研究生: |
張顥(革敦) Chang, Hao-Tun |
---|---|
論文名稱: |
於有號網路中各種社群偵測方法的性能比較 Performance Comparisons of Various Community Detection Algorithms in Signed Networks |
指導教授: |
張正尚
Chang, Cheng-Shang |
口試委員: |
李端興
Lee, Duan-Shin 林華君 Lin, Hwa-Chun 黃之浩 Huang, Chih-Hao |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 通訊工程研究所 Communications Engineering |
論文出版年: | 2017 |
畢業學年度: | 105 |
語文別: | 英文 |
論文頁數: | 47 |
中文關鍵詞: | 有號網路 、分群 、錯誤更正碼 |
外文關鍵詞: | signed network, clustering, error correcting code |
相關次數: | 點閱:2 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在本論文中,我們討論了在有號網路 (signed network) 的社群偵測。在有號網路中,鏈結符號為正代表有好關係,鏈結符號若為負則表示敵對關係。Haray’s Theorem 告訴我們一個結構平衡 (structurally balanced) 的兩群網路中,每個迴圈的負號的鏈結個數會是偶數。我們使用錯誤更正碼中漢明距離的概念來更正錯誤的鏈結,藉由最小化漢明距離,我們提出了三種方法:1. 多數決演算法 2. 機率決演算法 3. 符號反轉演算法。另外在分群方法中,初始化的問題一直備受討論,對於這個問題,我們在機率決演算法中也推導出了特徵向量的初始化方式。我們也找到了對於最小化漢明距離的充分必要條件,藉此我們提出了符號反轉演算法。最後,我們延伸我們的演算法到多群的網路偵測上。在和SDP演算法、LR-SVP演算法以及Kset-plus演算法比較過後,實驗結果顯示我們提出的演算法均有不錯的表現。
In this thesis, we consider the community detection problem in signed networks. In signed networks, there are two types of edges: positive edges (friends) and negative edges (enemies). Harary's theorem states that a structurally balanced signed network is clusterable and it can be separated into several communities. We link the community detection problem in a signed network with two communities to the decoding problem for a parity-check code. Each cycle in a signed network can be viewed as a parity-check constraint. Based on minimizing the Hamming distance, we propose three algorithms: (i) the majority vote decoding algorithm, (ii) the probabilistic decoding algorithm, and (iii) the sign flipping algorithm. We also derive an eigenvector initialization as the initial condition. Moreover, a necessary and sufficient condition for the minimum Hamming distance leads to the sign flipping decoder algorithm. Further, we extend our algorithm to more than two communities. We compare the performance of our algorithm with the SDP algorithm, the LR-SVP algorithm, and the Kset$^+$ algorithm. Our experimental results show that our algorithms have a good performance than the others.
[1] A. Lancichinetti and S. Fortunato, "Community detection algorithms: a comparative analysis," Physical review E, vol. 80, no. 5, p. 056117, 2009.
[2] M. Newman, Networks: an introduction. Oxford university press, 2010.
[3] F. D. Malliaros and M. Vazirgiannis, "Clustering and community detection in directed networks: A survey," Physics Reports, vol. 533, no. 4, pp. 95-142, 2013.
[4] M. Burke and R. Kraut, "Mopping up: modeling wikipedia promotion decisions," in Proceedings of the 2008 ACM conference on Computer supported cooperative work. ACM, 2008, pp. 27-36.
[5] R. Guha, R. Kumar, P. Raghavan, and A. Tomkins, "Propagation of trust and distrust," in Proceedings of the 13th international conference on World Wide Web. ACM, 2004, pp. 403-412.
[6] P. Massa and P. Avesani, "Controversial users demand local trust metrics: An experimental study on epinions. com community," in AAAI, vol. 5, 2005, pp. 121-126.
[7] M. J. Brzozowski, T. Hogg, and G. Szabo, "Friends and foes: ideological social networking," in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2008, pp. 817-820.
[8] J. Kunegis, A. Lommatzsch, and C. Bauckhage, "The slashdot zoo: mining a social network with negative edges," in Proceedings of the 18th international conference on World wide web. ACM, 2009, pp. 741-750.
[9] C. A. Lampe, E. Johnston, and P. Resnick, "Follow the reader: filtering comments on slashdot," in Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, 2007, pp. 1253-1262.
[10] P. Doreian and A. Mrvar, "A partitioning approach to structural balance," Social networks, vol. 18, no. 2, pp. 149-168, 1996.
[11] D. Cartwright and F. Harary, "Structural balance: a generalization of heider's theory." Psychological review, vol. 63, no. 5, p. 277, 1956.
[12] F. Harary, "A matrix criterion for structural balance," Naval Research Logistics (NRL), vol. 7, no. 2, pp. 195-199, 1960.
[13] F. Harary et al., "On the notion of balance of a signed graph." The Michigan Mathematical Journal, vol. 2, no. 2, pp. 143-146, 1953.
[14] C.-S. Chang, D.-S. Lee, L.-H. Liou, and S.-M. Lu, "Community detection in signed networks: an error-correcting code approach," arXiv preprint arXiv:1705.04254, 2017.
[15] F. Heider, "Attitudes and cognitive organization," The Journal of psychology, vol. 21, no. 1, pp. 107-112, 1946.
[16] D. B. West et al., Introduction to graph theory. Prentice hall Upper Saddle River, 2001, vol. 2.
[17] S. Lin and D. J. Costello, Error control coding. Prentice Hall Englewood Cliffs, 2004, vol. 2.
[18] J. D. Horton, "A polynomial-time algorithm to find the shortest cycle basis of a graph," SIAM Journal on Computing, vol. 16, no. 2, pp. 358-366, 1987.
[19] E. Abbe, A. S. Bandeira, A. Bracher, and A. Singer, "Decoding binary node labels from censored edge measurements: Phase transition and efficient recovery," IEEE Transactions on Network Science and Engineering, vol. 1, no. 1, pp. 10-22, 2014.
[20] K.-Y. Chiang, C.-J. Hsieh, N. Natarajan, I. S. Dhillon, and A. Tewari, "Prediction and clustering in signed networks: a local to global perspective." Journal of Machine Learning Research, vol. 15, no. 1, pp. 1177-1213, 2014.
[21] A. Singer, "Angular synchronization by eigenvectors and semidenite programming," Applied and computational harmonic analysis, vol. 30, no. 1, pp. 20-36, 2011.
[22] L. Vandenberghe and S. Boyd, "Semidenite programming," SIAM review, vol. 38,no. 1, pp. 49-95, 1996.
[23] M. Grant and S. Boyd, "CVX: Matlab software for disciplined convex programming, version 2.1," http://cvxr.com/cvx, Mar. 2014.
[24] -, "Graph implementations for nonsmooth convex programs," in Recent Advances in Learning and Control, ser. Lecture Notes in Control and Information Sciences, V. Blondel, S. Boyd, and H. Kimura, Eds. Springer-Verlag Limited, 2008, pp. 95-110, http://stanford.edu/boyd/graph dcp.html.
[25] G. H. Golub and C. F. Van Loan, "Matrix computations, the johns hopkins univ," Press, Baltimore, 1983.
[26] J. A. Davis, "Clustering and structural balance in graphs," Human relations, vol. 20, no. 2, pp. 181-187, 1967.
[27] E. Candes and B. Recht, "Exact matrix completion via convex optimization," Communications of the ACM, vol. 55, no. 6, pp. 111{119, 2012.
[28] P. Jain, R. Meka, and I. S. Dhillon, "Guaranteed rank minimization via singular value projection," in Advances in Neural Information Processing Systems, 2010, pp. 937-945.
[29] C. Castellano, S. Fortunato, and V. Loreto, "Statistical physics of social dynamics," Reviews of modern physics, vol. 81, no. 2, p. 591, 2009.
[30] C.-S. Chang, C.-T. Chang, D.-S. Lee, and L.-H. Liou, "K-sets+: a linear-time clustering algorithm for data points with a sparse similarity measure," arXiv preprintarXiv:1705.04249, 2017.
[31] J. Yang and J. Leskovec, "Dening and evaluating network communities based on ground-truth," Knowledge and Information Systems, vol. 42, no. 1, pp. 181-213, 2015.
[32] S. Harenberg, G. Bello, L. Gjeltema, S. Ranshous, J. Harlalka, R. Seay, K. Padmanabhan, and N. Samatova, "Community detection in large-scale networks: a survey and empirical evaluation," Wiley Interdisciplinary Reviews: Computational Statistics, vol. 6, no. 6, pp. 426-439, 2014.