A New Algorithm for Personalized Recommendations in Community Networks

  • Xin Zhou
  • XinXiang Xing
  • Yun Liu
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 260)


In a graph theory model, clustering is the process of division of vertices in groups, with a higher density of edges in groups than among them. In this paper, we introduce a new clustering algorithm for detecting such groups; we use it to analyze some classic social networks. The new algorithm has two distinguished features: non-binary hierarchical tree and the feature of overlapping clustering. A non-binary hierarchical tree is much smaller than the binary-trees constructed by most traditional algorithms; it clearly highlights meaningful clusters which significantly reduce further manual efforts for cluster selections. The present algorithm is tested by several bench mark data sets for which the community structure was known in advance and the results indicate that it is a sensitive and accurate algorithm for extracting community structure from social networks.


Clustering Graph theory Hierarchical tree Social network 



This work has been supported by the National Natural Science Foundation of China under Grant 61172072, 61271308, the Beijing Natural Science Foundation under Grant 4112045, the Research Fund for the Doctoral Program of Higher Education of China under Grant W11C100030, the Beijing Science and Technology Program under Grant Z121100000312024.


  1. 1.
    Merriam-Webster Online Dictionary (2008) Cluster analysis.
  2. 2.
    Jain AK (2009) Data clustering: 50 years beyond K-means.
  3. 3.
    Steinhaus H (1956) Sur la division des corpmateriels en parties. Bull Acad Polon Sci C1. III IV:801–804Google Scholar
  4. 4.
    Berkhin P (2009) Survey of clustering data mining techniques,
  5. 5.
    Freeman L (1977) A set of measures of centrality based upon betweenness. Sociometry 40:35–41Google Scholar
  6. 6.
    Girvan M, Newman MEJ (2002) Community structure in social and biological networks. Proc Natl Acad Sci 99(12):7821–7826Google Scholar
  7. 7.
    Frey BJ, Dueck D (2007) Clustering by passing messages between data points. Science 315:972–976MathSciNetCrossRefMATHGoogle Scholar
  8. 8.
    Newman MEJ (2006) Finding community structure in networks using the eigenvectors of matrices. Phys Rev E 74:036104MathSciNetCrossRefGoogle Scholar
  9. 9.
    Rosvall M, Bergstrom CT (2008) Maps of random walks on complex networks reveal community structure. Proc Natl Acad Sci USA 105(4):1118–1123Google Scholar
  10. 10.
    Wu F, Huberman BA (2004) Finding communities in linear time: A physics approach. Eur Phys J B 38:331–338Google Scholar
  11. 11.
    Danon L, Duch J, Diaz-Guilera A, Arenas A (2005) Comparing community structure identification. J Stat Mech 2005:P09008Google Scholar
  12. 12.
    Newman MEJ (2004a) Detecting community structure in networks. Eur Phys J B 38;321–330Google Scholar
  13. 13.
    Scott J (2000) Social network analysis: a handbook, 2nd ed. Sage Publications, LondonGoogle Scholar
  14. 14.
    Wasserman S, Faust K (1994) Social network analysis. Cambridge University Press, CambridgeGoogle Scholar
  15. 15.
    Bondy JA, Murty USR (1976). Graph theory with applications. Macmillan, LondonGoogle Scholar
  16. 16.
    Diestel R (2005) Graph theory, Graduate texts in mathematics, vol 173, 3r edn. Springer, HeidelbergGoogle Scholar
  17. 17.
    West W (1996) Introduction to graph theory. Prentice Hall, Upper Saddle River,NJGoogle Scholar
  18. 18.
    Gary MR, Johnson DS (1979) Computers and intractability. Freeman, NYGoogle Scholar
  19. 19.
    Zachary WW (1977) An information flow model for conflict and fission in small groups. J Anthropol Res 33(4):452–473Google Scholar
  20. 20.
    Davis A, Gardner BB, Gardner MR (1941) Deep South: a social anthropological study of caste and class. University of Chicago Press, ChicagoGoogle Scholar
  21. 21.
    Homans GC (1950) The human group. Harcourt, Brace and World, New YorkGoogle Scholar
  22. 22.
    Lusseau D, Schneider K, Boisseau OJ, Haase P, Slooten E, Dawson SM (2003) The bottlenose dolphin community of doubtful sound features a large proportion of long-lasting associations. Can geographic isolation explain this unique trait? Behav Ecol Sociobiol 54:396–405Google Scholar
  23. 23.
    Lusseau D (2003) The emergent properties of a dolphin social network. Proc R Soc London B270:S186–S188Google Scholar
  24. 24.
    Lusseau D, Newman MEJ (2004) Identifying the role that individual animals play in their social network. Proc R Soc London B(Suppl.) 271:S377–S481Google Scholar
  25. 25.
    Newman MEJ, Girvan M (2004) Finding and evaluating community structure in networks. Phys Rev E 69:026113Google Scholar
  26. 26.
    Santamaria R, Theron R (2008) Overlapping clustered graphs: coauthorship networks visualization. Lect Notes Comput Sci 5166:190–199CrossRefGoogle Scholar
  27. 27.
    SAS Institute Inc (2003) Introduction to clustering procedures, Chapter 8 of SAS/STAT User’s Guide.(SAS OnlineDocTM: Version 8)
  28. 28.
    Palla G, Derenyi I, Farkas I, Vicsek T (2005) Uncovering the overlapping community structure of complex networks in nature and society. Nature 435(7043):814–818CrossRefGoogle Scholar
  29. 29.
    Pereira-Leal JB, Enright AJ, Ouzounis CA (2004) Detection of functional modules from protein interaction networks. PROTEINS: Struct Funct Bioinf 54:49–57CrossRefGoogle Scholar
  30. 30.
    Futschik ME, Carlisle B (2005) Noise-robust soft clustering of gene expression timecourse. J Bioinf Comput Biol 3:965–988CrossRefGoogle Scholar
  31. 31.
    Breiger RL (1974) The duality of persons and groups. Soc Forces 53(2):181–190Google Scholar
  32. 32.
  33. 33.
    Kernighan BW, Lin S (1970) An efficient heuristic procedure for partitioning graphs. Bell Syst Tech J 49:291–307Google Scholar
  34. 34.
    Krebs V (2009)
  35. 35.
    Newman MEJ (2004b) Fast algorithm for detecting community structure in networks. Phys Rev E 69:066133Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2014

Authors and Affiliations

  1. 1.China Information Technology Security Evaluation CenterBeijingChina
  2. 2.School of Electronic and Information EngineeringBeijing Jiaotong UniversityBeijingChina
  3. 3.Key Laboratory of Communication and Information Systems, Beijing Municipal Commission of EducationBeijing Jiaotong UniversityBeijingChina

Personalised recommendations