吉林大学学报(工学版) ›› 2013, Vol. 43 ›› Issue (02): 424-428.

Previous Articles     Next Articles

CCA-based mining algorithm of modules in in complex networks

YE Yu-xin1,2, ZHAO Jian-min3, MO Yu-chang3, OUYANG Dan-tong1,2, LIU Hua-wen2,3   

  1. 1. College of Computer Science and Technology, Jilin University, Changchun 130012, China;
    2. Key Lab of Symbol Computation and Knowledge Engineer of Ministry of Education, Jilin University, Changchun 130012, China;
    3. College of Mathematics, Physics and Information Engineering, Zhejiang Normal University, Jinhua 321004, China
  • Received:2012-05-05 Online:2013-03-01 Published:2013-03-01

Abstract: Complex networks, such as social networks and biological networks, are ubiquitous in real world. Identifying modules and their relationships in complex networks is very important to discover entities and modules behind the networks, and to understand the mechanisms of the networks. In this paper, we analyze modules and their interplays in complex network using Canonical Correlation Analysis (CCA). To improve the interpretability of the results, we further extend the solution of CCA as a LASSO optimization problem, and then propose a new mining algorithm of modules and their relationships. This algorithm enables us to disclose modules and explicitly modeling their relationships simultaneously. Extensive experiments on both synthetic and DBLP datasets demonstrate the effectiveness of the proposed method.

Key words: computer software, complex network, functional module, social network, canonical correlation analysis (CCA)

CLC Number: 

  • TP31
[1] Palla G, Barabási A-L, Vicsek T. Quantifying social group evolution[J]. Nature, 2007, 446(7136): 664-667.

[2] Liu B, Liu L, Tsykin A, et al. Identifying functional miRNA-mRNA regulatory modules with correspondence latent dirichlet allocation[J]. Bioinformatics, 2010,26(24):3105-3011.

[3] Scott J. Social Network Analysis: A Handbook[M]. London, UK: SAGE Publications, 2000.

[4] Getoor L, Diehl C P. Link mining: a survey[J]. SIGKDD Explor Newsl,2005, 7:3-12.

[5] Fortunato S. Community detection in graphs[J]. Phy Rept, 2010, 486(3):75-174.

[6] Newman M E J, Girvan M. Finding and evaluating community structure in networks[J]. Phys Rev E, 2004, 69(2):026113.

[7] Negoescu R-A, Gatica-Perez D. Modeling flickr communities through probabilistic topic-based analysis[J]. IEEE Trans Mult, 2010, 12(5): 399-416.

[8] Hotelling H. Relations between two sets of variables[J]. Biometrika, 1936, 28(3/4):312-377.

[9] Tibshirani R. Regression shrinkage and selection via the lasso: a retrospective[J]. J R Statist Soc B, 2011, 73(3):273-282.
[1] MA Jian, FAN Jian-ping, LIU Feng, LI Hong-hui. The evolution model of objective-oriented software system [J]. 吉林大学学报(工学版), 2018, 48(2): 545-550.
[2] LUO Yang-xia, GUO Ye. Software recognition based on features of data dependency [J]. 吉林大学学报(工学版), 2017, 47(6): 1894-1902.
[3] YING Huan, WANG Dong-hui, WU Cheng-gang, WANG Zhe, TANG Bo-wen, LI Jian-jun. Efficient deterministic replay technique on commodity system environment [J]. 吉林大学学报(工学版), 2017, 47(1): 208-217.
[4] SHI Xiao-hu, FENG Guo-xiang, LI Mu, LI Ying, WU Chun-guo. Overlapping community detection method based on density peaks [J]. 吉林大学学报(工学版), 2017, 47(1): 242-248.
[5] LI Yong, HUANG Zhi-qiu, WANG Yong, FANG Bing-wu. New approach of cross-project defect prediction based on multi-source data [J]. 吉林大学学报(工学版), 2016, 46(6): 2034-2041.
[6] HUANG Lan, LI Yu, WANG Gui-shen, WANG Yan. Community detection method based on vertex distance and clustering of density peaks [J]. 吉林大学学报(工学版), 2016, 46(6): 2042-2051.
[7] GUO Yu-quan, LI Xiong-fei. Fractal clustering method for uncovering community of complex network [J]. 吉林大学学报(工学版), 2016, 46(5): 1633-1638.
[8] WANG Nian-bin, ZHU Guan-wen, ZHOU Lian-ke, WANG Hong-wei. Novel dataspace index for efficient processing of path query [J]. 吉林大学学报(工学版), 2016, 46(3): 911-916.
[9] TE Ri-gen, JIANG Sheng, LI Xiong-fei, LI Jun. Document compression scheme based on integer data [J]. 吉林大学学报(工学版), 2016, 46(1): 228-234.
[10] CHEN Peng-fei, TIAN Di, YANG Guang. Design and implementation of LIBS software based on MVC architecture [J]. 吉林大学学报(工学版), 2016, 46(1): 242-245.
[11] LIU Lei, WANG Yan-yan, SHEN Chun, LI Yu-xiang, LIU Lei. Performance portable GPU parallel optimization technique on Bellman-Ford algorithm [J]. 吉林大学学报(工学版), 2015, 45(5): 1559-1564.
[12] FENG Xiao-ning, WANG Zhuo, ZHANG Xu. Formal method for routing protocol of WSN based on L-π calculus [J]. 吉林大学学报(工学版), 2015, 45(5): 1565-1571.
[13] LI Ming-zhe, WANG Jin-lin, CHEN Xiao, CHEN Jun. Architecture model of streaming media applications on network processors(VPL) [J]. 吉林大学学报(工学版), 2015, 45(5): 1572-1580.
[14] WANG Ke-chao, WANG Tian-tian, SU Xiao-hong, MA Pei-jun. Plagiarism detection in student programs based on frequent closed sequence mining [J]. 吉林大学学报(工学版), 2015, 45(4): 1260-1265.
[15] HUANG Hong-tao,WANG Jing,YE Hai-zhi,HUANG Shao-bin. Lazy slicing based method for verifying linear temporal logic property [J]. 吉林大学学报(工学版), 2015, 45(1): 245-251.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!