Social Network Analysis using Graph Metrics of Web-based Social Networks

Size: px
Start display at page:

Download "Social Network Analysis using Graph Metrics of Web-based Social Networks"

Transcription

1 Social Network Analysis using Graph Metrics of Web-based Social Networks Robert Hilbrich Department of Computer Science Humboldt Universität Berlin November 27, / 25

2 ... taken from (XING AG) 2 / 25

3 ... and here my results: 3 / 25

4 How do they know that? Research Area called Social Network Analysis (SNA)... is a key technique in modern sociology, anthropology, sociolinguistics, geography, social psychology, communication studies, information science, organizational studies, economics, and biology as well as a popular topic of speculation and study. 4 / 25

5 How do they know that? Research Area called Social Network Analysis (SNA)... is a key technique in modern sociology, anthropology, sociolinguistics, geography, social psychology, communication studies, information science, organizational studies, economics, and biology as well as a popular topic of speculation and study. Goal Analyze the structure of a social network to infer knowledge about an individual or a group. 4 / 25

6 Agenda 1 Introduction 2 Graphs and Metrics What are Graphs? What are Graph Metrics? 3 Graphs for Social Networks 4 Application Areas Reputation management Find Terrorist Activity 5 Keynote 6 Paper 7 Comments 5 / 25

7 Graphs & Metrics A graphical way to express relations. 6 / 25

8 What are Graphs? What are Graphs? Graphs are... mathematical structures used to model pairwise relations between objects. nodes to represent objects ( actors) edges to express relations ( communication paths) 7 / 25

9 What are Graphs? Graphs can be... undirected to represent (only) symmetric relations directed to represent asymmetric ( directed) and symmetric relations weighted to represent intensities, distances or costs of relations 8 / 25

10 What are Graphs? Examples Research with a 250 million node graph (call logs) Vizster - Visualizing Online Social Networks... exploration of the community structure of friendster, tribe,... vizster/early_design/... 9 / 25

11 What are Graph Metrics? What are Graphs Metrics? In SNA, we need to compare Graphs with other Graphs 10 / 25

12 What are Graph Metrics? What are Graphs Metrics? In SNA, we need to compare Graphs with other Graphs Need measures for Graphs Graph Metrics! 10 / 25

13 What are Graph Metrics? Graph Metrics Graph Metrics... are of properties of graphs to compare Graphs with other Graphs Nodes with other Nodes 11 / 25

14 What are Graph Metrics? Graph Metrics Graph Metrics... are of properties of graphs to compare Graphs with other Graphs Nodes with other Nodes Simple examples # of nodes per graph # of edges per node 11 / 25

15 What are Graph Metrics? Graph Metrics in SNA Social Network Analysis (SNA) needs/deserves special metrics. Using SNA metrics in... static graphs graph properties at a given point in time ( snapshot) dynamic graphs graph properties observed over a period of time ( evolution) 12 / 25

16 What are Graph Metrics? Graph Metrics in SNA Social Network Analysis (SNA) needs/deserves special metrics. Using SNA metrics in... static graphs graph properties at a given point in time ( snapshot) dynamic graphs graph properties observed over a period of time ( evolution) Some popular SNA metrics Density: # of edges # of possible edges Characteristic Path Length (CPL): relative connectedness of a social network / 25

17 Graphs for Social Networks Modelling a web-based social network using graphs 13 / 25

18 Modelling a Social Network Now you got all the tools to build a model ( graphs) and analyze it ( graph metrics) 14 / 25

19 Modelling a Social Network Now you got all the tools to build a model ( graphs) and analyze it ( graph metrics) Questions What can you infer about real life from these models? To what extent do your metrics reflect real life? 14 / 25

20 Critical Remarks Example Intuitive metric: Popularity of a node # edges per node 15 / 25

21 Critical Remarks Example Intuitive metric: Popularity of a node # edges per node How about A. Schmidt with friends in XING? What if A. Schmidt also had a Gold Account at StayFriends? 15 / 25

22 Critical Remarks Example Intuitive metric: Popularity of a node # edges per node How about A. Schmidt with friends in XING? What if A. Schmidt also had a Gold Account at StayFriends? Critical Comments web-based social networks reflect an artificial social network being part of a social network attaches a label (Facebook vs. XING) joining a community may have purpose or strategy behind it 15 / 25

23 Application Areas Who is using graphs and metrics of social networks? 16 / 25

24 Reputation static models: Reputation management main idea: reciprocity... taken from the more other people value my opinions, the more weight has my opinion on other topics. 17 / 25

25 Terrorist Activity dynamic models: Find terrorist activity Idea Given a directed graph representing communication paths Goal: Find secretive / terrorist activity in cells in the graph Method: Find communication patterns that uncommon for human social networks... DOD / DARPA sponsored research (!!) 18 / 25

26 Terrorist Activity Evolution of Human Social Networks vs. Secretive Activity Human Social Networks t = t 0 t = t 1 no central mediator geodesic assumption redundancy assumption 19 / 25

27 Terrorist Activity Evolution of Human Social Networks vs. Secretive Activity Human Social Networks Secretive Activity t = t 0 t = t 1 t = t 0 (sleeping) t = t 1 (active) no central mediator geodesic assumption redundancy assumption sleeping: central mediator to reduce risk for leaks active: efficiency needs direct communication 19 / 25

28 Terrorist Activity Find secretive activity Which metrics are used? mediated communication Characteristic Path Length Density is lower compared to real live (reduce # possible leaks reduce # communication paths) 20 / 25

29 Terrorist Activity Find secretive activity Which metrics are used? mediated communication Characteristic Path Length Density is lower compared to real live (reduce # possible leaks reduce # communication paths) Experiments on a generated graph do pattern-search for metrics Result: accuracy rate of 96% 20 / 25

30 Terrorist Activity Find secretive activity Which metrics are used? mediated communication Characteristic Path Length Density is lower compared to real live (reduce # possible leaks reduce # communication paths) Experiments on a generated graph do pattern-search for metrics Result: accuracy rate of 96% Remarks... Found a pattern = Found Terror Cell? Pattern based on Leninist Cell-Communication Model However: AT&T develops similar approach to detect fraud! 20 / 25

31 Keynote What should you take home? 21 / 25

32 Keynote Should we use graph metrics? 22 / 25

33 Keynote Should we use graph metrics? Yes, because... AT&T, DOD(DARPA),... Data-Mining (fast, simple, cheap) Only need the Graph High accuracy rate 22 / 25

34 Keynote Should we use graph metrics? Yes, because... AT&T, DOD(DARPA),... Data-Mining (fast, simple, cheap) Only need the Graph High accuracy rate No, because... Based on Models Model Errors? Observation noise effect on metrics? False interpretations possible! How to build a complete Social Network? 22 / 25

35 Further Plans for the Paper 1 Further analysis of terror papers to show weak spots and false assumptions 2 Learn more about Reputation Management 3 Start it soon :) 23 / 25

36 Bibliography (... more on the WIKI) Thayne Coffman, Seth Greenblatt, and Sherry Marcus. Sensitivity of social network analysis metrics to observation noise. In Proc. IEEE Aerospace Conf., Thayne Coffman and Sherry Marcus. Dynamic classification of groups using social network analysis and hmms. In Proc. IEEE Aerospace Conf., Corinna Cortes, Daryl Pregibon, and Chris Volinsky. Communities of interest. Lecture Notes in Computer Science, 2189:105??, John Scott. Social Network Analysis, A Handbook, Second Edition. SAGE Publications, / 25

37 Questions or Comments? 25 / 25

Practical Graph Mining with R. 5. Link Analysis

Practical Graph Mining with R. 5. Link Analysis Practical Graph Mining with R 5. Link Analysis Outline Link Analysis Concepts Metrics for Analyzing Networks PageRank HITS Link Prediction 2 Link Analysis Concepts Link A relationship between two entities

More information

Examining graduate committee faculty compositions- A social network analysis example. Kathryn Shirley and Kelly D. Bradley. University of Kentucky

Examining graduate committee faculty compositions- A social network analysis example. Kathryn Shirley and Kelly D. Bradley. University of Kentucky Examining graduate committee faculty compositions- A social network analysis example Kathryn Shirley and Kelly D. Bradley University of Kentucky Graduate committee social network analysis 1 Abstract Social

More information

Introduction to Networks and Business Intelligence

Introduction to Networks and Business Intelligence Introduction to Networks and Business Intelligence Prof. Dr. Daning Hu Department of Informatics University of Zurich Sep 17th, 2015 Outline Network Science A Random History Network Analysis Network Topological

More information

Enrollment and Generated Credit Hours in Summer Session Courses Offered by the Department

Enrollment and Generated Credit Hours in Summer Session Courses Offered by the Department College of Arts and Sciences Prepared by: Planning, Research, and Policy Analysis (PRPA) 438-8393 Page 1 Department of Chemistry Prepared by: Planning, Research, and Policy Analysis (PRPA) 438-8393 Page

More information

Introduction to social network analysis

Introduction to social network analysis Introduction to social network analysis Paola Tubaro University of Greenwich, London 26 March 2012 Introduction to social network analysis Introduction Introducing SNA Rise of online social networking

More information

Social Network Mining

Social Network Mining Social Network Mining Data Mining November 11, 2013 Frank Takes (ftakes@liacs.nl) LIACS, Universiteit Leiden Overview Social Network Analysis Graph Mining Online Social Networks Friendship Graph Semantics

More information

Viral Marketing in Social Network Using Data Mining

Viral Marketing in Social Network Using Data Mining Viral Marketing in Social Network Using Data Mining Shalini Sharma*,Vishal Shrivastava** *M.Tech. Scholar, Arya College of Engg. & I.T, Jaipur (Raj.) **Associate Proffessor(Dept. of CSE), Arya College

More information

HISTORICAL DEVELOPMENTS AND THEORETICAL APPROACHES IN SOCIOLOGY Vol. I - Social Network Analysis - Wouter de Nooy

HISTORICAL DEVELOPMENTS AND THEORETICAL APPROACHES IN SOCIOLOGY Vol. I - Social Network Analysis - Wouter de Nooy SOCIAL NETWORK ANALYSIS University of Amsterdam, Netherlands Keywords: Social networks, structuralism, cohesion, brokerage, stratification, network analysis, methods, graph theory, statistical models Contents

More information

Inter-domain Routing

Inter-domain Routing Inter-domain Routing The structure of Internet Qinsi Wang Computer Science Department, Carnegie Mellon September 15, 2010 Outline Lecture 4: Interdomain Routing; L. Gao, On inferring autonomous system

More information

A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION

A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS Kyoungjin Park Alper Yilmaz Photogrammetric and Computer Vision Lab Ohio State University park.764@osu.edu yilmaz.15@osu.edu ABSTRACT Depending

More information

IC05 Introduction on Networks &Visualization Nov. 2009. <mathieu.bastian@gmail.com>

IC05 Introduction on Networks &Visualization Nov. 2009. <mathieu.bastian@gmail.com> IC05 Introduction on Networks &Visualization Nov. 2009 Overview 1. Networks Introduction Networks across disciplines Properties Models 2. Visualization InfoVis Data exploration

More information

Extracting Information from Social Networks

Extracting Information from Social Networks Extracting Information from Social Networks Aggregating site information to get trends 1 Not limited to social networks Examples Google search logs: flu outbreaks We Feel Fine Bullying 2 Bullying Xu, Jun,

More information

Online Credit Card Application and Identity Crime Detection

Online Credit Card Application and Identity Crime Detection Online Credit Card Application and Identity Crime Detection Ramkumar.E & Mrs Kavitha.P School of Computing Science, Hindustan University, Chennai ABSTRACT The credit cards have found widespread usage due

More information

Using Sage to Model, Analyze, and Dismember Terror Groups. In dismembering a Terrorist network in which many people may be involved it is

Using Sage to Model, Analyze, and Dismember Terror Groups. In dismembering a Terrorist network in which many people may be involved it is Kevin Flood SM450A Using Sage to Model, Analyze, and Dismember Terror Groups In dismembering a Terrorist network in which many people may be involved it is important to understand how a social network

More information

A REVIEW OF SOCIAL NETWORK ANALYSIS FOR THE IMI TRUST IN CONSTRUCTION PROJECT

A REVIEW OF SOCIAL NETWORK ANALYSIS FOR THE IMI TRUST IN CONSTRUCTION PROJECT A REVIEW OF SOCIAL NETWORK ANALYSIS FOR THE IMI TRUST IN CONSTRUCTION PROJECT William Swan, Rachel Cooper, Peter McDermott and Graham Wood School of Construction and Property Management, University of

More information

Social Network Analysis: a practical measurement and evaluation of Trust in a classroom environment

Social Network Analysis: a practical measurement and evaluation of Trust in a classroom environment Social Network Analysis: a practical measurement and evaluation of Trust in a classroom environment Antonieta Kuz Facultad de Ingeniería, UCASAL Facultad de Ciencias Exactas, UNICEN antok79@gmail.com Roxana

More information

Técnicas y Herramientas de Apoyo a la investigación (THA) II. Técnicas de Investigación Cualitativa. Social network analysis (SNA)

Técnicas y Herramientas de Apoyo a la investigación (THA) II. Técnicas de Investigación Cualitativa. Social network analysis (SNA) Técnicas y Herramientas de Apoyo a la investigación (THA) II. Técnicas de Investigación Cualitativa Sesión 3. Análisis de redes sociales Alejandra Martínez Monés Noviembre 2009 2 Social network analysis

More information

THE ROLE OF SOCIOGRAMS IN SOCIAL NETWORK ANALYSIS. Maryann Durland Ph.D. EERS Conference 2012 Monday April 20, 10:30-12:00

THE ROLE OF SOCIOGRAMS IN SOCIAL NETWORK ANALYSIS. Maryann Durland Ph.D. EERS Conference 2012 Monday April 20, 10:30-12:00 THE ROLE OF SOCIOGRAMS IN SOCIAL NETWORK ANALYSIS Maryann Durland Ph.D. EERS Conference 2012 Monday April 20, 10:30-12:00 FORMAT OF PRESENTATION Part I SNA overview 10 minutes Part II Sociograms Example

More information

A comparative study of social network analysis tools

A comparative study of social network analysis tools Membre de Membre de A comparative study of social network analysis tools David Combe, Christine Largeron, Előd Egyed-Zsigmond and Mathias Géry International Workshop on Web Intelligence and Virtual Enterprises

More information

Week 3. Network Data; Introduction to Graph Theory and Sociometric Notation

Week 3. Network Data; Introduction to Graph Theory and Sociometric Notation Wasserman, Stanley, and Katherine Faust. 2009. Social Network Analysis: Methods and Applications, Structural Analysis in the Social Sciences. New York, NY: Cambridge University Press. Chapter III: Notation

More information

Evaluating Software Products - A Case Study

Evaluating Software Products - A Case Study LINKING SOFTWARE DEVELOPMENT PHASE AND PRODUCT ATTRIBUTES WITH USER EVALUATION: A CASE STUDY ON GAMES Özge Bengur 1 and Banu Günel 2 Informatics Institute, Middle East Technical University, Ankara, Turkey

More information

Data Mining Cluster Analysis: Basic Concepts and Algorithms. Lecture Notes for Chapter 8. Introduction to Data Mining

Data Mining Cluster Analysis: Basic Concepts and Algorithms. Lecture Notes for Chapter 8. Introduction to Data Mining Data Mining Cluster Analysis: Basic Concepts and Algorithms Lecture Notes for Chapter 8 Introduction to Data Mining by Tan, Steinbach, Kumar Tan,Steinbach, Kumar Introduction to Data Mining 4/8/2004 Hierarchical

More information

Understanding Sociograms

Understanding Sociograms Understanding Sociograms A Guide to Understanding Network Analysis Mapping Developed for Clients of: Durland Consulting, Inc. Elburn, IL Durland Consulting, Inc. Elburn IL Copyright 2003 Durland Consulting,

More information

Secure Because Math: Understanding ML- based Security Products (#SecureBecauseMath)

Secure Because Math: Understanding ML- based Security Products (#SecureBecauseMath) Secure Because Math: Understanding ML- based Security Products (#SecureBecauseMath) Alex Pinto Chief Data Scientist Niddel / MLSec Project @alexcpsec @MLSecProject @NiddelCorp MLSec Project / Niddel MLSec

More information

Using Graph Theory to Analyze Gene Network Coherence

Using Graph Theory to Analyze Gene Network Coherence Using Graph Theory to Analyze Gene Network Coherence Francisco A. Gómez-Vela fgomez@upo.es Norberto Díaz-Díaz ndiaz@upo.es José A. Lagares José A. Sánchez Jesús S. Aguilar 1 Outlines Introduction Proposed

More information

Evaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model

Evaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model Evaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model Trung Le 1, Ba Quy Tran 2, Hanh Dang Thi My 3, Thanh Hung Ngo 4 1 GSR, Information System Lab., University of

More information

Network-Based Tools for the Visualization and Analysis of Domain Models

Network-Based Tools for the Visualization and Analysis of Domain Models Network-Based Tools for the Visualization and Analysis of Domain Models Paper presented as the annual meeting of the American Educational Research Association, Philadelphia, PA Hua Wei April 2014 Visualizing

More information

Network Metrics, Planar Graphs, and Software Tools. Based on materials by Lala Adamic, UMichigan

Network Metrics, Planar Graphs, and Software Tools. Based on materials by Lala Adamic, UMichigan Network Metrics, Planar Graphs, and Software Tools Based on materials by Lala Adamic, UMichigan Network Metrics: Bowtie Model of the Web n The Web is a directed graph: n webpages link to other webpages

More information

Social Networking Analytics

Social Networking Analytics VU UNIVERSITY AMSTERDAM BMI PAPER Social Networking Analytics Abstract In recent years, the online community has moved a step further in connecting people. Social Networking was born to enable people to

More information

Component visualization methods for large legacy software in C/C++

Component visualization methods for large legacy software in C/C++ Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University mcserep@caesar.elte.hu

More information

Roadnet. Performance Dashboard. Information That Powers Your Business

Roadnet. Performance Dashboard. Information That Powers Your Business Roadnet Performance Dashboard Information That Powers Your Business Big Picture Information, Made Easy Let s face it: You re always seeking more transportation intelligence, especially when it comes to

More information

CHAPTER VII CONCLUSIONS

CHAPTER VII CONCLUSIONS CHAPTER VII CONCLUSIONS To do successful research, you don t need to know everything, you just need to know of one thing that isn t known. -Arthur Schawlow In this chapter, we provide the summery of the

More information

Tie Visualization in NodeXL

Tie Visualization in NodeXL Tie Visualization in NodeXL Nick Gramsky ngramsky at cs.umd.edu CMSC 838C Social Computing University of Maryland College Park Abstract: The ability to visualize a network as it varies over time has become

More information

Course Syllabus. BIA658 Social Network Analytics Fall, 2013

Course Syllabus. BIA658 Social Network Analytics Fall, 2013 Course Syllabus BIA658 Social Network Analytics Fall, 2013 Instructor Yasuaki Sakamoto, Assistant Professor Office: Babbio 632 Office hours: By appointment ysakamot@stevens.edu Course Description This

More information

Leveraging Boundary-spanning Knowledge Community Building

Leveraging Boundary-spanning Knowledge Community Building in: Gronau, N. et al. (eds.): Wissensmanagement. Motivation, Org 247 Leveraging Boundary-spanning Knowledge Community Building - Interventions from a Social Network Analysis in Interorganizational R&D

More information

Examining Case Management Demand using Event Log Complexity Metrics

Examining Case Management Demand using Event Log Complexity Metrics Examining Case Management Demand using Event Log Complexity Metrics @Adaptive CM 2014 Workshop Marian Benner-Wickner, Matthias Book, Tobias Brückmann, Volker Gruhn Agenda Problem domain Event log complexity

More information

Social Media Mining. Network Measures

Social Media Mining. Network Measures Klout Measures and Metrics 22 Why Do We Need Measures? Who are the central figures (influential individuals) in the network? What interaction patterns are common in friends? Who are the like-minded users

More information

Exploring Big Data in Social Networks

Exploring Big Data in Social Networks Exploring Big Data in Social Networks virgilio@dcc.ufmg.br (meira@dcc.ufmg.br) INWEB National Science and Technology Institute for Web Federal University of Minas Gerais - UFMG May 2013 Some thoughts about

More information

Protein Protein Interaction Networks

Protein Protein Interaction Networks Functional Pattern Mining from Genome Scale Protein Protein Interaction Networks Young-Rae Cho, Ph.D. Assistant Professor Department of Computer Science Baylor University it My Definition of Bioinformatics

More information

The Basics of Graphical Models

The Basics of Graphical Models The Basics of Graphical Models David M. Blei Columbia University October 3, 2015 Introduction These notes follow Chapter 2 of An Introduction to Probabilistic Graphical Models by Michael Jordan. Many figures

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance of

More information

Exponential Random Graph Models for Social Network Analysis. Danny Wyatt 590AI March 6, 2009

Exponential Random Graph Models for Social Network Analysis. Danny Wyatt 590AI March 6, 2009 Exponential Random Graph Models for Social Network Analysis Danny Wyatt 590AI March 6, 2009 Traditional Social Network Analysis Covered by Eytan Traditional SNA uses descriptive statistics Path lengths

More information

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more

More information

Distance Degree Sequences for Network Analysis

Distance Degree Sequences for Network Analysis Universität Konstanz Computer & Information Science Algorithmics Group 15 Mar 2005 based on Palmer, Gibbons, and Faloutsos: ANF A Fast and Scalable Tool for Data Mining in Massive Graphs, SIGKDD 02. Motivation

More information

Borgatti, Steven, Everett, Martin, Johnson, Jeffrey (2013) Analyzing Social Networks Sage

Borgatti, Steven, Everett, Martin, Johnson, Jeffrey (2013) Analyzing Social Networks Sage Social Network Analysis in Cultural Anthropology Instructor: Dr. Jeffrey C. Johnson and Dr. Christopher McCarty Email: johnsonje@ecu.edu and ufchris@ufl.edu Description and Objectives Social network analysis

More information

Web Developer's Status Report. Laurie Laforest, Ph.D. Academic Technology 22 May 2009

Web Developer's Status Report. Laurie Laforest, Ph.D. Academic Technology 22 May 2009 Web Developer's Status Report Laurie Laforest, Ph.D. Academic Technology 22 May 2009 Overview Move to Concordia template Staff training on Contribute software IITS Projects Google audit of sites in Concordia

More information

Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics

Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics Zhao Wenbin 1, Zhao Zhengxu 2 1 School of Instrument Science and Engineering, Southeast University, Nanjing, Jiangsu

More information

BOOSTING - A METHOD FOR IMPROVING THE ACCURACY OF PREDICTIVE MODEL

BOOSTING - A METHOD FOR IMPROVING THE ACCURACY OF PREDICTIVE MODEL The Fifth International Conference on e-learning (elearning-2014), 22-23 September 2014, Belgrade, Serbia BOOSTING - A METHOD FOR IMPROVING THE ACCURACY OF PREDICTIVE MODEL SNJEŽANA MILINKOVIĆ University

More information

OUTLIER ANALYSIS. Data Mining 1

OUTLIER ANALYSIS. Data Mining 1 OUTLIER ANALYSIS Data Mining 1 What Are Outliers? Outlier: A data object that deviates significantly from the normal objects as if it were generated by a different mechanism Ex.: Unusual credit card purchase,

More information

CHAPTER 1 PROJECT OVERVIEW

CHAPTER 1 PROJECT OVERVIEW CHAPTER 1 PROJECT OVERVIEW 1.1 Introduction VoIP stands for Voice over Internet Protocol or normally known as Internet Telephony. It is a technology for making phone calls using Internet Protocol. It is

More information

Network Analysis of a Large Scale Open Source Project

Network Analysis of a Large Scale Open Source Project 2014 40th Euromicro Conference on Software Engineering and Advanced Applications Network Analysis of a Large Scale Open Source Project Alma Oručević-Alagić, Martin Höst Department of Computer Science,

More information

Subgraph Patterns: Network Motifs and Graphlets. Pedro Ribeiro

Subgraph Patterns: Network Motifs and Graphlets. Pedro Ribeiro Subgraph Patterns: Network Motifs and Graphlets Pedro Ribeiro Analyzing Complex Networks We have been talking about extracting information from networks Some possible tasks: General Patterns Ex: scale-free,

More information

Enterprise Organization and Communication Network

Enterprise Organization and Communication Network Enterprise Organization and Communication Network Hideyuki Mizuta IBM Tokyo Research Laboratory 1623-14, Shimotsuruma, Yamato-shi Kanagawa-ken 242-8502, Japan E-mail: e28193@jp.ibm.com Fusashi Nakamura

More information

DEGREE PROGRAM REQUIREMENTS REQUIREMENTS FOR THE ASSOCIATE OF ARTS DEGREE

DEGREE PROGRAM REQUIREMENTS REQUIREMENTS FOR THE ASSOCIATE OF ARTS DEGREE DEGREE PROGRAM REQUIREMENTS Procedure 3.13 REQUIREMENTS FOR THE ASSOCIATE OF ARTS DEGREE To earn the Associate of Arts degree, the student must successfully complete courses from the following areas to

More information

Business Intelligence and Process Modelling

Business Intelligence and Process Modelling Business Intelligence and Process Modelling F.W. Takes Universiteit Leiden Lecture 7: Network Analytics & Process Modelling Introduction BIPM Lecture 7: Network Analytics & Process Modelling Introduction

More information

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network , pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and

More information

Virtual Meeting Analyzer: A Web application to visualize and analyze social networks emerging in group meetings

Virtual Meeting Analyzer: A Web application to visualize and analyze social networks emerging in group meetings PsychNology Journal, 2012 Volume 10, Number 1, 39 51 Virtual Meeting Analyzer: A Web application to visualize and analyze social networks emerging in group meetings Alessandro Giuseppe Privitera 1, Francesco

More information

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10 1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom

More information

Analysis Of Source Lines Of Code(SLOC) Metric

Analysis Of Source Lines Of Code(SLOC) Metric Analysis Of Source Lines Of Code(SLOC) Metric Kaushal Bhatt 1, Vinit Tarey 2, Pushpraj Patel 3 1,2,3 Kaushal Bhatt MITS,Datana Ujjain 1 kaushalbhatt15@gmail.com 2 vinit.tarey@gmail.com 3 pushpraj.patel@yahoo.co.in

More information

A Review on Zero Day Attack Safety Using Different Scenarios

A Review on Zero Day Attack Safety Using Different Scenarios Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios

More information

Undergraduate Psychology Major Learning Goals and Outcomes i

Undergraduate Psychology Major Learning Goals and Outcomes i Undergraduate Psychology Major Learning Goals and Outcomes i Goal 1: Knowledge Base of Psychology Demonstrate familiarity with the major concepts, theoretical perspectives, empirical findings, and historical

More information

Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data

Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data CMPE 59H Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data Term Project Report Fatma Güney, Kübra Kalkan 1/15/2013 Keywords: Non-linear

More information

Implementing social network analysis for fraud prevention

Implementing social network analysis for fraud prevention Implementing social network analysis for fraud prevention ABOUT THIS PAPER Fraud continues to rise and impose enormous costs on businesses, demanding the need for effective fraud detection technologies

More information

NEW VERSION OF DECISION SUPPORT SYSTEM FOR EVALUATING TAKEOVER BIDS IN PRIVATIZATION OF THE PUBLIC ENTERPRISES AND SERVICES

NEW VERSION OF DECISION SUPPORT SYSTEM FOR EVALUATING TAKEOVER BIDS IN PRIVATIZATION OF THE PUBLIC ENTERPRISES AND SERVICES NEW VERSION OF DECISION SUPPORT SYSTEM FOR EVALUATING TAKEOVER BIDS IN PRIVATIZATION OF THE PUBLIC ENTERPRISES AND SERVICES Silvija Vlah Kristina Soric Visnja Vojvodic Rosenzweig Department of Mathematics

More information

Network mining for crime/fraud detection. FuturICT CrimEx January 26th, 2012 Jan Ramon

Network mining for crime/fraud detection. FuturICT CrimEx January 26th, 2012 Jan Ramon Network mining for crime/fraud detection FuturICT CrimEx January 26th, 2012 Jan Ramon Overview Administrative data and crime/fraud Data mining and related domains Data mining in large networks Opportunities

More information

Network Maps for End Users: Collect, Analyze, Visualize and Communicate Network Insights with Zero Coding

Network Maps for End Users: Collect, Analyze, Visualize and Communicate Network Insights with Zero Coding Network Maps for End Users: Collect, Analyze, Visualize and Communicate Network Insights with Zero Coding A project from the Social Media Research Founda8on: h:p://www.smrfounda8on.org About Me Introduc8ons

More information

Data Integration. Lectures 16 & 17. ECS289A, WQ03, Filkov

Data Integration. Lectures 16 & 17. ECS289A, WQ03, Filkov Data Integration Lectures 16 & 17 Lectures Outline Goals for Data Integration Homogeneous data integration time series data (Filkov et al. 2002) Heterogeneous data integration microarray + sequence microarray

More information

MINFS544: Business Network Data Analytics and Applications

MINFS544: Business Network Data Analytics and Applications MINFS544: Business Network Data Analytics and Applications March 30 th, 2015 Daning Hu, Ph.D., Department of Informatics University of Zurich F Schweitzer et al. Science 2009 Stop Contagious Failures in

More information

Using Library Dependencies for Clustering

Using Library Dependencies for Clustering Using Library Dependencies for Clustering Jochen Quante Software Engineering Group, FB03 Informatik, Universität Bremen quante@informatik.uni-bremen.de Abstract: Software clustering is an established approach

More information

PSN: Portfolio Social Network

PSN: Portfolio Social Network PSN: Portfolio Social Network Jordi M. Cortes, Sarwat Nizamani and Nasrullah Memon Abstract In this paper we present a web-based information system which is a portfolio social network (PSN) that provides

More information

Mining Metrics to Predict Component Failures

Mining Metrics to Predict Component Failures Mining Metrics to Predict Component Failures Nachiappan Nagappan, Microsoft Research Thomas Ball, Microsoft Research Andreas Zeller, Saarland University Overview Introduction Hypothesis and high level

More information

A discussion of Statistical Mechanics of Complex Networks P. Part I

A discussion of Statistical Mechanics of Complex Networks P. Part I A discussion of Statistical Mechanics of Complex Networks Part I Review of Modern Physics, Vol. 74, 2002 Small Word Networks Clustering Coefficient Scale-Free Networks Erdös-Rényi model cover only parts

More information

Graph theoretic approach to analyze amino acid network

Graph theoretic approach to analyze amino acid network Int. J. Adv. Appl. Math. and Mech. 2(3) (2015) 31-37 (ISSN: 2347-2529) Journal homepage: www.ijaamm.com International Journal of Advances in Applied Mathematics and Mechanics Graph theoretic approach to

More information

Automated Social Network Analysis for Collaborative Work 1

Automated Social Network Analysis for Collaborative Work 1 Automated Social Network Analysis for Collaborative Work 1 Larry Korba, Ronggong Song, George Yee, Andrew Patrick Institute for Information Technology, National Research Council of Canada Building M-50,

More information

SOCIAL NETWORK ANALYSIS. ANZEA conference 2012 Jenny Long

SOCIAL NETWORK ANALYSIS. ANZEA conference 2012 Jenny Long SOCIAL NETWORK ANALYSIS ANZEA conference 2012 Jenny Long BACKGROUND: BEHAVIOUR CONTAGION / DIFFUSION OF INNOVATION Other examples: information, innovation, collaboration, communication, resource sharing

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

Jung Typology Profiler for Workplace Assessment User Handbook

Jung Typology Profiler for Workplace Assessment User Handbook Jung Typology Profiler for Workplace Assessment User Handbook Includes the material for the JTPW Certified Assessment Practitioner certification syllabus Humanmetrics Certified JTPW Assessment Practitioner

More information

Social Network Analysis and Simulation of the Development of Adversarial Networks

Social Network Analysis and Simulation of the Development of Adversarial Networks Social Network Analysis and Simulation of the Development of Adversarial Networks Razvan Orendovici, Computer Science and Engineering Frank E. Ritter, College of IST Pennsylvania State University University

More information

TeCReVis: A Tool for Test Coverage and Test Redundancy Visualization

TeCReVis: A Tool for Test Coverage and Test Redundancy Visualization TeCReVis: A Tool for Test Coverage and Test Redundancy Visualization Negar Koochakzadeh Vahid Garousi Software Quality Engineering Research Group University of Calgary, Canada Acknowledging funding and

More information

Performance Testing Challenges

Performance Testing Challenges Performance Testing Challenges First Presented for: Florida Institute of Technology Computer Science Seminar Scott Barber Chief Technology Officer PerfTestPlus, Inc. Performance Testing Challenges Page

More information

Extend Table Lens for High-Dimensional Data Visualization and Classification Mining

Extend Table Lens for High-Dimensional Data Visualization and Classification Mining Extend Table Lens for High-Dimensional Data Visualization and Classification Mining CPSC 533c, Information Visualization Course Project, Term 2 2003 Fengdong Du fdu@cs.ubc.ca University of British Columbia

More information

Project Management System Services

Project Management System Services Project Management System Services Today's projects need to deal with increasing amounts of information that require better tools to help navigate through all the data produced by projects. Our services

More information

ALBERTA. Social Network Analysis for the Assessment of Learning UNIVERSITY OF. Osmar R. Zaïane Professor & Scientific Director of AICML

ALBERTA. Social Network Analysis for the Assessment of Learning UNIVERSITY OF. Osmar R. Zaïane Professor & Scientific Director of AICML UNIVERSITY OF ALBERTA Social Network Analysis for the Assessment of Learning Osmar R. Zaïane Professor & Scientific Director of AICML Educational Data Mining 2010 Pittsburgh, USA University of Alberta

More information

Social Data Science for Intelligent Cities

Social Data Science for Intelligent Cities Social Data Science for Intelligent Cities The Role of Social Media for Sensing Crowds Prof.dr.ir. Geert-Jan Houben TU Delft Web Information Systems & Delft Data Science WIS - Web Information Systems Why

More information

An Integrated-Method to Analyze Online Asynchronous Discussion

An Integrated-Method to Analyze Online Asynchronous Discussion An Integrated-Method to Analyze Online Asynchronous Discussion Erlin Faculty of Computer Science and Information System Universiti Teknologi Malaysia 8110, Skudai-Malaysia erlin_by@yahoo.com Norazah Yusof

More information

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one

More information

1. University General Education Requirements. (a) University Required Courses 15. (b) University Elective Courses 9

1. University General Education Requirements. (a) University Required Courses 15. (b) University Elective Courses 9 Degree Requirements The Bachelor Of Educational Technology requires students to successfully complete 120 credit hours: University Required Courses (24 credit hours), College Required Courses (27 credit

More information

Self-adaptive e-learning Website for Mathematics

Self-adaptive e-learning Website for Mathematics Self-adaptive e-learning Website for Mathematics Akira Nakamura Abstract Keyword searching and browsing on learning website is ultimate self-adaptive learning. Our e-learning website KIT Mathematics Navigation

More information

CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma

CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are

More information

Embodied decision making with animations

Embodied decision making with animations Embodied decision making with animations S. Maggi and S. I. Fabrikant University of Zurich, Department of Geography, Winterthurerstr. 19, CH 857 Zurich, Switzerland. Email: {sara.maggi, sara.fabrikant}@geo.uzh.ch

More information

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2 On the Traffic Capacity of Cellular Data Networks T. Bonald 1,2, A. Proutière 1,2 1 France Telecom Division R&D, 38-40 rue du Général Leclerc, 92794 Issy-les-Moulineaux, France {thomas.bonald, alexandre.proutiere}@francetelecom.com

More information

INTERNATIONAL RELATIONS PROGRAM EXIT INTERVIEW: ANALYSIS OF STUDENT RESPONSES. By: Meghan I. Gottowski and Conor N. Rowell

INTERNATIONAL RELATIONS PROGRAM EXIT INTERVIEW: ANALYSIS OF STUDENT RESPONSES. By: Meghan I. Gottowski and Conor N. Rowell INTERNATIONAL RELATIONS PROGRAM EXIT INTERVIEW: ANALYSIS OF STUDENT RESPONSES By: Meghan I. Gottowski and Conor N. Rowell Supervised by Dr. Diane E. Schmidt, California State University, Chico July 12,

More information

Grid Density Clustering Algorithm

Grid Density Clustering Algorithm Grid Density Clustering Algorithm Amandeep Kaur Mann 1, Navneet Kaur 2, Scholar, M.Tech (CSE), RIMT, Mandi Gobindgarh, Punjab, India 1 Assistant Professor (CSE), RIMT, Mandi Gobindgarh, Punjab, India 2

More information

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu

More information

DIGITS CENTER FOR DIGITAL INNOVATION, TECHNOLOGY, AND STRATEGY THOUGHT LEADERSHIP FOR THE DIGITAL AGE

DIGITS CENTER FOR DIGITAL INNOVATION, TECHNOLOGY, AND STRATEGY THOUGHT LEADERSHIP FOR THE DIGITAL AGE DIGITS CENTER FOR DIGITAL INNOVATION, TECHNOLOGY, AND STRATEGY THOUGHT LEADERSHIP FOR THE DIGITAL AGE INTRODUCTION RESEARCH IN PRACTICE PAPER SERIES, FALL 2011. BUSINESS INTELLIGENCE AND PREDICTIVE ANALYTICS

More information

Crowd sourced Financial Support: Kiva lender networks

Crowd sourced Financial Support: Kiva lender networks Crowd sourced Financial Support: Kiva lender networks Gaurav Paruthi, Youyang Hou, Carrie Xu Table of Content: Introduction Method Findings Discussion Diversity and Competition Information diffusion Future

More information

GOAL 3: Building World Class Academic Programs and Research Capacity

GOAL 3: Building World Class Academic Programs and Research Capacity GOAL 3: Building World Class Academic Programs and Research Capacity Objective 4: Attract and retain highly qualified graduate teaching and research assistants by creating new graduate assistant positions

More information

Information Management course

Information Management course Università degli Studi di Milano Master Degree in Computer Science Information Management course Teacher: Alberto Ceselli Lecture 01 : 06/10/2015 Practical informations: Teacher: Alberto Ceselli (alberto.ceselli@unimi.it)

More information

Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, 2010. Chapter 7: Digraphs

Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, 2010. Chapter 7: Digraphs MCS-236: Graph Theory Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, 2010 Chapter 7: Digraphs Strong Digraphs Definitions. A digraph is an ordered pair (V, E), where V is the set

More information

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of

More information