Download Predicting Links in Complex Network using Fuzzy Logic

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Types of artificial neural networks wikipedia , lookup

Transcript
International Journal of Computer Trends and Technology (IJCTT) – Volume 36 Number 3 - June 2016
Predicting Links in Complex Network using
Fuzzy Logic
Mini Ahuja#1, Heemakshi Malhi*2
Research Scholar#1, Department of Computer Science, Punjab Technical University, Punjab,India
Student*2, Department of computer Science, Regional Campus, Gurdaspur, Punjab, India
Abstract — This Complex networks has become
significant part of the digital world. Many large
scale problems can only be handled using complex
networks. Evaluating the optimistic link in these
networks is still a challenging issue. Link prediction
in directed network is attracting growing interest
among many network scientists. Compared with
predicting the existence of a link, determine its
direction is more complicated. It proposed efficient
solution named Local Directed Path to predict link
direction. By adding an extra ground node to the
network, one can solve the information loss problem
in sparse network, which makes the method effective
and robust. As a quasi-local method, link prediction
using fuzzy logic can deal with large –scale
networks in a reasonable time. The comparison is
made between existing and proposed technique
based on parametric analysis. The overall objective
is to evaluate various shortcomings in them.
Keywords — Fuzzy logic, Link prediction, bivalent
values, k-statistics, f-measure, sensitivity.
I. INTRODUCTION
Wireless complex network is the one in which there
exist connectivity of each node with every other
node. Wireless mesh network is one of the most
reliable networks available to be used. The topology
which is used wireless mesh topology. The
mechanism is generally expensive in nature. The
wireless Complex network will consist to nodes,
routers and gateways etc. Mesh topology is reliable
and offer redundancy [2]. The redundancy is the one
in which same data is repeated again and again over
the network. The radio nodes are used over the mesh
network. There are number of parameters which are
used within the wireless mesh network. The
coverage area of the mesh nodes is known as mesh
cloud. The nodes which are connected over the
wireless mesh network are of different types. Some
of the issues which are associated with the Wireless
Mesh networks are:
i)
Coverage Area
ii)
Supra System
iii)
Total Cost of ownership
iv)
Security
ISSN: 2231-2803
Fig 1: Showing Structure of Mesh Network
All of the above said factors will decide the success
or failure of the network. The cost factor is very
important since every user may not afford the cost
associated with the system.
In a given network what is major challenge
encountered is inference of links whose occurrence
is anticipated in future on basis of the edge, node
and topological characteristics they possess thereby
leading to a fundamental problem known as link
prediction. In a network representation, at a
particular instance of time, main objective is to
predict what and all links in the network will occur
in next instance of time. The nodes refer to people
or entities in social terms and the edges represent
linkage, interaction between the entities in social
networks.
Fuzzy logic involves method of reasoning
much alike human reasoning. It produces acceptable
yet define the result as a response to ambiguous,
contradictory, out of bounds, incomplete, distorted
fuzzy input. The concept of fuzzy logic resembles
the task of decision making in human brain that
comprises of all in between possibilities between
digital terms Yes or No. which range in between yes
or No. This was observed by fuzzy logic inventor
Loffi Zodeh. Fuzzy logic is dependent on input
possibilities levels to determine definite output [5].
Fuzzy logic may have two values and infers two
possible solutions. Fuzzy logic is a flexible machine
learning approach accompanied with multi –valued
logic allowing intermediate values. Interpretation
and execution of commands is taken care by
inference mechanism seen in fuzzy logic approach.
The existing work concentrates on the directed
algorithm in which bivalent values are considered
http://www.ijcttjournal.org
Page 158
International Journal of Computer Trends and Technology (IJCTT) – Volume 36 Number 3 - June 2016
only. The bivalent values indicates multi facet values
which are absent in the existing system. The
existing system does not consider the parameters
which are considered in the proposed system.
II. LITERATURE SURVEY
The existing work is being done toward complex
network. The connectivity problems has legion of
techniques associated with it.
S. Selvakennedy et.al [2] this paper describes the
rural area data transmission through the WSN is
considered in this case. The checking of malicious
entry is difficult in this case. Large number of users
interacts with the WSN and checking credibility of
each is exceedingly difficult. The WSN opt for large
number of security mechanism. The security
mechanisms which are used could involve
authentication and authorization. In wireless sensor
network knobs life starts only with the power usage,
connecting with another knobs. In processing the
data and transferring the gathered data a lots of
energy depletes. It is unsafe to replace the batteries
which are depleted or drained the power in many
cases like surveillance applications. Thus in order to
beat such power efficiency problems many
researchers are trying to find power aware protocols.
A.B Khan et al. [4] this paper suggests how to form
a dataset for the given problem. Today database are
huge so extracting data from the database using
genetic algorithm is complex task. Learning
techniques are employed in order to make algorithm
collect the data which is required. Collecting data
and training process is not a simple task. In this
paper it is suggested that how we can collect and
train the algorithm to achieve desired objective.
Dataset formulation is easy using this algorithm.
Supervised learning mechanisms are followed in this
case.
Xiaojie Wang et al. [5] In that paper, they propose
an effective alternative called Local Directed Way to
anticipate url bearing. With the development of a
supplementary ground center point to the system, we
handle the data diminishing issue in thin structure,
which makes our methodology convincing and solid.
In that paper, we offer thought with respect to
anticipating url bearing in guided frameworks and
propose LDP strategy. With the choice of a
supplementary ground center point and numbering
what number of guided ways, we extend the LP
approach to manage guided cases and add a semi
neighborhood rundown to predict the course of
association.
Evan Wei et al. [6] In that paper, they facilitate the
thin associated study directly into an organized
discourse and condense the late study works on the
hyperlink forecast errand. We isolate the current url
expectation strategies into three courses: the hub
savvy similarity based procedures tries to find a
suitable separation rating for 2 questions; the
ISSN: 2231-2803
topological configuration based methods offer
consideration regarding abusing both nearby or
overall strategies that may viably depict the
framework; probabilistic outline based systems
attempt to comprehend a tight plan that may digest
the interpersonal organization.
Panagiotis Symeonidis et al. [7] in that paper, they
incorporate the pondered a vertex collocation page
(VCP) for the objective of topological url evaluation
and desire. VCPs offer just about signify information
about the enveloping adjacent arrangement of stuck
vertex sets. The VCP procedure offers another item
for space forces to get a handle on the guideline
advancement segments inside their frameworks and
to analyze url course of action parts in the benefit
sociological, normal, physical, and other association.
Buket Kayaet et al. [8] incorporate a story
probabilistically weighted extension of the
Adamic/Adar figure for heterogeneous data
frameworks, which we use to display the possible
amazing things about grouped verification,
especially in circumstances when homogeneous
associations are to an incredible degree inadequate.
We in this manner show some direct inadequacies of
customary unsupervised url desire.
Catherine et al. [9] in this paper, they propose a
convincing choice called Local Directed Way to
predict url course. With the development of a
supplementary ground centre point to the structure,
we handle the data reducing issue in thin system,
which makes our methodology fruitful and capable.
In that paper, we offer thought with respect to
predicting url bearing in guided frameworks and
propose LDP technique. With the alternative of a
supplementary ground centre and counting what
number of guided ways, we extend the LP approach
to manage guided events and add a semi adjacent
record to anticipate the direction of association.
III. PROPOSED SYSTEM
The proposed system will have certain objectives
associated with it. The proposed system will
consider fuzzy system. The fuzzy system constructs
the fuzzy inference system. In this case rules of
fuzzy are created.
The proposed system
accomplishes the desired results through the use of
sink node elimination so that shortest path is
detected. The optimality is achieved in this case. The
clustering coefficient is also considered. The
clustering coefficient will make the clusters
connectivity high or low. The clustering coefficient
is selected on the basis of relationship that has to be
expressed between the various nodes. It is given
through the following equation
Eq--1
http://www.ijcttjournal.org
Page 159
International Journal of Computer Trends and Technology (IJCTT) – Volume 36 Number 3 - June 2016
The clustering coefficient will be utilized on the
basis of distinct node attributes. The proposed
system is based on the following algorithm:
Algorithm fuzzy (Data)
a) Data=Data[]
b) Initialize U=[uij]
c) Perform the following steps for every
center vector C(k)=[cj] with Uk
d)
e)
then stop otherwise
return to step c
Where u indicates membership function
values is the prescribed tolerance. X is
the value from the dataset or input value.
The proposed system also takes into consideration
path length which is calculated using the following
algorithm.
Algo path (Graph G, Node n)
a) Obtain Adjacency(A)=Adj(G)
b) Set i=1
c) Repeat while i<=n
d) Check Adji
e) If(Adji>0)
f) Accept the node(ACi)=Ni
g) Else
h) Reject the node
i) End of if
j) Move to the next node
k) I=i+1
l) End of loop
m) Calculate Modularity(Q) using Eq 1
The algorithm efficiently calculates the value of the
path length and overhead as listed through the results.
IV. RESULTS
The simulation and results indicate that the proposed
technique produces better result as compared to the
exiting technique. The simulation is created in
MATLAB. The simulation when executed at first
place following screen will be displayed
Fig 2: Showing Complexity degree in terms of
Graph
The graph once produced link prediction will going
to take place. The result produced in terms of chart
will be as follows
ISSN: 2231-2803
Fig 3: Showing the link prediction in terms of
edges and degree of distribution
The result from the above diagram indicates that
proposed technique predict the links much quickly
as compared to the previous work. The parametric
analysis is given by:
A. K-STATISTICS: In insights, a k-Statistics is a
base fluctuation impartial estimator of accumulates.
Cohen's kappa coefficient is a measurement which
measures between rater understanding for subjective
(unmitigated) things. It is for the most part thought
to be a more hearty measure than basic percent
understanding estimation, since κ considers the
agreement happening by possibility. The condition
for K is:
K=
Where po is the relative watched agreement among
raters, and pe is the speculative likelihood of chance
understanding, utilizing the watched information to
figure the probabilities of every onlooker
haphazardly saying every class.
B. SENSITIVITY: Sensitivity is an absolute
quantity, the smallest absolute amount of change that
can be detected by a measurement. It is a degree to
which a system will respond to change in climatic
conditions.
Sensitivity=
C. F-MEASURE: The F-score is frequently utilized
as a part of the field of data recovery for measuring
look, archive order, and inquiry grouping execution.
Prior works concentrated essentially on the F1 score,
yet with the multiplication of expansive scale
internet searchers, execution objectives changed to
place more accentuation on either accuracy or
review as is seen in wide application. It considers
both the precision p and the recall r of the test to
compute the score. The traditional F-measure or
balanced F-score (F1 score) is the harmonic mean of
precision and recall:
Precision=
http://www.ijcttjournal.org
Page 160
International Journal of Computer Trends and Technology (IJCTT) – Volume 36 Number 3 - June 2016
[3]
Recall=
[4]
F1=
(5)
[5]
Table 1: Showing values of existing and proposed
technique based on parameters analysis
Parameters
Values
Of Values
Of
Existing
Proposed
Technique
Technique
K-Statistics
0.3357
0.804
Sensitivity
0.846
0.955
F-Measure
0.849
0.953
[6]
[7]
[8]
[9]
[10]
[11]
[12]
Fig 4: Graph showing values of existing and
proposed technique
Fig 4 is showing that the proposed technique has
more kappa-statistics than the existing technique. It
shows that proposed techinque has more sensitivity
than the existing technique and also higher Fmeasure than the earlier technique. Hence the
proposed technique is showing better results than
earlier algorithms.
[13]
[14]
[15]
[16]
[17]
V. CONCLUSIONS
From the above comparison it is clear that the Fuzzy
algorithm will generate faster results as compared to
previous algorithms. The Fuzzy will go through the
nodes eliminating sink nodes hence consuming less
time than normal. With the help of proposed system
not only link between the nodes is detected but also
direction of link is also identifies which is more
complicated. Hence link is predicted with least
amount of time and optimality. The modularity of
the proposed system is also better as compared to the
existing system.
REFERENCES
[1]
[2]
Clauset A, Moore C, Newman M E J. Hierarchical
structure and the prediction of missing links in networks [J].
Nature, 2008, 453(7191): 98-101.
Lü L, Zhou T. Link prediction in complex networks: A
survey [J]. Physica A: Statistical Mechanics and its
Applications, 2011, 390(6): 1150-1170.
ISSN: 2231-2803
[18]
[19]
[20]
[21]
[22]
[23]
[24]
Huang Z, Li X, Chen H. Link prediction approach to
collaborativefiltering[C]//Proceedings
of
the
5th
ACM/IEEE-CS joint conference on Digital libraries. ACM,
2005: 141-142.
Dong Y, Tang J, Wu S, et al. Link prediction and
recommendation
across
heterogeneous
social
networks[C]//Data Mining (ICDM), 2012 IEEE 12th
International Conference on. IEEE, 2012: 181-190.
Han J. Mining heterogeneous information networks by
exploring the power of links[C]//Discovery Science.
Springer Berlin Heidelberg, 2009: 13-30.
Davis D, Lichtenwalter R, Chawla N V. Multi-relational
link
prediction
in
heterogeneous
information
networks[C]//Advances in Social Networks Analysis and
Mining (ASONAM), 2011 International Conference on.
IEEE, 2011: 281-288.
Clauset A, Moore C, Newman M E J. Hierarchical
structure and the prediction of missing links in networks [J].
Nature, 2008, 453(7191): 98-101.
Lü L, Zhou T. Link prediction in complex networks: A
survey [J]. Physica A: Statistical Mechanics and its
Applications, 2011, 390(6): 1150-1170.
Huang Z, Li X, Chen H. Link prediction approach to
collaborativefiltering[C]//Proceedings
of
the
5th
ACM/IEEE-CS joint conference on Digital libraries. ACM,
2005: 141-142.
Dong Y, Tang J, Wu S, et al. Link prediction and
recommendation
across
heterogeneous
social
networks[C]//Data Mining (ICDM), 2012 IEEE 12th
International Conference on. IEEE, 2012: 181-190.
Han J. Mining heterogeneous information networks by
exploring the power of links[C]//Discovery Science.
Springer Berlin Heidelberg, 2009: 13-30.
Davis D, Lichtenwalter R, Chawla N V. Multi-relational
link
prediction
in
heterogeneous
information
networks[C]//Advances in Social Networks Analysis and
Mining (ASONAM), 2011 International Conference on.
IEEE, 2011: 281-288.
Liben Nowell D, Kleinberg J. The link prediction problem
for social networks [J]. Journal of the American society for
information Science and technology, 2007, 58(7): 10191031.
Newman M E J. Clustering and preferential attachment in
growing networks [J]. Physical Review E, 2001, 64(2):
025102.
Jaccard P. Etude comparative de la distribution florale
dans une portion des Alpes et du Jura [M]. Impr. Corbaz,
1901.
Adamic L A, ADAR E. Friends and neighbors on the web
[J]. Social networks, 2003, 25(3): 211-230.
Xie Y B, Zhou T, Wang B H. Scale-free networks without
growth [J]. Physica A: Statistical Mechanics and its
Applications, 2008, 387(7): 1683-1688.
Katz L. A new status index derived from sociometric
analysis [J]. Psychometrika, 1953, 18(1): 39-43.
Lichtenwalter R N, Lussier J T, Chawla N V. New
perspectives
and
methods
in
link
prediction[C]//Proceedings of the 16th ACM
SIGKDD international conference on Knowledge
discovery and data mining. ACM, 2010: 243-252.
Al Hasan M, Chaoji V, Salem S, et al. Link prediction
using supervised
learning[C]//SDM’06: Workshop on
Link Analysis, Counter-terrorism and Security. 2006.
Benchettara N, Kanawati R, Rouveirol C. Supervised
machine learning applied to link prediction in bipartite
social
networks[C]//Advances in Social Networks
Analysis and Mining(ASONAM), 2010 International
Conference on. IEEE, 2010: 326-330.
Wang C, Satuluri V, Parthasarathy S. Local probabilistic
models for link prediction[C]//Data Mining, 2007. ICDM
2007. Seventh IEEE International Conference on. IEEE,
2007: 322-331.
Kashima H, Abe N. A parameterized probabilistic model of
network evolution for supervised link prediction[C]//Data
http://www.ijcttjournal.org
Page 161
International Journal of Computer Trends and Technology (IJCTT) – Volume 36 Number 3 - June 2016
[25]
[26]
[27]
[28]
[29]
Mining, 2006. ICDM'06. Sixth International Conference on.
IEEE, 2006: 340-349.
Dunlavy D M, Kolda T G, Acar E. Temporal link
prediction using matrix and tensor factorizations [J]. ACM
Transactions on Knowledge Discovery from Data (TKDD),
2011, 5(2): 10.
Huang Z, Li X, Chen H. Link prediction approach to
collaborative
filtering[C]//Proceedings of the 5th
ACM/IEEE-CS joint conference on Digital libraries. ACM,
2005: 141-142.
Silva Soares P R, Bastos Cavalcante Prudencio R. Time
Series Based Link Prediction[C]//Neural Networks
(IJCNN), The 2012 International Joint Conference on.
IEEE, 2012: 1-7.
Soares P R S, Prudêncio R B C. Proximity measures for
link prediction based on temporal events[J]. Expert
Systems with Applications, 2013, 40(16): 6652-6660.
Bliss C A, Frank M R, Danforth C M, et al. An
Evolutionary Algorithm Approach to Link Prediction in
Dynamic
Social
Networks[J].
arXiv
preprint
arXiv:1304.6257, 2013.
ISSN: 2231-2803
http://www.ijcttjournal.org
Page 162