簡易檢索 / 詳目顯示

研究生: 張顥(革敦)
Chang, Hao-Tun
論文名稱: 於有號網路中各種社群偵測方法的性能比較
Performance Comparisons of Various Community Detection Algorithms in Signed Networks
指導教授: 張正尚
Chang, Cheng-Shang
口試委員: 李端興
Lee, Duan-Shin
林華君
Lin, Hwa-Chun
黃之浩
Huang, Chih-Hao
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 通訊工程研究所
Communications Engineering
論文出版年: 2017
畢業學年度: 105
語文別: 英文
論文頁數: 47
中文關鍵詞: 有號網路分群錯誤更正碼
外文關鍵詞: signed network, clustering, error correcting code
相關次數: 點閱:3下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在本論文中,我們討論了在有號網路 (signed network) 的社群偵測。在有號網路中,鏈結符號為正代表有好關係,鏈結符號若為負則表示敵對關係。Haray’s Theorem 告訴我們一個結構平衡 (structurally balanced) 的兩群網路中,每個迴圈的負號的鏈結個數會是偶數。我們使用錯誤更正碼中漢明距離的概念來更正錯誤的鏈結,藉由最小化漢明距離,我們提出了三種方法:1. 多數決演算法 2. 機率決演算法 3. 符號反轉演算法。另外在分群方法中,初始化的問題一直備受討論,對於這個問題,我們在機率決演算法中也推導出了特徵向量的初始化方式。我們也找到了對於最小化漢明距離的充分必要條件,藉此我們提出了符號反轉演算法。最後,我們延伸我們的演算法到多群的網路偵測上。在和SDP演算法、LR-SVP演算法以及Kset-plus演算法比較過後,實驗結果顯示我們提出的演算法均有不錯的表現。


    In this thesis, we consider the community detection problem in signed networks. In signed networks, there are two types of edges: positive edges (friends) and negative edges (enemies). Harary's theorem states that a structurally balanced signed network is clusterable and it can be separated into several communities. We link the community detection problem in a signed network with two communities to the decoding problem for a parity-check code. Each cycle in a signed network can be viewed as a parity-check constraint. Based on minimizing the Hamming distance, we propose three algorithms: (i) the majority vote decoding algorithm, (ii) the probabilistic decoding algorithm, and (iii) the sign flipping algorithm. We also derive an eigenvector initialization as the initial condition. Moreover, a necessary and sufficient condition for the minimum Hamming distance leads to the sign flipping decoder algorithm. Further, we extend our algorithm to more than two communities. We compare the performance of our algorithm with the SDP algorithm, the LR-SVP algorithm, and the Kset$^+$ algorithm. Our experimental results show that our algorithms have a good performance than the others.

    Contents 1 List of Figures 3 1 Introduction 4 2 Community Detection 7 2.1 Signed Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.2 Connection between signed networks and error-correcting codes . . . . . 9 2.3 The Hamming distance . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3 Clustering algorithm 15 3.1 The SDP algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.2 The LR-SVP algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 3.3 Majority vote decoder . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 3.4 A probabilistic decoder . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 3.5 A necessary and sufficient optimality condition . . . . . . . . . . . . . . . 25 4 Extension to more than two communities 29 5 Experimental results 32 5.1 Community detection with two communities . . . . . . . . . . . . . . . . 32 5.2 Community detection with more than two communities . . . . . . . . . . 37 5.3 Results on real-life data set . . . . . . . . . . . . . . . . . . . . . . . . . 38 6 Conclusion 41

    [1] A. Lancichinetti and S. Fortunato, "Community detection algorithms: a comparative analysis," Physical review E, vol. 80, no. 5, p. 056117, 2009.

    [2] M. Newman, Networks: an introduction. Oxford university press, 2010.

    [3] F. D. Malliaros and M. Vazirgiannis, "Clustering and community detection in directed networks: A survey," Physics Reports, vol. 533, no. 4, pp. 95-142, 2013.

    [4] M. Burke and R. Kraut, "Mopping up: modeling wikipedia promotion decisions," in Proceedings of the 2008 ACM conference on Computer supported cooperative work. ACM, 2008, pp. 27-36.

    [5] R. Guha, R. Kumar, P. Raghavan, and A. Tomkins, "Propagation of trust and distrust," in Proceedings of the 13th international conference on World Wide Web. ACM, 2004, pp. 403-412.

    [6] P. Massa and P. Avesani, "Controversial users demand local trust metrics: An experimental study on epinions. com community," in AAAI, vol. 5, 2005, pp. 121-126.

    [7] M. J. Brzozowski, T. Hogg, and G. Szabo, "Friends and foes: ideological social networking," in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2008, pp. 817-820.

    [8] J. Kunegis, A. Lommatzsch, and C. Bauckhage, "The slashdot zoo: mining a social network with negative edges," in Proceedings of the 18th international conference on World wide web. ACM, 2009, pp. 741-750.

    [9] C. A. Lampe, E. Johnston, and P. Resnick, "Follow the reader: filtering comments on slashdot," in Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, 2007, pp. 1253-1262.

    [10] P. Doreian and A. Mrvar, "A partitioning approach to structural balance," Social networks, vol. 18, no. 2, pp. 149-168, 1996.

    [11] D. Cartwright and F. Harary, "Structural balance: a generalization of heider's theory." Psychological review, vol. 63, no. 5, p. 277, 1956.

    [12] F. Harary, "A matrix criterion for structural balance," Naval Research Logistics (NRL), vol. 7, no. 2, pp. 195-199, 1960.

    [13] F. Harary et al., "On the notion of balance of a signed graph." The Michigan Mathematical Journal, vol. 2, no. 2, pp. 143-146, 1953.

    [14] C.-S. Chang, D.-S. Lee, L.-H. Liou, and S.-M. Lu, "Community detection in signed networks: an error-correcting code approach," arXiv preprint arXiv:1705.04254, 2017.

    [15] F. Heider, "Attitudes and cognitive organization," The Journal of psychology, vol. 21, no. 1, pp. 107-112, 1946.

    [16] D. B. West et al., Introduction to graph theory. Prentice hall Upper Saddle River, 2001, vol. 2.

    [17] S. Lin and D. J. Costello, Error control coding. Prentice Hall Englewood Cliffs, 2004, vol. 2.

    [18] J. D. Horton, "A polynomial-time algorithm to find the shortest cycle basis of a graph," SIAM Journal on Computing, vol. 16, no. 2, pp. 358-366, 1987.

    [19] E. Abbe, A. S. Bandeira, A. Bracher, and A. Singer, "Decoding binary node labels from censored edge measurements: Phase transition and efficient recovery," IEEE Transactions on Network Science and Engineering, vol. 1, no. 1, pp. 10-22, 2014.

    [20] K.-Y. Chiang, C.-J. Hsieh, N. Natarajan, I. S. Dhillon, and A. Tewari, "Prediction and clustering in signed networks: a local to global perspective." Journal of Machine Learning Research, vol. 15, no. 1, pp. 1177-1213, 2014.

    [21] A. Singer, "Angular synchronization by eigenvectors and semide nite programming," Applied and computational harmonic analysis, vol. 30, no. 1, pp. 20-36, 2011.

    [22] L. Vandenberghe and S. Boyd, "Semide nite programming," SIAM review, vol. 38,no. 1, pp. 49-95, 1996.

    [23] M. Grant and S. Boyd, "CVX: Matlab software for disciplined convex programming, version 2.1," http://cvxr.com/cvx, Mar. 2014.

    [24] -, "Graph implementations for nonsmooth convex programs," in Recent Advances in Learning and Control, ser. Lecture Notes in Control and Information Sciences, V. Blondel, S. Boyd, and H. Kimura, Eds. Springer-Verlag Limited, 2008, pp. 95-110, http://stanford.edu/boyd/graph dcp.html.

    [25] G. H. Golub and C. F. Van Loan, "Matrix computations, the johns hopkins univ," Press, Baltimore, 1983.

    [26] J. A. Davis, "Clustering and structural balance in graphs," Human relations, vol. 20, no. 2, pp. 181-187, 1967.

    [27] E. Candes and B. Recht, "Exact matrix completion via convex optimization," Communications of the ACM, vol. 55, no. 6, pp. 111{119, 2012.

    [28] P. Jain, R. Meka, and I. S. Dhillon, "Guaranteed rank minimization via singular value projection," in Advances in Neural Information Processing Systems, 2010, pp. 937-945.

    [29] C. Castellano, S. Fortunato, and V. Loreto, "Statistical physics of social dynamics," Reviews of modern physics, vol. 81, no. 2, p. 591, 2009.

    [30] C.-S. Chang, C.-T. Chang, D.-S. Lee, and L.-H. Liou, "K-sets+: a linear-time clustering algorithm for data points with a sparse similarity measure," arXiv preprintarXiv:1705.04249, 2017.

    [31] J. Yang and J. Leskovec, "De ning and evaluating network communities based on ground-truth," Knowledge and Information Systems, vol. 42, no. 1, pp. 181-213, 2015.

    [32] S. Harenberg, G. Bello, L. Gjeltema, S. Ranshous, J. Harlalka, R. Seay, K. Padmanabhan, and N. Samatova, "Community detection in large-scale networks: a survey and empirical evaluation," Wiley Interdisciplinary Reviews: Computational Statistics, vol. 6, no. 6, pp. 426-439, 2014.

    QR CODE