You are on page 1of 9

The Fourteenth International

Multi-Conference on Advanced
Computer Systems
ACS 2007
SUBCONFERENCE ON ARTIFICIAL INTELLIGENCE, SOFTWARE TECHNOLOGIES,
BIOMETRCS AND INFORMATION TECHNOLOGY SECURITY
AISBIS 2007
MIEDZYZDROJE, POLAND, OCTOBER 17-19, 2007

CONFERENCE CHAIRS
n Prof. Włodzimierz Bielecki (Szczecin University of Technology, Poland)
n Prof. Mirosław Kutyłowski (Wroclaw University of Technology, Poland)
n Prof. Andrzej Piegat (Szczecin University of Technology, Poland)

INTERNATIONAL SCIENTIFIC COMMITTEE


ARTIFICIAL INTELLIGENCE:
n Andrzej Piegat (Poland), chair (Szczecin University of n Witold Pedrycz (University of Alberta, Canada)
Technology, Poland) n Orest Popov (Szczecin University of Szczecin,
n Anna Bartkowiak (Wroclaw University, Poland) Poland)
n Alexander Dorogov (Saint-Petersburg State n Elisabeth Rakus-Andersson (Blekinge Institute
Electrotechnical University, Russia) of Technology, School of Engineering, Sweden)
n Gisella Facchinetti (University of Modena & Reggio n Leszek Rutkowski (Czestochowa University
Emilia, Italy) of Technology, Poland)
n Akira Imada (Brest State Technical University, Belarus) n Zenon Sosnowski (University of Finance
n Janusz Kacprzyk (Systems Research Institute, and Management in Białystok, Poland)
Polish Academy of Sciences, Poland) n Sławomir Wierzchoń (Institute of Computer Science,
n Shin-ya Kobayashi (Ehime University, Japan) Polish Academy of Sciences, Poland)
n Jonathan Lawry (University of Bristol, UK) n Toru Yamaguchi, Tokyo Metropolitan University, Japan
n Kurosh Madani (Paris-XII University, France) n Jan Węglarz (Poznan University of Technology, Poland)

SOFTWARE TECHNOLOGIES:
n Włodzimierz Bielecki, chair (Szczecin University n Piotr Habela (Polish-Japanese Institute of Information
of Technology, Poland) Technology, Poland)
n Leon Bobrowski (Bialystok Technical University, Poland) n Leszek Maciaszek (Macquarie University, Sydney,
n Stefano Crespi (Politecnico di Milano, Italy) Australia)
n Andrzej Goscinski (Deakin University, Australia) n Valery Rogoza (Szczecin University of Technology,
n Janusz Górski (Technical University of Gdansk, Poland) Poland)
n Dietbert Gütter, (Technical University of Dresden, n Macha Sosonkina (Scalable Computing Laboratory, Iowa
Germany) State University, USA)
BIOMETRICS:
n Georgy Kukharev, chair (Szczecin University of Technology, Poland)
n Leonid Kompanets (Czestochowa University of Technology, Poland)r
n Ryszard S. Choraś (University of Technology and Life Sciences, Poland)
n Władysław Skarbek (Warsaw University of Technology, Poland)
n Khalid Saeed (Bialystok Technical University)

These articles have been presented during 14 International


Conference on Advanced Computer Systems
INFORMATION TECHNOLOGY SECURITY:
n Mirosław Kutyłowski, chair (Wroclaw University n Janusz Stokłosa (Poznan University of Technology, Poland)
of Technology, Poland n Vyacheslav Yarmolik (Bialystok Technical University,
n Johannes Bloemer (Paderborn University, Germany) Poland)
n Jos Dumortier (K.U.Leuven University, Belgium) n Prof. Ryszard S. Choraś (Poland)
n Mieczysław Kula (University of Silesia, Poland) n Prof. Jonathan Lawry (University of Bristol,
n Eugeniusz Kuriata (University of Zielona Gora, Poland) United Kingdom)
n Matthias Krause (Mannheim University, Germany) n Dr Marek Klonowski (Wroclaw University
n Josef Pieprzyk (Macquarie University, Australia) of Technology, Poland)
n Marian Srebrny (Institute of Computer Science, Polish n Prof. Larissa Globa (National Technical University
Academy of Sciences, Poland) of Ukraine), Ukraine)

BIOMETRICS:
n Georgy Kukharev, chair (Szczecin University of Technology, Poland)
n Leonid Kompanets (Czestochowa University of Technology, Poland)r
n Ryszard S. Choraś (University of Technology and Life Sciences, Poland)
n Władysław Skarbek (Warsaw University of Technology, Poland)
n Khalid Saeed (Bialystok Technical University)

INFORMATION TECHNOLOGY SECURITY:


n Mirosław Kutyłowski, chair (Wroclaw University n Matthias Krause (Mannheim University, Germany)
of Technology, Poland n Josef Pieprzyk (Macquarie University, Australia)
n Johannes Bloemer (Paderborn University, Germany) n Marian Srebrny (Institute of Computer Science, Polish
n Jos Dumortier (K.U.Leuven University, Belgium) Academy of Sciences, Poland)
n Mieczysław Kula (University of Silesia, Poland) n Janusz Stokłosa (Poznan University of Technology, Poland)
n Eugeniusz Kuriata (University of Zielona Gora, Poland) n Vyacheslav Yarmolik (Bialystok Technical University, Poland)

STEERING COMMITTEE AND EDITORS


n Imed El Fray (Szczecin University of Technology, Poland)
n Koichi Kashiwagi (Ehime University, Japan)
n Krzysztof Kraska (Szczecin University of Technology, Poland)
n Jerzy Pejaś (Szczecin University of Technology, Poland)
n Khalid Saeed (Szczecin University of Technology, Poland)
n Eri Sato (Tokyo Metropolitan Institute of Technology, Japan)
n Matthieu Voiry (Paris XII University, France)

REVIEWERS
n Anna Bartkowiak (Wroclaw University, Poland) n Leszek Maciaszek (Macquarie University, Sydney, Australia)
n Włodzimierz Bielecki (Szczecin University n Kurosh Madani (Paris-XII University, France)
of Technology, Poland) n Jerzy Pejaś (Szczecin University of Technology, Poland)
n Johannes Bloemer (Paderborn University, Germany) n Andrzej Piegat (Szczecin University of Technology, Poland)
n Andrzej Cader (Academy of Humanities n Josef Pieprzyk (Macquarie University, Australia)
and Economics in Lodz, Poland) n Valery Rogoza (Szczecin University of Technology, Poland)
n Piotr Habela (Polish-Japanese Institute of Information n Przemysław Różewski (Szczecin University of Technology,
Technology, Poland) Poland)
n Akira Imada (Brest State Technical University, n Khalid Saeed (Bialystok Technical University, Poland)
Belarus) n Macha Sosonkina (Scalable Computing Laboratory, Iowa
n Leonid Kompanets (Czestochowa University State University, USA)
of Technology, Poland) n Roman Śmierzchalski (Gdynia Maritime University, Poland)
n Mieczysław Kula (University of Silesia, Poland) n Janusz Stokłosa (Poznan University of Technology, Poland)
n Matthias Krause (Mannheim University, Germany) n Mieczyslaw Wodecki (Wroclaw University,
n Mirosław Kutyłowski (Wroclaw University Poland)
of Technology, Poland) n Oleg Zaikin (Szczecin University of Technology, Poland)

INVITED SPEAKERS
n Prof. Roman Śmierzchalski Artificial Intelligence in ship control (Gdynia Maritime University, Poland)
n Prof. Mirosław Kutyłowski (Wroclaw University of Technology, Poland)
POLISH JOURNAL OF ENVIRONMENTAL STUDIES
Vol. 16, No. 5B, 2007

1. “Probabilistic Computing with Words in Solution of the 2-option Problem”


A. PIEGAT .................................................................................................................................................... 7
2. “An Ant Colony Optimization to Scheduling Tasks on a Grid”
M. DRABOWSKI ....................................................................................................................................... 14
3. “A New Low Level Hybrid Algorithm for Bin Packing Problem”
L. CRUZ REYES, D. NIETO YAÑEZ, P. TOMAS SOLIS, J. MARTÍNEZ FLORES,
A. RAMÍREZ SALDÍVAR ......................................................................................................................... 20
4. “Application of the Centers of Gravity Method in Solving Linear Equations with Uncertain Parameters
Occurring in Problems of Computing with Words”
A. PIEGAT .................................................................................................................................................. 26
5. “Application of the Probabilistic RBF Neural Network in the Reinforcement Learning of a Mobile Robot”
M. PLUCIēSKI ........................................................................................................................................... 32
6. “Artificial Neural Network for Identification of Qualification Probability Function of Linguistic Concept”
A. PIEGAT, M. LANDOWSKI ................................................................................................................... 38
7. “Concept of Processor Architecture for Software Radio”
M. KAPRUZIAK, B. OLECH .................................................................................................................... 43
8. “Data-Driven Fuzzy Modelling for Fuzzy and Mixed Data: Fuzzy Tri-Model”
K. MURAWKO-WIĝNIEWSKA, A. PIEGAT ........................................................................................... 49
9. “Evolutionary and Coevolutionary Dynamic k-Means Algorithms in Image Segmentation”
D. MAàYSZKO, S. T. WIERZCHOē ....................................................................................................... 55
10. “Expanding the Feature Space in Classification Problems Using Additional Derived Attributes”
A. SAMBORSKA-OWCZAREK, P. CZAPIEWSKI ................................................................................. 61
11. “Experimental Design for Selection of Characterization Functions that Allow Discriminate Among
Random, Scale Free and Exponential Networks”
L. CRUZ REYES, E. MEZA CONDE, T. TURRUBIATES LÓPEZ, C. GUADALUPE GÓMEZ
SANTILLÁN, R. ORTEGA IZAGUIRRE .................................................................................................. 67
12. “Explaining Performance of the Threshold Accepting Algorithm for the Bin Packing Problem: a Causal
Approach”
J. PÉREZ ORTEGA, L. CRUZ REYES, V. LANDERO NAJERA, R. PAZOS RANGEL,
V. PÉREZ ROSAS, G. ZARATE RIVERA, G. REYES SALGADO ........................................................ 72
13. “Improving the Tabu Solution of the Robust Capacitated International Sourcing Problem”
H. J. FRAIRE HUACUJA, J. L. GONZÁLEZ VELARDE, G. CASTILLA VALDEZ,
S. GÓMEZ CARPIZO ................................................................................................................................ 77
14. “Incorporating Variance Reduction Techniques in the Experimental Analysis of Metaheuristic Algorithms”
H. J. FRAIRE HUACUJA, D. ROMERO VARGAS, R. A. PAZOS RANGEL, G. CASTILLA VALDEZ,
A. HERNÁNDEZ RAMÍREZ, J. J. GONZÁLEZ BARBOSA ................................................................... 82
15. “Integration of Fuzzy Rule Bases”
I. REJER ...................................................................................................................................................... 86
16. “Multiobjective Evolutionary Approach to Weather Routing for Vessels with Hybrid Propulsion”
J. SZàAPCZYēSKA, R. ĝMIERZCHALSKI ............................................................................................ 91
17. “ On the Sensitivity of Structural Similarity Index on the Window Function and the Stability Constants”
K. OKARMA .............................................................................................................................................. 96
18. “Artificial Intelligence in Ship Control”
R. ĝMIERZCHALSKI .............................................................................................................................. 101
19. “Singleton Representation of a Fuzzy Set for Data-Driven Fuzzy Modelling”
K. MURAWKO-WIĝNIEWSKA, A. PIEGAT ......................................................................................... 106
20. “Software Project Activity”
D. DĩEGA ................................................................................................................................................ 112
21. “Studying the Impact of Growing Dynamic in the Internet Topology”
R. ORTEGA IZAGUIRRE, E. MEZA CONDE, C. GÓMEZ SANTILLÁN, L. CRUZ REYES,
T. TURRUBIATES LÓPEZ ...................................................................................................................... 117
22. “Trajectory Tracking Control System with a Backstepping Ship Course Controller”
A. WITKOWSKA, R. ĝMIERZCHALSKI ............................................................................................... 121
23. “Some Problems in the Tasks of Calculating the Sensitivity Function”
A. BARCZ, O. POPOV ............................................................................................................................. 126
24. “Regions Grouping with Similarity Measure Based on Vector Calculus”
K. NERMEND .......................................................................................................................................... 130
25. “CASE Tools for Distributed IT-System Accounting Multithreading”
L. GLOBA ................................................................................................................................................. 135
26. “Blocking and Deadlock Factors in Series Linked Servers with HOL Priority Feedback Service”
W. ONISZCZUK ....................................................................................................................................... 141
27. “CASE Tools for IT-System Integration”
L. GLOBA, A. LUNTOVSKYY, D. GÜTTER, T. KOT .......................................................................... 148
28. “Core Concepts to Software Design of Steady-State Temperature Control”
M. FEDOROV .......................................................................................................................................... 154
29. “Extracting Synchronization-Free Chains of Dependent Iterations in Non-Uniform Loops”
W. BIELECKI, A BELETSKA, M. PAàKOWSKI, P. SAN PIETRO ..................................................... 161
30 “Increasing Program Locality by Extracting Synchronization – Free Slices in Arbitrarily Nested Loops”
W. BIELECKI, K. KRASKA, K. SIEDLECKI ........................................................................................ 167
31 “Influence of Arrival of Tasks in Partial Nodes of a System on Autonomous Load Distribution Method”
T. GODA, Y. HIGAMI, S.-Y. KOBAYASHI ........................................................................................... 176
32 “Network Design Methodology and Workflow within the CANDY Framework”
A. LUNTOVSKYY, D. GUETTER, G. PFEIFER, A. SCHILL ............................................................... 182
33 “ Program Realization of Adaptors in Problem Adaptive Systems”
W. ROGOZA ............................................................................................................................................ 189
34 “ Random Processes Visual Identification – Models for Identification of Basic Characteristic”
K. MAKLES .............................................................................................................................................. 198
35. “Reduction of Visualisation Errors’ Caused by Changing Light Conditions for Low Bitrate Video
Transmission over the FTP Based on Monte Carlo Motion Detection Method”
P. LECH, K. OKARMA ............................................................................................................................ 203
36. “Some Models of Problem Adaptive Systems”
W. ROGOZA ............................................................................................................................................ 208
37. “The Multilevel Signal Representation Using Sine Transform”
D. MAJORKOWSKA-MECH, A. ğARIOV ............................................................................................ 215
38. “Translation of VHDL Sequential Statements”
M. RADZIEWICZ ..................................................................................................................................... 219
39. “Using Argument Structures to Create a Measurement Plan”
à. CYRA, J. GÓRSKI ............................................................................................................................... 226
Polish J. of Environ. Stud. Vol. 16, No. 5B (2007), 67-71

Experimental Design for Selection


of Characterization Functions that Allow
Discriminate Among Random,
Scale Free and Exponential Networks
L. Cruz Reyes1, E. Meza Conde2, T. Turrubiates López1,3,
C. Guadalupe Gómez Santillán1,2, R. Ortega Izaguirre2
1
Instituto Tecnológico de Cd. Madero. Maestría en Ciencias en Ciencias de la Computación.
2
Centro de Investigación de Ciencias Avanzadas y Tecnología Aplicada.
3
Instituto Tecnológico Superior de Álamo Temapache.
e-mail: lauracruzreyes@hotmail.com, emazac@ipn.mx, tania_251179@hotmail.com,
cggs71@hotmail.com, rortegai@ipn.mx

Abstract
In this paper the design of an experiment is presented. An experiment was designed to select relevant
and not redundant features or characterization functions, which allow quantitatively discriminating among
different types of complex networks. As well there exist researchers given to the task of classifying some
networks of the real world through characterization functions inside a type of complex network, they do
not give enough evidences of detailed analysis of the functions that allow to determine if all of them are
necessary to carry out an efficient discrimination or which are better functions for discriminating. Our
results show that with a reduced number of characterization functions such as the degree dispersion
coefficient can discriminate efficiently among the types of complex networks treated here.

Keywords: complex networks, feature selection,classification, experimental design

Introduction resources [1], traffic management and design of ro-


uting algorithms.
Any natural or artificial complex system of the real Up to now the best way to identify the type of
world as Internet, can be modeled as a complex complex network has been observing the graphic of the
network, where the nodes are elements of the system degree distribution. Some researchers classifying com-
and the edges interactions between elements [8]. The plex networks, without showing evidences of statistical
term complex network refers to a graph with a non analysis of the functions that allow determining if all
trivial topologic structure, this has motivated the are necessary to carry out an efficient discrimination or
study of topological characteristics of real networks which are better for discrimination. This work presents
[4] to identify characteristics that allow the disc- an experimental design that has as an objective to select
rimination among different types of complex networks a characterization function or a set of characterization
and in this way optimize the performance of processes functions that allow quantitatively identified the type of
carried out in this networks as: search of distributed complex network.
68 Cruz Reyes L., et al.

Characterization Functions ristics of networks of the real world making possible its
of Complex Networks study. Some generation models are the Erdös-Rényi (ER)
model [9] that reproduces random networks, the Barabási-
The characterization functions provide informa- Albert (BA) [7] model that reproduces scale-free networks
tion about the topological characteristics of a com- and the Liu model [13] that reproduces scale-free and
plex network, when they are applied on a network, exponential networks.
a vector of characteristic is obtained. Through this
vector, the behavior of the complex networks is cha- Related Works
racterized and analyzed. The characterization func-
tions used in this work were: average degree of the A recent application in the field of complex net-
network, standard deviation of the degree, shortest works, is used information obtained through the cha-
path length, diameter, clustering coefficient, global racterization functions with the objective to discri-
and local efficiency, this characterization functions minate among different types of complex networks,
are described and detailed in Costa [10] and we in- this application is related with the area of pattern
troduce in this work the degree dispersion coefficient recognition also known as classification. The clas-
detailed in Ortega [17]. sification of naturals and artificial structures modeled
One characterization function widely used to iden- as complex networks implicate an important question:
tify the type of complex network is the degree distri- what characterization functions to select in order to
bution which provides graphic information about the discriminate among different types of complex net-
connectivity behavior of the nodes; through this func- works [10]?
tion different types of networks as random networks, In the classification area the selection of features (in
scale-free networks and exponential networks can be this case, characterization functions) has great benefits:
identified. to improve the performance of classification procedure,
and to construct simple and comprehensible classifica-
Three Types tion models, these are achieved leaving aside, irrelevant
of Complex Networks and redundant characteristics that can introduce noise
[12].
Toward late of the 50's and early of 60's Erdös and The work reported in Costa [2], used a classification
Rényi focused in studying statistical properties in graphs procedure to identify the type of a network with
where the connection among the nodes is established ran- unknown nature, the results show that the type of net-
domly. These graphs are called random networks and they work assigned to the networks, vary according to the
are characterized for approaching a degree distribution characterization functions selected and an excessive
binomial when the number of nodes n is small; when number of characterization functions can compromise
n o f , the degree distribution approaches a Poisson the quality of the classification.
distribution [9]. An experimentation to evaluate the stability and
In the decade of the 90's diverse researchers [3, 11], separability of different types of networks is presented in
discovered networks of the real world as Internet exhi- Airoldi [2], taking into account 6 topologies of networks
bits a degree distribution following a power law distri- to discriminate, 47 characterization functions are used as
bution, these networks are called scale-free, because inputs to the classifiers. This work does not present
independently of the scale, number of nodes, the main evidences of a selection of relevant and not redundant
characteristic of the network does not change, a reduced characterization functions.
set of nodes have a very high degree and the rest of the In Middendorf [14], the objective is to determine
nodes have a small degree [16]. from a set of models those describing more adequately
Some natural networks exhibit an exponential networks that represent biological systems, a tech-
distribution [6], where the majority of the nodes have nique described in Ziv [18] was utilized for extracting
a degree closer to the average degree and other nodes characteristics serving as inputs to the classifier per-
with a high degree can be observed [3, 4], this networks mitting to relate an instance generated by a model
are called exponential networks. To analyze the charac- with a real instance. Though the results of clas-
teristics of these networks and to understand the sification obtained are good, they do not show if the
phenomena carried out in them, generation models of characteristics extracted by the technique improve the
complex networks have been created. performance of the classifier regarding the informa-
tion provided by characterization functions exten-
Generation Models sively used in the field of the physics and the social
of Complex Networks sciences. In Ali [5] networks in 3 types of topology
are classified by means of a neural network; the
The generation models of networks are an important eigenvalues of the adjacency matrix are utilized as
tool to reproduce graphs sharing topological characte- inputs of the neural network.
Experimental Design for Selection… 69

Experimentation (exponential networks), with 200, 512, 1024, 2048 and


4096 nodes by each type of network; subsequently
Following the general scheme of procedures described topologic characteristics were extracted such as: average
in Montgomery [15] an experiment was designed, to degree (Avg) , standard deviation of the degree (D),
determinate, given a set of characterization functions, the clustering coefficient (CG), global efficiency (EG), local
functions permitting quantitatively discriminate among efficiency (EL), shortest path length (L), diameter(D)
three types of complex networks: random networks, scale- and the degree dispersion coefficient (DDC). The
free networks and exponential networks. statistical packages MINITAB and SAS were utilized to
In other words, 3 different populations are defined study these characteristics.
for each type of networks, from which topological In the related works, the networks have the same
characteristics are extracted, if the averages of those number of nodes and edges, so the average degree is
characteristics are significantly different and the popu- equal for each type of network; in this experimentation
lations do not overlap then those characteristics can help the number of edges with the purpose of introducing
to distinguish networks of those populations. Three pos- variability to the experiment and carry to correct conclu-
sible results of classifying networks are: sions is not determined. In Airoldi [2] it was observed
Case 1: There are significant differences among the that determining the number of edges aid to understand
3 types of networks according to a set of characteristics, phenomena of interest but introduces dangers in statis-
in this way through these characteristics a new network tical tests.
can be classified inside a type of network. These In this way, two factors that can influence in the process
characteristics are very relevant. of characterization were identified and can be controlled
Case 2: There exist significant differences among without affecting data normality, the type of network and
some of the types of networks according to a set of the number of nodes. The factor, type of network, is
characteristics. These characteristics are weak rele- composed of 3 levels, represented by the 3 types of
vant. networks being analyzed. The factor, number of nodes, is
Case 3: There does not exist significant differences composed of 5 levels, 200, 512, 1024, 2048 and 4096
among the 3 types of networks according to a set of nodes. Giving the characteristic of the problem a two-factor
characteristics, these two last cases lead to wrong clas- factorial design was chosen. The significance level D was
sifications of new networks that need to be identified. set in 0.01.
These characteristics are irrelevant. The operation characteristics curves was used to
Instances of complex networks were generated to determine the number of instances of networks n,
carry out the experimentation, through the models of E- appropriate for detecting significant differences. Thro-
R (random networks), BA (scale free networks) and Liu ugh this procedure it was determined that with n = 19

Table 1. F0 -values calculated by GLM for each variable.

Avg Std DDC L D EL EG CG

Type of network 218.83 327.73 18794.1 1348.78 1014.56 95.73 1066.68 406.02

Number of nodes 39.02 93.33 90.40 77.22 32.18 1.87 15.59 2.41

Interaction 38.93 46.71 128.51 22.48 11.90 0.54 4.35 0.94

Table 2. F0 values calculated for the MANOVA test and values of F distribution.

Type of Network Number of nodes Interaction


MANOVA Test
F0 FD ,Q ,Q
1 2
F0 FD ,Q ,Q
1 2
F0 FD ,Q ,Q
1 2

Wilks’ 515.91 1.23 88.62 1.23 32.97 1.17

Pilliai’s 391.57 1.23 34.52 1.23 17.04 1.17

Lawley – Hotelling 676.26 1.23 183.88 1.23 66.26 1.17

Roy’s 1137.97 1.29 367.89 1.29 250.28 1.29


70 Cruz Reyes L., et al.

instances a probability of 98% is obtained to detect exponential networks, were defined by initial parameters
differences up to 0.1 this procedure can be found in employed by the models of generation, on the other hand
Montgomery [15]. Due that this experiment was the plots of Std DDC, EL, EG, L, D showed normality.
extended to the classification, n = 19 was taken as the MANOVA tests shown in Table 2, for the type of net-
minimum number of instances to generate; n = 30 work, the quantity of nodes and the interaction, are
instances was set for the experimental design. statistically significant, by which the significant differences
Once the networks were generated and characterized, detected in the analysis of a variable at one time are
a Principal Components Analysis (PCA) was performed reaffirmed, being real and not false positive. Due that the
to verify the normality of the data. According to the values of F0 are greater for factor of type of network, it is
fixed effects model describing to a two-factor factorial concluded that this factor has greater influence in the values
design [15] a hypothesis were formulated to detect obtained by the characterization functions.
significant differences. A Multivariate Analysis of Va- Once it was detected that the characterization
riance General (GML) was carried out to obtain results functions differ significantly according to the type of
permitting to reject or to accept the hypothesis, these network and this factor has greater effect, using the test
results are discussed subsequently. of Tukey, multiple comparisons were carried out, with
In Table 1 the numbers in bold are the rejected the objective of detecting which characterization func-
hypothesis, it can be observed, that according to the type tions differ significantly in each level of the factor of
of network, the characterization functions satisfy the type of network.
criteria for rejection, the null hypothesis associated with Tukey's tests carried out showed the means of the
the effect of the type of network is rejected, therefore, it characterization functions Avg, EL, EG and CG are sig-
can be concluded that all the characterization functions nificantly equal for scale free and exponential networks,
differ significantly according to the type of network. and for the random networks the mean is significantly
For the effect of the number of nodes, and the effect greater. The characterizations functions where signi-
of the interaction between the type of network and ficant differences in the means of the random, scale free
number of nodes, criteria for rejection are satisfied for and exponential networks were observed are Std, DDC,
Avg, Std, DDC, L, D and EG, therefore, it can be L and D. Then it can be conclude, according with the
concluded that these characterization functions differ cases mentioned above, that the Avg, EL, EG, and CG
significantly according to the number of nodes presented functions are weak relevant characteristics; the Std,
in the network, and the interaction between the type of DDC, L and D are very relevant characteristics.
network and the amount of nodes. The characterization functions selected to discriminate
The analysis of the residuals of Avg and CG, showed among different types of networks, were Std, DDC, L, and
abnormalities, this is because in spite of the fact that the EL, in this way at least one characterization function of
number of edges was not determined, the average degree each case were taken into account. The Avg and CG were
and the clustering coefficient for scale free and not taken into account because of the abnormalities

Table 3. Results of the Quadratic Discriminant Analysis.

Quadratic Discriminant Analysis

Combination Scale Free Exponential


Random Networks Total
of variables Networks Networks

DDC 99.3% (149/150) 100% (150/150) 100% (150/150) 99.8%

L, DDC 99.3% (149/150) 100% (150/150) 100% (150/150) 99.8%

Std, DDC 99.3% (149/150) 100% (150/150) 100% (150/150) 99.8%

Std, EL 91.3% (137/150) 100% (150/150) 100% (150/150) 97.1%

DDC, EL 99.3% (149/150) 100% (150/150) 100% (150/150) 99.8%

L, Std, EL 99.3% (149/150) 100% (150/150) 100% (150/150) 99.8%

L, DDC, EL 99.3% (149/150) 100% (150/150) 100% (150/150) 99.8%

Std, DDC, EL 99.3% (149/150) 100% (150/150) 100% (150/150) 99.8%

L, Std, DDC, EL 99.3% (149/150) 100% (150/150) 100% (150/150) 99.8%


Experimental Design for Selection… 71

presented in the plots of the residuals, thus D and EG also 2. AIROLDI E. M., et al., Sampling algorithms for
were excluded because of being highly correlated with L, pure network topologies: a study on the stability and
which indicates redundancy. the separability of metric embeddings. ACM
To obtain an efficient classifier of networks, a quad- SIGKDD. 2005.
ratic discriminant analysis was carried out with different 3. ALBERT R., et al., Error and attack tolerance of
combinations of the characterization functions selected, complex networks. Nature. 2000.
using in both cases the cross-validation procedure. In 4. ALBERT R., et al., Statistical Mechanics of
Table 3, the combinations with percentages of networks Complex Networks. Reviews of Modern Physics.
classified correctly inside each type of network up to 2002.
90% are presented. 5. ALI W., et al., Extraction of topological features
from communication network topological patterns
Conclusions and Future Works using self-organizing feature maps. arXiv:
cs/0404042v2. 2004.
An experimental design was presented for the purpose 6. AMARAL L. A. N., et al., Classes of small world
of selecting statistically characterization functions of networks. PNAS. 2000.
complex networks relevant and not redundant, the results 7. BARABÁSI A. L., et al., Emergence of Scaling in
obtained in the experimentation show that the degree Random Networks. Science. 1999.
dispersion coefficient (DDC) permit in a quantitative way to 8. BARABÁSI A. L., et al., Mean-Field theory for
discriminate among random, scale-free and exponential scale-free random networks. Physica A. 1999.
networks. By means of the quadratic discriminant analysis 9. BOLLOBÁS B. et al., Mathematical results on
an accuracy of classification of the 99.8% was obtained scale-free random graphs. Handbook of Graphs and
with this characterization function, the size of the sample Networks. Wiley-VCH. Berlin. 2002.
was justified statistically. As it can be appreciated in this 10. COSTA L., et al., Characterization of Complex
work the number of characterization functions is very small Networks: A survey of measurements. arXiv:cond-
in relation to the 47 functions utilized in Airoldi [2], this mat/0505185v5. 2007.
reduces dramatically the time of computation required for 11. FALOUTSOS M., et al., On power-law relationship
the classification of complex networks. on the internet topology. ACM SIGCOMM. 1999.
In future works it is recommended to extend this 12. GUYON I., et al., An introduction to variable and
experimental design to another types of networks and feature selection. Machine Learning Research. 2003.
taken the number of nodes as a random factor, besides it 13. LIU Z., et al., Connectivity distribution and attack
is recommended to work with procedures and algorithms tolerance of general networks with both preferential
for selection of characteristics utilized in the area of and random attachments. Physics Letters A. 2003.
machine learning in order to compare the results 14. MIDDENDORF M., et al., Discriminative Topolo-
obtained with this experimental design. gical Features Reveal Biological Network Mecha-
nisms. BMC Bioinformatics. 2004.
Acknowledgements 15. MONTGOMERY D. C., Diseño y Análisis de Expe-
rimentos. Limusa Wiley. 2004.
This research was supported in part by CONACYT 16. NEWMAN M. E. J., The structure and function of
and DGEST. complex networks. SIAM. 2003.
17. ORTEGA R. I., et al., Studying the Impact of Gro-
wing Dynamic in the Internet Power Law Distri-
References bution. ACS’2007. 2007.
18. ZIV E., et al., Systematic Identification of stati-
1. ADAMIC L. A., et al., Search in power law net- stically significant network measures. arXiv:cond-
work. Physical Review E. 2001. mat/0306610v3. 2005.

You might also like