Please wait a minute...
Computer & Telecommunication  2024, Vol. 1 Issue (5): 79-    DOI: 10.15966/j.cnki.dnydx.2024.05.023
Current Issue | Archive | Adv Search |
Graph Embedding Based on Neighbor Similarity for Community Detection
College of Computer and Artificial Intelligence
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  Community detection is a crucial research topic in the realm of complex networks. Understanding and identifying the community structure of a network is essential for uncovering its behavior and function. In this paper, we propose a novel graph em‐ bedding method based on neighbor similarity for community detection. By utilizing the acceptance of nodes and aggregating attri‐ bute information expressions of neighbors, we obtain the vector representation of each node in the network. The final community de‐ tection results are then obtained by directly applying K-means clustering. Our experimental results demonstrate that our proposed al‐ gorithm outperforms other methods, showing significant improvements in both modularity and standard normalization metrics.
Key wordscommunity detection      neighbor similarity      graph embedding      clustering     
Published: 12 October 2024

Cite this article:

ZHANG An-qi ZHANG Na. Graph Embedding Based on Neighbor Similarity for Community Detection. Computer & Telecommunication, 2024, 1(5): 79-.

URL:

https://www.computertelecom.com.cn/EN/10.15966/j.cnki.dnydx.2024.05.023     OR     https://www.computertelecom.com.cn/EN/Y2024/V1/I5/79

[1] HUANG He-lie HUANG Ge-wen CHEN Zhi-hua YAO Zu-fa. Improved Sparrow Search Algorithm for Hybrid Flow-shop Scheduling Problem with Peak Clipping Demand Response [J]. 电脑与电信, 2024, 1(6): 16-.
[2] YUAN Li-ning, XING Zhong-yu, YANG Guo-yi LUO Heng-yu.
Crime Organization Member Relationship Prediction Based on Graph Embedding Model
[J]. 电脑与电信, 2024, 1(4): 1-5.
[3] CAO Cong-hui LAN Qiang HOU Qun QI Wei-min . Research on Extraction Technology Based on Remote Learning[J]. 电脑与电信, 2021, 1(8): 1-5.
[4] ZHANG Zhi-yuan. DDoS Attack Detection Method on Application Layer Based on Clustering[J]. 电脑与电信, 2021, 1(7): 25-28.
[5] LI Hui-fang ZHONG Xin-cheng FU Xiao-li. Research on the Detection of Abnormal Behavior of College StudentsBased on Density Peak Clustering[J]. 电脑与电信, 2021, 1(3): 26-29.
[6] SONG Tian-shu, LI Jiang-yu, ZHANG Qin-zhe. Research on Personal Microblog Clustering Based on CBOW Model[J]. 电脑与电信, 2018, 1(4): 69-72.
[7] WEI Shuang. An Enhanced Data Mining Method for Text Clustering[J]. 电脑与电信, 2018, 1(3): 46-48.
[8] Chen Ping. Analysis of Network Learning Behavior Data Based on Clustering Technology[J]. 电脑与电信, 2017, 1(4): 31-33.
[9] LI Yan-mei. An Improvement Algorithm Based on Global K- means Clustering[J]. 电脑与电信, 2017, 1(11): 25-27.
[10] CHEN Min-tao, KUANG Fang-jun. Research on the Application of Data Mining Technology in Medical Big Data[J]. 电脑与电信, 2017, 1(11): 34-36.
[11] CHEN Shuang-quan. Research on Video Content Recognition Based on Clustering Algorithm[J]. 电脑与电信, 2017, 1(11): 44-46.
[12] Chen Lin. An Improved GHSOMAlgorithm for Text Clustering[J]. 电脑与电信, 2016, 1(5): 57-61.
[13] Xu Yong. Research on Content Recognition Based on Clustering Algorithm[J]. 电脑与电信, 2016, 1(11): 39-41.
[14] Zhang Yonghua. The Research on Network Community Detection Method Based on the Core Node[J]. 电脑与电信, 2015, 1(7): 39-42.
[15] Zhang Xiaoyan Hua Ying . Research on Methods of Text Mining and Its Application [J]. , 2011, 1(12): 0-0.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd