This version differs from the published version by minor formatting details.
منابع مشابه
Condition directed Multi-domain Adversarial Learning for Loop Closure Detection
Loop closure detection (LCD) is the key module in appearance based simultaneously localization and mapping (SLAM). However, in the real life, the appearance of visual inputs are usually affected by the illumination changes and texture changes under different weather conditions. Traditional methods in LCD usually rely on handcraft features, however, such methods are unable to capture the common ...
متن کاملOnline Monitoring and Fault Diagnosis of Multivariate-attribute Process Mean Using Neural Networks and Discriminant Analysis Technique
In some statistical process control applications, the process data are not Normally distributed and characterized by the combination of both variable and attributes quality characteristics. Despite different methods which are proposed separately for monitoring multivariate and multi-attribute processes, only few methods are available in the literature for monitoring multivariate-attribute proce...
متن کاملراهکار ترکیبی نوین جهت تشخیص نفوذ در شبکههای کامپیوتری با استفاده از الگوریتم-های هوش محاسباتی
In this paper, a novel hybrid method is proposed for intrusion detection in computer networks using combination of misuse-based and anomaly-based detection models with the aim of performance improvement. In the proposed hybrid approach, a set of algorithms and models is employed. The selection of input features is performed using shuffled frog-leaping (SFL) algorithm. The misuse detection modul...
متن کاملModule identification in bipartite and directed networks.
Modularity is one of the most prominent properties of real-world complex networks. Here, we address the issue of module identification in two important classes of networks: bipartite networks and directed unipartite networks. Nodes in bipartite networks are divided into two nonoverlapping sets, and the links must have one end node from each set. Directed unipartite networks only have one type o...
متن کاملModule identification in bipartite networks with applications to directed networks
Modularity is one of the most prominent properties of real-world complex networks. Here, we address the issue of module identification in an important class of networks known as bipartite networks. Nodes in bipartite networks are divided into two non-overlapping sets, and the links must have one end node from each set. We suggest a novel approach especially suited for module detection in bipart...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1404.2813 شماره
صفحات -
تاریخ انتشار 2014