1,094 research outputs found
Multistep greedy algorithm identifies community structure in real-world and computer-generated networks
We have recently introduced a multistep extension of the greedy algorithm for
modularity optimization. The extension is based on the idea that merging l
pairs of communities (l>1) at each iteration prevents premature condensation
into few large communities. Here, an empirical formula is presented for the
choice of the step width l that generates partitions with (close to) optimal
modularity for 17 real-world and 1100 computer-generated networks. Furthermore,
an in-depth analysis of the communities of two real-world networks (the
metabolic network of the bacterium E. coli and the graph of coappearing words
in the titles of papers coauthored by Martin Karplus) provides evidence that
the partition obtained by the multistep greedy algorithm is superior to the one
generated by the original greedy algorithm not only with respect to modularity
but also according to objective criteria. In other words, the multistep
extension of the greedy algorithm reduces the danger of getting trapped in
local optima of modularity and generates more reasonable partitions.Comment: 17 pages, 2 figure
Impact of constrained rewiring on network structure and node dynamics
In this paper, we study an adaptive spatial network. We consider a susceptible-infected-susceptible (SIS) epidemic on the network, with a link or contact rewiring process constrained by spatial proximity. In particular, we assume that susceptible nodes break links with infected nodes independently of distance and reconnect at random to susceptible nodes available within a given radius. By systematically manipulating this radius we investigate the impact of rewiring on the structure of the network and characteristics of the epidemic.We adopt a step-by-step approach whereby we first study the impact of rewiring on the network structure in the absence of an epidemic, then with nodes assigned a disease status but without disease dynamics, and finally running network and epidemic dynamics simultaneously. In the case of no labeling and no epidemic dynamics, we provide both analytic and semianalytic formulas for the value of clustering achieved in the network. Our results also show that the rewiring radius and the network’s initial structure have a pronounced effect on the endemic equilibrium, with increasingly large rewiring radiuses yielding smaller disease prevalence
Module identification in bipartite and directed networks
Modularity is one of the most prominent properties of real-world complex
networks. Here, we address the issue of module identification in two important
classes of networks: bipartite networks and directed unipartite networks. Nodes
in bipartite networks are divided into two non-overlapping sets, and the links
must have one end node from each set. Directed unipartite networks only have
one type of nodes, but links have an origin and an end. We show that directed
unipartite networks can be conviniently represented as bipartite networks for
module identification purposes. We report a novel approach especially suited
for module detection in bipartite networks, and define a set of random networks
that enable us to validate the new approach
A paradox in community detection
Recent research has shown that virtually all algorithms aimed at the
identification of communities in networks are affected by the same main
limitation: the impossibility to detect communities, even when these are
well-defined, if the average value of the difference between internal and
external node degrees does not exceed a strictly positive value, in literature
known as detectability threshold. Here, we counterintuitively show that the
value of this threshold is inversely proportional to the intrinsic quality of
communities: the detection of well-defined modules is thus more difficult than
the identification of ill-defined communities.Comment: 5 pages, 3 figure
Identifying network communities with a high resolution
Community structure is an important property of complex networks. An
automatic discovery of such structure is a fundamental task in many
disciplines, including sociology, biology, engineering, and computer science.
Recently, several community discovery algorithms have been proposed based on
the optimization of a quantity called modularity (Q). However, the problem of
modularity optimization is NP-hard, and the existing approaches often suffer
from prohibitively long running time or poor quality. Furthermore, it has been
recently pointed out that algorithms based on optimizing Q will have a
resolution limit, i.e., communities below a certain scale may not be detected.
In this research, we first propose an efficient heuristic algorithm, Qcut,
which combines spectral graph partitioning and local search to optimize Q.
Using both synthetic and real networks, we show that Qcut can find higher
modularities and is more scalable than the existing algorithms. Furthermore,
using Qcut as an essential component, we propose a recursive algorithm, HQcut,
to solve the resolution limit problem. We show that HQcut can successfully
detect communities at a much finer scale and with a higher accuracy than the
existing algorithms. Finally, we apply Qcut and HQcut to study a
protein-protein interaction network, and show that the combination of the two
algorithms can reveal interesting biological results that may be otherwise
undetectable.Comment: 14 pages, 5 figures. 1 supplemental file at
http://cic.cs.wustl.edu/qcut/supplemental.pd
Fast Community Identification by Hierarchical Growth
A new method for community identification is proposed which is founded on the
analysis of successive neighborhoods, reached through hierarchical growth from
a starting vertex, and on the definition of communities as a subgraph whose
number of inner connections is larger than outer connections. In order to
determine the precision and speed of the method, it is compared with one of the
most popular community identification approaches, namely Girvan and Newman's
algorithm. Although the hierarchical growth method is not as precise as Girvan
and Newman's method, it is potentially faster than most community finding
algorithms.Comment: 6 pages, 5 figure
Quantum Tunneling Detection of Two-photon and Two-electron Processes
We analyze the operation of a quantum tunneling detector coupled to a
coherent conductor. We demonstrate that in a certain energy range the output of
the detector is determined by two-photon processes, two-electron processes and
the interference of the two. We show how the individual contributions of these
processes can be resolved in experiments.Comment: 4 pages, 4 figure
Evaluating Local Community Methods in Networks
We present a new benchmarking procedure that is unambiguous and specific to
local community-finding methods, allowing one to compare the accuracy of
various methods. We apply this to new and existing algorithms. A simple class
of synthetic benchmark networks is also developed, capable of testing
properties specific to these local methods.Comment: 8 pages, 9 figures, code included with sourc
Outlier Edge Detection Using Random Graph Generation Models and Applications
Outliers are samples that are generated by different mechanisms from other
normal data samples. Graphs, in particular social network graphs, may contain
nodes and edges that are made by scammers, malicious programs or mistakenly by
normal users. Detecting outlier nodes and edges is important for data mining
and graph analytics. However, previous research in the field has merely focused
on detecting outlier nodes. In this article, we study the properties of edges
and propose outlier edge detection algorithms using two random graph generation
models. We found that the edge-ego-network, which can be defined as the induced
graph that contains two end nodes of an edge, their neighboring nodes and the
edges that link these nodes, contains critical information to detect outlier
edges. We evaluated the proposed algorithms by injecting outlier edges into
some real-world graph data. Experiment results show that the proposed
algorithms can effectively detect outlier edges. In particular, the algorithm
based on the Preferential Attachment Random Graph Generation model consistently
gives good performance regardless of the test graph data. Further more, the
proposed algorithms are not limited in the area of outlier edge detection. We
demonstrate three different applications that benefit from the proposed
algorithms: 1) a preprocessing tool that improves the performance of graph
clustering algorithms; 2) an outlier node detection algorithm; and 3) a novel
noisy data clustering algorithm. These applications show the great potential of
the proposed outlier edge detection techniques.Comment: 14 pages, 5 figures, journal pape
Community Detection as an Inference Problem
We express community detection as an inference problem of determining the
most likely arrangement of communities. We then apply belief propagation and
mean-field theory to this problem, and show that this leads to fast, accurate
algorithms for community detection.Comment: 4 pages, 2 figure
- …
