Table captions, unshading a figure, and adding 2 refs in future work

This commit is contained in:
Noah L. Schrick 2023-04-13 22:59:32 -05:00
parent e882215d4c
commit f93383d39a
7 changed files with 166 additions and 87 deletions

View File

@ -277,4 +277,38 @@ doi = {https://doi.org/10.1016/j.amc.2017.10.001},
url = {https://www.sciencedirect.com/science/article/pii/S0096300317306884}, url = {https://www.sciencedirect.com/science/article/pii/S0096300317306884},
author = {Chao Li and Li Wang and Shiwen Sun and Chengyi Xia}, author = {Chao Li and Li Wang and Shiwen Sun and Chengyi Xia},
keywords = {Influential spreaders, Identification algorithms, Classified neighbors, Complex networks}, keywords = {Influential spreaders, Identification algorithms, Classified neighbors, Complex networks},
} }
@Article{sym11020284,
AUTHOR = {Agryzkov, Taras and Curado, Manuel and Pedroche, Francisco and Tortosa, Leandro and Vicent, José F.},
TITLE = {Extending the Adapted PageRank Algorithm Centrality to Multiplex Networks with Data Using the PageRank Two-Layer Approach},
JOURNAL = {Symmetry},
VOLUME = {11},
YEAR = {2019},
NUMBER = {2},
ARTICLE-NUMBER = {284},
URL = {https://www.mdpi.com/2073-8994/11/2/284},
ISSN = {2073-8994},
ABSTRACT = {Usually, the nodes’ interactions in many complex networks need a more accurate mapping than simple links. For instance, in social networks, it may be possible to consider different relationships between people. This implies the use of different layers where the nodes are preserved and the relationships are diverse, that is, multiplex networks or biplex networks, for two layers. One major issue in complex networks is the centrality, which aims to classify the most relevant elements in a given system. One of these classic measures of centrality is based on the PageRank classification vector used initially in the Google search engine to order web pages. The PageRank model may be understood as a two-layer network where one layer represents the topology of the network and the other layer is related to teleportation between the nodes. This approach may be extended to define a centrality index for multiplex networks based on the PageRank vector concept. On the other hand, the adapted PageRank algorithm (APA) centrality constitutes a model to obtain the importance of the nodes in a spatial network with the presence of data (both real and virtual). Following the idea of the two-layer approach for PageRank centrality, we can consider the APA centrality under the perspective of a two-layer network where, on the one hand, we keep maintaining the layer of the topological connections of the nodes and, on the other hand, we consider a data layer associated with the network. Following a similar reasoning, we are able to extend the APA model to spatial networks with different layers. The aim of this paper is to propose a centrality measure for biplex networks that extends the adapted PageRank algorithm centrality for spatial networks with data to the PageRank two-layer approach. Finally, we show an example where the ability to analyze data referring to a group of people from different aspects and using different sets of independent data are revealed.},
DOI = {10.3390/sym11020284}
}
@article{10.1093/bioinformatics/bty965,
author = {Parvandeh, Saeid and McKinney, Brett A},
title = "{EpistasisRank and EpistasisKatz: interaction network centrality methods that integrate prior knowledge networks}",
journal = {Bioinformatics},
volume = {35},
number = {13},
pages = {2329-2331},
year = {2018},
month = {11},
abstract = "{An important challenge in gene expression analysis is to improve hub gene selection to enrich for biological relevance or improve classification accuracy for a given phenotype. In order to incorporate phenotypic context into co-expression, we recently developed an epistasis-expression network centrality method that blends the importance of genegene interactions (epistasis) and main effects of genes. Further blending of prior knowledge from functional interactions has the potential to enrich for relevant genes and stabilize classification.We develop two new expression-epistasis centrality methods that incorporate interaction prior knowledge. The first extends our SNPrank (EpistasisRank) method by incorporating a gene-wise prior knowledge vector. This prior knowledge vector informs the centrality algorithm of the inclination of a gene to be involved in interactions by incorporating functional interaction information from the Integrative Multi-species Prediction database. The second method extends Katz centrality to expression-epistasis networks (EpistasisKatz), extends the Katz bias to be a gene-wise vector of main effects and extends the Katz attenuation constant prefactor to be a prior-knowledge vector for interactions. Using independent microarray studies of major depressive disorder, we find that including prior knowledge in network centrality feature selection stabilizes the training classification and reduces over-fitting.Methods and examples provided at https://github.com/insilico/Rinbix and https://github.com/insilico/PriorKnowledgeEpistasisRank.Supplementary data are available at Bioinformatics online.}",
issn = {1367-4803},
doi = {10.1093/bioinformatics/bty965},
url = {https://doi.org/10.1093/bioinformatics/bty965},
eprint = {https://academic.oup.com/bioinformatics/article-pdf/35/13/2329/36613945/bioinformatics\_35\_13\_2329.pdf},
}

View File

@ -24,7 +24,7 @@
\@writefile{toc}{\contentsline {section}{\numberline {II}Related Works}{2}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {II}Related Works}{2}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {III}Experimental Networks}{2}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {III}Experimental Networks}{2}{}\protected@file@percent }
\newlabel{sec:networks}{{III}{2}} \newlabel{sec:networks}{{III}{2}}
\@writefile{lot}{\contentsline {table}{\numberline {I}{\ignorespaces Network Properties for the Three Networks Utilized}}{2}{}\protected@file@percent } \@writefile{lot}{\contentsline {table}{\numberline {I}{\ignorespaces Network Structural Properties for the Three Example Networks Used}}{2}{}\protected@file@percent }
\newlabel{table:networks}{{I}{2}} \newlabel{table:networks}{{I}{2}}
\@writefile{toc}{\contentsline {section}{\numberline {IV}Centralities and their Contextualizations to Compliance Graphs}{2}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {IV}Centralities and their Contextualizations to Compliance Graphs}{2}{}\protected@file@percent }
\newlabel{sec:centralities}{{IV}{2}} \newlabel{sec:centralities}{{IV}{2}}
@ -49,28 +49,33 @@
\newlabel{eq:PR}{{5}{4}} \newlabel{eq:PR}{{5}{4}}
\newlabel{eq:APC}{{6}{4}} \newlabel{eq:APC}{{6}{4}}
\@writefile{toc}{\contentsline {section}{\numberline {V}Transitive Closure}{4}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {V}Transitive Closure}{4}{}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces Transitive Closure Illustration}}{4}{}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces Illustration of an Example DAG and its Transitive Closure}}{4}{}\protected@file@percent }
\newlabel{fig:TC}{{1}{4}} \newlabel{fig:TC}{{1}{4}}
\@writefile{toc}{\contentsline {section}{\numberline {VI}Dominant Tree}{4}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {VI}Dominant Tree}{4}{}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Example Network for Illustrating Dominance}}{5}{}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Example Network for Illustrating Dominance}}{5}{}\protected@file@percent }
\newlabel{fig:domNet}{{2}{5}} \newlabel{fig:domNet}{{2}{5}}
\@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Dominant Tree Derived from the Network Displayed in Figure \ref {fig:domNet}}}{5}{}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Dominant Tree Derived from the Network Displayed in Figure \ref {fig:domNet}}}{5}{}\protected@file@percent }
\newlabel{fig:domTree}{{3}{5}} \newlabel{fig:domTree}{{3}{5}}
\@writefile{lot}{\contentsline {table}{\numberline {II}{\ignorespaces Top 15 Nodes with Degree Centrality}}{5}{}\protected@file@percent } \@writefile{lot}{\contentsline {table}{\numberline {II}{\ignorespaces Top 15 Nodes with Degree Centrality for the Automobile Network. \\\hspace {\textwidth } Base columns represent the top ranked nodes and their percentage of importance held relative to the entire network. \\\hspace {\textwidth }Transitive Closure and Dominant Tree columns illustrate the difference in node rankings after the base network underwent a transformation. \\\hspace {\textwidth }}}{5}{}\protected@file@percent }
\newlabel{table:car-deg}{{II}{5}} \newlabel{table:car-deg}{{II}{5}}
\@writefile{toc}{\contentsline {section}{\numberline {VII}Results and Result Analysis}{5}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {VII}Results and Result Analysis}{5}{}\protected@file@percent }
\newlabel{sec:results}{{VII}{5}} \newlabel{sec:results}{{VII}{5}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VII-A}}Result Analysis}{5}{}\protected@file@percent } \@writefile{lot}{\contentsline {table}{\numberline {III}{\ignorespaces Top 15 Nodes with Katz Centrality for the Automobile Network. \\\hspace {\textwidth } Base columns represent the top ranked nodes and their percentage of importance held relative to the entire network. \\\hspace {\textwidth }Transitive Closure and Dominant Tree columns illustrate the difference in node rankings after the base network underwent a transformation. \\\hspace {\textwidth }}}{6}{}\protected@file@percent }
\@writefile{lot}{\contentsline {table}{\numberline {III}{\ignorespaces Top 15 Nodes with Katz Centrality}}{6}{}\protected@file@percent }
\newlabel{table:car-katz}{{III}{6}} \newlabel{table:car-katz}{{III}{6}}
\@writefile{lot}{\contentsline {table}{\numberline {IV}{\ignorespaces Top 15 Nodes with K-path Edge Centrality}}{6}{}\protected@file@percent } \@writefile{lot}{\contentsline {table}{\numberline {IV}{\ignorespaces Top 15 Nodes with K-path Edge Centrality for the Automobile Network. \\\hspace {\textwidth } Base columns represent the top ranked nodes and their percentage of importance held relative to the entire network. \\\hspace {\textwidth }Transitive Closure and Dominant Tree columns illustrate the difference in node rankings after the base network underwent a transformation. \\\hspace {\textwidth }}}{6}{}\protected@file@percent }
\newlabel{table:car-kpe}{{IV}{6}} \newlabel{table:car-kpe}{{IV}{6}}
\@writefile{lot}{\contentsline {table}{\numberline {V}{\ignorespaces Top 15 Nodes with PageRank Centrality}}{6}{}\protected@file@percent } \@writefile{lot}{\contentsline {table}{\numberline {V}{\ignorespaces Top 15 Nodes with PageRank Centrality for the Automobile Network. \\\hspace {\textwidth } Base columns represent the top ranked nodes and their percentage of importance held relative to the entire network. \\\hspace {\textwidth }Transitive Closure and Dominant Tree columns illustrate the difference in node rankings after the base network underwent a transformation. \\\hspace {\textwidth }}}{6}{}\protected@file@percent }
\newlabel{table:car-APC}{{V}{6}} \newlabel{table:car-APC}{{V}{6}}
\@writefile{lot}{\contentsline {table}{\numberline {VI}{\ignorespaces Top 15 Nodes with Betweenness Centrality}}{6}{}\protected@file@percent } \@writefile{lot}{\contentsline {table}{\numberline {VI}{\ignorespaces Top 15 Nodes with Betweenness Centrality for the Automobile Network. \\\hspace {\textwidth } Base columns represent the top ranked nodes and their percentage of importance held relative to the entire network. \\\hspace {\textwidth }Transitive Closure and Dominant Tree columns illustrate the difference in node rankings after the base network underwent a transformation. \\\hspace {\textwidth }}}{6}{}\protected@file@percent }
\newlabel{table:car-betweenness}{{VI}{6}} \newlabel{table:car-betweenness}{{VI}{6}}
\citation{LI2018512} \citation{LI2018512}
\citation{MO2019121538} \citation{MO2019121538}
\citation{sym11020284}
\citation{10.1093/bioinformatics/bty965}
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VII-A}}Result Analysis}{7}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {VIII}Conclusions and Future Work}{7}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VIII-A}}Conclusions}{7}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VIII-B}}Future Work}{7}{}\protected@file@percent }
\bibdata{Bibliography} \bibdata{Bibliography}
\bibcite{j_hale_compliance_nodate}{1} \bibcite{j_hale_compliance_nodate}{1}
\bibcite{baloyi_guidelines_2019}{2} \bibcite{baloyi_guidelines_2019}{2}
@ -91,15 +96,14 @@
\bibcite{K_Path_Edge}{17} \bibcite{K_Path_Edge}{17}
\bibcite{PageRank}{18} \bibcite{PageRank}{18}
\bibcite{Adapted_PageRank}{19} \bibcite{Adapted_PageRank}{19}
\@writefile{toc}{\contentsline {section}{\numberline {VIII}Conclusions and Future Work}{7}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VIII-A}}Conclusions}{7}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VIII-B}}Future Work}{7}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{Bibliography}{7}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{References}{7}{}\protected@file@percent }
\bibcite{li_combining_2019}{20} \bibcite{li_combining_2019}{20}
\bibcite{zeng_cyber_2017}{21} \bibcite{zeng_cyber_2017}{21}
\bibcite{dominance}{22} \bibcite{dominance}{22}
\bibcite{LI2018512}{23} \bibcite{LI2018512}{23}
\bibcite{MO2019121538}{24} \bibcite{MO2019121538}{24}
\bibcite{sym11020284}{25}
\bibcite{10.1093/bioinformatics/bty965}{26}
\bibstyle{ieeetr} \bibstyle{ieeetr}
\@writefile{toc}{\contentsline {section}{Bibliography}{8}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{References}{8}{}\protected@file@percent }
\gdef \@abspage@last{8} \gdef \@abspage@last{8}

View File

@ -116,4 +116,15 @@ H.~Mo and Y.~Deng, ``Identifying node importance based on evidence theory in
complex networks,'' {\em Physica A: Statistical Mechanics and its complex networks,'' {\em Physica A: Statistical Mechanics and its
Applications}, vol.~529, p.~121538, 2019. Applications}, vol.~529, p.~121538, 2019.
\bibitem{sym11020284}
T.~Agryzkov, M.~Curado, F.~Pedroche, L.~Tortosa, and J.~F. Vicent, ``Extending
the adapted pagerank algorithm centrality to multiplex networks with data
using the pagerank two-layer approach,'' {\em Symmetry}, vol.~11, no.~2,
2019.
\bibitem{10.1093/bioinformatics/bty965}
S.~Parvandeh and B.~A. McKinney, ``{EpistasisRank and EpistasisKatz:
interaction network centrality methods that integrate prior knowledge
networks},'' {\em Bioinformatics}, vol.~35, pp.~2329--2331, 11 2018.
\end{thebibliography} \end{thebibliography}

View File

@ -4,45 +4,45 @@ The top-level auxiliary file: Schrick-Noah_CG-Network_Theory.aux
The style file: ieeetr.bst The style file: ieeetr.bst
Database file #1: Bibliography.bib Database file #1: Bibliography.bib
Warning--empty booktitle in Mieghem2018DirectedGA Warning--empty booktitle in Mieghem2018DirectedGA
You've used 24 entries, You've used 26 entries,
1876 wiz_defined-function locations, 1876 wiz_defined-function locations,
625 strings with 7712 characters, 637 strings with 8161 characters,
and the built_in function-call counts, 5933 in all, are: and the built_in function-call counts, 6483 in all, are:
= -- 600 = -- 653
> -- 203 > -- 228
< -- 0 < -- 0
+ -- 79 + -- 88
- -- 55 - -- 62
* -- 375 * -- 419
:= -- 820 := -- 900
add.period$ -- 28 add.period$ -- 30
call.type$ -- 24 call.type$ -- 26
change.case$ -- 23 change.case$ -- 25
chr.to.int$ -- 0 chr.to.int$ -- 0
cite$ -- 25 cite$ -- 27
duplicate$ -- 329 duplicate$ -- 356
empty$ -- 570 empty$ -- 618
format.name$ -- 55 format.name$ -- 62
if$ -- 1485 if$ -- 1618
int.to.chr$ -- 0 int.to.chr$ -- 0
int.to.str$ -- 24 int.to.str$ -- 26
missing$ -- 20 missing$ -- 22
newline$ -- 81 newline$ -- 87
num.names$ -- 23 num.names$ -- 25
pop$ -- 85 pop$ -- 88
preamble$ -- 1 preamble$ -- 1
purify$ -- 0 purify$ -- 0
quote$ -- 0 quote$ -- 0
skip$ -- 239 skip$ -- 259
stack$ -- 0 stack$ -- 0
substring$ -- 341 substring$ -- 377
swap$ -- 145 swap$ -- 157
text.length$ -- 0 text.length$ -- 0
text.prefix$ -- 0 text.prefix$ -- 0
top$ -- 0 top$ -- 0
type$ -- 0 type$ -- 0
warning$ -- 1 warning$ -- 1
while$ -- 44 while$ -- 48
width$ -- 26 width$ -- 28
write$ -- 232 write$ -- 252
(There was 1 warning) (There was 1 warning)

View File

@ -1,4 +1,4 @@
This is pdfTeX, Version 3.141592653-2.6-1.40.25 (TeX Live 2023/Arch Linux) (preloaded format=pdflatex 2023.4.3) 4 APR 2023 14:28 This is pdfTeX, Version 3.141592653-2.6-1.40.25 (TeX Live 2023/Arch Linux) (preloaded format=pdflatex 2023.4.3) 13 APR 2023 14:20
entering extended mode entering extended mode
restricted \write18 enabled. restricted \write18 enabled.
%&-line parsing enabled. %&-line parsing enabled.
@ -341,6 +341,11 @@ LaTeX Font Info: External font `cmex10' loaded for size
LaTeX Font Info: External font `cmex10' loaded for size LaTeX Font Info: External font `cmex10' loaded for size
(Font) <5> on input line 92. (Font) <5> on input line 92.
Underfull \hbox (badness 1895) in paragraph at lines 99--99
[]\OT1/ptm/m/n/10 TABLE I: Network Structural Properties for the Three
[]
Underfull \hbox (badness 1590) in paragraph at lines 104--105 Underfull \hbox (badness 1590) in paragraph at lines 104--105
\OT1/ptm/m/n/10 implemented in order to determine node importance in \OT1/ptm/m/n/10 implemented in order to determine node importance in
[] []
@ -356,15 +361,17 @@ File: ./images/TC.png Graphic file (type png)
<use ./images/TC.png> <use ./images/TC.png>
Package pdftex.def Info: ./images/TC.png used on input line 168. Package pdftex.def Info: ./images/TC.png used on input line 168.
(pdftex.def) Requested size: 227.05pt x 313.77466pt. (pdftex.def) Requested size: 227.05pt x 313.77466pt.
<./images/dom_net.png, id=25, 319.1925pt x 432.61626pt> <./images/dom_net_unshaded.png, id=25, 319.1925pt x 432.61626pt>
File: ./images/dom_net.png Graphic file (type png) File: ./images/dom_net_unshaded.png Graphic file (type png)
<use ./images/dom_net.png> <use ./images/dom_net_unshaded.png>
Package pdftex.def Info: ./images/dom_net.png used on input line 182. Package pdftex.def Info: ./images/dom_net_unshaded.png used on input line 182.
(pdftex.def) Requested size: 191.51697pt x 259.57176pt. (pdftex.def) Requested size: 191.51697pt x 259.57176pt.
<./images/dom_tree.png, id=26, 352.31625pt x 312.16624pt> <./images/dom_tree_unshaded.png, id=26, 352.31625pt x 312.16624pt>
File: ./images/dom_tree.png Graphic file (type png) File: ./images/dom_tree_unshaded.png Graphic file (type png)
<use ./images/dom_tree.png> <use ./images/dom_tree_unshaded.png>
Package pdftex.def Info: ./images/dom_tree.png used on input line 189. Package pdftex.def Info: ./images/dom_tree_unshaded.png used on input line 189
.
(pdftex.def) Requested size: 211.39137pt x 187.3012pt. (pdftex.def) Requested size: 211.39137pt x 187.3012pt.
[4 <./images/TC.png>] [4 <./images/TC.png>]
@ -372,22 +379,47 @@ LaTeX Warning: No positions in optional float specifier.
Default added (so using `tbp') on input line 201. Default added (so using `tbp') on input line 201.
Underfull \hbox (badness 10000) in paragraph at lines 230--230
[]
LaTeX Warning: No positions in optional float specifier. LaTeX Warning: No positions in optional float specifier.
Default added (so using `tbp') on input line 234. Default added (so using `tbp') on input line 234.
Underfull \hbox (badness 10000) in paragraph at lines 263--263
[]
LaTeX Warning: No positions in optional float specifier. LaTeX Warning: No positions in optional float specifier.
Default added (so using `tbp') on input line 267. Default added (so using `tbp') on input line 267.
Underfull \hbox (badness 10000) in paragraph at lines 296--296
[]
LaTeX Warning: No positions in optional float specifier. LaTeX Warning: No positions in optional float specifier.
Default added (so using `tbp') on input line 300. Default added (so using `tbp') on input line 300.
Underfull \hbox (badness 10000) in paragraph at lines 329--329
[]
LaTeX Warning: No positions in optional float specifier. LaTeX Warning: No positions in optional float specifier.
Default added (so using `tbp') on input line 333. Default added (so using `tbp') on input line 333.
Underfull \hbox (badness 10000) in paragraph at lines 362--362
[]
Underfull \hbox (badness 10000) in paragraph at lines 367--368 Underfull \hbox (badness 10000) in paragraph at lines 367--368
[]\OT1/ptm/m/n/10 When viewing the results of the car networks, []\OT1/ptm/m/n/10 When viewing the results of the car networks,
[] []
@ -397,15 +429,15 @@ Underfull \hbox (badness 1997) in paragraph at lines 367--368
\OT1/ptm/m/n/10 based on additional metrics, such as severity, cost, or \OT1/ptm/m/n/10 based on additional metrics, such as severity, cost, or
[] []
[5 <./images/dom_net.png> <./images/dom_tree.png>]
Underfull \vbox (badness 6001) has occurred while \output is active []
[5 <./images/dom_net_unshaded.png> <./images/dom_tree_unshaded.png>] [6]
Underfull \hbox (badness 3428) in paragraph at lines 369--370 Underfull \hbox (badness 3428) in paragraph at lines 369--370
\OT1/ptm/m/n/10 their original compliance graph rankings. As expected \OT1/ptm/m/n/10 their original compliance graph rankings. As expected
[] []
Underfull \vbox (badness 1147) has occurred while \output is active []
Underfull \hbox (badness 1789) in paragraph at lines 371--372 Underfull \hbox (badness 1789) in paragraph at lines 371--372
[]\OT1/ptm/m/n/10 For the dominant tree representation, it was initially []\OT1/ptm/m/n/10 For the dominant tree representation, it was initially
[] []
@ -416,19 +448,19 @@ Underfull \hbox (badness 3009) in paragraph at lines 371--372
[] []
Underfull \vbox (badness 1147) has occurred while \output is active []
[6]
Underfull \hbox (badness 1688) in paragraph at lines 375--376 Underfull \hbox (badness 1688) in paragraph at lines 375--376
\OT1/ptm/m/n/10 correction measures. In addition, transitive closures and \OT1/ptm/m/n/10 correction measures. In addition, transitive closures and
[] []
Underfull \vbox (badness 10000) has occurred while \output is active []
Underfull \hbox (badness 2913) in paragraph at lines 378--379 Underfull \hbox (badness 2913) in paragraph at lines 378--379
\OT1/ptm/m/n/10 importance rankings, it would be useful to artificially \OT1/ptm/m/n/10 importance rankings, it would be useful to artificially
[] []
(./Schrick-Noah_CG-Network_Theory.bbl [7] (./Schrick-Noah_CG-Network_Theory.bbl
Underfull \hbox (badness 1442) in paragraph at lines 9--14 Underfull \hbox (badness 1442) in paragraph at lines 9--14
\OT1/ptm/m/n/8 A Focus on Cyberphysical Systems and Internet of Things,'' in \OT1/ptm/m/n/8 A Focus on Cyberphysical Systems and Internet of Things,'' in
[] []
@ -473,7 +505,7 @@ Underfull \hbox (badness 2698) in paragraph at lines 74--77
[]\OT1/ptm/m/n/8 M. Ogura and V. M. Preciado, ``Katz centrality of markovian []\OT1/ptm/m/n/8 M. Ogura and V. M. Preciado, ``Katz centrality of markovian
[] []
[7]) )
** Conference Paper ** ** Conference Paper **
Before submitting the final camera ready copy, remember to: Before submitting the final camera ready copy, remember to:
@ -485,28 +517,26 @@ Before submitting the final camera ready copy, remember to:
uses only Type 1 fonts and that every step in the generation uses only Type 1 fonts and that every step in the generation
process uses the appropriate paper size. process uses the appropriate paper size.
[8 [8] (./Schrick-Noah_CG-Network_Theory.aux) )
] (./Schrick-Noah_CG-Network_Theory.aux) )
Here is how much of TeX's memory you used: Here is how much of TeX's memory you used:
4270 strings out of 476025 4272 strings out of 476025
77329 string characters out of 5796533 77517 string characters out of 5796533
1921388 words of memory out of 5000000 1921388 words of memory out of 5000000
24665 multiletter control sequences out of 15000+600000 24667 multiletter control sequences out of 15000+600000
546200 words of font info for 93 fonts, out of 8000000 for 9000 546200 words of font info for 93 fonts, out of 8000000 for 9000
1141 hyphenation exceptions out of 8191 1141 hyphenation exceptions out of 8191
62i,9n,67p,1800b,261s stack positions out of 5000i,500n,10000p,200000b,80000s 62i,9n,67p,1800b,261s stack positions out of 5000i,500n,10000p,200000b,80000s
</usr/share/texmf-dist/fonts/type1/pu </usr/share/texmf-dist/fonts/type1/
blic/amsfonts/cm/cmex10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/ public/amsfonts/cm/cmex10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfont
cm/cmmi10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi7.pfb>< s/cm/cmmi10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi7.pfb
/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr10.pfb></usr/share/texm ></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr10.pfb></usr/share/te
f-dist/fonts/type1/public/amsfonts/cm/cmr7.pfb></usr/share/texmf-dist/fonts/typ xmf-dist/fonts/type1/public/amsfonts/cm/cmr7.pfb></usr/share/texmf-dist/fonts/t
e1/public/amsfonts/cm/cmsy10.pfb></usr/share/texmf-dist/fonts/type1/public/amsf ype1/public/amsfonts/cm/cmsy10.pfb></usr/share/texmf-dist/fonts/type1/public/am
onts/cm/cmsy7.pfb></usr/share/texmf-dist/fonts/type1/public/doublestroke/dsrom1 sfonts/cm/cmsy7.pfb></usr/share/texmf-dist/fonts/type1/public/doublestroke/dsro
0.pfb></usr/share/texmf-dist/fonts/type1/urw/times/utmb8a.pfb></usr/share/texmf m10.pfb></usr/share/texmf-dist/fonts/type1/urw/times/utmb8a.pfb></usr/share/tex
-dist/fonts/type1/urw/times/utmbi8a.pfb></usr/share/texmf-dist/fonts/type1/urw/ mf-dist/fonts/type1/urw/times/utmbi8a.pfb></usr/share/texmf-dist/fonts/type1/ur
times/utmr8a.pfb></usr/share/texmf-dist/fonts/type1/urw/times/utmri8a.pfb> w/times/utmr8a.pfb></usr/share/texmf-dist/fonts/type1/urw/times/utmri8a.pfb>
Output written on Schrick-Noah_CG-Network_Theory.pdf (8 pages, 201307 bytes). Output written on Schrick-Noah_CG-Network_Theory.pdf (8 pages, 200465 bytes).
PDF statistics: PDF statistics:
99 PDF objects out of 1000 (max. 8388607) 99 PDF objects out of 1000 (max. 8388607)
58 compressed objects within 1 object stream 58 compressed objects within 1 object stream

Binary file not shown.

View File

@ -96,7 +96,7 @@ The work conducted in this approach utilized three compliance graphs, with their
HIPAA & 2321 & 8063 & 0.150 \\ \hline HIPAA & 2321 & 8063 & 0.150 \\ \hline
PCI DSS & 61 & 163 & 4.381 \\ \hline PCI DSS & 61 & 163 & 4.381 \\ \hline
\end{tabular} \end{tabular}
\caption{Network Properties for the Three Networks Utilized} \caption{Network Structural Properties for the Three Example Networks Used}
\label{table:networks} \label{table:networks}
\end{table} \end{table}
@ -168,7 +168,7 @@ Section \ref{sec:networks}, and this transitive closure was then analyzed throug
\includegraphics[scale=0.6]{"./images/TC.png"} \includegraphics[scale=0.6]{"./images/TC.png"}
\centering \centering
\vspace{.2truein} \centerline{} \vspace{.2truein} \centerline{}
\caption{Transitive Closure Illustration} \caption{Illustration of an Example DAG and its Transitive Closure}
\label{fig:TC} \label{fig:TC}
\end{figure} \end{figure}
@ -179,14 +179,14 @@ Dominance, as initially introduced by the author of \cite{dominance} in terms of
Following the properties of dominance, a dominator tree can be derived. In a dominator tree, each node has children that it immediately dominates. Immediate dominance is referred to nodes that strictly dominate a given node, but do not strictly dominate any other node that may strictly dominate a node. Figure 3 displays the dominant tree of the network seen in Figure 2. Following the properties of dominance, a dominator tree can be derived. In a dominator tree, each node has children that it immediately dominates. Immediate dominance is referred to nodes that strictly dominate a given node, but do not strictly dominate any other node that may strictly dominate a node. Figure 3 displays the dominant tree of the network seen in Figure 2.
\begin{figure}[htp] \begin{figure}[htp]
\includegraphics[scale=0.6]{"./images/dom_net.png"} \includegraphics[scale=0.6]{"./images/dom_net_unshaded.png"}
\centering \centering
\vspace{.2truein} \centerline{} \vspace{.2truein} \centerline{}
\caption{Example Network for Illustrating Dominance}\label{fig:domNet} \caption{Example Network for Illustrating Dominance}\label{fig:domNet}
\end{figure} \end{figure}
\begin{figure}[htp] \begin{figure}[htp]
\includegraphics[scale=0.6]{"./images/dom_tree.png"} \includegraphics[scale=0.6]{"./images/dom_tree_unshaded.png"}
\centering \centering
\vspace{.2truein} \centerline{} \vspace{.2truein} \centerline{}
\caption{Dominant Tree Derived from the Network Displayed in Figure \ref{fig:domNet}}\label{fig:domTree} \caption{Dominant Tree Derived from the Network Displayed in Figure \ref{fig:domNet}}\label{fig:domTree}
@ -227,7 +227,7 @@ In this section, only results for the car network are displayed for brevity. The
\multicolumn{1}{|c|}{410} & 0.07 & \multicolumn{1}{c|}{4} & 0.33 & \multicolumn{1}{c|}{4} & 0.00 \\ \hline \multicolumn{1}{|c|}{410} & 0.07 & \multicolumn{1}{c|}{4} & 0.33 & \multicolumn{1}{c|}{4} & 0.00 \\ \hline
\end{tabular} \end{tabular}
\caption{Top 15 Nodes with Degree Centrality} \caption{Top 15 Nodes with Degree Centrality for the Automobile Network. \\\hspace{\textwidth} Base columns represent the top ranked nodes and their percentage of importance held relative to the entire network. \\\hspace{\textwidth}Transitive Closure and Dominant Tree columns illustrate the difference in node rankings after the base network underwent a transformation. \\\hspace{\textwidth}}
\label{table:car-deg} \label{table:car-deg}
\end{table} \end{table}
@ -260,7 +260,7 @@ In this section, only results for the car network are displayed for brevity. The
\multicolumn{1}{|c|}{467} & 0.08 & \multicolumn{1}{c|}{187} & 1.08 & \multicolumn{1}{c|}{4} & 0.04 \\ \hline \multicolumn{1}{|c|}{467} & 0.08 & \multicolumn{1}{c|}{187} & 1.08 & \multicolumn{1}{c|}{4} & 0.04 \\ \hline
\end{tabular} \end{tabular}
\caption{Top 15 Nodes with Katz Centrality} \caption{Top 15 Nodes with Katz Centrality for the Automobile Network. \\\hspace{\textwidth} Base columns represent the top ranked nodes and their percentage of importance held relative to the entire network. \\\hspace{\textwidth}Transitive Closure and Dominant Tree columns illustrate the difference in node rankings after the base network underwent a transformation. \\\hspace{\textwidth}}
\label{table:car-katz} \label{table:car-katz}
\end{table} \end{table}
@ -293,7 +293,7 @@ In this section, only results for the car network are displayed for brevity. The
\multicolumn{1}{|c|}{410} & 0.14 & \multicolumn{1}{c|}{4} & 0.33 & \multicolumn{1}{c|}{4} & 0.00 \\ \hline \multicolumn{1}{|c|}{410} & 0.14 & \multicolumn{1}{c|}{4} & 0.33 & \multicolumn{1}{c|}{4} & 0.00 \\ \hline
\end{tabular} \end{tabular}
\caption{Top 15 Nodes with K-path Edge Centrality} \caption{Top 15 Nodes with K-path Edge Centrality for the Automobile Network. \\\hspace{\textwidth} Base columns represent the top ranked nodes and their percentage of importance held relative to the entire network. \\\hspace{\textwidth}Transitive Closure and Dominant Tree columns illustrate the difference in node rankings after the base network underwent a transformation. \\\hspace{\textwidth}}
\label{table:car-kpe} \label{table:car-kpe}
\end{table} \end{table}
@ -326,7 +326,7 @@ In this section, only results for the car network are displayed for brevity. The
\multicolumn{1}{|c|}{2489} & 0.83 & \multicolumn{1}{c|}{2426} & 0.29 & \multicolumn{1}{c|}{471} & 0.04 \\ \hline \multicolumn{1}{|c|}{2489} & 0.83 & \multicolumn{1}{c|}{2426} & 0.29 & \multicolumn{1}{c|}{471} & 0.04 \\ \hline
\end{tabular} \end{tabular}
\caption{Top 15 Nodes with PageRank Centrality} \caption{Top 15 Nodes with PageRank Centrality for the Automobile Network. \\\hspace{\textwidth} Base columns represent the top ranked nodes and their percentage of importance held relative to the entire network. \\\hspace{\textwidth}Transitive Closure and Dominant Tree columns illustrate the difference in node rankings after the base network underwent a transformation. \\\hspace{\textwidth}}
\label{table:car-APC} \label{table:car-APC}
\end{table} \end{table}
@ -359,7 +359,7 @@ In this section, only results for the car network are displayed for brevity. The
\multicolumn{1}{|c|}{115} & 0.25 & \multicolumn{1}{c|}{14} & 0 & \multicolumn{1}{c|}{4} & 0.00 \\ \hline \multicolumn{1}{|c|}{115} & 0.25 & \multicolumn{1}{c|}{14} & 0 & \multicolumn{1}{c|}{4} & 0.00 \\ \hline
\end{tabular} \end{tabular}
\caption{Top 15 Nodes with Betweenness Centrality} \caption{Top 15 Nodes with Betweenness Centrality for the Automobile Network. \\\hspace{\textwidth} Base columns represent the top ranked nodes and their percentage of importance held relative to the entire network. \\\hspace{\textwidth}Transitive Closure and Dominant Tree columns illustrate the difference in node rankings after the base network underwent a transformation. \\\hspace{\textwidth}}
\label{table:car-betweenness} \label{table:car-betweenness}
\end{table} \end{table}
@ -377,7 +377,7 @@ Each centrality measure implemented in this work provides various information th
\subsection{Future Work} \subsection{Future Work}
Based on the results of this work, there is considerable opportunity to continue investigation of centrality methods for compliance graphs. With three compliance graphs generated for three different applications, along with various node importance rankings, it would be useful to artificially implement correction schemes based on the rankings to see their effects on the compliance graph. Extensions to the ranking and correction schemes could be made by creating a single source of importance ranking by collapsing or combining the vector of centrality method rankings. Since each centrality method highlights unique properties of the network, it may be useful to take each into consideration and determine a final, overall importance ranking. This approach has been seen in works such as those presented by the authors of \cite{LI2018512} and \cite{MO2019121538}. Based on the results of this work, there is considerable opportunity to continue investigation of centrality methods for compliance graphs. With three compliance graphs generated for three different applications, along with various node importance rankings, it would be useful to artificially implement correction schemes based on the rankings to see their effects on the compliance graph. Extensions to the ranking and correction schemes could be made by creating a single source of importance ranking by collapsing or combining the vector of centrality method rankings. Since each centrality method highlights unique properties of the network, it may be useful to take each into consideration and determine a final, overall importance ranking. This approach has been seen in works such as those presented by the authors of \cite{LI2018512} and \cite{MO2019121538}.
Further research could examine how node importance varies based on user-defined metrics by using a user-defined data matrix in centrality methods like PageRank. Edge weights could also be assigned to the original compliance graphs to represent the probability that a given change in the network could occur. Edge weights would be reflected in the adjacency matrices of the graphs, and centrality methods could be reexamined to determine node importance when state transition probabilities are given. Transitive closures and dominant trees derived from the compliance graphs present a new approach for examining compliance graphs. Further research can be conducted to determine the effects of correction schemes when employed on nodes ranked highly in their respective centrality measures in these formats. Further research could examine how node importance varies based on user-defined metrics by using a user-defined data matrix in centrality methods like PageRank. This approach has seen success through the work demonstrated by the authors of \cite{sym11020284}, which adds a data layer to the network for a two-layer approach to PageRank. Similar works can be seen by the authors of \cite{10.1093/bioinformatics/bty965}, which extends Katz to incorporate a prior knowledge vector. Edge weights could also be assigned to the original compliance graphs to represent the probability that a given change in the network could occur. Edge weights would be reflected in the adjacency matrices of the graphs, and centrality methods could be reexamined to determine node importance when state transition probabilities are given. Transitive closures and dominant trees derived from the compliance graphs present a new approach for examining compliance graphs. Further research can be conducted to determine the effects of correction schemes when employed on nodes ranked highly in their respective centrality measures in these formats.
\addcontentsline{toc}{section}{Bibliography} \addcontentsline{toc}{section}{Bibliography}
\bibliography{Bibliography} \bibliography{Bibliography}