Graph theory and network analysis. Devika Subramanian Comp 140 Fall 2008

Similar documents
V. Adamchik 1. Graph Theory. Victor Adamchik. Fall of 2005

IE 680 Special Topics in Production Systems: Networks, Routing and Logistics*

Social Media Mining. Graph Essentials

Euler, Mei-Ko Kwan, Königsberg, and a Chinese Postman

Euler Paths and Euler Circuits

Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs

Complex Networks Analysis: Clustering Methods

Graph Theory Origin and Seven Bridges of Königsberg -Rhishikesh

Simple Graphs Degrees, Isomorphism, Paths

Asking Hard Graph Questions. Paul Burkhardt. February 3, 2014

Course on Social Network Analysis Graphs and Networks

CMPSCI611: Approximating MAX-CUT Lecture 20

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis

136 CHAPTER 4. INDUCTION, GRAPHS AND TREES

Networks and Paths. The study of networks in mathematics began in the middle 1700 s with a famous puzzle called the Seven Bridges of Konigsburg.

Class One: Degree Sequences

Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, Chapter 7: Digraphs

Graph/Network Visualization

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks

Introduction to Networks and Business Intelligence

Network Analysis Basics and applications to online data

Extremal Wiener Index of Trees with All Degrees Odd

DATA ANALYSIS II. Matrix Algorithms

Sum of Degrees of Vertices Theorem

Graph Theory Lecture 3: Sum of Degrees Formulas, Planar Graphs, and Euler s Theorem Spring 2014 Morgan Schreffler Office: POT 902

Max Flow, Min Cut, and Matchings (Solution)

Social Network Mining

Graph Theory Problems and Solutions

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis. Contents. Introduction. Maarten van Steen. Version: April 28, 2014

General Network Analysis: Graph-theoretic. COMP572 Fall 2009

Systems and Algorithms for Big Data Analytics

Some questions... Graphs

Practical Graph Mining with R. 5. Link Analysis

Distributed Computing over Communication Networks: Maximal Independent Set

Introduction to Graph Theory

! E6893 Big Data Analytics Lecture 10:! Linked Big Data Graph Computing (II)

SCAN: A Structural Clustering Algorithm for Networks

Protein Protein Interaction Networks

Midterm Practice Problems

MEASURES OF VARIATION

Lecture Notes on GRAPH THEORY Tero Harju

3. Eulerian and Hamiltonian Graphs

USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS

Social Media Mining. Network Measures

NP-Completeness. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University

Random graphs with a given degree sequence

Types of Degrees in Bipolar Fuzzy Graphs

Chapter 6: Graph Theory

Network/Graph Theory. What is a Network? What is network theory? Graph-based representations. Friendship Network. What makes a problem graph-like?

THE PROBLEM WORMS (1) WORMS (2) THE PROBLEM OF WORM PROPAGATION/PREVENTION THE MINIMUM VERTEX COVER PROBLEM

How To Understand The Network Of A Network

Graph Theory: Penn State Math 485 Lecture Notes. Christopher Griffin

Chapter 1. Introduction

SPANNING CACTI FOR STRUCTURALLY CONTROLLABLE NETWORKS NGO THI TU ANH NATIONAL UNIVERSITY OF SINGAPORE

CSV886: Social, Economics and Business Networks. Lecture 2: Affiliation and Balance. R Ravi ravi+iitd@andrew.cmu.edu

Network Analysis. BCH 5101: Analysis of -Omics Data 1/34

NodeXL for Network analysis Demo/hands-on at NICAR 2012, St Louis, Feb 24. Peter Aldhous, San Francisco Bureau Chief.

CIS 700: algorithms for Big Data

SOME APPLICATIONS OF EULERIAN GRAPHS

UPPER BOUNDS ON THE L(2, 1)-LABELING NUMBER OF GRAPHS WITH MAXIMUM DEGREE

Million Dollar Mathematics!

Topological Properties

Degree Hypergroupoids Associated with Hypergraphs

Why? A central concept in Computer Science. Algorithms are ubiquitous.

Chinese postman problem

Network (Tree) Topology Inference Based on Prüfer Sequence

Big Graph Processing: Some Background

Data Structure [Question Bank]

1. Nondeterministically guess a solution (called a certificate) 2. Check whether the solution solves the problem (called verification)

Graph theoretic approach to analyze amino acid network

Priority Based Enhancement of Online Power-Aware Routing in Wireless Sensor Network. Ronit Nossenson Jerusalem College of Technology

Graph Processing and Social Networks

Graph Theory Techniques in Model-Based Testing

Arrangements And Duality

Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations

On Integer Additive Set-Indexers of Graphs

Analysis of Algorithms, I

A Sublinear Bipartiteness Tester for Bounded Degree Graphs

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)

Zachary Monaco Georgia College Olympic Coloring: Go For The Gold

Disjoint Compatible Geometric Matchings

Follow links Class Use and other Permissions. For more information, send to:

Efficient Identification of Starters and Followers in Social Media

Graph Mining and Social Network Analysis

Foundations of Operations Research

Brian Hayes. A reprint from. American Scientist. the magazine of Sigma Xi, the Scientific Research Society

DATA ANALYSIS IN PUBLIC SOCIAL NETWORKS

Social Network Analysis

KEYWORD SEARCH OVER PROBABILISTIC RDF GRAPHS

Tracers Placement for IP Traceback against DDoS Attacks

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS

A permutation can also be represented by describing its cycles. What do you suppose is meant by this?

Finding and counting given length cycles

High-dimensional labeled data analysis with Gabriel graphs

Using Sage to Model, Analyze, and Dismember Terror Groups. In dismembering a Terrorist network in which many people may be involved it is

Polytope Examples (PolyComp Fukuda) Matching Polytope 1

An Empirical Study of Two MIS Algorithms

Big Data Analytics. Lucas Rego Drumond

Healthcare Analytics. Aryya Gangopadhyay UMBC

Transcription:

Graph theory and network analysis Devika Subramanian Comp 140 Fall 2008 1

The bridges of Konigsburg Source: Wikipedia The city of Königsberg in Prussia was set on both sides of the Pregel River, and included two large islands which were connected to each other and the mainland by seven bridges. Leonard Euler posed the following problem: can we find a walk through the city that crosses each bridge once and only once, and begins and ends at the same point? Rules: The islands cannot be reached by any route other than the bridges, and every bridge must have been crossed completely every time (one cannot walk halfway onto the bridge and then turn around to come at it from another side). 2

A schematic of the seven bridges problem C b1 b2 b3 b7 A B b4 b5 b6 D 3

First paper on graph theory Leonard Euler presented a solution to the St. Petersburg Academy on August 26, 1735 Solutio problematis ad geometriam situs pertinentis (The solution of a problem relating to the geometry of position), Commentarii academiae scientiarum Petropolitanae, 1741. 4

Abstract representation A b1 b4 b2 b5 C b7 D b3 b6 B 1. Only land masses and the bridges connecting them matter! 2. Shapes of land masses and lengths of bridges are not relevant. Relative distances between land masses also not relevant. 3. Topological connectivity is the only relevant aspect for solving the problem. 4. The structure shown alongside makes only the relevant factors of the problem explicit. 5

Euler s insight When one enters a land mass (that is not the start or the end of the tour) by a bridge, one leaves it by a bridge. If each bridge is to be traversed exactly once, then each land mass that is not the start or the end, needs to have an even number of bridges touching it. Land mass A has five bridges touching it, land masses B, C and D each have three bridges touching them. So a tour that starts and ends on any of these land masses and which crosses each bridge exactly once is not possible. 6

Elements of graph theory b1 b2 C b3 Land masses are vertices. Bridges are edges. The problem is represented as an undirected multi-graph. A b7 B The degree of a vertex is the number of edges on it. b4 b5 D b6 all vertexes in this problem have odd degree. Euler s insight: An Eulerian tour in a connected graph is possible only if all vertexes in it have even degree. 7

Some definitions A graph G is a pair of sets V and E V is a non-empty set of vertices E is a set of pairs of vertices V = {A,B,C,D,E,F} G={V,E} A B C E={{A,B},{A,D},{B,C},{B,E}, {C,D},{C,E},{E,F}} E F D 8

Subgraphs Deleting some vertices or edges from a graph leaves a subgraph. Formally, G =(V,E ) is a subgraph of G = (V,E) if V is a non-empty subset of V E is a subset of E 9

A computer scientist reads the paper A 1994 University of Chicago entitled The Social Organization of Sexuality found that on average men have 74% more opposite-gender partners than women. 10

Mapping to graph theory Men Women 11

Analysis Every edge in this graph connects an M vertex to a W vertex. So the sum of the degrees of the M vertices must equal the sum of the degrees of the W vertices. x M deg(x) = yinw deg(y) 12

Analysis contd. x M deg(x) M 1. W = y W deg(y) W 1. M Avg. deg in M Avg. deg in W = W M Avg. deg in M = W.Avg. deg in W M 13

Analysis contd. Census Bureau reports W / M is about 1.035. Therefore, on average men have 3.5% more opposite-gender partners. The University of Chicago study has problematic data. The average number of opposite-gender partners is completely determined by W / M. 14

Graph variations Multigraph: more than one edge between a pair of vertices. Directed graph: edges have direction. the edges of a directed graph are ordered pairs of vertices. indegree of a vertex is the number of edges directed into a vertex. outdegree of a vertex is the number of edges directed out of a vertex. 15

Problems that map to graphs Social networks: nodes are people, edges represent the is-friends-with relation. Terrorist networks: nodes are terrorist groups/individuals, edges are participatedin-an-incident-with Conflict networks: nodes are countries, edges are cooperate-with or conflict-with 16

2 weeks prior to Desert Storm 17

The SHSU database A human curated database of global terrorist incidents from 1/22/1990 to 12/31/2007 31,199 incidents 1257 groups Very detailed information on incidents (e.g. weapons used, fatalities, etc) and some information on the groups. (c) Devika Subramanian 2008 18

Pre-Bali network Palestine groups Kashmir groups Columbia Al Qaeda US terror groups (KKK etc) Irish groups Philippines, Indonesian groups Hamas (c) Devika Subramanian 2008 19

Post Bali network Bangladesh Al Qaeda All the rest are fragments of networks from previous slide US environmental Terror groups Splintering of the terror network into smaller, more decentralized pieces (c) Devika Subramanian 2008 20

More problems The web: each vertex is a page, directed edges between vertices represent hyperlinks Algorithm to compute hubs and authorities to determine page rank in Google Modeling the spread of infection in a community: vertices are people, and edges represent contact between them. Routing messages on the Internet: vertices are end hosts and routers, edges denote vertices that are directly linked. 21