SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018.
DOI: 10.5121/ijcsit.2018.10402 13
EVOLUTIONARY CENTRALITY AND MAXIMAL
CLIQUES IN MOBILE SOCIAL NETWORKS
Heba Elgazzar1
and Adel Elmaghraby2
1
School of Engineering & Information Systems, Morehead State University
Morehead, KY, USA
2
Computer Engineering and Computer Science Department, University of Louisville
Louisville, KY, USA
ABSTRACT
This paper introduces an evolutionary approach to enhance the process of finding central nodes in mobile
networks. This can provide essential information and important applications in mobile and social networks.
This evolutionary approach considers the dynamics of the network and it takes into consideration the
central nodes from previous time slots. We study also the applicability of maximal cliques algorithms in
mobile social networks and how it can be used to find the central nodes based on the discovered maximal
cliques. The experimental results are promising and show a significant enhancement in finding the central
nodes.
KEYWORDS
Centrality, Social Networks, Network Science, Mobile Networks, Evolutionary Centrality, Maximal Cliques
1. INTRODUCTION
Centrality in social networks is an important measure of the influence of the node in the network
[1-6]. Finding these central nodes that have important effect on other nodes had many important
applications in network science. One application in healthcare is discovering these central nodes
that transmit disease among the nodes that represent connected communities. Finding clusters
that present communities in social networks is also one of the important problems [7-11].
We focus in this paper on the design and analysis of evolutionary centrality algorithms that can be
used effectively to analyze the dynamics of mobile networks to find central nodes. There is a need
to understand the behavior of mobile networks and to find central nodes dynamically. This can
enhance the provided services and introduce new applications that meet the need of communities
in mobile networks. The goal of this research is to develop algorithms that can be used for
evolutionary centrality in mobile social networks by utilizing mobility data that represents the
dynamics behavior of the mobile networks.
The remainder of this paper is organized as follows. Section 2 gives an overview of network
representation. Section 3 discusses different centrality measures in social networks and the
proposed evolutionary approach. Section 4 discusses one of the maximal cliques algorithm that
can be applied to mobile social networks. The MIT mobility dataset that was used in our
experiments are discussed in section 5. Sections 6 and 7 discuss the results of several experiments
that we conducted to evaluate the evolutionary centrality and to discover maximal cliques.
Finally, conclusion and future work are given at the end of this paper.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018.
14
2. NETWORK REPRESENTATION
The work in this paper is related to network science which is one of the important fields in
computer science. It focuses on the study of the theoretical foundations of network structure,
network dynamics, network behavior, and the application of network science to different types of
networks [12]. Network science techniques can be applied to different types of networks
including mobile social networks, biological networks, power grids and other types of networks.
We can represent any network in terms of nodes, edges between the nodes, and algorithms that
can be applied to the nodes. Network nodes represent the main entities in the network that interact
with each other. An edge or a link represents an interaction or a relationship between two nodes.
We can define any network as shown below [12]:
G (t) = { N(t); L(t); f (t) : J(t) } (1)
where:
N(t): is nodes or vertices at time t
L(t): is links or edges at time t
f(t): N X N mapping function that connects node pairs
J(t): Algorithm for describing behaviors of nodes and links versus time.
This above definition gives an important representation for the topology of the networks which
can be changed dynamically with the time and it connects the different entities in the networks.
Algorithms can be used to understand the behavior and the dynamics of the networks. In this
paper, we will focus on mobile nodes in mobile networks where the network nodes are social
communicating and the topology is changing with time because of the nodes are not stationary
and the communication links are dynamically changing between nodes. An example of this
mobile network is shown in Figure 1.
Figure1. Example of network representation
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018.
15
3. CENTRALITY IN SOCIAL NETWORKS
Centrality in social networks is a measure of the importance of the node in the network. This is a
very useful measure and it has important applications. This can be used to discover central nodes
that have important effect on other nodes.
There are several techniques that can be used to measure the centrality in social networks. We
focus in this paper on the following similarity measures that can be used effectively for mobile
networks where the network is changing dynamically over time [1-6]:
3.1. Degree Centrality
This is a simple measure and it is based on counting the number of neighbor nodes. This degree
centrality, CD, of a node N can be expressed as the degree of the vertex N in the connected graph
that represents the network:
CD(N)= deg(N) (2)
Where, deg(N) returns the number of neighbor nodes that are connected to the node N.
3.2. Closeness Centrality
This measures the centrality based on the distance from the node to the neighbor nodes. The sum
of shortest distance to all other nodes is used. This measure is useful to show how fast it will take
to reach other nodes. This is very useful in broadcasting and healthcare applications.
=
1
∑ ,≠
3
Where, d(N,V) is the shortest distance between nodes N and V
3.3. Betweenness Centrality
This measures the centrality based on the number of times the node act as a bridge between other
two nodes based in the distances between these nodes. The betweenness centrality for a node N
can be calculated according to the following steps:
1. Start with CB(N)=0
2. For each two other nodes (N1 and N2) find the shortest path between them:
a. If this shortest path passes through N, find p, the percentage of that path that
passes through N.
b. CB(N)= CB(N)+p
3. Repeat step 2 for all pairs of nodes.
3.4. Eigenvector Centrality
This measure is based on the idea of considering a node as an important node if it is connected to
other important nodes. it is based on counting the number of neighbor nodes. The vector of
centralities, C, can be found based on the adjacency matrix A and a constant λ as follows:
λ.C = A.C (4)
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018.
16
where A is an n×n adjacency matrix and n is number of all nodes in the network. Any
element aij in A represents the connection (edge) between the nodes i and j. Element aij
will be zero if there is no edge between nodes i and j. C is the eigenvector of A with an
eigen value of λ.
3.5. Page Rank Centrality
This centrality measure algorithm was developed by google to determine the importance of
webpages based on the counting the number of links to the page and the quality of these links [6].
The PageRank, PR(N), for any node, N, in this algorithm is based on PageRank PR(J) for every
other node J connected to N and the number of links (edges) of J. This can be expressed in a
simple form as:
= 5
where:
PR(N) is the PageRank of the node N
PR(J) is PageRank of the node J that is connected to N
L(J) is the number of links of the node J
In this case, the PageRank measure for each node will be initialized to 1/n where n is the total
number of nodes in the network.
3.6. Proposed Evolutionary Centrality
We introduce an evolutionary approach to enhance the process of finding central nodes. The
evolutionary centrality will be calculated based on the connections between the nodes in the
network at the current time slot, t, and at the previous time slot, t-1. This evolutionary approach
considers the dynamics of the network and it takes into consideration the central nodes from
previous time slots. The factor α will be used to calculate the updated adjacency matrix between
the nodes (which represents the connections between edges) by considering the connections from
current and previous time slot:
′ = 1 − " + " −1 6
where:
At is the adjacency matrix at time t
A't is the updated adjacency matrix after temporal smoothing
This approach is applicable to all the above centrality measures with considering the dynamics of
the network based on the updated adjacency matrix that considers the dynamic network structure
at different time slots.
4. MAXIMAL CLIQUES
A clique in social networks represents a group of people or nodes that are connected in a
complete graph where every node is connected to each other. An example of clique is shown in
Fig. 2. A k-clique is a clique of order k where it has k nodes. The clique shown in Fig. 2 is an
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018.
17
example of a 13- clique. A maximal clique is a clique that is not a subset of any other clique. The
graph shown in Figure 2 is a maximal clique while any subgraph of this graph is a clique.
Figure 2. Example of a clique
The well-known Bron-Kerbosch algorithm [11] was used in this problem in a recursive manner to
find the maximal cliques for mobile social networks. The general algorithm requires an
undirected graph with no self-edges which is applicable in mobile social networks where the link
between two nodes is undirected and there is no edges from one node to itself [11]. Suppose that
there are three sets R, P, and X where [11]:
R: represents the set of vertices that represent a maximal clique or can be extended to a
maximal clique.
P: represents the set of vertices that are connected to all vertices in R and can be added to R
to make a larger clique.
X: represents the set of vertices connected to all vertices in R but excluded from being added
to R.
N(v): returns a list of vertices that are neighbors to v.
The Bron-Kerbosch algorithm starts by initializing R and X to empty sets and P to the set of the
vertices in the graph. The algorithm makes recursive calls to consider every vertex in P in turn.
The general algorithm is as follows [11]:
BronKerbosch(R, P, X):
1. if P and X are empty:
Report R as a maximal clique
2. for each vertex v in P:
BronKerbosch(R⋃{v},P⋂N(v),X⋂N(v))
P = P{v}
X = X⋃{v}
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018.
18
This algorithm is one of the most effective algorithms to find clique communities and therefore it
was selected to find the maximal cliques in our problem.
5. MIT REALITY MINING DATASET
MIT reality mining dataset [13] was used in our experiments in the next chapters to test the
proposed evolutionary techniques in this proposal. This dataset has records for 106 users and it
was recorded for a period of 9 months. The dataset was available as MATLAB data. This data has
a variety of information including mobility data survey data collected for mobile users. MATLAB
toolboxes were used to help in implementing the evolutionary centrality.
We considered the mobility features in the datasets to find friendship among users. These data
include MAC address data, location data, and time stamps. These data are recorded for all mobile
users. Our analysis in next chapters is based on the fact that the MAC address can be discovered
by a periodic Bluetooth scan performed by another phone and this is indicative of the fact that the
two users’ phones are within 5-10 meters of each other. A similarity matrix was used to record
the similarity between users which represents the number of intervals where they were in physical
proximity for different weeks. The evolutionary clustering algorithms introduced in next sections
were tested using this dataset.
6. EXPERIMENTAL RESULTS FOR CENTRALITY
Several experiments have been conducted to find the centrality in the mobile social networks
using different centrality measures. We used here the results of the PageRank centrality and
eigenvector centrality to show the effectiveness of using the evolutionary approach.
Figure 3 shows an example of the results before and after applying the evolutionary centrality
using the eigenvector centrality measure for time slot 46. Figure 3 (a) shows the eigenvector
centrality at time slot 45 and Figure 3 (b) shows the eigenvector centrality at time slot 46 before
applying the evolutionary centrality. Fig. 3(c) shows the results of applying the evolutionary
centrality at time slot 46 by considering the network connections at time slot 45 and time slot 46.
The results of the centrality scores in Figure 3 (c) shows a significant enhancement in finding the
central nodes using the evolutionary centrality. For example, Figure 3 (b and c) shows that the
centrality score for nodes 17 was increased significantly at the current time slot (t=46) by
considering the network connections at the previous time slot (t=45). Figure3 (a) shows the
centrality for node 17 and it was the main central point at that time slot. Also, the centrality score
for node 44 was increased significantly because it continues to represent a high level of centrality
over time as indicated in Figure 3.
Additional experiments were conducted to apply the evolutionary centrality for the MIT mobility
dataset. The results of the scores for different time slots for PageRank centrality before applying
the evolutionary approach are shown in Figure 4. The results of evolutionary centrality using the
PageRank Centrality measure is shown in Figure 5 for different time slots. These results are
shown for α factor of 0.5. The results show a significant improvement in finding central nodes by
applying the evolutionary centrality approach. The nodes centrality measures were adjusted to
reflect the centrality over time for different nodes. This is very important in many applications
where the network is changing dynamically.
Several experiments were also conducted for all other centrality measures (degree centrality,
closeness centrality, and betweenness centrality). The results of degree centrality show that
central nodes can be detected in the network directly and a threshold can be used to determine the
effective central nodes. The results of closeness centrality show that central nodes that can be
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018.
19
used to reach other nodes in a fast way based on the distances. The results of the scores for the
betweenness centrality show that central nodes that can be used effectively to connect other pairs
of nodes. The results of the scores for the PageRank centrality show that this algorithm is very
applicable to dynamic networks because it considers the updated links.
Figure 3. The results applying the evolutionary centrality for Eigenvector Centrality
at time slot 46 with α = 0.5 of
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018.
20
Figure 4. PageRank Centrality Scores for different time slots
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018.
21
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018.
22
Figure 5. Evolutionary PageRank Centrality Scores for different time slots with α = 0.5
7. EXPERIMENTAL RESULTS FOR MAXIMAL CLIQUES
We applied the Bron-Kerbosch algorithm for the MIT reality mining dataset at different time slots
to find the maximum cliques. The results are shown below. Figure 6 shows sample results with
different cliques. The size of the generated clique is based on the time slot of that clique and the
number of nodes that interact at this time slot. The results in Figure 7 show the frequency of the
discovered maximal cliques for at different times for different clique sizes. A total of 12875 were
discovered. The 10-clique is the most frequent maximal clique and the 20-clique is the least
frequent as shown in Figure 7.
Figure 6. Sample Results of Finding the Maximal Cliques using Bron-Kerbosch Algorithm
Figure 7. Frequency of Clique Size
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018.
23
The results in Figure 7 show the frequency of the discovered maximal cliques for at different
times for different clique sizes. A total of 12875 were discovered. The 10-clique is the most
frequent maximal clique and the 20-clique is the least frequent as shown in Figure 7.
The maximal cliques algorithm that was used can be utilized to find the central nodes based on
the discovered maximal cliques at every time slot. In this case, the proposed algorithm will be
extended to find and generate a list of the common nodes in the discovered maximal cliques at
every time step. These nodes are highly connected to most of the other nodes in this case and they
can be considered as central nodes. A time window can be applied in this case as well to find the
nodes that frequently continue to be central nodes during this time window. These are the nodes
that can be used effectively for early detection of outbreak. For example, the four discovered
maximal cliques in Figure 6 at the same time slot can be used to determine the central node. In
this example, X2 (with red circle) can be considered as a central node because it is connected to
all other points in the four cliques and it can be used in this case as a sensor node to detect an
outbreak.
7. CONCLUSION
This paper focused on the problem of centrality and maximal cliques in mobile social networks.
The goal of this research is to develop evolutionary centrality algorithms that can be applied in
mobile social networks to analyze the dynamics of the networks and find the central nodes based
on the behavior of the network over time. We also studied the applicability of one of the maximal
cliques algorithms. We focused in this paper on different centrality measures that can be used in
mobile social networks with a focus on evolutionary centrality. Finding centrality and maximal
cliques in social networks has many important applications including healthcare applications. The
proposed evolutionary approach to find centrality in mobile social networks shows a significant
enhancement in finding the central nodes using the evolutionary Eigenvector Centrality and
PageRank Centrality. The discovered maximal cliques show the dynamic of the different nodes at
different time slots and these maximal claques can be used as well to find centrality.
Future work includes enhancing the current proposed evolutionary centrality technique by
considering more than one time period from previous time slots. Although we were able to
discover most of the cliques, there still a possibility to enhance the results by considering cliques
from previous time slots and this approach will be considered in future work.
REFERENCES
[1] Xiaohui Zhao, Sai Guo, and Yanlei Wang, “The Node Influence Analysis in Social Networks Based
on Structural Holes and Degree Centrality”, IEEE International Conference on Computational
Science and Engineering (CSE) and Embedded and Ubiquitous Computing (EUC), pp. 708 – 711,
2017.
[2] Felipe Grando, Diego Noble, and Luis C. Lamb, “An Analysis of Centrality Measures for Complex
and Social Networks”, 2016 IEEE Global Communications Conference (GLOBECOM), pp. 1-6,
2016.
[3] Amedapu Srinivas and R. Leela Velusamy, “Identification of influential nodes from social
networks based on Enhanced Degree Centrality Measure”, 2015 IEEE International Advance
Computing Conference (IACC), pp. 1179 – 1184, 2015.
[4] Zudha Aulia Rachman, Warih Maharani, and Adiwijaya, “The analysis and implementation of
degree centrality in weighted graph in Social Network Analysis”, 2013 International Conference of
Information and Communication Technology (ICoICT), pp. 72 – 76, 2013.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018.
24
[5] Jie Zhang, Xuerui Ma, Weihao Liu, Yong Bai, “Inferring Community Members in Social
Networks by Closeness Centrality Examination”, 2012 Ninth Web Information Systems and
Applications Conference, pp. 131-134, 2012.
[6] Sergey Brin and Lawrence Page, “The Anatomy of a Large-Scale Hypertextual Web Search
Engine”, Computer Networks, vol. 30, pp. 107-117, 1998.
[7] Eppstein D., Strash D., “Listing All Maximal Cliques in Large Sparse Real-World Graphs”, In:
Pardalos P.M., Rebennack S. (eds) Experimental Algorithms. SEA 2011. Lecture Notes in
Computer Science, vol 6630. Springer, Berlin, Heidelberg.
[8] Cazals, F., Karande, C., “A note on the problem of reporting maximal cliques”, Theoretical
Computer Science, 407(1-3), pp. 564–568, 2008.
[9] F. Cazals, C. Karande, “An algorithm for reporting maximal c-cliques”, Theoretical Computer
Science, 349 (3), pp. 484-490, 2005.
[10] David Eppstein, Maarten Löffler, Darren Strash, “Listing All Maximal Cliques in Large Sparse
Real World Graphs”, Journal of Experimental Algorithmics (JEA), Vol. 18, 2013.
[11] Anne-Sophie Himmel, Hendrik Molter, Rolf Niedermeier, Manuel Sorge, “Adapting the Bron-
Kerbosch Algorithm for Enumerating Maximal Cliques in Temporal Graphs”, Social Network
Analysis and Mining, pp. 7-35, 2017.
[12] Katy Börner, Soma Sanyal, and Alessandro Vespignani, “Network Science”, Annual Review of
Information Science & Technology, Volume 41, pp. 537-607, January 2007.
[13] Nathan Eagle, Alex Pentland, and David Lazer. Inferring Social Network Structure using Mobile
Phone Data, Proceedings of the National Academy of Sciences (PNAS), Vol 106 (36), pp. 15274-
15278, 2009.

Contenu connexe

Tendances

Quantum persistent k cores for community detection
Quantum persistent k cores for community detectionQuantum persistent k cores for community detection
Quantum persistent k cores for community detectionColleen Farrelly
 
Vol 16 No 2 - July-December 2016
Vol 16 No 2 - July-December 2016Vol 16 No 2 - July-December 2016
Vol 16 No 2 - July-December 2016ijcsbi
 
Spatial correlation based clustering algorithm for random and uniform topolog...
Spatial correlation based clustering algorithm for random and uniform topolog...Spatial correlation based clustering algorithm for random and uniform topolog...
Spatial correlation based clustering algorithm for random and uniform topolog...eSAT Publishing House
 
Data collection in multi application sharing wireless sensor networks
Data collection in multi application sharing wireless sensor networksData collection in multi application sharing wireless sensor networks
Data collection in multi application sharing wireless sensor networksPvrtechnologies Nellore
 
Clustering Algorithms for Data Stream
Clustering Algorithms for Data StreamClustering Algorithms for Data Stream
Clustering Algorithms for Data StreamIRJET Journal
 
Dynamic approach to k means clustering algorithm-2
Dynamic approach to k means clustering algorithm-2Dynamic approach to k means clustering algorithm-2
Dynamic approach to k means clustering algorithm-2IAEME Publication
 
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...IJCSEIT Journal
 
Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)Alexander Decker
 
One dimensional vector based pattern
One dimensional vector based patternOne dimensional vector based pattern
One dimensional vector based patternijcsit
 
Energy Efficient Modeling of Wireless Sensor Networks using Random Graph Theory
Energy Efficient Modeling of Wireless Sensor Networks using Random Graph TheoryEnergy Efficient Modeling of Wireless Sensor Networks using Random Graph Theory
Energy Efficient Modeling of Wireless Sensor Networks using Random Graph Theoryidescitation
 
Comparison Between Clustering Algorithms for Microarray Data Analysis
Comparison Between Clustering Algorithms for Microarray Data AnalysisComparison Between Clustering Algorithms for Microarray Data Analysis
Comparison Between Clustering Algorithms for Microarray Data AnalysisIOSR Journals
 
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...csandit
 
Distribution of maximal clique size under
Distribution of maximal clique size underDistribution of maximal clique size under
Distribution of maximal clique size underijfcstjournal
 
An improved graph drawing algorithm for email networks
An improved graph drawing algorithm for email networksAn improved graph drawing algorithm for email networks
An improved graph drawing algorithm for email networksZakaria Boulouard
 
Density Based Clustering Approach for Solving the Software Component Restruct...
Density Based Clustering Approach for Solving the Software Component Restruct...Density Based Clustering Approach for Solving the Software Component Restruct...
Density Based Clustering Approach for Solving the Software Component Restruct...IRJET Journal
 
Finding Relationships between the Our-NIR Cluster Results
Finding Relationships between the Our-NIR Cluster ResultsFinding Relationships between the Our-NIR Cluster Results
Finding Relationships between the Our-NIR Cluster ResultsCSCJournals
 
Operating Task Redistribution in Hyperconverged Networks
Operating Task Redistribution in Hyperconverged Networks Operating Task Redistribution in Hyperconverged Networks
Operating Task Redistribution in Hyperconverged Networks IJECEIAES
 
k fault tolerance Mobile Adhoc Network under Cost Constraint
k fault tolerance Mobile Adhoc Network under Cost Constraintk fault tolerance Mobile Adhoc Network under Cost Constraint
k fault tolerance Mobile Adhoc Network under Cost Constraintsugandhasinghhooda
 

Tendances (20)

Quantum persistent k cores for community detection
Quantum persistent k cores for community detectionQuantum persistent k cores for community detection
Quantum persistent k cores for community detection
 
Vol 16 No 2 - July-December 2016
Vol 16 No 2 - July-December 2016Vol 16 No 2 - July-December 2016
Vol 16 No 2 - July-December 2016
 
Impact of Graphs and Network in Minimizing Project and Product Cost
Impact of Graphs and Network in Minimizing Project and Product CostImpact of Graphs and Network in Minimizing Project and Product Cost
Impact of Graphs and Network in Minimizing Project and Product Cost
 
Spatial correlation based clustering algorithm for random and uniform topolog...
Spatial correlation based clustering algorithm for random and uniform topolog...Spatial correlation based clustering algorithm for random and uniform topolog...
Spatial correlation based clustering algorithm for random and uniform topolog...
 
Data collection in multi application sharing wireless sensor networks
Data collection in multi application sharing wireless sensor networksData collection in multi application sharing wireless sensor networks
Data collection in multi application sharing wireless sensor networks
 
Clustering Algorithms for Data Stream
Clustering Algorithms for Data StreamClustering Algorithms for Data Stream
Clustering Algorithms for Data Stream
 
K means report
K means reportK means report
K means report
 
Dynamic approach to k means clustering algorithm-2
Dynamic approach to k means clustering algorithm-2Dynamic approach to k means clustering algorithm-2
Dynamic approach to k means clustering algorithm-2
 
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
 
Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)
 
One dimensional vector based pattern
One dimensional vector based patternOne dimensional vector based pattern
One dimensional vector based pattern
 
Energy Efficient Modeling of Wireless Sensor Networks using Random Graph Theory
Energy Efficient Modeling of Wireless Sensor Networks using Random Graph TheoryEnergy Efficient Modeling of Wireless Sensor Networks using Random Graph Theory
Energy Efficient Modeling of Wireless Sensor Networks using Random Graph Theory
 
Comparison Between Clustering Algorithms for Microarray Data Analysis
Comparison Between Clustering Algorithms for Microarray Data AnalysisComparison Between Clustering Algorithms for Microarray Data Analysis
Comparison Between Clustering Algorithms for Microarray Data Analysis
 
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...
 
Distribution of maximal clique size under
Distribution of maximal clique size underDistribution of maximal clique size under
Distribution of maximal clique size under
 
An improved graph drawing algorithm for email networks
An improved graph drawing algorithm for email networksAn improved graph drawing algorithm for email networks
An improved graph drawing algorithm for email networks
 
Density Based Clustering Approach for Solving the Software Component Restruct...
Density Based Clustering Approach for Solving the Software Component Restruct...Density Based Clustering Approach for Solving the Software Component Restruct...
Density Based Clustering Approach for Solving the Software Component Restruct...
 
Finding Relationships between the Our-NIR Cluster Results
Finding Relationships between the Our-NIR Cluster ResultsFinding Relationships between the Our-NIR Cluster Results
Finding Relationships between the Our-NIR Cluster Results
 
Operating Task Redistribution in Hyperconverged Networks
Operating Task Redistribution in Hyperconverged Networks Operating Task Redistribution in Hyperconverged Networks
Operating Task Redistribution in Hyperconverged Networks
 
k fault tolerance Mobile Adhoc Network under Cost Constraint
k fault tolerance Mobile Adhoc Network under Cost Constraintk fault tolerance Mobile Adhoc Network under Cost Constraint
k fault tolerance Mobile Adhoc Network under Cost Constraint
 

Similaire à EVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKS

MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK
MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK
MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK csandit
 
A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DE...
A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DE...A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DE...
A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DE...ijcsit
 
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...csandit
 
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents ApproachAn Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approachijasuc
 
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents ApproachAn Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approachjake henry
 
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents ApproachAn Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approachijasuc
 
AN OPPORTUNISTIC AODV ROUTING SCHEME: A COGNITIVE MOBILE AGENTS APPROACH
AN OPPORTUNISTIC AODV ROUTING SCHEME: A COGNITIVE MOBILE AGENTS APPROACHAN OPPORTUNISTIC AODV ROUTING SCHEME: A COGNITIVE MOBILE AGENTS APPROACH
AN OPPORTUNISTIC AODV ROUTING SCHEME: A COGNITIVE MOBILE AGENTS APPROACHijasuc
 
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKSOPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKSZac Darcy
 
Exploring the Current Trends and Future Prospects in Terrorist Network Mining
Exploring the Current Trends and Future Prospects in Terrorist Network Mining Exploring the Current Trends and Future Prospects in Terrorist Network Mining
Exploring the Current Trends and Future Prospects in Terrorist Network Mining cscpconf
 
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKS
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKSSCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKS
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKSIJDKP
 
Scalable Local Community Detection with Mapreduce for Large Networks
Scalable Local Community Detection with Mapreduce for Large NetworksScalable Local Community Detection with Mapreduce for Large Networks
Scalable Local Community Detection with Mapreduce for Large NetworksIJDKP
 
LCF: A Temporal Approach to Link Prediction in Dynamic Social Networks
 LCF: A Temporal Approach to Link Prediction in Dynamic Social Networks LCF: A Temporal Approach to Link Prediction in Dynamic Social Networks
LCF: A Temporal Approach to Link Prediction in Dynamic Social NetworksIJCSIS Research Publications
 
Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018Arsalan Khan
 
Energy Efficient Power Failure Diagonisis For Wireless Network Using Random G...
Energy Efficient Power Failure Diagonisis For Wireless Network Using Random G...Energy Efficient Power Failure Diagonisis For Wireless Network Using Random G...
Energy Efficient Power Failure Diagonisis For Wireless Network Using Random G...idescitation
 
Ripple Algorithm to Evaluate the Importance of Network Nodes
Ripple Algorithm to Evaluate the Importance of Network NodesRipple Algorithm to Evaluate the Importance of Network Nodes
Ripple Algorithm to Evaluate the Importance of Network Nodesrahulmonikasharma
 
Predicting_new_friendships_in_social_networks
Predicting_new_friendships_in_social_networksPredicting_new_friendships_in_social_networks
Predicting_new_friendships_in_social_networksAnvardh Nanduri
 
Medicinal Applications of Quantum Computing
Medicinal Applications of Quantum ComputingMedicinal Applications of Quantum Computing
Medicinal Applications of Quantum ComputingbGeniusLLC
 
Adaptive Percolation Daniel Burkhardt Cerigo
Adaptive Percolation Daniel Burkhardt CerigoAdaptive Percolation Daniel Burkhardt Cerigo
Adaptive Percolation Daniel Burkhardt CerigoDaniel Burkhardt Cerigo
 

Similaire à EVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKS (20)

MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK
MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK
MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK
 
A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DE...
A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DE...A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DE...
A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DE...
 
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
 
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents ApproachAn Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
 
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents ApproachAn Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
 
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents ApproachAn Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
 
AN OPPORTUNISTIC AODV ROUTING SCHEME: A COGNITIVE MOBILE AGENTS APPROACH
AN OPPORTUNISTIC AODV ROUTING SCHEME: A COGNITIVE MOBILE AGENTS APPROACHAN OPPORTUNISTIC AODV ROUTING SCHEME: A COGNITIVE MOBILE AGENTS APPROACH
AN OPPORTUNISTIC AODV ROUTING SCHEME: A COGNITIVE MOBILE AGENTS APPROACH
 
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKSOPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
 
Exploring the Current Trends and Future Prospects in Terrorist Network Mining
Exploring the Current Trends and Future Prospects in Terrorist Network Mining Exploring the Current Trends and Future Prospects in Terrorist Network Mining
Exploring the Current Trends and Future Prospects in Terrorist Network Mining
 
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKS
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKSSCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKS
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKS
 
Scalable Local Community Detection with Mapreduce for Large Networks
Scalable Local Community Detection with Mapreduce for Large NetworksScalable Local Community Detection with Mapreduce for Large Networks
Scalable Local Community Detection with Mapreduce for Large Networks
 
LCF: A Temporal Approach to Link Prediction in Dynamic Social Networks
 LCF: A Temporal Approach to Link Prediction in Dynamic Social Networks LCF: A Temporal Approach to Link Prediction in Dynamic Social Networks
LCF: A Temporal Approach to Link Prediction in Dynamic Social Networks
 
Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018
 
Energy Efficient Power Failure Diagonisis For Wireless Network Using Random G...
Energy Efficient Power Failure Diagonisis For Wireless Network Using Random G...Energy Efficient Power Failure Diagonisis For Wireless Network Using Random G...
Energy Efficient Power Failure Diagonisis For Wireless Network Using Random G...
 
Ripple Algorithm to Evaluate the Importance of Network Nodes
Ripple Algorithm to Evaluate the Importance of Network NodesRipple Algorithm to Evaluate the Importance of Network Nodes
Ripple Algorithm to Evaluate the Importance of Network Nodes
 
Predicting_new_friendships_in_social_networks
Predicting_new_friendships_in_social_networksPredicting_new_friendships_in_social_networks
Predicting_new_friendships_in_social_networks
 
Medicinal Applications of Quantum Computing
Medicinal Applications of Quantum ComputingMedicinal Applications of Quantum Computing
Medicinal Applications of Quantum Computing
 
Node similarity
Node similarityNode similarity
Node similarity
 
Adaptive Percolation Daniel Burkhardt Cerigo
Adaptive Percolation Daniel Burkhardt CerigoAdaptive Percolation Daniel Burkhardt Cerigo
Adaptive Percolation Daniel Burkhardt Cerigo
 
1104.0355
1104.03551104.0355
1104.0355
 

Plus de AIRCC Publishing Corporation

Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...AIRCC Publishing Corporation
 
Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!AIRCC Publishing Corporation
 
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarConstraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarAIRCC Publishing Corporation
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...AIRCC Publishing Corporation
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkAIRCC Publishing Corporation
 
International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)AIRCC Publishing Corporation
 
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...AIRCC Publishing Corporation
 
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3AIRCC Publishing Corporation
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...AIRCC Publishing Corporation
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkAIRCC Publishing Corporation
 
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesUse of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesAIRCC Publishing Corporation
 
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...AIRCC Publishing Corporation
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...AIRCC Publishing Corporation
 
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Current Issue - February 2024, Volume 16, Number 1  - International Journal o...Current Issue - February 2024, Volume 16, Number 1  - International Journal o...
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...AIRCC Publishing Corporation
 
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...AIRCC Publishing Corporation
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 
February 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyFebruary 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyAIRCC Publishing Corporation
 
Call for Articles- International Journal of Computer Science & Information T...
Call for Articles-  International Journal of Computer Science & Information T...Call for Articles-  International Journal of Computer Science & Information T...
Call for Articles- International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 

Plus de AIRCC Publishing Corporation (20)

Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...
 
The Smart Parking Management System - IJCSIT
The Smart Parking Management System  - IJCSITThe Smart Parking Management System  - IJCSIT
The Smart Parking Management System - IJCSIT
 
Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!
 
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarConstraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
 
International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)
 
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
 
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
 
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesUse of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
 
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...
 
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Current Issue - February 2024, Volume 16, Number 1  - International Journal o...Current Issue - February 2024, Volume 16, Number 1  - International Journal o...
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
 
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...
 
February 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyFebruary 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information Technology
 
Call for Articles- International Journal of Computer Science & Information T...
Call for Articles-  International Journal of Computer Science & Information T...Call for Articles-  International Journal of Computer Science & Information T...
Call for Articles- International Journal of Computer Science & Information T...
 

Dernier

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 

Dernier (20)

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 

EVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKS

  • 1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018. DOI: 10.5121/ijcsit.2018.10402 13 EVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKS Heba Elgazzar1 and Adel Elmaghraby2 1 School of Engineering & Information Systems, Morehead State University Morehead, KY, USA 2 Computer Engineering and Computer Science Department, University of Louisville Louisville, KY, USA ABSTRACT This paper introduces an evolutionary approach to enhance the process of finding central nodes in mobile networks. This can provide essential information and important applications in mobile and social networks. This evolutionary approach considers the dynamics of the network and it takes into consideration the central nodes from previous time slots. We study also the applicability of maximal cliques algorithms in mobile social networks and how it can be used to find the central nodes based on the discovered maximal cliques. The experimental results are promising and show a significant enhancement in finding the central nodes. KEYWORDS Centrality, Social Networks, Network Science, Mobile Networks, Evolutionary Centrality, Maximal Cliques 1. INTRODUCTION Centrality in social networks is an important measure of the influence of the node in the network [1-6]. Finding these central nodes that have important effect on other nodes had many important applications in network science. One application in healthcare is discovering these central nodes that transmit disease among the nodes that represent connected communities. Finding clusters that present communities in social networks is also one of the important problems [7-11]. We focus in this paper on the design and analysis of evolutionary centrality algorithms that can be used effectively to analyze the dynamics of mobile networks to find central nodes. There is a need to understand the behavior of mobile networks and to find central nodes dynamically. This can enhance the provided services and introduce new applications that meet the need of communities in mobile networks. The goal of this research is to develop algorithms that can be used for evolutionary centrality in mobile social networks by utilizing mobility data that represents the dynamics behavior of the mobile networks. The remainder of this paper is organized as follows. Section 2 gives an overview of network representation. Section 3 discusses different centrality measures in social networks and the proposed evolutionary approach. Section 4 discusses one of the maximal cliques algorithm that can be applied to mobile social networks. The MIT mobility dataset that was used in our experiments are discussed in section 5. Sections 6 and 7 discuss the results of several experiments that we conducted to evaluate the evolutionary centrality and to discover maximal cliques. Finally, conclusion and future work are given at the end of this paper.
  • 2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018. 14 2. NETWORK REPRESENTATION The work in this paper is related to network science which is one of the important fields in computer science. It focuses on the study of the theoretical foundations of network structure, network dynamics, network behavior, and the application of network science to different types of networks [12]. Network science techniques can be applied to different types of networks including mobile social networks, biological networks, power grids and other types of networks. We can represent any network in terms of nodes, edges between the nodes, and algorithms that can be applied to the nodes. Network nodes represent the main entities in the network that interact with each other. An edge or a link represents an interaction or a relationship between two nodes. We can define any network as shown below [12]: G (t) = { N(t); L(t); f (t) : J(t) } (1) where: N(t): is nodes or vertices at time t L(t): is links or edges at time t f(t): N X N mapping function that connects node pairs J(t): Algorithm for describing behaviors of nodes and links versus time. This above definition gives an important representation for the topology of the networks which can be changed dynamically with the time and it connects the different entities in the networks. Algorithms can be used to understand the behavior and the dynamics of the networks. In this paper, we will focus on mobile nodes in mobile networks where the network nodes are social communicating and the topology is changing with time because of the nodes are not stationary and the communication links are dynamically changing between nodes. An example of this mobile network is shown in Figure 1. Figure1. Example of network representation
  • 3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018. 15 3. CENTRALITY IN SOCIAL NETWORKS Centrality in social networks is a measure of the importance of the node in the network. This is a very useful measure and it has important applications. This can be used to discover central nodes that have important effect on other nodes. There are several techniques that can be used to measure the centrality in social networks. We focus in this paper on the following similarity measures that can be used effectively for mobile networks where the network is changing dynamically over time [1-6]: 3.1. Degree Centrality This is a simple measure and it is based on counting the number of neighbor nodes. This degree centrality, CD, of a node N can be expressed as the degree of the vertex N in the connected graph that represents the network: CD(N)= deg(N) (2) Where, deg(N) returns the number of neighbor nodes that are connected to the node N. 3.2. Closeness Centrality This measures the centrality based on the distance from the node to the neighbor nodes. The sum of shortest distance to all other nodes is used. This measure is useful to show how fast it will take to reach other nodes. This is very useful in broadcasting and healthcare applications. = 1 ∑ ,≠ 3 Where, d(N,V) is the shortest distance between nodes N and V 3.3. Betweenness Centrality This measures the centrality based on the number of times the node act as a bridge between other two nodes based in the distances between these nodes. The betweenness centrality for a node N can be calculated according to the following steps: 1. Start with CB(N)=0 2. For each two other nodes (N1 and N2) find the shortest path between them: a. If this shortest path passes through N, find p, the percentage of that path that passes through N. b. CB(N)= CB(N)+p 3. Repeat step 2 for all pairs of nodes. 3.4. Eigenvector Centrality This measure is based on the idea of considering a node as an important node if it is connected to other important nodes. it is based on counting the number of neighbor nodes. The vector of centralities, C, can be found based on the adjacency matrix A and a constant λ as follows: λ.C = A.C (4)
  • 4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018. 16 where A is an n×n adjacency matrix and n is number of all nodes in the network. Any element aij in A represents the connection (edge) between the nodes i and j. Element aij will be zero if there is no edge between nodes i and j. C is the eigenvector of A with an eigen value of λ. 3.5. Page Rank Centrality This centrality measure algorithm was developed by google to determine the importance of webpages based on the counting the number of links to the page and the quality of these links [6]. The PageRank, PR(N), for any node, N, in this algorithm is based on PageRank PR(J) for every other node J connected to N and the number of links (edges) of J. This can be expressed in a simple form as: = 5 where: PR(N) is the PageRank of the node N PR(J) is PageRank of the node J that is connected to N L(J) is the number of links of the node J In this case, the PageRank measure for each node will be initialized to 1/n where n is the total number of nodes in the network. 3.6. Proposed Evolutionary Centrality We introduce an evolutionary approach to enhance the process of finding central nodes. The evolutionary centrality will be calculated based on the connections between the nodes in the network at the current time slot, t, and at the previous time slot, t-1. This evolutionary approach considers the dynamics of the network and it takes into consideration the central nodes from previous time slots. The factor α will be used to calculate the updated adjacency matrix between the nodes (which represents the connections between edges) by considering the connections from current and previous time slot: ′ = 1 − " + " −1 6 where: At is the adjacency matrix at time t A't is the updated adjacency matrix after temporal smoothing This approach is applicable to all the above centrality measures with considering the dynamics of the network based on the updated adjacency matrix that considers the dynamic network structure at different time slots. 4. MAXIMAL CLIQUES A clique in social networks represents a group of people or nodes that are connected in a complete graph where every node is connected to each other. An example of clique is shown in Fig. 2. A k-clique is a clique of order k where it has k nodes. The clique shown in Fig. 2 is an
  • 5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018. 17 example of a 13- clique. A maximal clique is a clique that is not a subset of any other clique. The graph shown in Figure 2 is a maximal clique while any subgraph of this graph is a clique. Figure 2. Example of a clique The well-known Bron-Kerbosch algorithm [11] was used in this problem in a recursive manner to find the maximal cliques for mobile social networks. The general algorithm requires an undirected graph with no self-edges which is applicable in mobile social networks where the link between two nodes is undirected and there is no edges from one node to itself [11]. Suppose that there are three sets R, P, and X where [11]: R: represents the set of vertices that represent a maximal clique or can be extended to a maximal clique. P: represents the set of vertices that are connected to all vertices in R and can be added to R to make a larger clique. X: represents the set of vertices connected to all vertices in R but excluded from being added to R. N(v): returns a list of vertices that are neighbors to v. The Bron-Kerbosch algorithm starts by initializing R and X to empty sets and P to the set of the vertices in the graph. The algorithm makes recursive calls to consider every vertex in P in turn. The general algorithm is as follows [11]: BronKerbosch(R, P, X): 1. if P and X are empty: Report R as a maximal clique 2. for each vertex v in P: BronKerbosch(R⋃{v},P⋂N(v),X⋂N(v)) P = P{v} X = X⋃{v}
  • 6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018. 18 This algorithm is one of the most effective algorithms to find clique communities and therefore it was selected to find the maximal cliques in our problem. 5. MIT REALITY MINING DATASET MIT reality mining dataset [13] was used in our experiments in the next chapters to test the proposed evolutionary techniques in this proposal. This dataset has records for 106 users and it was recorded for a period of 9 months. The dataset was available as MATLAB data. This data has a variety of information including mobility data survey data collected for mobile users. MATLAB toolboxes were used to help in implementing the evolutionary centrality. We considered the mobility features in the datasets to find friendship among users. These data include MAC address data, location data, and time stamps. These data are recorded for all mobile users. Our analysis in next chapters is based on the fact that the MAC address can be discovered by a periodic Bluetooth scan performed by another phone and this is indicative of the fact that the two users’ phones are within 5-10 meters of each other. A similarity matrix was used to record the similarity between users which represents the number of intervals where they were in physical proximity for different weeks. The evolutionary clustering algorithms introduced in next sections were tested using this dataset. 6. EXPERIMENTAL RESULTS FOR CENTRALITY Several experiments have been conducted to find the centrality in the mobile social networks using different centrality measures. We used here the results of the PageRank centrality and eigenvector centrality to show the effectiveness of using the evolutionary approach. Figure 3 shows an example of the results before and after applying the evolutionary centrality using the eigenvector centrality measure for time slot 46. Figure 3 (a) shows the eigenvector centrality at time slot 45 and Figure 3 (b) shows the eigenvector centrality at time slot 46 before applying the evolutionary centrality. Fig. 3(c) shows the results of applying the evolutionary centrality at time slot 46 by considering the network connections at time slot 45 and time slot 46. The results of the centrality scores in Figure 3 (c) shows a significant enhancement in finding the central nodes using the evolutionary centrality. For example, Figure 3 (b and c) shows that the centrality score for nodes 17 was increased significantly at the current time slot (t=46) by considering the network connections at the previous time slot (t=45). Figure3 (a) shows the centrality for node 17 and it was the main central point at that time slot. Also, the centrality score for node 44 was increased significantly because it continues to represent a high level of centrality over time as indicated in Figure 3. Additional experiments were conducted to apply the evolutionary centrality for the MIT mobility dataset. The results of the scores for different time slots for PageRank centrality before applying the evolutionary approach are shown in Figure 4. The results of evolutionary centrality using the PageRank Centrality measure is shown in Figure 5 for different time slots. These results are shown for α factor of 0.5. The results show a significant improvement in finding central nodes by applying the evolutionary centrality approach. The nodes centrality measures were adjusted to reflect the centrality over time for different nodes. This is very important in many applications where the network is changing dynamically. Several experiments were also conducted for all other centrality measures (degree centrality, closeness centrality, and betweenness centrality). The results of degree centrality show that central nodes can be detected in the network directly and a threshold can be used to determine the effective central nodes. The results of closeness centrality show that central nodes that can be
  • 7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018. 19 used to reach other nodes in a fast way based on the distances. The results of the scores for the betweenness centrality show that central nodes that can be used effectively to connect other pairs of nodes. The results of the scores for the PageRank centrality show that this algorithm is very applicable to dynamic networks because it considers the updated links. Figure 3. The results applying the evolutionary centrality for Eigenvector Centrality at time slot 46 with α = 0.5 of
  • 8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018. 20 Figure 4. PageRank Centrality Scores for different time slots
  • 9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018. 21
  • 10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018. 22 Figure 5. Evolutionary PageRank Centrality Scores for different time slots with α = 0.5 7. EXPERIMENTAL RESULTS FOR MAXIMAL CLIQUES We applied the Bron-Kerbosch algorithm for the MIT reality mining dataset at different time slots to find the maximum cliques. The results are shown below. Figure 6 shows sample results with different cliques. The size of the generated clique is based on the time slot of that clique and the number of nodes that interact at this time slot. The results in Figure 7 show the frequency of the discovered maximal cliques for at different times for different clique sizes. A total of 12875 were discovered. The 10-clique is the most frequent maximal clique and the 20-clique is the least frequent as shown in Figure 7. Figure 6. Sample Results of Finding the Maximal Cliques using Bron-Kerbosch Algorithm Figure 7. Frequency of Clique Size
  • 11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018. 23 The results in Figure 7 show the frequency of the discovered maximal cliques for at different times for different clique sizes. A total of 12875 were discovered. The 10-clique is the most frequent maximal clique and the 20-clique is the least frequent as shown in Figure 7. The maximal cliques algorithm that was used can be utilized to find the central nodes based on the discovered maximal cliques at every time slot. In this case, the proposed algorithm will be extended to find and generate a list of the common nodes in the discovered maximal cliques at every time step. These nodes are highly connected to most of the other nodes in this case and they can be considered as central nodes. A time window can be applied in this case as well to find the nodes that frequently continue to be central nodes during this time window. These are the nodes that can be used effectively for early detection of outbreak. For example, the four discovered maximal cliques in Figure 6 at the same time slot can be used to determine the central node. In this example, X2 (with red circle) can be considered as a central node because it is connected to all other points in the four cliques and it can be used in this case as a sensor node to detect an outbreak. 7. CONCLUSION This paper focused on the problem of centrality and maximal cliques in mobile social networks. The goal of this research is to develop evolutionary centrality algorithms that can be applied in mobile social networks to analyze the dynamics of the networks and find the central nodes based on the behavior of the network over time. We also studied the applicability of one of the maximal cliques algorithms. We focused in this paper on different centrality measures that can be used in mobile social networks with a focus on evolutionary centrality. Finding centrality and maximal cliques in social networks has many important applications including healthcare applications. The proposed evolutionary approach to find centrality in mobile social networks shows a significant enhancement in finding the central nodes using the evolutionary Eigenvector Centrality and PageRank Centrality. The discovered maximal cliques show the dynamic of the different nodes at different time slots and these maximal claques can be used as well to find centrality. Future work includes enhancing the current proposed evolutionary centrality technique by considering more than one time period from previous time slots. Although we were able to discover most of the cliques, there still a possibility to enhance the results by considering cliques from previous time slots and this approach will be considered in future work. REFERENCES [1] Xiaohui Zhao, Sai Guo, and Yanlei Wang, “The Node Influence Analysis in Social Networks Based on Structural Holes and Degree Centrality”, IEEE International Conference on Computational Science and Engineering (CSE) and Embedded and Ubiquitous Computing (EUC), pp. 708 – 711, 2017. [2] Felipe Grando, Diego Noble, and Luis C. Lamb, “An Analysis of Centrality Measures for Complex and Social Networks”, 2016 IEEE Global Communications Conference (GLOBECOM), pp. 1-6, 2016. [3] Amedapu Srinivas and R. Leela Velusamy, “Identification of influential nodes from social networks based on Enhanced Degree Centrality Measure”, 2015 IEEE International Advance Computing Conference (IACC), pp. 1179 – 1184, 2015. [4] Zudha Aulia Rachman, Warih Maharani, and Adiwijaya, “The analysis and implementation of degree centrality in weighted graph in Social Network Analysis”, 2013 International Conference of Information and Communication Technology (ICoICT), pp. 72 – 76, 2013.
  • 12. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018. 24 [5] Jie Zhang, Xuerui Ma, Weihao Liu, Yong Bai, “Inferring Community Members in Social Networks by Closeness Centrality Examination”, 2012 Ninth Web Information Systems and Applications Conference, pp. 131-134, 2012. [6] Sergey Brin and Lawrence Page, “The Anatomy of a Large-Scale Hypertextual Web Search Engine”, Computer Networks, vol. 30, pp. 107-117, 1998. [7] Eppstein D., Strash D., “Listing All Maximal Cliques in Large Sparse Real-World Graphs”, In: Pardalos P.M., Rebennack S. (eds) Experimental Algorithms. SEA 2011. Lecture Notes in Computer Science, vol 6630. Springer, Berlin, Heidelberg. [8] Cazals, F., Karande, C., “A note on the problem of reporting maximal cliques”, Theoretical Computer Science, 407(1-3), pp. 564–568, 2008. [9] F. Cazals, C. Karande, “An algorithm for reporting maximal c-cliques”, Theoretical Computer Science, 349 (3), pp. 484-490, 2005. [10] David Eppstein, Maarten Löffler, Darren Strash, “Listing All Maximal Cliques in Large Sparse Real World Graphs”, Journal of Experimental Algorithmics (JEA), Vol. 18, 2013. [11] Anne-Sophie Himmel, Hendrik Molter, Rolf Niedermeier, Manuel Sorge, “Adapting the Bron- Kerbosch Algorithm for Enumerating Maximal Cliques in Temporal Graphs”, Social Network Analysis and Mining, pp. 7-35, 2017. [12] Katy Börner, Soma Sanyal, and Alessandro Vespignani, “Network Science”, Annual Review of Information Science & Technology, Volume 41, pp. 537-607, January 2007. [13] Nathan Eagle, Alex Pentland, and David Lazer. Inferring Social Network Structure using Mobile Phone Data, Proceedings of the National Academy of Sciences (PNAS), Vol 106 (36), pp. 15274- 15278, 2009.