62,032 research outputs found
ALPINE : Active Link Prediction using Network Embedding
Many real-world problems can be formalized as predicting links in a partially observed network. Examples include Facebook friendship suggestions, consumer-product recommendations, and the identification of hidden interactions between actors in a crime network. Several link prediction algorithms, notably those recently introduced using network embedding, are capable of doing this by just relying on the observed part of the network.
Often, the link status of a node pair can be queried, which can be used as additional information by the link prediction algorithm. Unfortunately, such queries can be expensive or time-consuming, mandating the careful consideration of which node pairs to query. In this paper we estimate the improvement in link prediction accuracy after querying any particular node pair, to use in an active learning setup.
Specifically, we propose ALPINE (Active Link Prediction usIng Network Embedding), the first method to achieve this for link prediction based on network embedding. To this end, we generalized the notion of V-optimality from experimental design to this setting, as well as more basic active learning heuristics originally developed in standard classification settings. Empirical results on real data show that ALPINE is scalable, and boosts link prediction accuracy with far fewer queries
Graph Theory and Networks in Biology
In this paper, we present a survey of the use of graph theoretical techniques
in Biology. In particular, we discuss recent work on identifying and modelling
the structure of bio-molecular networks, as well as the application of
centrality measures to interaction networks and research on the hierarchical
structure of such networks and network motifs. Work on the link between
structural network properties and dynamics is also described, with emphasis on
synchronization and disease propagation.Comment: 52 pages, 5 figures, Survey Pape
Topology Detection in Microgrids with Micro-Synchrophasors
Network topology in distribution networks is often unknown, because most
switches are not equipped with measurement devices and communication links.
However, knowledge about the actual topology is critical for safe and reliable
grid operation. This paper proposes a voting-based topology detection method
based on micro-synchrophasor measurements. The minimal difference between
measured and calculated voltage angle or voltage magnitude, respectively,
indicates the actual topology. Micro-synchrophasors or micro-Phasor Measurement
Units ({\mu}PMU) are high-precision devices that can measure voltage angle
differences on the order of ten millidegrees. This accuracy is important for
distribution networks due to the smaller angle differences as compared to
transmission networks. For this paper, a microgrid test bed is implemented in
MATLAB with simulated measurements from {\mu}PMUs as well as SCADA measurement
devices. The results show that topologies can be detected with high accuracy.
Additionally, topology detection by voltage angle shows better results than
detection by voltage magnitude.Comment: 5 Pages, PESGM2015, Denver, C
Infection Spreading and Source Identification: A Hide and Seek Game
The goal of an infection source node (e.g., a rumor or computer virus source)
in a network is to spread its infection to as many nodes as possible, while
remaining hidden from the network administrator. On the other hand, the network
administrator aims to identify the source node based on knowledge of which
nodes have been infected. We model the infection spreading and source
identification problem as a strategic game, where the infection source and the
network administrator are the two players. As the Jordan center estimator is a
minimax source estimator that has been shown to be robust in recent works, we
assume that the network administrator utilizes a source estimation strategy
that can probe any nodes within a given radius of the Jordan center. Given any
estimation strategy, we design a best-response infection strategy for the
source. Given any infection strategy, we design a best-response estimation
strategy for the network administrator. We derive conditions under which a Nash
equilibrium of the strategic game exists. Simulations in both synthetic and
real-world networks demonstrate that our proposed infection strategy infects
more nodes while maintaining the same safety margin between the true source
node and the Jordan center source estimator
- …