<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2227-1899</journal-id>
<journal-title><![CDATA[Revista Cubana de Ciencias Informáticas]]></journal-title>
<abbrev-journal-title><![CDATA[Rev cuba cienc informat]]></abbrev-journal-title>
<issn>2227-1899</issn>
<publisher>
<publisher-name><![CDATA[Editorial Ediciones Futuro]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2227-18992018000300001</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[A New Multi-graph Transformation Method for Frequent Approximate Subgraph Mining]]></article-title>
<article-title xml:lang="es"><![CDATA[Un nuevo método basado en transformaciones de multigrafos para la minería de subgrafos frecuentes aproximados]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Acosta Mendoza]]></surname>
<given-names><![CDATA[Niusvel]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Centro de Aplicaciones de Tecnología de Avanzada (CENATAV).  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>09</month>
<year>2018</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>09</month>
<year>2018</year>
</pub-date>
<volume>12</volume>
<numero>3</numero>
<fpage>1</fpage>
<lpage>16</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_arttext&amp;pid=S2227-18992018000300001&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_abstract&amp;pid=S2227-18992018000300001&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_pdf&amp;pid=S2227-18992018000300001&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Frequent approximate subgraph (FAS) mining has been successfully applied in several science domains, because in many applications, approximate approaches have achieved better results than exact approaches. However, there are real applications based on multi-graphs where traditional FAS miners cannot be applied because they were not designed to deal with this type of graph. Only one method based on graph transformation, which allows the use of traditional simple-graph FAS miners on multi-graph problems was reported, but it has high computational cost. This paper aims at accelerating the mining process, thus a more efficient method is proposed for transforming multi-graphs into simple graphs and vice versa without losing topological or semantic information, that allows using traditional FAS mining algorithms and returning the mined patterns to the multi-graph space. Finally, we analyze the performance of the proposed method over synthetic multi-graph collections and additionally we show the effectiveness of the proposal in image classification tasks where images are represented as multi-graphs.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[La minería de subgrafos frecuentes aproximados ha sido satisfactoriamente aplicada en varios dominios de la ciencia, debido a que los enfoques aproximados han alcanzado mejores resultados que los exactos en muchas aplicaciones. Sin embargo, existen aplicaciones basadas en multi-grafos donde los algoritmos tradicionales de minería no pueden ser aplicados porque no están diseñados para trabajar con este tipo de grafos. Solo se ha reportado un método basado en transformaciones de grafos que permite aplicar los algoritmos tradicionales para la minería de subgrafos frecuentes aproximados en problemas representados como multi-grafos, pero tiene la limitante de un alto costo computacional. En este trabajo, con el objetivo de acelerar el proceso de minería, se propone un método más eficiente para transformar los multi-grafos en grafos simples y vice versa. Este proceso se realiza sin perder información topológica o semántica, lo cual permite el uso de los algoritmos tradicionales de minería de grafos y los patrones minados se pueden retornar al contexto de multi-grafos. Finalmente se analiza el comportamiento del método propuesto sobre colecciones de multi-grafos sintéticas y adicionalmente se muestra la utilidad de la propuesta en tareas de clasificación de imágenes, donde dichas imágenes son representadas como multi-grafos.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[approximate mining]]></kwd>
<kwd lng="en"><![CDATA[frequent approximate subgraphs]]></kwd>
<kwd lng="en"><![CDATA[graph-based classification]]></kwd>
<kwd lng="en"><![CDATA[multi-graph mining]]></kwd>
<kwd lng="es"><![CDATA[clasificación basada en grafos]]></kwd>
<kwd lng="es"><![CDATA[minería aproximada]]></kwd>
<kwd lng="es"><![CDATA[minería de multi-grafos]]></kwd>
<kwd lng="es"><![CDATA[subgrafos frecuentes aproximados]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[ <p align="right"><font face="Verdana, Arial, Helvetica, sans-serif" size="2"><B>ART&Iacute;CULO  ORIGINAL</B></font></p>     <p>&nbsp;</p>     <p><font size="4"><strong><font face="Verdana, Arial, Helvetica, sans-serif">A New Multi-graph Transformation Method for  Frequent Approximate Subgraph Mining</font></strong></font></p>     <p>&nbsp;</p>     <p><font size="3"><strong><font face="Verdana, Arial, Helvetica, sans-serif">Un nuevo m&eacute;todo basado en transformaciones de  multigrafos para la miner&iacute;a de subgrafos frecuentes aproximados</font></strong></font></p>     <p>&nbsp;</p>     <p>&nbsp;</p>     <P><font size="2"><strong><font face="Verdana, Arial, Helvetica, sans-serif">Niusvel Acosta Mendoza</font> <font face="Verdana, Arial, Helvetica, sans-serif"><strong><sup>1</sup></strong></font></strong></font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif"><sup>1</sup>Centro de Aplicaciones de Tecnolog&iacute;a de Avanzada (CENATAV). nacosta@cenatav.co.cu</font>    <br>     ]]></body>
<body><![CDATA[<br> </p>     <P><font face="Verdana, Arial, Helvetica, sans-serif"><span class="class"><font size="2">*Autor para la correspondencia: </font></span></font><font size="2" face="Verdana, Arial, Helvetica, sans-serif"> <a href="mailto:jmperea@unex.es">nacosta@cenatav.co.cu</a><a href="mailto:jova@uci.cu"></a></font><font face="Verdana, Arial, Helvetica, sans-serif"><a href="mailto:losorio@ismm.edu.cu"></a> </font>     <p>&nbsp;</p>     <p>&nbsp;</p> <hr>     <P><font size="2" face="Verdana, Arial, Helvetica, sans-serif"><b>ABSTRACT</b> </font>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">Frequent  approximate subgraph (FAS) mining has been successfully applied in several  science domains, because in many applications, approximate approaches have  achieved better results than exact approaches. However, there are real  applications based on multi-graphs where traditional FAS miners cannot be  applied because they were not designed to deal with this type of graph. Only  one method based on graph transformation, which allows the use of traditional  simple-graph FAS miners on multi-graph problems was reported, but it has high  computational cost. This paper aims at accelerating the mining process, thus a  more efficient method is proposed for transforming multi-graphs into simple  graphs and vice versa without losing topological or semantic information, that  allows using traditional FAS mining algorithms and returning the mined patterns  to the multi-graph space. Finally, we analyze the performance of the proposed  method over synthetic multi-graph collections and additionally we show the  effectiveness of the proposal in image classification tasks where images are  represented as multi-graphs.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif"><b>Key words<span lang=EN-GB>:</span></b></font> <font size="2" face="Verdana, Arial, Helvetica, sans-serif">approximate  mining, frequent approximate subgraphs, graph-based classification, multi-graph  mining.</font></p> <hr>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif"><b>RESUMEN</b></font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">La miner&iacute;a de subgrafos frecuentes aproximados ha sido  satisfactoriamente aplicada en varios dominios de la ciencia, debido a que los  enfoques aproximados han alcanzado mejores resultados que los exactos en muchas  aplicaciones. Sin embargo, existen aplicaciones basadas en multi-grafos donde  los algoritmos tradicionales de miner&iacute;a no pueden ser aplicados porque no est&aacute;n  dise&ntilde;ados para trabajar con este tipo de grafos. Solo se ha reportado un m&eacute;todo  basado en transformaciones de grafos que permite aplicar los algoritmos  tradicionales para la miner&iacute;a de subgrafos frecuentes aproximados en problemas  representados como multi-grafos, pero tiene la limitante de un alto costo  computacional. En este trabajo, con el objetivo de acelerar el proceso de  miner&iacute;a, se propone un m&eacute;todo m&aacute;s eficiente para transformar los multi-grafos  en grafos simples y vice versa. Este proceso se realiza sin perder informaci&oacute;n  topol&oacute;gica o sem&aacute;ntica, lo cual permite el uso de los algoritmos tradicionales  de miner&iacute;a de grafos y los patrones minados se pueden retornar al contexto de  multi-grafos. Finalmente se analiza el comportamiento del m&eacute;todo propuesto  sobre colecciones de multi-grafos sint&eacute;ticas y adicionalmente se muestra la  utilidad de la propuesta en tareas de clasificaci&oacute;n de im&aacute;genes, donde dichas  im&aacute;genes son representadas como multi-grafos.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif"><b>Palabras clave<span lang=EN-GB>: </span></b>clasificaci&oacute;n basada en grafos, miner&iacute;a  aproximada, miner&iacute;a de multi-grafos, subgrafos frecuentes aproximados.</font></p> <hr>     ]]></body>
<body><![CDATA[<p>&nbsp;</p>     <p>&nbsp;</p>     <p><font size="3" face="Verdana, Arial, Helvetica, sans-serif"><b>INTRODUCTION</b></font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">Frequent approximate subgraph (FAS)  mining has become an outstanding technique in data mining with several  applications such as: genetic networks and biochemical structures analysis,  image classification, and circuits, cites, social networks and links analysis,  among others (Flores-Garrido et al.,  2015; Jia et al., 2011; Morales-Gonz&aacute;lez et al., 2014).  In this research, FAS mining algorithms achieve better results than the ones  reported by exact frequent subgraph mining algorithms. This is because the  inexact matching between patterns is common in the data of a real-life  application (Cook and Holder, 1994;  Gonz&aacute;lez et al., 2001; Ketkar, 2005). However, the exact mining  algorithms compute frequent patterns based on isomorphism (Yan and Huan, 2002; Zhu  et al., 2007; Wang et al., 2016).</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">All the aforementioned algorithms  process only simple graph collections, where a simple graph is a graph with a  single edge between a pair of vertices and without edges connecting a vertex  with itself (loops). However, there are some applications such as pathfinder on  game maps, RNA molecule analysis, dynamic network with time information, image  processing, and event detection from Web sites, among others (Boneva et al., 2007;  Bj&ouml;rnsson  and Halld&oacute;rsson, 2006; Cazabet et al., 2015;  Morales-Gonz&aacute;lez  and Garc&iacute;a-Reyes, 2013; Terroso-Saez et al., 2015;  Youssef et  al., 2015) in which the authors highlight  that using multi-graphs allow them modeling data in a better way than using  simple graphs. A multi-graph is a graph that may contain loops and multiple  edges between a pair of vertices. In these applications, traditional FAS miners  cannot be applied because they have not been designed to work on multi-graphs.  In all of these applications, using multi-graphs and finding interesting  patterns from multi-graphs would allow to get information potentially useful to  solve problems that are more complex.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">As mentioned before, several researchers have  focused their efforts on developing algorithms for mining FASs in simple graph  collections and, and it has only been found one work which reports a solution,  based on graph transformations, for using this FAS miners on multi-graph  collections (Acosta-Mendoza et al., 2015). However, this method highly increases the size of each graph in the  collection and therefore the runtime of the FAS mining process. For this  reason, with the aim of speeding up the mining process, an alternative method  is proposed, based on graph transformation, for mining a subset of FASs from a  multi-graph collection. The proposal of this paper guarantees returning the  mined FASs to the multi-graph space faster than the method reported in the  state-of-the-art. </font></p>     <p>&nbsp;</p>     <p><font face="Verdana, Arial, Helvetica, sans-serif"><strong>COMPUTATIONAL  METHODOLOGY</strong></font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">As we focus on working over a  collection of undirected labeled multi-graphs, the first concepts to be defined  are labeled graph, simple graph and multi-graph. It is important to highlight  that several of the concepts presented in this section were obtained from (Acosta-Mendoza et al., 2012; Morales-Gonz&aacute;lez et al., 2014).</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">Definition  1 (Labeled graph): Let Lv <em>and </em>Le <em>be two label sets for vertices and edges,  respectively, a labeled graph G is a 5-tuple</em> <img src="/img/revistas/rcci/v11n3/fo0101318.jpg" alt="fo01" width="113" height="22"><em>where:</em> Vg <em>is a set of vertices; </em>Eg <em>is a set of edges;</em><img src="/img/revistas/rcci/v11n3/fo0201318.jpg" alt="fo02" width="97" height="20"> <em>is a function that returns the pair of vertices  of</em> Vg <em>which are connected by a given edge, where </em><img src="/img/revistas/rcci/v11n3/fo0301318.jpg" alt="fo03" width="228" height="21"><em>is a labeling function for assigning labels to  vertices in </em>Vg <em>and </em><img src="/img/revistas/rcci/v11n3/fo0401318.jpg" alt="fo04" width="72" height="20"> <em>is a labeling function for assigning labels to  edges in</em> Eg. </font></p>     ]]></body>
<body><![CDATA[<p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">Multi-edges  are different edges connecting the same pair of vertices (i.e. e and e&acute; are  multi-edges if <img src="/img/revistas/rcci/v11n3/fo0501318.jpg" alt="fo05" width="377" height="17">). A  loop is an edge connecting a vertex to itself (i.e., when <img src="/img/revistas/rcci/v11n3/fo0601318.jpg" alt="fo06" width="413" height="19">) (Acosta-Mendoza et al., 2015).  Then, the concepts of simple graph and multi-graph are defined as follows:</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">Definition 2 (Simple-graph and multi-graph (Acosta-Mendoza et al., 2015)): <em>A graph G is a </em>simple graph <em>if  it has no loops and no multi-edges; otherwise, G is a </em>multi-graph<em>.</em></font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">Definition  3 (subgraph and supergraph): <em>Given two graphs </em><img src="/img/revistas/rcci/v11n3/fo0701318.jpg" alt="fo07" width="169" height="22"> and <img src="/img/revistas/rcci/v11n3/fo0801318.jpg" alt="fo08" width="192" height="22"> is a  subgraph of <img src="/img/revistas/rcci/v11n3/fo0901318.jpg" alt="fo09" width="159" height="22">, <img src="/img/revistas/rcci/v11n3/fo1001318.jpg" alt="fo10" width="219" height="25">, <img src="/img/revistas/rcci/v11n3/fo1101318.jpg" alt="fo11" width="298" height="24"> <em>In this case, we use the notation</em> <img src="/img/revistas/rcci/v11n3/fo1201318.jpg" alt="fo12" width="54" height="20"><em>and we say that</em> G2 <em>is a supergraph of</em> G1. </font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">In exact graph mining, graph matching is performed by  means of graph isomorphism. For both, simple graphs and multi-graphs,  isomorphism and sub-isomorphism between two graphs are defined as follow:</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">Definition 4 (Isomorphism and sub-isomorphism): Given two graphs <img src="/img/revistas/rcci/v11n3/fo1301318.jpg" alt="fo13" width="170" height="21"> and <img src="/img/revistas/rcci/v11n3/fo1401318.jpg" alt="fo14" width="175" height="19"> the  pair of functions (f,g)    is  an isomorphism between these graphs<em> iff </em>: <img src="/img/revistas/rcci/v11n3/fo1501318.jpg" alt="fo15" width="63" height="23"> and <img src="/img/revistas/rcci/v11n3/fo1601318.jpg" alt="fo16" width="84" height="23">   are  bijective functions, such that<em>:</em></font><font size="2"><em></em></font><img src="/img/revistas/rcci/v11n3/fo1701318.jpg" alt="fo17" width="342" height="20"> , where <img src="/img/revistas/rcci/v11n3/fo1801318.jpg" alt="fo18" width="215" height="18"> and <img src="/img/revistas/rcci/v11n3/fo1901318.jpg" alt="fo19" width="285" height="21"> and <img src="/img/revistas/rcci/v11n3/fo2001318.jpg" alt="fo20" width="67" height="23"> where <img src="/img/revistas/rcci/v11n3/fo2101318.jpg" alt="fo21" width="479" height="20"><font size="2" face="Verdana, Arial, Helvetica, sans-serif">If  there is an isomorphism between G1 and G2, then  we say that G1 and G2 are  isomorphic. Besides<em>, </em>if G1 is  isomorphic to a subgraph of G2, then  there is a sub-isomorphism between G1 and G2 ;  in this case, we say that G1 and G2 are  sub-isomorphic<em>.</em></font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">In  almost all inexact-based graph mining approaches, the authors firstly define a  function for comparing graphs, according to the application context (Cook and Holder, 1994; Jia et al., 2011; Acosta-Mendoza et al., 2012; Flores-Garrido et al., 2015). This function is known  as similarity function between two graphs, denoted by sim(G1,G2). Later,  using a specific sim(G1,G2) function,  the approximate sub-isomorphism between two graphs and the maximum inclusion  degree for a graph G1 &nbsp;in another G2 are defined (see the definitions 5 and 6).</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">Definition  5 (Approximate isomorphism and approximate sub-isomorphism): Let G1, G2 and G3 be  three labeled multi-graphs, let sim(G1,G2) be  a similarity function, and let <img src="/img/revistas/rcci/v11n3/fo2201318.jpg" alt="fo22" width="56" height="16"> be  a similarity threshold, there is an approximate isomorphism between G1 and G2 if sim(G1,G2) <img src="/img/revistas/rcci/v11n3/fo2301318.jpg" alt="fo23" width="31" height="19"> Also,  if there is an approximate isomorphism between G1 and G2, and G2 is  a subgraph of G3, then  there is anapproximate  sub-isomorphism between G1 and G3, denotedas <img src="/img/revistas/rcci/v11n3/fo2401318.jpg" alt="fo24" width="64" height="20"></font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">Between two multi-graphs, more than one approximate  similarity with different values can be computed. Thus, in order to have only  one similarity value between two graphs, the following definition is used.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">Definition 6 (Maximum inclusion degree): Let G1 and G2 be  two labeled multi-graphs, let    sim(G1,G2) be  a similarity function; the maximum inclusion degree of G1 in G2 is  defined as: </font></p>     <p align="center"><img src="/img/revistas/rcci/v11n3/fo2501318.jpg" alt="fo25" width="380" height="46"></p>     ]]></body>
<body><![CDATA[<p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">where maxID(G1,G2) means  the maximum value of similarity at comparing G1 with  all of the subgraphs of G2.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">With Definition 7, it is possible to compute the  approximate support of a subgraph in a graph collection.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">Definition 7 (Approximate support): Let   <img src="/img/revistas/rcci/v11n3/fo2601318.jpg" alt="fo26" width="108" height="20"> be  a multi-graph collection, let  sim(G1,G2) be  a similarity function among graphs, let <img src="/img/revistas/rcci/v11n3/fo2701318.jpg" alt="fo27" width="10" height="12"> be  a similarity threshold, and let G be  a similarity threshold, and let G be  a labeled multi-graph. Thus, the approximate support (denoted by appSupp) of G in D is  obtained through Equation (2):</font></p>     <p align="center"><img src="/img/revistas/rcci/v11n3/fo2801318.jpg" alt="fo28" width="470" height="62"></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">By using the equation (2), frequent approximate  subgraphs can be defined as follows.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">Definition 8 (Frequent approximate subgraph  (FAS)): Let D be  a multi-graph collection, let G be  a multi-graph and let <img src="/img/revistas/rcci/v11n3/fo2901318.jpg" alt="fo29" width="13" height="15">   be  a support threshold, G is  a frequent approximate subgraph in D iff  <img src="/img/revistas/rcci/v11n3/fo3001318.jpg" alt="fo30" width="128" height="18"></font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">Taking into account the FAS definition, frequent  approximate subgraph miningin a  multi-graph collection consists in, given a support threshold, a similarity  function between multi-graphs, and a similarity threshold, computing all the  FASs in the multi-graph collection.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif"><strong>Related  work</strong></font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">There are three methods reported in  the literature where multi-graphs are transformed into simple graphs, the  simple graphs are analyzed and a subset of them are returned as result to the  context of multi-graphs (Acosta-Mendoza et al.,  2015; Boneva et al., 2007; Whalen and Kenney, 1990).  The transformation method introduced in (Boneva et al.,  2007) is applied for solving a problem  in production systems. In (Whalen and Kenney,  1990) a transformation method for  finding maximal link-disjoint paths in a multi-graph is proposed. In (Acosta-Mendoza et al., 2015),  a method that allows applying FAS miner was introduced and applied on image  classification tasks.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">All  the aforementioned methods use the same basic trick of modifying edges (i.e.  replacing edges by a vertex with two incident edges to the end vertices of the  original edge). This transformation process is applied over all the edges of  the multi-graphs and in this way, a multi-graph G&acute; is  transformed into a simple graph G.</font></p>     ]]></body>
<body><![CDATA[<p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">The transformation approaches reported in (Boneva et al., 2007;  Whalen and  Kenney, 1990) have some drawbacks that make  them infeasible in the context of FAS mining. In (Whalen and Kenney, 1990),  the method does not transform graphs with loops; however, loops could be  important in some applications and they should be preserved and treated in a  special way for FAS mining in multi-graphs. Furthermore, in (Whalen and Kenney, 1990),  the authors do not provide a reverse transformation from directed simple graphs  to directed multi-graphs. This reverse process is trivial when the  transformation is applied on a directed multi-graph, where every vertex should  be connected with at least two vertices. Nevertheless, other kind of  multi-graphs do not have a deterministic reverse transformation, and this kind  of multi-graphs are also very common in FAS mining applications. On the other  hand, the method proposed in (Boneva et al.,  2007) maintains multi-edges after  transforming a multi-graph with loops. Therefore, the application of a  traditional FAS miner over the transformed graphs is infeasible.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">The method (allEdges) proposed in (Acosta-Mendoza  et al., 2015), for allowing the application of traditional pattern miners over  multi-graph collections, transforms multi-graphs into simple graphs. First, the  multi-graph collection is transformed into a simple graph collection. For doing  that, each loop that connects a vertex v by  a new vertex w and a simple edge <img src="/img/revistas/rcci/v11n3/fo3101318.jpg" alt="fo31" width="313" height="22">   is  a simple edge if <img src="/img/revistas/rcci/v11n3/fo3201318.jpg" alt="fo32" width="183" height="21">   with  the label of the loop, connecting v to w Later,  each non-loop edge (i.e. simple edges or multi-edges) e that  connects a pair of vertices <img src="/img/revistas/rcci/v11n3/fo3301318.jpg" alt="fo33" width="116" height="20"> is  transformed into a new vertex w&acute; and  two edges (e1 and e2)    both  with the label of e, connecting u and v, respectively,  to    w&acute;. </font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">Once the multi-graph collection is transformed into a  simple graph collection, a traditional pattern miner is applied on the simple  graph collection, and then, the patterns identified by the pattern miner are  transformed into multi-graphs. Through some special labels, it is possible to  perform the reverse process without losing structural or semantic information  of the multi-graph collection. In allEdges, the simple edges and the  multi-edges are transformed because the authors consider that a simple edge  must have occurrences in the multi-edges and vice versa. However, during this  transformation process, several vertices and edges are added. A new vertex for  each edge is added and the number of edges is duplicated, increasing the size  of each graph, and therefore, the cost of FAS mining.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">Both proposals reported in (Boneva et al., 2007;  Whalen and  Kenney, 1990) are focused on directed  multi-graphs. The strategies followed by these methods require the vertex and  edge label sets to be disjoint. Thus, traditional FAS miners cannot be used if  these transformation methods are applied. On the other hand, the method  proposed in (Acosta-Mendoza et al.,  2015), although it allows to apply  traditional FAS miners, it builds simple graphs with the double of vertices and  edges than those in the multi-graph collections, which increases the cost of  FAS mining. Therefore, in this paper, we present a new reversible method for  transforming an undirected multi-graph collection into an undirected simple  graph collection considering loops. Finally, complex simple graph collections  are obtained when the method proposed in (Acosta-Mendoza et al.,  2015) is applied, because the number of  vertices and edges are duplicated in the transformation process. In this way,  the performance of the miners is negatively affected.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif"><strong>Proposed  method</strong></font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">In this section, we propose a  solution (called <em>onlyMulti</em>) for  mining a FAS subset from multi-graph collections taking advantage of the FAS  miners reported in the literature. The solution proposed in this section, as we  illustrate in <a href="/img/revistas/rcci/v11n3/f0101318.jpg" target="_blank">Figure 1</a>, consists  in transforming a multi-graph collection into a simple graph collection, mining  a FAS subset from the simple graph collection by applying a FAS miner, and  transforming the FASs into multi-graphs.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">The idea illustrated in <a href="/img/revistas/rcci/v11n3/f0101318.jpg" target="_blank">Figure 1</a> has also been followed by the  method (allEdges) reported in (Acosta-Mendoza et al.,  2015), but for mining all FASs from  multi-graph collections, while onlyMulti is an alternative for mining a reduced  number of FASs.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">The proposed alternative for  transforming multi-graph collections into simple graph collections consists in  only transforming loops and multi-edges while simple edges are kept without  changes. In this way, less edges and vertices are added during the  transformation process, and the FAS miner is applied over simple graph  collections smaller graphs than those obtained by the allEdges method proposed  in (Acosta-Mendoza  et al., 2015). After the FAS miner is applied,  the mined FASs are returned to the multi-graphs through the same reversing  process used in allEdges. Thus, the process for transforming a multi-graph into  a simple graph of allEdges and onlyMulti are different. </font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">Following  the proposed alternative, the process for transforming a multi-graph G&acute; into  a simple graph G consists  in replacing each loop and each multi-edge by new vertices and simple edges  likewise in allEdges; however, unlike in allEdges, the simple edges are kept  without changes. In this way, a simple edge does not have occurrences in multi-edges  and vice versa and this is an important characteristic of the solution proposed  to be taken into account when it is applied. Each loop, connecting a vertex v of G&acute;, is  replaced by a simple edge with the label of the loop; connecting v to  a new vertex with a special label (k) Later,  each multi-edge e in G&acute;, with <img src="/img/revistas/rcci/v11n3/fo3401318.jpg" alt="fo34" width="168" height="21">, is  replaced by two simple edges (e1 and e2) both  with the label of e; connecting u and v, respectively,  to a new vertex with a special label (p). This  process is shown in <a href="/img/revistas/rcci/v11n3/f0201318.jpg" target="_blank">Figure 2</a> where each loop in G&acute; is  transformed into a new vertex and a simple edge in G, and  each multi-edge in G&acute; is  transformed into a new vertex and two simple edges in G, obtaining  the simple graph G from  the multi-graph G&acute; The  special label p, in  the same way as k, cannot be used as label in the multi-graph collection  and during the mining process, any other label, except by itself, cannot  replace it. In this way, a non-loop edge will only match with other non-loop  edge with the same label as well as a multi-edge will only match with other  multi-edge with the same label.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">Once  discussed how a loop and a multi-edge is transformed into simple edges, we can  introduce the algorithm (<em>M</em>2<em>Simple</em>) for transforming a multi-graph  into a simple graph. This algorithm traverses the edges in the input  multi-graph searching the loops and multi-edges. The identified loops and  multi-edges are replaced by simple edges following the ideas above discussed.  Applying this transformation process over each graph in a given multi-graph  collection, we can transform it into a simple graph collection. The  computational complexity of this process is <em>O</em>(<em>qd</em>), where <em>q </em>is the average number of edges in the multi-graphs of the  collection, and <em>d </em>is the number of  multi-graphs in the collection. This complexity is obtained considering that,  for each multi-graph, all its edges should be visited.</font></p>     ]]></body>
<body><![CDATA[<p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">Given a multi-graph collection, through the process  above described, a transformed simple graph collection is obtained. Then, a  conventional FAS miner can be applied, and the same process introduced in (AcostaMendoza et al., 2015)  can be used for transforming the returnable FASs into multi-graphs. Notice  that, for obtaining the FASs from the multi-graph collection, this reverse  transformation process is required.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">For transforming a FAS G (a  simple graph) into a multi-graph G&acute;, each  edge <img src="/img/revistas/rcci/v11n3/fo3501318.jpg" alt="fo35" width="169" height="18"> that  has a vertex  v with  label k is  transformed into a loop <img src="/img/revistas/rcci/v11n3/fo3601318.jpg" alt="fo36" width="89" height="20">   keeping  the label of e. Each  pair of edges e1 and e2 with  <img src="/img/revistas/rcci/v11n3/fo3701318.jpg" alt="fo37" width="228" height="21">   that  have a common vertex w with  label p are  replaced by an edge e&acute; with <img src="/img/revistas/rcci/v11n3/fo3801318.jpg" alt="fo38" width="102" height="23"> keeping  the label of e1 and e2, which  have the same label.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">Following  the aforementioned idea, by traversing the edges of a FAS <em>G </em>and replacing those edges that contain vertices with label &nbsp;or &nbsp;by multi-edges or loops, respectively, we can  transform a simple graph into a multigraph. Notice that only vertices with  label &nbsp;or &nbsp;are removed from the simple graph, together  with the simple edges connecting those vertices. However, as discussed in (Acosta-Mendoza et al., 2015), not all the mined FASs should be transformed into multi-graphs  because some of them do not represent subgraphs in the original multi-graphs.  Then, with the aim of identifying the FASs from the original multi-graph  collection, some conditions that the mined simple graph FASs must fulfill for  being susceptible to be transformed into a multi-graph (i.e. to be a returnable  FAS) were introduced in (Acosta-Mendoza  et al., 2015). In Definition 9, the aforementioned conditions are presented.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">Definition 9  (Returnable graph) Let<em> k </em>and<em> p </em>be the special labels used for representing loops and  multi-edges, respectively. A simple graph<em> G </em>is returnable toa multi-graph  if it fulfills the following conditions:</font></p>     <p><img src="/img/revistas/rcci/v11n3/fo3901318.jpg" alt="fo39" width="545" height="50"></p>     <p>&nbsp;</p>     <p><font face="Verdana, Arial, Helvetica, sans-serif"><strong><font size="3">RESULTS Y DISCUSSIONS</font></strong></font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">With the purpose of studying the performance of the  proposed method as well as its effectiveness, in this section, two experiments  are presented. First, the performance of the proposed method over synthetic and  real collections is evaluated. Later, the usefulness of the FASs computed by  our proposed transformation method from real images for image classification is  shown. All experiments were carried out on a personal computer with an Intel(R)  Core(TM) i7-3820 CPU @ 3.60 GHz with 64 GB of RAM. The algorithms S2Multi and  M2Simple were implemented in ANSI-C.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">In  the following experiments, several synthetic multi-graph collections are used  for evaluating the performance of the proposed method. These synthetic  collections were generated using the PyGen graph emulation library.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">In addition, two real image collections were used:  COIL (Nene  et al., 2008) and ETH (Leibe and Schiele, 2003),  which contain images of real objects taken from different viewpoints. In these  cases, each image is represented as a multi-graph following the approaches  described in (Morales-Gonz&aacute;lez and Garc&iacute;a-Reyes, 2013) and  (Morales-Gonz&aacute;lez  and Garc&iacute;a-Reyes, 2010), respectively. In COIL, we use  the same 25 objects used by Morales-Gonz&aacute;lez and Garc&iacute;a-Reyes (Morales-Gonz&aacute;lez and  Garc&iacute;a-Reyes, 2013). This collection is split into  198 (11%) images for training and 1602 (89%) for testing, as in (Morales-Gonz&aacute;lez and  Garc&iacute;a-Reyes, 2013). This collection has 144 as  average graph size, 19 as average of multi-edges per graphs and 25 classes. In  ETH, we use the same 6 categories employed in (Morales-Gonz&aacute;lez and Garc&iacute;a-Reyes, 2010)  (<em>apples</em>, <em>cars</em>, <em>cows</em>, <em>cups</em>, <em>horses </em>and <em>tomatoes</em>).  This collection is split into 615 (25%) images for training and 1845 (75%) for  testing, as in (Morales-Gonz&aacute;lez and Garc&iacute;a-Reyes, 2010).  This collection has 179 as average graph size, 25 as average of multi-edges per  graphs and 6 classes.</font></p>     ]]></body>
<body><![CDATA[<p><font size="2" face="Verdana, Arial, Helvetica, sans-serif"><strong>Performance  evaluation over synthetic collections</strong></font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">Three kinds of synthetic multi-graph collections  were used for evaluating the performance of both algorithms. In this case, we  use multi-graph collections generated varying only one parameter at a time.  First, we fix |<em>D</em>| = 1000 and |<em>E</em>| = 200, varying |<em>V </em>| from 200 to 1000, with increments of 200. Next, we fix |<em>V </em>| = 200, maintaining |<em>D</em>| = 1000 and varying |<em>E</em>| from 200 to 1000, with increments of  200. Finally, we vary |<em>D</em>| from 1000  to 5000, with increments of 1000, keeping |<em>V </em>| = |<em>E</em>| = 200. Then, we assign a  descriptive name for each synthetic collection, for example, <em>D1kV1kE200 </em>means that the collection has  |<em>D</em>| = 1000, |<em>V </em>| = 1000 and |<em>E</em>| = 200. </font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">In <a href="/img/revistas/rcci/v11n3/t0101318.jpg" target="_blank">Table 1</a>, the  performance results, in terms of runtime, and the average of vertices and edges  obtained by the transformation algorithms (M2Simple and S2Multi) are shown. It  is important to highlight that we denoted by M2Simple&rsquo; the algorithm for  transforming multi-graphs into simple graph proposed in (Acosta-Mendoza et al., 2015).  In this table, the runtime for mining the frequent approximate subgraphs (FASs)  from the transformed simple graph collections is also shown. These results were  achieved by transforming each multi-graph collection into a simple graph  collection using M2Simple or M2Simple&rsquo;. The average of vertices and edges for  the simple graph collections obtained are shown, as well as the runtime  required for computing the FASs from these transformed simple graph  collections. Finally, each pattern obtained from the simple graph collection  was transformed into a multi-graph using S2Multi.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif"><a href="/img/revistas/rcci/v11n3/t0101318.jpg" target="_blank">Table 1</a> is split into three sub-tables  according to the collection type. In these sub-tables, the first column shows  the collection. The other two consecutive blocks, with five columns each one,  show the results obtained by applying the transformation method specified on  top. The first three columns of each block show the runtime in seconds of  M2Simple, the FASs mining process, and S2Multi applied over the mined FASs. The  other two columns specify the average number of the vertices and edges of each  collection after the transformation from multi-graphs into simple graphs.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">According to the results shown in <a href="/img/revistas/rcci/v11n3/t0101318.jpg" target="_blank">Table 1</a>, the runtime of the transformation process grows with  the increment of |<em>D</em>|, |<em>V </em>| and |<em>E</em>|, however, when the amount of edges increases, this process grows  faster than by increasing the number of vertices and the number of graphs. The  number of graphs in the collection is an important variable to take into  account, because it affects the performance of M2Simple (M2Simple&rsquo;) and S2Multi  when it grows. Furthermore, S2Multi receives many more vertices and edges than  M2Simple (M2Simple&rsquo;) for the same multi-graph collection, since M2Simple  (M2Simple&rsquo;) creates an additional vertex and an additional edge for each  transformed edge or loop. In this sense, as M2Simple&oacute;f the method proposed in (Acosta-Mendoza et al., 2015) adds more vertices and edges in these collections than M2Simple of  onlyMulti, then allEdges required more time over the same collections than  onlyMulti, for both, mining patterns and returning the patterns to  multi-graphs. Finally, as it can be seen in <a href="/img/revistas/rcci/v11n3/t0101318.jpg" target="_blank">Table 1</a>, onlyMulti allows mining patterns in less time than  the method reported in (Acosta-Mendoza  et al., 2015).</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif"><strong>Performance  evaluation over real-world collections</strong></font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">In <a href="/img/revistas/rcci/v11n3/t0201318.jpg" target="_blank">Table 2</a>, the  performance of onlyMulti over the two real image collections (COIL and ETH) is  shown, represented as multi-graphs. In this experiment, the performance of  M2Simple over the whole multi-graph collection was evaluated while the  performance of S2Multi was evaluated over the simple graph subsets generated  after applying VEAM to the results of M2Simple, by testing different values for  the support threshold.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">The first column of <a href="/img/revistas/rcci/v11n3/t0201318.jpg" target="_blank">Table 2</a> shows the collection name. The  second column contains the support threshold value (<em>&delta;</em>) used by VEAM to get a subset of patterns when it is applied to  the result of M2Simple. The third column shows the runtime of M2Simple when it is  applied over the whole collection specified in column one. The time spent by  VEAM is shown in the fourth column, while the amount of patterns computed by  VEAM appears in the fifth column. The sixth column contains the runtime of  S2Multi for transforming the mined patterns (simple graphs) to multi-graphs. In  the last column, we show the amount of returnable patterns. As it can be seen  in this Table, the number of returnable patterns identified by VEAM grows as  the support threshold decreases. However, it is important to highlight that the  runtime of the proposed transformation algorithms is too small regarding the  runtime required by VEAM for mining FASs.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif"><strong>Classification  results</strong></font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">For showing the usefulness of the  patterns identified by using onlyMulti, the results obtained by it in the  context of image classification using COIL and ETH collections are shown A new  classifier in not being proposed, so the design of a specialized classifier for  images represented as multi-graphs is out of the scope of this paper. In this  experiment, the idea of the proposed method for the FAS mining in multigraph  collections is followed, where all the FASs computed by the proposed method are  used for building an attribute vector for each image. In the same way as (Acosta-Mendoza et al., 2012),  the vectors are described through the bag-of-word technique using the patters  computed after applying the proposed transformation algorithm M2Simple.  Finally, once we have the vector representation of the images, a conventional  classifier is applied. As in previous experiments, the FAS mining algorithm  used for this experiment was VEAM, but fixing to 0<em>,</em>66 the similarity threshold, as recommended in (Acosta-Mendoza et al., 2012).</font></p>     ]]></body>
<body><![CDATA[<p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">One of the most recent works reported in  literature based on FAS for image classification is the one reported in (Morales-Gonz&aacute;lez et al., 2014). Thus, the onlyMulti image classification results are contrasted  against those obtained by this method. Since in (Morales-Gonz&aacute;lez et al., 2014), the best image  classification results were achieved with SVM classifier, we used this  classifier for this experiment. The SVM classifier was taken from Weka v3.6.6 (Hall et al., 2009) with the default  parameters. </font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">The classification results (accuracy and F-measure  results) are shown in Table 3. This  table is split into two subtables showing the results obtained over COIL and  ETH, respectively. The first column of each table shows the support threshold  values used in each experiment. In this case, we use <em>&delta; </em>= 0<em>,</em>2, 0<em>,</em>3, 0<em>,</em>4  and 0<em>,</em>5 for COIL and <em>&delta; </em>= 0<em>,</em>5,  0<em>,</em>6, 0<em>,</em>7 and 0<em>,</em>8 for ETH  because, in both collections, if greater or smaller values of <em>&delta; </em>are used, useful patterns could not be  identified. The second and third columns show the classification results  (accuracy or F-measure), using all FASs computed by VEAM.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">In (Morales-Gonz&aacute;lez and Garc&iacute;a-Reyes, 2013), an  image classification method, not based on FASs, which uses the same image  collections (COIL and ETH) represented as multi-graphs in a similar way as in  the current paper, was introduced. Comparing onlyMulti against the method  reported in (Morales-Gonz&aacute;lez and Garc&iacute;a-Reyes, 2013), the  proposal, using a simple pattern based classifier, obtained better results over  the COIL collection, since in (Morales-Gonz&aacute;lez and Garc&iacute;a-Reyes, 2013) an  accuracy of 91<em>,</em>60 was reported while  onlyMulti scored 94<em>,</em>13. In the case  of the ETH collection, we did not improve upon the results reported in (Morales-Gonz&aacute;lez and  Garc&iacute;a-Reyes, 2013) where the authors reported an  accuracy of 88<em>,</em>0; while the onlyMulti  best result was 67<em>,</em>48. In spite of  these results, this experiment shows the usefulness of onlyMulti, which allows  transforming a multi-graph collection into a simple graph collection for applying  traditional FAS miners. Although onlyMulti can be applied in different contexts  where data are represented as multi-graphs in order to find out interesting  patterns which could be useful for solving different problems.</font></p>     <p>&nbsp;</p>     <p><font face="Verdana, Arial, Helvetica, sans-serif" size="3"><B>CONCLUSIONS</B></font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">In this paper, a new method  (onlyMulti) for frequent approximate subgraph (FAS) mining in multi-graph  collections by transforming multi-graphs into simple graphs and vice versa is  proposed. OnlyMulti, as a first step, transforms a multi-graph collection into  a simple graph collection, then over this collection a FASs mining algorithm is  applied and onlyMulti transforms the patterns found to multi-graphs.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">From the experiments reported in this paper, we  can conclude that onlyMulti is able to mine FASs from multi-graph collections  in a shorter time, producing smaller simple graphs than the only alternative  option reported in literature. This is very important in order to reduce the  cost of the FAS mining step. Based on the experiments we can conclude that the  time required for mining multi-graphs using onlyMulti is smaller than applying  the closest state-of-the-art transformation method. In addition, the usefulness  of the FASs computed over multi-graph collections by applying onlyMulti in an  image classification problem was shown, where in some cases the results  obtained by the patterns computed by using the proposed method outperform the  results obtained by state-of-the-art classifiers non-based on FASs. </font></p>     <p>&nbsp;</p>     <p><font face="Verdana, Arial, Helvetica, sans-serif" size="3"><B>ACKNOWLEDGMENT</B></font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">This work was partly supported by the National Council  of Science and Technology of Mexico (CONACyT) through the scholarship grant  287045.</font></p>     ]]></body>
<body><![CDATA[<p>&nbsp;</p>     <p align="left"><font face="Verdana, Arial, Helvetica, sans-serif" size="3"><B>REFERENCES    </B></font>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">N. Acosta-Mendoza,  A. Gago-Alonso, and J.E. Medina-Pagola. Frequent  approximate subgraphs as features for graph-based image classification. <em>Knowledge-Based Systems</em>, 27:381&ndash;392,  2012.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">N. Acosta-Mendoza, J.A. Carrasco-Ochoa, J.F. Mart&iacute;nez-Trinidad,  A. Gago-Alonso, and J.E. Medina-Pagola. A New Method Based on Graph  Transformation for FAS Mining in Multi-graph Collections. Acepted. In <em>Pattern Recognition</em>, pages 13&ndash;22.  Springer, 2015.</font></p>     <!-- ref --><p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">Y. Bj&ouml;rnsson and K. Halld&oacute;rsson. Improved Heuristics  for Optimal Pathfinding on Game Maps. In <em>American  Association for Artificial Intelligence</em>, page 9, 2006.    </font></p>     <!-- ref --><p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">I. Boneva, F. Hermann, H. Kastenberg, and A. Rensink.  Simulating Multigraph Transformations Using Simple Graphs. <em>Electronic Comunications of the EASST</em>, 6, 2007.    </font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">R. Cazabet, H. Takeda, and M. Hamasaki. Characterizing  the nature of interactions for cooperative creation in online social networks. <em>Social Network Analysis and Mining</em>, 5(1):1&ndash;17,  2015.</font></p>     <!-- ref --><p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">D.J. Cook and L.B. Holder. Substructure discovery  using minimum description length and background knowledge. Journal of  Artificial Intelligence Research, 1:231-255, 1994.    </font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">M. Flores-Garrido, J.A. Carrasco-Ochoa, and J.Fco.  Mart&iacute;nez-Trinidad. AGraP: an algorithm for mining frequent patterns in a single  graph using inexact matching. Knowledge and Information Systems, 42(2): 1&ndash;22,  2015. doi: 10.1007/s10115-014-0747- x.</font></p>     <!-- ref --><p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">J.A. Gonz&aacute;lez, L.B. Holder, and D.J. Cook. Graph-Based  Concept Learning. In Proceedings of the Fourteenth International Florida  Artificial Intelligence Research Society Conference, pp. 377-381, Key West,  Florida, USA, 2001. AAAI Press.    </font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">M. Hall, E. Frank, G. Holmes, B. Pfahringer, P.  Reutemann, and I.H. Witten. The WEKA Data Mining Software: An Update. <em>Special Interest Group on Knowledge  Discovery and Data Mining (SIGKDD) Explorations</em>, 11:10&ndash;18, 2009.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">Y. Jia, J. Zhang, and J. Huan. An efficient  graph-mining method for complicated and noisy data with real-world applications. <em>Knowledge Information Systems</em>,  28(2):423&ndash;447, 2011.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">N.S. Ketkar. Subdue: compression-based frequent  pattern discovery in graph data. In OSDM&rsquo;05: Proceedings of the 1st  international workshop on open source data mining, pp. 71-76. ACM Press, 2005.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">B. Leibe and B. Schiele. Analyzing Appearance and  Contour Based Methods for Object Categorization. In <em>IEEE Conference on Computer Vision and Pattern Recognition (CVPR&rsquo;03)</em>,  pages 409&ndash;415. Madison, WI, USA, June 16&ndash;22 2003.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">A. Morales-Gonz&aacute;lez  and E. B. Garc&iacute;a-Reyes. Assessing the Role  of Spatial Relations for the Object Recognition Task. In <em>The 15th Iberoamerican Congress on Pattern Recognition (CIARP&rsquo;10)</em>,  volume 6419 of <em>Lecture Notes in Computer  Science</em>, pages 549&ndash;556. Springer, Heidelberg, 2010.</font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">A. Morales-Gonz&aacute;lez and E. B. Garc&iacute;a-Reyes. Simple  object recognition based on spatial relations and visual features represented  using irregular pyramids. <em>Multimedia  tools and applications</em>, 63(3):875&ndash;897, 2013.</font></p>     ]]></body>
<body><![CDATA[<p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">A. Morales-Gonz&aacute;lez, N. Acosta-Mendoza, A.  Gago-Alonso, E.B. Garc&iacute;a-Reyes, and J.E. Medina-Pagola. A new proposal for  graph-based image classification using frequent approximate subgraphs. <em>Pattern Recognition</em>, 47(1):169&ndash;177,  2014. ISSN 0031-3203.</font></p>     <!-- ref --><p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">S. Nene, S. Nayar, and H. Murase. Columbia  Object Image Library (COIL-100). <em>Structural,  Syntactic, and Statistical Pattern Recognition, Joint IAPR International  Workshop, SSPR &amp; SPR 2008</em>, 2008.    </font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">F. Terroso-Saez,  M. Vald&eacute;s-Vela, and A.F.. Skarmeta-G&oacute;mez.  Online Urban Mobility Detection Based on Velocity Features. In <em>Proceeding of The 17th International  Conference of Big Data Analytics and Knowledge Discovery</em>, volume LNCS 9263,  pages 351&ndash;362. Valencia, Spain, 2015.</font></p>     <!-- ref --><p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">K. Wang, X. Xie, H. Jin, P. Yuan, F. Lu, and X. Ke.  Frequent Subgraph Mining in Graph Databases Based on MapReduce. In G. Wang, Y.  Han, and G. Mart&iacute;nez, editors, Advances in Services Computing - 10th  Asia-Pacific Services Computing Conference, APSCC 2016, Zhangjiajie, China,  November 16-18, 2016, Proceedings, pp. 464-476, Cham, 2016. Springer  International Publishing.    </font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">J.S. Whalen and J. Kenney. Finding maximal  link disjoint paths in a multigraph. <em>Global  Telecommunications Conference and Exhibition. &rsquo;Communications: Connecting the  Future&rsquo;</em>, 1:470&ndash;474, 1990.</font></p>     <!-- ref --><p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">X. Yan and J. Huan. gSpan: Graph-Based Substructure  Pattern Mining. In <em>International  Conference on Data Mining</em>, Japan, 2002. Maebashi.    </font></p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">R. Youssef, A. Kacem, S. Sevestre-Ghalila, and C.  Chappard. Graph Structuring of Skeleton Object for Its HighLevel Exploitation. <em>Image Analysis and Recognition</em>, LNCS  9164:419&ndash;426, 2015.</font></p>     ]]></body>
<body><![CDATA[<!-- ref --><p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">F.  Zhu, X. Yan, J. Han, and P.S. Yu. gPrune: A Constraint Pushing Framework for  Graph Pattern Mining. In Advances in Knowledge Discovery and Data Mining, 11th  Pacific-Asia Conference, PAKDD 2007, Nanjing, China, May 22-25, Proceedings,  volume 4426 of LNCS, pp. 388-400. Springer, 2007.     </font></p>     <p name="_ENREF_1">&nbsp;</p>     <p name="_ENREF_1">&nbsp;</p>     <p><font size="2" face="Verdana, Arial, Helvetica, sans-serif">Recibido: 24/11/2017    <br> Aceptado: 06/06/2018</font></p>      ]]></body><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Acosta-Mendoza]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Gago-Alonso]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Medina-Pagola]]></surname>
<given-names><![CDATA[J.E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Frequent approximate subgraphs as features for graph-based image classification.]]></source>
<year>2012</year>
<volume>27</volume>
<page-range>381-392</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Acosta-Mendoza]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Carrasco-Ochoa]]></surname>
<given-names><![CDATA[J.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Martínez-Trinidad]]></surname>
<given-names><![CDATA[J.F.]]></given-names>
</name>
<name>
<surname><![CDATA[Gago-Alonso]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Medina-Pagola]]></surname>
<given-names><![CDATA[J.E.]]></given-names>
</name>
</person-group>
<source><![CDATA[A New Method Based on Graph Transformation for FAS Mining in Multi-graph Collections.]]></source>
<year>2015</year>
<page-range>13-22</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Björnsson]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Halldórsson]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<source><![CDATA[Improved Heuristics for Optimal Pathfinding on Game Maps]]></source>
<year>2006</year>
<page-range>9</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Boneva]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
<name>
<surname><![CDATA[Hermann]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Kastenberg]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Rensink]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Simulating Multigraph Transformations Using Simple Graphs]]></source>
<year>2007</year>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cazabet]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[H]]></surname>
<given-names><![CDATA[Takeda]]></given-names>
</name>
<name>
<surname><![CDATA[Hamasaki]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Characterizing the nature of interactions for cooperative creation in online social networks.]]></article-title>
<source><![CDATA[]]></source>
<year>2015</year>
<volume>5</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-17</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cook]]></surname>
<given-names><![CDATA[D.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Holder]]></surname>
<given-names><![CDATA[L.B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Substructure discovery using minimum description length and background knowledge]]></source>
<year>1994</year>
<page-range>231-255</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Flores-Garrido]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Carrasco-Ochoa]]></surname>
<given-names><![CDATA[J.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Martínez-Trinidad]]></surname>
<given-names><![CDATA[J.Fco]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[AGraP: an algorithm for mining frequent patterns in a single graph using inexact matching.]]></article-title>
<source><![CDATA[]]></source>
<year>2015</year>
<volume>42</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>1-22</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[González]]></surname>
<given-names><![CDATA[J.A]]></given-names>
</name>
<name>
<surname><![CDATA[Holder]]></surname>
<given-names><![CDATA[L.B]]></given-names>
</name>
<name>
<surname><![CDATA[Cook]]></surname>
<given-names><![CDATA[D.J]]></given-names>
</name>
</person-group>
<source><![CDATA[Graph-Based Concept Learning.]]></source>
<year>2001</year>
<page-range>377-381</page-range><publisher-loc><![CDATA[^eFlorida Florida]]></publisher-loc>
<publisher-name><![CDATA[AAAI Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hall]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Frank]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Holmes]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Pfahringer]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Reutemann]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Witten]]></surname>
<given-names><![CDATA[I.H.]]></given-names>
</name>
</person-group>
<source><![CDATA[The WEKA Data Mining Software: An Update.]]></source>
<year>2009</year>
<volume>11</volume>
<page-range>10-18</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jia]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Huan]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[An efficient graph-mining method for complicated and noisy data with real-world applications]]></article-title>
<source><![CDATA[]]></source>
<year>2011</year>
<volume>28</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>423-447</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ketkar]]></surname>
<given-names><![CDATA[N.S]]></given-names>
</name>
</person-group>
<source><![CDATA[Subdue: compression-based frequent pattern discovery in graph data]]></source>
<year>2005</year>
<page-range>71-76</page-range><publisher-name><![CDATA[ACM Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Leibe]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Schiele]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<source><![CDATA[Analyzing Appearance and Contour Based Methods for Object Categorization.]]></source>
<year>June</year>
<month> 1</month>
<day>6-</day>
<page-range>409-415</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Morales-González]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[García-Reyes]]></surname>
<given-names><![CDATA[E. B]]></given-names>
</name>
</person-group>
<source><![CDATA[Assessing the Role of Spatial Relations for the Object Recognition Task]]></source>
<year>2010</year>
<volume>6419</volume>
<page-range>549-556</page-range><publisher-name><![CDATA[Springer, Heidelberg]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Morales-González]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[García-Reyes]]></surname>
<given-names><![CDATA[E. B]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Simple object recognition based on spatial relations and visual features represented using irregular pyramids]]></article-title>
<source><![CDATA[]]></source>
<year>2013</year>
<volume>63</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>875-897</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Morales-González]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Acosta-Mendoza]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Gago-Alonso]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[García-Reyes]]></surname>
<given-names><![CDATA[E.B.]]></given-names>
</name>
<name>
<surname><![CDATA[Medina-Pagola]]></surname>
<given-names><![CDATA[J.E.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A new proposal for graph-based image classification using frequent approximate subgraphs]]></article-title>
<source><![CDATA[]]></source>
<year></year>
<volume>47</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>169-177</page-range><page-range>2014</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nene]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Nayar]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Murase]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<source><![CDATA[Columbia Object Image Library (COIL-100). Structural, Syntactic, and Statistical Pattern Recognition]]></source>
<year>2008</year>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Terroso-Saez]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Valdés-Vela]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Skarmeta-Gómez]]></surname>
<given-names><![CDATA[A.F..]]></given-names>
</name>
</person-group>
<source><![CDATA[Online Urban Mobility Detection Based on Velocity Features]]></source>
<year>2015</year>
<page-range>351-362</page-range><publisher-loc><![CDATA[^eValencia Valencia]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Xie]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
<name>
<surname><![CDATA[Jin]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Yuan]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Lu]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Ke]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
</person-group>
<source><![CDATA[Frequent Subgraph Mining in Graph Databases Based on MapReduce.]]></source>
<year>Nove</year>
<month>mb</month>
<day>er</day>
<page-range>464-476</page-range><publisher-loc><![CDATA[^eZhangjiajie Zhangjiajie]]></publisher-loc>
<publisher-name><![CDATA[Springer International Publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Whalen]]></surname>
<given-names><![CDATA[J.S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kenney]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Finding maximal link disjoint paths in a multigraph.]]></source>
<year></year>
<volume>1</volume>
<page-range>470-474</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yan]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
<name>
<surname><![CDATA[Huan]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[gSpan: Graph-Based Substructure Pattern Mining]]></source>
<year>2002</year>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Youssef]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Kacem]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Sevestre-Ghalila]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Chappard]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<source><![CDATA[Graph Structuring of Skeleton Object for Its HighLevel Exploitation.]]></source>
<year>2015</year>
<page-range>419-426</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Yan]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
<name>
<surname><![CDATA[Han]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[P.S.]]></given-names>
</name>
</person-group>
<source><![CDATA[gPrune: A Constraint Pushing Framework for Graph Pattern Mining.]]></source>
<year>2007</year>
<volume>4426</volume>
<publisher-loc><![CDATA[^eNanjing Nanjing]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
