IEEE Computational Intelligence Magazine - August 2019 - 32

Once an event is detected, WDHG approach suppresses
the bursty keywords at subsequent time intervals.
This characteristic enables other related information
to be more visible and helps in capturing new and
emerging events.
their structures. Canonical order of the
nodes in the graphs is not identical.
Graphs also differ in the number of
nodes. To overcome this issue, we align
the dimensions of adjacent graphs (G i -1
and G i) by regenerating their adjacency matrices in equal dimensions and
canonical order. The procedure of a
WDHG generation is briefly described

in Algorithm 1. Figure 3 illustrates an
example to generate a WDHG from two
adjacent graphs G i -1 and G i . Node
weights are shown in "( )". Edge weights
can be seen beside the edges.
Computational complexity im proves significantly from O (K ;V ;4 ) to
O (K ;V ;2 ) using above mentioned
transformation method, where K = ; G ;

Algorithm 1 Generate Set of WDHG.

input: G = {G 1, G 2, G 3, f, G | P |} a set of temporal graphs generated against a set
of super-documents D t
output: Gh = {G 1h, G 2h, f, G |hG | -1}
foreach G i ! G do
merge set of nodes V G i and V G i +1 by taking union U
regenerate adjacency matrix A for G i using U
regenerate adjacency matrix B for G i +1 using U
calculate difference graph G hi using A, B, V G i, and V G i +1

1
2
3
4
5
6 end

G
2
0
4
0
1

(4)
2

C
0
1
1
2
0

D
A
B
C

A
3
0
6
1

G
4

B
(4) 1

B
0
6
0
4

C
0
1
4
0

1

(2)

1

C
2

A

(2)

A
0
1
2
0
0
0

B
1
0
1
0
4
0

C
2
1
0
0
1
0

D
0
0
0
0
0
0

G
0
4
1
0
0
2

I
0
0
0
0
2
0

A
0
6
1
3
0
0

B
6
0
4
0
0
0

C
1
4
0
0
0
0

-2

(-2)
I

-4

(2)

D
3
0
0
0
0
0

G
0
0
0
0
0
0

I
0
0
0
0
0
0

B

-1

G

3

C

IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE | AUGUST 2019

(2)

(3) D 3 -1
5

A B C D
A 0 5 -1 3
B 5 0 3 0
C -1 3 0 0
D 3 0 0 0
G 0 -4 -1 0
I 0 0 0 0

FIGURE 3 The example illustrates the process to generate a WDGH.

32

The text stream has diverse contents and
the heartbeat graph inherits the structural and co-occurrence relationship of
a text stream. To understand our event
detection model, let } =G hi where G hi
is i-th heartbeat graph for simplification.
To detect the strong event candidates,
we extract growth factor and aggregated centrality as key features from each WDHG
and perform three experiments to compute corresponding heartbeat scores.

Gi

(-4)

D (3)
(3) 3
A
1
(6) 6
B
C (4)
4

A
B
C
D
G
I

2.3. Event Detection

h

Gi

A (1)

er

O
rd
er
A
B
C
D
G
I

D
0
3
0
0

Gi -1

ed

I

A
0
0
1
0
2

ed

(2)

B
0
4
0
1
1

O
rd

I
0
2
0
0
0

I
G
B
A
C

G I
0 0
-4 0
-1 0
0 0
0 -2
-2 0

is the number of graphs in the graph
series G.
One of the inherent characteristics of
WDHG is to suppress and handle bias in
the data caused by the burstiness of dominating topics. Each WDHG is formulated by estimating the displaced temporal
frequency of nodes and edges between
each pair of graphs G i -1 and G i to highlight other event-related information,
which might also be important but less
frequent at the same time. Algorithm 1
calculates the change in the corresponding pair of graphs G i -1 and G i . It generates a WDHG G hi by assigning new
weights to all the nodes and edges. The
graph series G is transformed into
WDHG series Gh in a streaming fashion
without affecting the temporal alignment
of the data. Furthermore, these WDHGs
are used to detect emerging events at
precise time descriptions. The methodology of the event detection process is
described in the next section.

2.3.1. Growth Factor Based
In the first experiment, we use growth
factor GF (}) to compute the heartbeat.
GF (}) is an accumulated score of node
weights in a WDHG } which shows the
intensity of drift in topics and their popularity in the text stream. It also shows
how previously observed topics are
trending, in terms of popularity and if
new topics are emerging at the time
interval t i compared to t i -1 (1).
;V } ;

GF (}) = / j(v k} ),

(1)

k =1

where j(v }k ) is the kth node weight
which represents the displaced temporal



IEEE Computational Intelligence Magazine - August 2019

Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - August 2019

Contents
IEEE Computational Intelligence Magazine - August 2019 - Cover1
IEEE Computational Intelligence Magazine - August 2019 - Cover2
IEEE Computational Intelligence Magazine - August 2019 - Contents
IEEE Computational Intelligence Magazine - August 2019 - 2
IEEE Computational Intelligence Magazine - August 2019 - 3
IEEE Computational Intelligence Magazine - August 2019 - 4
IEEE Computational Intelligence Magazine - August 2019 - 5
IEEE Computational Intelligence Magazine - August 2019 - 6
IEEE Computational Intelligence Magazine - August 2019 - 7
IEEE Computational Intelligence Magazine - August 2019 - 8
IEEE Computational Intelligence Magazine - August 2019 - 9
IEEE Computational Intelligence Magazine - August 2019 - 10
IEEE Computational Intelligence Magazine - August 2019 - 11
IEEE Computational Intelligence Magazine - August 2019 - 12
IEEE Computational Intelligence Magazine - August 2019 - 13
IEEE Computational Intelligence Magazine - August 2019 - 14
IEEE Computational Intelligence Magazine - August 2019 - 15
IEEE Computational Intelligence Magazine - August 2019 - 16
IEEE Computational Intelligence Magazine - August 2019 - 17
IEEE Computational Intelligence Magazine - August 2019 - 18
IEEE Computational Intelligence Magazine - August 2019 - 19
IEEE Computational Intelligence Magazine - August 2019 - 20
IEEE Computational Intelligence Magazine - August 2019 - 21
IEEE Computational Intelligence Magazine - August 2019 - 22
IEEE Computational Intelligence Magazine - August 2019 - 23
IEEE Computational Intelligence Magazine - August 2019 - 24
IEEE Computational Intelligence Magazine - August 2019 - 25
IEEE Computational Intelligence Magazine - August 2019 - 26
IEEE Computational Intelligence Magazine - August 2019 - 27
IEEE Computational Intelligence Magazine - August 2019 - 28
IEEE Computational Intelligence Magazine - August 2019 - 29
IEEE Computational Intelligence Magazine - August 2019 - 30
IEEE Computational Intelligence Magazine - August 2019 - 31
IEEE Computational Intelligence Magazine - August 2019 - 32
IEEE Computational Intelligence Magazine - August 2019 - 33
IEEE Computational Intelligence Magazine - August 2019 - 34
IEEE Computational Intelligence Magazine - August 2019 - 35
IEEE Computational Intelligence Magazine - August 2019 - 36
IEEE Computational Intelligence Magazine - August 2019 - 37
IEEE Computational Intelligence Magazine - August 2019 - 38
IEEE Computational Intelligence Magazine - August 2019 - 39
IEEE Computational Intelligence Magazine - August 2019 - 40
IEEE Computational Intelligence Magazine - August 2019 - 41
IEEE Computational Intelligence Magazine - August 2019 - 42
IEEE Computational Intelligence Magazine - August 2019 - 43
IEEE Computational Intelligence Magazine - August 2019 - 44
IEEE Computational Intelligence Magazine - August 2019 - 45
IEEE Computational Intelligence Magazine - August 2019 - 46
IEEE Computational Intelligence Magazine - August 2019 - 47
IEEE Computational Intelligence Magazine - August 2019 - 48
IEEE Computational Intelligence Magazine - August 2019 - 49
IEEE Computational Intelligence Magazine - August 2019 - 50
IEEE Computational Intelligence Magazine - August 2019 - 51
IEEE Computational Intelligence Magazine - August 2019 - 52
IEEE Computational Intelligence Magazine - August 2019 - 53
IEEE Computational Intelligence Magazine - August 2019 - 54
IEEE Computational Intelligence Magazine - August 2019 - 55
IEEE Computational Intelligence Magazine - August 2019 - 56
IEEE Computational Intelligence Magazine - August 2019 - 57
IEEE Computational Intelligence Magazine - August 2019 - 58
IEEE Computational Intelligence Magazine - August 2019 - 59
IEEE Computational Intelligence Magazine - August 2019 - 60
IEEE Computational Intelligence Magazine - August 2019 - 61
IEEE Computational Intelligence Magazine - August 2019 - 62
IEEE Computational Intelligence Magazine - August 2019 - 63
IEEE Computational Intelligence Magazine - August 2019 - 64
IEEE Computational Intelligence Magazine - August 2019 - 65
IEEE Computational Intelligence Magazine - August 2019 - 66
IEEE Computational Intelligence Magazine - August 2019 - 67
IEEE Computational Intelligence Magazine - August 2019 - 68
IEEE Computational Intelligence Magazine - August 2019 - 69
IEEE Computational Intelligence Magazine - August 2019 - 70
IEEE Computational Intelligence Magazine - August 2019 - 71
IEEE Computational Intelligence Magazine - August 2019 - 72
IEEE Computational Intelligence Magazine - August 2019 - 73
IEEE Computational Intelligence Magazine - August 2019 - 74
IEEE Computational Intelligence Magazine - August 2019 - 75
IEEE Computational Intelligence Magazine - August 2019 - 76
IEEE Computational Intelligence Magazine - August 2019 - Cover3
IEEE Computational Intelligence Magazine - August 2019 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com