Overview Of Various Overlapping Community Detection Approaches
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 7
Abstract
With the advancement in technology, we are surrounded with huge amount of data, which need to be processed in some manner for further processing. For this purpose, we may combine the Data Mining Techniques with the concepts of Graph Theory. Real world systems may be represented as Graphs. For example: Social Networks may be depicted as graph with the people as nodes and their relationships represented as links. Community Structure has been found as an important property of these systems. In simple words we can define community structure as a connected sub-graph which is tightly connected within the subgroups and weakly connected within the subgroups. Various algorithms have been proposed till now to identify and detect these community structures. In this paper we will provide the overview of some approaches which identify the overlapping communities i.e. communities that may belong to more than one subgroups.
Authors and Affiliations
Pooja Chaturvedi
An Integer Programming-based Local Search for Large-scale Maximal Covering Problems
Maximal covering problem (MCP) is classified as a linear integer optimization problem which can be effectively solved by integer programming technique. However, as the problem size grows, integer programming requires exc...
A Zero-Watermarking algorithm on multiple occurrences of letters for text tampering detection
Electronic publishing has gained importance with the widespread use of Internet. It involves transmission of digital data in bulk from one place to another. It brings various threats to the data in form of illegal copyin...
Effect of Normalized Scale on Design of Rectangular Microstrip Antenna by using FFBP
Nonlinear neural optimization networks are used for the esigning of MSA. The paper presents NN model for computing resonant frequency of RMSA with normalized scale. NN model with normalised scale computes very fast. The...
Encryption using XOR based Extended Key for Information Security – A Novel Approach
The explosive growth of information, places a high demand for Information Security. Information Security deals with securing the information from unauthorized access or misuse of information either intentionally or accid...
A Face Recognition System Through Somatology
Normally facial recognition algorithms identify faces by extracting landmarks or features from an image of the subject’s face and then algorithm may analyze the relative size, shape of the eyes, nose, cheekbones, and jaw...