SlideShare ist ein Scribd-Unternehmen logo
1 von 56
Downloaden Sie, um offline zu lesen
by Sébastien Heymann
seb@linkurio.us
Kick-start Graph
Visualization Projects.
...with software.
Co-founder of the Gephi project - 2008
Co-founder of the Linkurious startup - 2013
PhD in computer science, UPMC LIP6 - 2013
A few words about me
I democratise graph thinking
(with pink titles)
makes graphs handy
Open source project started in 2008
Built to solve large graph visualization problems
Latest version downloaded ~ 400,000 times
http://gephi.org
A few words about me / Gephi
makes graphs handy
A few words about me / Gephi
A few words about me / Linkurious
Started by a collaboration with Stanford - Mapping the
Republic of Letters and DensityDesign in 2012.
Now French startup of 3 people.
Linkurious helps companies make sense of data with user-
friendly visualization software.
We help business analysts, R&D teams, developers and
scientists.
A few words about me / Linkurious
Beautiful but
unreadable
pictures?
Let’s make graph visualization
useful.
0. Why?
1. Key takeaways
a. The 5 questions
b. User stories
c. Design visualization + interaction
2. Fraud detection use case
3. Q&A
How to create and use graph visualization successfully?
Agenda
PRACTICE
PRACTICE
0. Why graph
visualization?
Huh...
What is a graph?
This is a graph.
Father Of
Father Of
Siblings
What is a graph? / Nodes & relationships
A graph is a set of nodes
linked by relationships.
Father Of
Father Of
Siblings
This is a node
This is a
relationship
People, objects, movies,
restaurants, music...
Antennas, servers, phones,
people...
Supplier, roads, warehouses,
products...
Graphs can be used
to model many domains.
Supply chains Social networks Communications
Differents domains where graphs are important
Graph visualization
can help you in many
ways.
Do you have a graph project?
“The greatest
value of a picture
is when it forces
us to notice what
we never
expected to see.”
Why?
John Tukey
(1962)
How to create and use graph visualization successfully?
1. Key takeaways
to kick-start your
projects.
a. Ask 5 questions.
b. Write user stories.
c. Design visualization and
interaction.
Ask 5 questions / Q1: Data, tadaa?
You need data.
sourcing - cleaning - update
sensemaking - scale - complexity
Ask 5 questions / Q1: Data, tadaa?
Can you model data as graphs?
image: Martin Grandjean
Hypothesis discovery,
evidence finding
Impact analysis, reportingData modelling, database
administration
Set up your goal.
Administrate Understand Monitor
Ask 5 questions / Q2: Why using graph visualization in your project?
images: XKCD & the web
Ask 5 questions / Q3: Who will use it?
Define personas.
data scientist business analyst
developer public audience
images: PhdComics & Despicable Me
Short-term memory
max 7 items otherwise the ability to make
decisions drops
Vision
more than 10 000 nodes is generally useless
Ask 5 questions / Q4: What are the constraints?
Acknowledge human limits.
50 nodes – 1B nodes Graph size
Machine performances
Server side VS client side rendering
Interactive VS print
Ask 5 questions / Q4: What are the constraints?
Acknowledge technical limits.
individual use VS collaborative work
artwork VS integrated into an application
Ask 5 questions / Q5: How is it used?
Define scope.
1. What are the data?
2. What is your goal?
3. Who is your end-user?
4. What are the constraints?
5. How is it used?
Ask 5 questions / Summary
The 5 questions
Ask 5 questions / Your turn!
Answer the 5
questions of
your project.
PRACTICE
How to create and use graph visualization successfully?
1. Key takeaways
to kick-start your
projects.
a. Ask 5 questions.
b. Write user stories.
c. Design visualization and
interaction.
I define a data model.
I generate a significant graph sample.
I create a business query with Cypher.
I visualize the query result.
I iterate on the data model until it is satisfying.
Write user story / The developer story
“I am creating a Neo4j graph
database for my application.”
Write user story / Your turn!
Write your
own user story.
PRACTICE
How to create and use graph visualization successfully?
1. Key takeaways
to kick-start your
projects.
a. Ask 5 questions.
b. Write user stories.
c. Design visualization and
interaction.
Graph visualization in practice
Design visualization
How to represent
graphs?
(a) Nodes are ordered as rows and columns; connections are indicated as filled cells.
(b) A matrix representation of a typical biological pathway. in (Gehlenborg 2012)
Design visualization / Common graph representations
Matrices
(a) A directed graph typical of a biological pathway. (b) An undirected graph with
nodes arranged in a circle. (c) A spring-embedded layout of data from b. in
(Gehlenborg 2012)
Design visualization / Common graph representations
Node-link diagrams
Design visualization
Let’s choose node-
link diagrams
because it’s more
common.
Design visualization
Map data to visual variables.
proximity hierarchy group
Expand
Search
Design interaction
Add interactivity
Details on demand
Filter
Design visualization and interaction / Graph Viz 101
Learn more at
http://linkurio.us/graph-viz-101
How to create and use graph visualization successfully?
1. Key takeaways
to kick-start your
projects.
a. Ask 5 questions.
b. Write user stories.
c. Design visualization and
interaction.
Use case
2. Bank loan
fraud detection
use case.
Use case / The cost of fraud
$28.6B
AITE Group estimates that first party
fraud will cost $28.6 billion in credit
card losses a year by 2016.
http://news.alaric.com/industry-news/fraud/a-new-approach-to-first-party-fraud-reducing-bad-debt/
http://bankinganalyticsblog.fico.com/2013/02/first-party-fraud-it-was-me.html
A criminal uses the fake
identity to register a bank
account. He acts like a
normal customer and tries to
secure a loan.
Once the criminal feels he
cannot get access to more
money he carefully prepares
his exit : in a short amount of
time he empties all of his
accounts and disappears.
A criminal or a group of
criminal mix pieces of
information (addresses,
phone numbers, social
security number) to create a
“synthetic-identity”.
A look at a common fraud
scenario banks face.
Create a fake
identity
Go to the bank,
ask for a loan
Disappear with
the money
Use case / A common fraud scenario
Use case / How do we set up a graph-based fraud detection system?
Let’s ask our 5 questions.
1. What are the data?
2. What is your goal?
3. Who is your end-user?
4. What are the constraints?
5. How is it used?
Use case / Q1: What are the data?
We model customer data as a graph.
Loan
$25k
Home address
58, Eisenhower Square
Customer name
J. Smith
Phone number
+33 5 68 98 25 74
Credit card
1 234$
ID
J. Smith
A graph showing a legitimate customer and the information she is linked to.
Use case / Q1: What are the data?
In a fraud ring people share the same
information.
58, Eisenhower Square
14, Roses Street
+33 6 75 89 22 14
$7k
P. Martin
$12,5k
+331 42 58 66 00
J. Smith
SSN 17873897893
31195855
$20k
E. Selmati
SSN 1787576553
$45k
P. Smith
SSN 1787579953
SSN 1267576553
31184274
Use case / Q2: What is your goal?
We want to detect
fake customer
identities.
She is a fraud expert but has limited
data and computer skills.
She works with a team of data
analysts for a large bank.
When an alert is triggered, she
checks if the customer account
belongs to a potential fraud ring.
Use case / Q3: Who is your end-user?
Our user is a fraud analyst.
image: PhdComics
Thousands of new loans per month.
Time: a few days
Investigate before transferring more money.
Interaction
Detect fraud rings by exploring the graph
gradually.
Use case / Q4: What are the constraints?
We have a large graph on a
single database.
Use case / Q5: How it is used?
The visualization is embedded
in a business process.
Lifecycle events trigger
security checks
A new customer opens
an account
An existing customer asks
for a loan
A customer skips a loan
payment
A Neo4j Cypher query
runs to detect patterns
An analyst visualizes the
connections to make an
informed decision.
Use case / The user story
The fraud teams acts faster
and more fraud cases can be
avoided.
If something suspicious comes up, the analysts can
use Linkurious to quickly assess the situation.
Linkurious allows the fraud
teams to go deep in the data
and build cases against fraud
rings.
Treat false
positives
Investigate
serious cases
Save money
Linkurious allows you to
control the alerts and make
sure your customers are not
treated like criminals.
Max 200 nodes visualized
Relationships information is important
Multiple node categories (address, phone, ..)
-> node-link diagram
-> icons or node colors by category
Interactivity : yes
Display node and rels information on demand
Expand node connections on demand
Use case / Visualization and interaction design
Design
Use case
Proof-of-concept
demo with
Linkurious.
Conclusion
Graph visualization
can add a great
value to your project,
learn to leverage it.
Contact us to
discuss your
projects:
contact@linkurio.us
Case studies: http://linkurio.us/blog
Follow @linkurious #GraphViz101
Q&A
3. Q&A
Detailed use case on our blog :
● Part 1 : http://linkurio.us/how-to-detect-bank-loan-fraud-with-graphs-part-1/
● Part 2 : http://linkurio.us/how-to-detect-bank-loan-fraud-with-graphs-part-2/
● Neo4j data set : https://www.dropbox.com/s/wk8k5r23syp6kbx/fraud%20detection.zip
GraphGist by Kenny Bastani : http://gist.neo4j.org/?github-neo4j-contrib%2Fgists%2F%2Fother%
2FBankFraudDetection.adoc
Video demonstration : https://vimeo.com/76891393 (around the 12 minutes mark)
Graph Visualization 101: http://linkurio.us/graph-viz-101/
Resources
Resources
Research papers
Visual Analysis of Complex Networks for Business Intelligence with Gephi. Sébastien Heymann and Bénédicte Le
Grand. to appear in the Proceedings of the 1st International Symposium on Visualisation and Business Intelligence, in
conjunction with the 17th International Conference Information Visualisation (IV 2013 - VBI).
Gephi: an open source software for exploring and manipulating networks. Mathieu Bastian, Sébastien Heymann and
Mathieu Jacomy. in Proceedings of the Third International AAAI Conference on Weblogs and Social Media
(ICWSM'09), in American Journal of Sociology (2009), pp.361-362
Points of View: Bar Charts and Box Plots. M Streit and N Gehlenborg. Nature Methods 11(2):117 (2014).
Book chapters
Exploratory Network Analysis: Visualization and Interaction. Sébastien Heymann and Bénédicte Le Grand. to appear in
Hocine Cherifi (editor), Complex Networks and their Applications, Cambridge University Press.
Gephi. Sébastien Heymann. to appear in the Encyclopedia of Social Networks and Mining (ESNAM), Springer.
Books
Exploratory data analysis. Tukey, J. W. (1977).
References
References
Linkurious technology
Cloud ready and open source based.

Más contenido relacionado

Was ist angesagt?

Graph-based intelligence analysis
Graph-based intelligence analysis Graph-based intelligence analysis
Graph-based intelligence analysis Linkurious
 
Graphs and innovative graph solutions for financial services
Graphs and innovative graph solutions for financial servicesGraphs and innovative graph solutions for financial services
Graphs and innovative graph solutions for financial servicesNeo4j
 
Neo4j Graph Data Platform: Making Your Data More Intelligent
Neo4j Graph Data Platform: Making Your Data More IntelligentNeo4j Graph Data Platform: Making Your Data More Intelligent
Neo4j Graph Data Platform: Making Your Data More IntelligentNeo4j
 
Detecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousDetecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousNeo4j
 
The Future is Big Graphs: A Community View on Graph Processing Systems
The Future is Big Graphs: A Community View on Graph Processing SystemsThe Future is Big Graphs: A Community View on Graph Processing Systems
The Future is Big Graphs: A Community View on Graph Processing SystemsNeo4j
 
E psi open data - rejseplanen
E psi   open data - rejseplanenE psi   open data - rejseplanen
E psi open data - rejseplanenePSI Platform
 
One does not simply crowdsource the Semantic Web: 10 years with people, URIs,...
One does not simply crowdsource the Semantic Web: 10 years with people, URIs,...One does not simply crowdsource the Semantic Web: 10 years with people, URIs,...
One does not simply crowdsource the Semantic Web: 10 years with people, URIs,...Elena Simperl
 
Hacked: Threats, Trends and the Power of Connected Data
Hacked: Threats, Trends and the Power of Connected DataHacked: Threats, Trends and the Power of Connected Data
Hacked: Threats, Trends and the Power of Connected DataNeo4j
 
Big Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network ApproachBig Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network ApproachAndry Alamsyah
 
Startds9.19.17sd
Startds9.19.17sdStartds9.19.17sd
Startds9.19.17sdThinkful
 
The human face of AI: how collective and augmented intelligence can help sol...
The human face of AI:  how collective and augmented intelligence can help sol...The human face of AI:  how collective and augmented intelligence can help sol...
The human face of AI: how collective and augmented intelligence can help sol...Elena Simperl
 
High-value datasets: from publication to impact
High-value datasets: from publication to impactHigh-value datasets: from publication to impact
High-value datasets: from publication to impactElena Simperl
 
Data mining in social network
Data mining in social networkData mining in social network
Data mining in social networkakash_mishra
 
Data-centric design and the knowledge graph
Data-centric design and the knowledge graphData-centric design and the knowledge graph
Data-centric design and the knowledge graphAlan Morrison
 
What is data-driven government for public safety?
What is data-driven government for public safety?What is data-driven government for public safety?
What is data-driven government for public safety?IBM Analytics
 
Operationalize Your Linked Data
Operationalize Your Linked DataOperationalize Your Linked Data
Operationalize Your Linked DataMatt Turner
 
Graph Intelligence: The Essentials for Cybersecurity
Graph Intelligence: The Essentials for CybersecurityGraph Intelligence: The Essentials for Cybersecurity
Graph Intelligence: The Essentials for CybersecurityNeo4j
 

Was ist angesagt? (20)

Graph-based intelligence analysis
Graph-based intelligence analysis Graph-based intelligence analysis
Graph-based intelligence analysis
 
Graphs and innovative graph solutions for financial services
Graphs and innovative graph solutions for financial servicesGraphs and innovative graph solutions for financial services
Graphs and innovative graph solutions for financial services
 
Social network analysis
Social network analysisSocial network analysis
Social network analysis
 
Neo4j Graph Data Platform: Making Your Data More Intelligent
Neo4j Graph Data Platform: Making Your Data More IntelligentNeo4j Graph Data Platform: Making Your Data More Intelligent
Neo4j Graph Data Platform: Making Your Data More Intelligent
 
Detecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousDetecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and Linkurious
 
The Future is Big Graphs: A Community View on Graph Processing Systems
The Future is Big Graphs: A Community View on Graph Processing SystemsThe Future is Big Graphs: A Community View on Graph Processing Systems
The Future is Big Graphs: A Community View on Graph Processing Systems
 
E psi open data - rejseplanen
E psi   open data - rejseplanenE psi   open data - rejseplanen
E psi open data - rejseplanen
 
One does not simply crowdsource the Semantic Web: 10 years with people, URIs,...
One does not simply crowdsource the Semantic Web: 10 years with people, URIs,...One does not simply crowdsource the Semantic Web: 10 years with people, URIs,...
One does not simply crowdsource the Semantic Web: 10 years with people, URIs,...
 
Designing with data
Designing with dataDesigning with data
Designing with data
 
Hacked: Threats, Trends and the Power of Connected Data
Hacked: Threats, Trends and the Power of Connected DataHacked: Threats, Trends and the Power of Connected Data
Hacked: Threats, Trends and the Power of Connected Data
 
Big Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network ApproachBig Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network Approach
 
Startds9.19.17sd
Startds9.19.17sdStartds9.19.17sd
Startds9.19.17sd
 
The human face of AI: how collective and augmented intelligence can help sol...
The human face of AI:  how collective and augmented intelligence can help sol...The human face of AI:  how collective and augmented intelligence can help sol...
The human face of AI: how collective and augmented intelligence can help sol...
 
High-value datasets: from publication to impact
High-value datasets: from publication to impactHigh-value datasets: from publication to impact
High-value datasets: from publication to impact
 
Data mining in social network
Data mining in social networkData mining in social network
Data mining in social network
 
SMAC
SMACSMAC
SMAC
 
Data-centric design and the knowledge graph
Data-centric design and the knowledge graphData-centric design and the knowledge graph
Data-centric design and the knowledge graph
 
What is data-driven government for public safety?
What is data-driven government for public safety?What is data-driven government for public safety?
What is data-driven government for public safety?
 
Operationalize Your Linked Data
Operationalize Your Linked DataOperationalize Your Linked Data
Operationalize Your Linked Data
 
Graph Intelligence: The Essentials for Cybersecurity
Graph Intelligence: The Essentials for CybersecurityGraph Intelligence: The Essentials for Cybersecurity
Graph Intelligence: The Essentials for Cybersecurity
 

Andere mochten auch

Social Network Analysis in Two Parts
Social Network Analysis in Two PartsSocial Network Analysis in Two Parts
Social Network Analysis in Two PartsPatti Anklam
 
Mining Social Web APIs with IPython Notebook (PyCon 2014)
Mining Social Web APIs with IPython Notebook (PyCon 2014)Mining Social Web APIs with IPython Notebook (PyCon 2014)
Mining Social Web APIs with IPython Notebook (PyCon 2014)Matthew Russell
 
The Key Success Factor in Knowledge Management... What Else? Change Management
The Key Success Factor in Knowledge Management... What Else? Change ManagementThe Key Success Factor in Knowledge Management... What Else? Change Management
The Key Success Factor in Knowledge Management... What Else? Change ManagementPatti Anklam
 
Motivation in FLOSS communities
Motivation in FLOSS communitiesMotivation in FLOSS communities
Motivation in FLOSS communitiesSébastien
 
Monitoring User-System Interactions through Graph-Based Intrinsic Dynamics An...
Monitoring User-System Interactions through Graph-Based Intrinsic Dynamics An...Monitoring User-System Interactions through Graph-Based Intrinsic Dynamics An...
Monitoring User-System Interactions through Graph-Based Intrinsic Dynamics An...Sébastien
 
PhD Defense: Analyse exploratoire de flots de liens pour la détection d'événe...
PhD Defense: Analyse exploratoire de flots de liens pour la détection d'événe...PhD Defense: Analyse exploratoire de flots de liens pour la détection d'événe...
PhD Defense: Analyse exploratoire de flots de liens pour la détection d'événe...Sébastien
 
Outskewer: Using Skewness to Spot Outliers in Samples and Time Series
Outskewer: Using Skewness to Spot Outliers in Samples and Time SeriesOutskewer: Using Skewness to Spot Outliers in Samples and Time Series
Outskewer: Using Skewness to Spot Outliers in Samples and Time SeriesSébastien
 
Reversing the dropbox client on windows
Reversing the dropbox client on windowsReversing the dropbox client on windows
Reversing the dropbox client on windowsextremecoders
 
Euro python2011 High Performance Python
Euro python2011 High Performance PythonEuro python2011 High Performance Python
Euro python2011 High Performance PythonIan Ozsvald
 
Odessapy2013 - Graph databases and Python
Odessapy2013 - Graph databases and PythonOdessapy2013 - Graph databases and Python
Odessapy2013 - Graph databases and PythonMax Klymyshyn
 
Moocs virtual educa medellín_2013
Moocs virtual educa medellín_2013Moocs virtual educa medellín_2013
Moocs virtual educa medellín_2013Fernando Santamaría
 
Social Media Mining - Chapter 2 (Graph Essentials)
Social Media Mining - Chapter 2 (Graph Essentials)Social Media Mining - Chapter 2 (Graph Essentials)
Social Media Mining - Chapter 2 (Graph Essentials)SocialMediaMining
 
Beyond tf idf why, what & how
Beyond tf idf why, what & howBeyond tf idf why, what & how
Beyond tf idf why, what & howlucenerevolution
 
Inside the ANN: A visual and intuitive journey to understand how artificial n...
Inside the ANN: A visual and intuitive journey to understand how artificial n...Inside the ANN: A visual and intuitive journey to understand how artificial n...
Inside the ANN: A visual and intuitive journey to understand how artificial n...XavierArrufat
 
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...Xiaohan Zeng
 
Graph mining 2: Statistical approaches for graph mining
Graph mining 2: Statistical approaches for graph miningGraph mining 2: Statistical approaches for graph mining
Graph mining 2: Statistical approaches for graph miningtuxette
 
Mining the social graph
Mining the social graphMining the social graph
Mining the social graphshunya kimura
 
Operational Terms
Operational TermsOperational Terms
Operational TermsEddie Black
 

Andere mochten auch (20)

Social Network Analysis in Two Parts
Social Network Analysis in Two PartsSocial Network Analysis in Two Parts
Social Network Analysis in Two Parts
 
Mining Social Web APIs with IPython Notebook (PyCon 2014)
Mining Social Web APIs with IPython Notebook (PyCon 2014)Mining Social Web APIs with IPython Notebook (PyCon 2014)
Mining Social Web APIs with IPython Notebook (PyCon 2014)
 
The Key Success Factor in Knowledge Management... What Else? Change Management
The Key Success Factor in Knowledge Management... What Else? Change ManagementThe Key Success Factor in Knowledge Management... What Else? Change Management
The Key Success Factor in Knowledge Management... What Else? Change Management
 
Motivation in FLOSS communities
Motivation in FLOSS communitiesMotivation in FLOSS communities
Motivation in FLOSS communities
 
Monitoring User-System Interactions through Graph-Based Intrinsic Dynamics An...
Monitoring User-System Interactions through Graph-Based Intrinsic Dynamics An...Monitoring User-System Interactions through Graph-Based Intrinsic Dynamics An...
Monitoring User-System Interactions through Graph-Based Intrinsic Dynamics An...
 
PhD Defense: Analyse exploratoire de flots de liens pour la détection d'événe...
PhD Defense: Analyse exploratoire de flots de liens pour la détection d'événe...PhD Defense: Analyse exploratoire de flots de liens pour la détection d'événe...
PhD Defense: Analyse exploratoire de flots de liens pour la détection d'événe...
 
Outskewer: Using Skewness to Spot Outliers in Samples and Time Series
Outskewer: Using Skewness to Spot Outliers in Samples and Time SeriesOutskewer: Using Skewness to Spot Outliers in Samples and Time Series
Outskewer: Using Skewness to Spot Outliers in Samples and Time Series
 
Faster Python
Faster PythonFaster Python
Faster Python
 
Reversing the dropbox client on windows
Reversing the dropbox client on windowsReversing the dropbox client on windows
Reversing the dropbox client on windows
 
Euro python2011 High Performance Python
Euro python2011 High Performance PythonEuro python2011 High Performance Python
Euro python2011 High Performance Python
 
Graph mining
Graph miningGraph mining
Graph mining
 
Odessapy2013 - Graph databases and Python
Odessapy2013 - Graph databases and PythonOdessapy2013 - Graph databases and Python
Odessapy2013 - Graph databases and Python
 
Moocs virtual educa medellín_2013
Moocs virtual educa medellín_2013Moocs virtual educa medellín_2013
Moocs virtual educa medellín_2013
 
Social Media Mining - Chapter 2 (Graph Essentials)
Social Media Mining - Chapter 2 (Graph Essentials)Social Media Mining - Chapter 2 (Graph Essentials)
Social Media Mining - Chapter 2 (Graph Essentials)
 
Beyond tf idf why, what & how
Beyond tf idf why, what & howBeyond tf idf why, what & how
Beyond tf idf why, what & how
 
Inside the ANN: A visual and intuitive journey to understand how artificial n...
Inside the ANN: A visual and intuitive journey to understand how artificial n...Inside the ANN: A visual and intuitive journey to understand how artificial n...
Inside the ANN: A visual and intuitive journey to understand how artificial n...
 
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
 
Graph mining 2: Statistical approaches for graph mining
Graph mining 2: Statistical approaches for graph miningGraph mining 2: Statistical approaches for graph mining
Graph mining 2: Statistical approaches for graph mining
 
Mining the social graph
Mining the social graphMining the social graph
Mining the social graph
 
Operational Terms
Operational TermsOperational Terms
Operational Terms
 

Ähnlich wie Kick start graph visualization projects

The 8 most common graph visualization mistakes
The 8 most common graph visualization mistakesThe 8 most common graph visualization mistakes
The 8 most common graph visualization mistakesLinkurious
 
The 8 do’s and don’ts of graph visualisations.
The 8 do’s and don’ts of graph visualisations.The 8 do’s and don’ts of graph visualisations.
The 8 do’s and don’ts of graph visualisations.Connected Data World
 
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4jAI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4jIvan Zoratti
 
BigData Visualization and Usecase@TDGA-Stelligence-11july2019-share
BigData Visualization and Usecase@TDGA-Stelligence-11july2019-shareBigData Visualization and Usecase@TDGA-Stelligence-11july2019-share
BigData Visualization and Usecase@TDGA-Stelligence-11july2019-sharestelligence
 
Creating data visualisations that don't suck
Creating data visualisations that don't suckCreating data visualisations that don't suck
Creating data visualisations that don't suckMartin Colebourne
 
Using An Intervention Increases Or Decreases The Number Of...
Using An Intervention Increases Or Decreases The Number Of...Using An Intervention Increases Or Decreases The Number Of...
Using An Intervention Increases Or Decreases The Number Of...Miles Priar
 
ADV: Solving the data visualization dilemma
ADV: Solving the data visualization dilemmaADV: Solving the data visualization dilemma
ADV: Solving the data visualization dilemmaGrant Thornton LLP
 
Modeling Cybersecurity with Neo4j, Based on Real-Life Data Insights
Modeling Cybersecurity with Neo4j, Based on Real-Life Data InsightsModeling Cybersecurity with Neo4j, Based on Real-Life Data Insights
Modeling Cybersecurity with Neo4j, Based on Real-Life Data InsightsNeo4j
 
Data-Driven Design for User Experience
Data-Driven Design for User Experience Data-Driven Design for User Experience
Data-Driven Design for User Experience Emi Kwon
 
Techniques of Data Visualization for Data & Business Analytics
Techniques of Data Visualization for Data & Business AnalyticsTechniques of Data Visualization for Data & Business Analytics
Techniques of Data Visualization for Data & Business AnalyticsMercy Akinseinde
 
Varied encounters with data science (slide share)
Varied encounters with data science (slide share)Varied encounters with data science (slide share)
Varied encounters with data science (slide share)gilbert.peffer
 
How to Search, Explore and Visualize Neo4j with Linkurious - Jean Villedieu @...
How to Search, Explore and Visualize Neo4j with Linkurious - Jean Villedieu @...How to Search, Explore and Visualize Neo4j with Linkurious - Jean Villedieu @...
How to Search, Explore and Visualize Neo4j with Linkurious - Jean Villedieu @...Neo4j
 
Using graph technologies to fight fraud
Using graph technologies to fight fraudUsing graph technologies to fight fraud
Using graph technologies to fight fraudLinkurious
 
The Knowledge Graph Explosion
The Knowledge Graph ExplosionThe Knowledge Graph Explosion
The Knowledge Graph ExplosionNeo4j
 
Copyright © 2014 EMC Corporation. All rights reserved.Copy.docx
Copyright © 2014 EMC Corporation. All rights reserved.Copy.docxCopyright © 2014 EMC Corporation. All rights reserved.Copy.docx
Copyright © 2014 EMC Corporation. All rights reserved.Copy.docxdickonsondorris
 
Data Science Highlights
Data Science Highlights Data Science Highlights
Data Science Highlights Joe Lamantia
 
GraphConnect 2013 : How to search, explore and visualize Neo4j with Linkurious
GraphConnect 2013 : How to search, explore and visualize Neo4j with LinkuriousGraphConnect 2013 : How to search, explore and visualize Neo4j with Linkurious
GraphConnect 2013 : How to search, explore and visualize Neo4j with LinkuriousLinkurious
 
Are You Underestimating the Value Within Your Data? A conversation about grap...
Are You Underestimating the Value Within Your Data? A conversation about grap...Are You Underestimating the Value Within Your Data? A conversation about grap...
Are You Underestimating the Value Within Your Data? A conversation about grap...Neo4j
 

Ähnlich wie Kick start graph visualization projects (20)

The 8 most common graph visualization mistakes
The 8 most common graph visualization mistakesThe 8 most common graph visualization mistakes
The 8 most common graph visualization mistakes
 
The 8 do’s and don’ts of graph visualisations.
The 8 do’s and don’ts of graph visualisations.The 8 do’s and don’ts of graph visualisations.
The 8 do’s and don’ts of graph visualisations.
 
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4jAI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
 
BigData Visualization and Usecase@TDGA-Stelligence-11july2019-share
BigData Visualization and Usecase@TDGA-Stelligence-11july2019-shareBigData Visualization and Usecase@TDGA-Stelligence-11july2019-share
BigData Visualization and Usecase@TDGA-Stelligence-11july2019-share
 
Creating data visualisations that don't suck
Creating data visualisations that don't suckCreating data visualisations that don't suck
Creating data visualisations that don't suck
 
Using An Intervention Increases Or Decreases The Number Of...
Using An Intervention Increases Or Decreases The Number Of...Using An Intervention Increases Or Decreases The Number Of...
Using An Intervention Increases Or Decreases The Number Of...
 
Big Data
Big DataBig Data
Big Data
 
ADV: Solving the data visualization dilemma
ADV: Solving the data visualization dilemmaADV: Solving the data visualization dilemma
ADV: Solving the data visualization dilemma
 
Modeling Cybersecurity with Neo4j, Based on Real-Life Data Insights
Modeling Cybersecurity with Neo4j, Based on Real-Life Data InsightsModeling Cybersecurity with Neo4j, Based on Real-Life Data Insights
Modeling Cybersecurity with Neo4j, Based on Real-Life Data Insights
 
Data-Driven Design for User Experience
Data-Driven Design for User Experience Data-Driven Design for User Experience
Data-Driven Design for User Experience
 
Techniques of Data Visualization for Data & Business Analytics
Techniques of Data Visualization for Data & Business AnalyticsTechniques of Data Visualization for Data & Business Analytics
Techniques of Data Visualization for Data & Business Analytics
 
Syphens gale
Syphens gale Syphens gale
Syphens gale
 
Varied encounters with data science (slide share)
Varied encounters with data science (slide share)Varied encounters with data science (slide share)
Varied encounters with data science (slide share)
 
How to Search, Explore and Visualize Neo4j with Linkurious - Jean Villedieu @...
How to Search, Explore and Visualize Neo4j with Linkurious - Jean Villedieu @...How to Search, Explore and Visualize Neo4j with Linkurious - Jean Villedieu @...
How to Search, Explore and Visualize Neo4j with Linkurious - Jean Villedieu @...
 
Using graph technologies to fight fraud
Using graph technologies to fight fraudUsing graph technologies to fight fraud
Using graph technologies to fight fraud
 
The Knowledge Graph Explosion
The Knowledge Graph ExplosionThe Knowledge Graph Explosion
The Knowledge Graph Explosion
 
Copyright © 2014 EMC Corporation. All rights reserved.Copy.docx
Copyright © 2014 EMC Corporation. All rights reserved.Copy.docxCopyright © 2014 EMC Corporation. All rights reserved.Copy.docx
Copyright © 2014 EMC Corporation. All rights reserved.Copy.docx
 
Data Science Highlights
Data Science Highlights Data Science Highlights
Data Science Highlights
 
GraphConnect 2013 : How to search, explore and visualize Neo4j with Linkurious
GraphConnect 2013 : How to search, explore and visualize Neo4j with LinkuriousGraphConnect 2013 : How to search, explore and visualize Neo4j with Linkurious
GraphConnect 2013 : How to search, explore and visualize Neo4j with Linkurious
 
Are You Underestimating the Value Within Your Data? A conversation about grap...
Are You Underestimating the Value Within Your Data? A conversation about grap...Are You Underestimating the Value Within Your Data? A conversation about grap...
Are You Underestimating the Value Within Your Data? A conversation about grap...
 

Mehr von Linkurious

Webinar: What's new in Linkurious Enterprise 2.8
Webinar: What's new in Linkurious Enterprise 2.8Webinar: What's new in Linkurious Enterprise 2.8
Webinar: What's new in Linkurious Enterprise 2.8Linkurious
 
What's new in Linkurious Enterprise 2.7
What's new in Linkurious Enterprise 2.7What's new in Linkurious Enterprise 2.7
What's new in Linkurious Enterprise 2.7Linkurious
 
How to visualize Cosmos DB graph data
How to visualize Cosmos DB graph dataHow to visualize Cosmos DB graph data
How to visualize Cosmos DB graph dataLinkurious
 
GraphTech Ecosystem - part 3: Graph Visualization
GraphTech Ecosystem - part 3: Graph VisualizationGraphTech Ecosystem - part 3: Graph Visualization
GraphTech Ecosystem - part 3: Graph VisualizationLinkurious
 
Getting started with Cosmos DB + Linkurious Enterprise
Getting started with Cosmos DB + Linkurious EnterpriseGetting started with Cosmos DB + Linkurious Enterprise
Getting started with Cosmos DB + Linkurious EnterpriseLinkurious
 
GraphTech Ecosystem - part 2: Graph Analytics
 GraphTech Ecosystem - part 2: Graph Analytics GraphTech Ecosystem - part 2: Graph Analytics
GraphTech Ecosystem - part 2: Graph AnalyticsLinkurious
 
GraphTech Ecosystem - part 1: Graph Databases
GraphTech Ecosystem - part 1: Graph DatabasesGraphTech Ecosystem - part 1: Graph Databases
GraphTech Ecosystem - part 1: Graph DatabasesLinkurious
 
3 types of fraud graph analytics can help defeat
3 types of fraud graph analytics can help defeat3 types of fraud graph analytics can help defeat
3 types of fraud graph analytics can help defeatLinkurious
 
Graph analytics in Linkurious Enterprise
Graph analytics in Linkurious EnterpriseGraph analytics in Linkurious Enterprise
Graph analytics in Linkurious EnterpriseLinkurious
 
Visualize the Knowledge Graph and Unleash Your Data
Visualize the Knowledge Graph and Unleash Your DataVisualize the Knowledge Graph and Unleash Your Data
Visualize the Knowledge Graph and Unleash Your DataLinkurious
 
Graph-based Product Lifecycle Management
Graph-based Product Lifecycle ManagementGraph-based Product Lifecycle Management
Graph-based Product Lifecycle ManagementLinkurious
 
Fraudes Financières: Méthodes de Prévention et Détection
Fraudes Financières: Méthodes de Prévention et DétectionFraudes Financières: Méthodes de Prévention et Détection
Fraudes Financières: Méthodes de Prévention et DétectionLinkurious
 
Detecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousDetecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousLinkurious
 
Graph-based Network & IT Management.
Graph-based Network & IT Management.Graph-based Network & IT Management.
Graph-based Network & IT Management.Linkurious
 
Graph-powered data lineage in Finance
Graph-powered data lineage in FinanceGraph-powered data lineage in Finance
Graph-powered data lineage in FinanceLinkurious
 
Using Linkurious in your Enterprise Architecture projects
Using Linkurious in your Enterprise Architecture projectsUsing Linkurious in your Enterprise Architecture projects
Using Linkurious in your Enterprise Architecture projectsLinkurious
 
Linkurious SDK: Build enterprise-ready graph applications faster
Linkurious SDK: Build enterprise-ready graph applications fasterLinkurious SDK: Build enterprise-ready graph applications faster
Linkurious SDK: Build enterprise-ready graph applications fasterLinkurious
 
Reinforcing AML systems with graph technologies.
Reinforcing AML systems with graph technologies.Reinforcing AML systems with graph technologies.
Reinforcing AML systems with graph technologies.Linkurious
 
Using graphs technologies for intelligence analysis.
Using graphs technologies for intelligence analysis. Using graphs technologies for intelligence analysis.
Using graphs technologies for intelligence analysis. Linkurious
 
Panama papers: how ICIJ used Linkurious to investigate the Mossack Fonseca leaks
Panama papers: how ICIJ used Linkurious to investigate the Mossack Fonseca leaksPanama papers: how ICIJ used Linkurious to investigate the Mossack Fonseca leaks
Panama papers: how ICIJ used Linkurious to investigate the Mossack Fonseca leaksLinkurious
 

Mehr von Linkurious (20)

Webinar: What's new in Linkurious Enterprise 2.8
Webinar: What's new in Linkurious Enterprise 2.8Webinar: What's new in Linkurious Enterprise 2.8
Webinar: What's new in Linkurious Enterprise 2.8
 
What's new in Linkurious Enterprise 2.7
What's new in Linkurious Enterprise 2.7What's new in Linkurious Enterprise 2.7
What's new in Linkurious Enterprise 2.7
 
How to visualize Cosmos DB graph data
How to visualize Cosmos DB graph dataHow to visualize Cosmos DB graph data
How to visualize Cosmos DB graph data
 
GraphTech Ecosystem - part 3: Graph Visualization
GraphTech Ecosystem - part 3: Graph VisualizationGraphTech Ecosystem - part 3: Graph Visualization
GraphTech Ecosystem - part 3: Graph Visualization
 
Getting started with Cosmos DB + Linkurious Enterprise
Getting started with Cosmos DB + Linkurious EnterpriseGetting started with Cosmos DB + Linkurious Enterprise
Getting started with Cosmos DB + Linkurious Enterprise
 
GraphTech Ecosystem - part 2: Graph Analytics
 GraphTech Ecosystem - part 2: Graph Analytics GraphTech Ecosystem - part 2: Graph Analytics
GraphTech Ecosystem - part 2: Graph Analytics
 
GraphTech Ecosystem - part 1: Graph Databases
GraphTech Ecosystem - part 1: Graph DatabasesGraphTech Ecosystem - part 1: Graph Databases
GraphTech Ecosystem - part 1: Graph Databases
 
3 types of fraud graph analytics can help defeat
3 types of fraud graph analytics can help defeat3 types of fraud graph analytics can help defeat
3 types of fraud graph analytics can help defeat
 
Graph analytics in Linkurious Enterprise
Graph analytics in Linkurious EnterpriseGraph analytics in Linkurious Enterprise
Graph analytics in Linkurious Enterprise
 
Visualize the Knowledge Graph and Unleash Your Data
Visualize the Knowledge Graph and Unleash Your DataVisualize the Knowledge Graph and Unleash Your Data
Visualize the Knowledge Graph and Unleash Your Data
 
Graph-based Product Lifecycle Management
Graph-based Product Lifecycle ManagementGraph-based Product Lifecycle Management
Graph-based Product Lifecycle Management
 
Fraudes Financières: Méthodes de Prévention et Détection
Fraudes Financières: Méthodes de Prévention et DétectionFraudes Financières: Méthodes de Prévention et Détection
Fraudes Financières: Méthodes de Prévention et Détection
 
Detecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousDetecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and Linkurious
 
Graph-based Network & IT Management.
Graph-based Network & IT Management.Graph-based Network & IT Management.
Graph-based Network & IT Management.
 
Graph-powered data lineage in Finance
Graph-powered data lineage in FinanceGraph-powered data lineage in Finance
Graph-powered data lineage in Finance
 
Using Linkurious in your Enterprise Architecture projects
Using Linkurious in your Enterprise Architecture projectsUsing Linkurious in your Enterprise Architecture projects
Using Linkurious in your Enterprise Architecture projects
 
Linkurious SDK: Build enterprise-ready graph applications faster
Linkurious SDK: Build enterprise-ready graph applications fasterLinkurious SDK: Build enterprise-ready graph applications faster
Linkurious SDK: Build enterprise-ready graph applications faster
 
Reinforcing AML systems with graph technologies.
Reinforcing AML systems with graph technologies.Reinforcing AML systems with graph technologies.
Reinforcing AML systems with graph technologies.
 
Using graphs technologies for intelligence analysis.
Using graphs technologies for intelligence analysis. Using graphs technologies for intelligence analysis.
Using graphs technologies for intelligence analysis.
 
Panama papers: how ICIJ used Linkurious to investigate the Mossack Fonseca leaks
Panama papers: how ICIJ used Linkurious to investigate the Mossack Fonseca leaksPanama papers: how ICIJ used Linkurious to investigate the Mossack Fonseca leaks
Panama papers: how ICIJ used Linkurious to investigate the Mossack Fonseca leaks
 

Último

Deloitte+RedCross_Talk to your data with Knowledge-enriched Generative AI.ppt...
Deloitte+RedCross_Talk to your data with Knowledge-enriched Generative AI.ppt...Deloitte+RedCross_Talk to your data with Knowledge-enriched Generative AI.ppt...
Deloitte+RedCross_Talk to your data with Knowledge-enriched Generative AI.ppt...Neo4j
 
Prediction Of Cryptocurrency Prices Using Lstm, Svm And Polynomial Regression...
Prediction Of Cryptocurrency Prices Using Lstm, Svm And Polynomial Regression...Prediction Of Cryptocurrency Prices Using Lstm, Svm And Polynomial Regression...
Prediction Of Cryptocurrency Prices Using Lstm, Svm And Polynomial Regression...ferisulianta.com
 
The market for cross-border mortgages in Europe
The market for cross-border mortgages in EuropeThe market for cross-border mortgages in Europe
The market for cross-border mortgages in Europe321k
 
Using DAX & Time-based Analysis in Data Warehouse
Using DAX & Time-based Analysis in Data WarehouseUsing DAX & Time-based Analysis in Data Warehouse
Using DAX & Time-based Analysis in Data WarehouseThinkInnovation
 
Paul Martin (Gartner) - Show Me the AI Money.pdf
Paul Martin (Gartner) - Show Me the AI Money.pdfPaul Martin (Gartner) - Show Me the AI Money.pdf
Paul Martin (Gartner) - Show Me the AI Money.pdfdcphostmaster
 
Understanding the Impact of video length on student performance
Understanding the Impact of video length on student performanceUnderstanding the Impact of video length on student performance
Understanding the Impact of video length on student performancePrithaVashisht1
 
How to Build an Experimentation Culture for Data-Driven Product Development
How to Build an Experimentation Culture for Data-Driven Product DevelopmentHow to Build an Experimentation Culture for Data-Driven Product Development
How to Build an Experimentation Culture for Data-Driven Product DevelopmentAggregage
 
STOCK PRICE ANALYSIS Furkan Ali TASCI --.pptx
STOCK PRICE ANALYSIS  Furkan Ali TASCI --.pptxSTOCK PRICE ANALYSIS  Furkan Ali TASCI --.pptx
STOCK PRICE ANALYSIS Furkan Ali TASCI --.pptxFurkanTasci3
 
Bengaluru Tableau UG event- 2nd March 2024 Q1
Bengaluru Tableau UG event- 2nd March 2024 Q1Bengaluru Tableau UG event- 2nd March 2024 Q1
Bengaluru Tableau UG event- 2nd March 2024 Q1bengalurutug
 
Enabling GenAI Breakthroughs with Knowledge Graphs
Enabling GenAI Breakthroughs with Knowledge GraphsEnabling GenAI Breakthroughs with Knowledge Graphs
Enabling GenAI Breakthroughs with Knowledge GraphsNeo4j
 
Elements of language learning - an analysis of how different elements of lang...
Elements of language learning - an analysis of how different elements of lang...Elements of language learning - an analysis of how different elements of lang...
Elements of language learning - an analysis of how different elements of lang...PrithaVashisht1
 
Unleashing Datas Potential - Mastering Precision with FCO-IM
Unleashing Datas Potential - Mastering Precision with FCO-IMUnleashing Datas Potential - Mastering Precision with FCO-IM
Unleashing Datas Potential - Mastering Precision with FCO-IMMarco Wobben
 
Data Collection from Social Media Platforms
Data Collection from Social Media PlatformsData Collection from Social Media Platforms
Data Collection from Social Media PlatformsMahmoud Yasser
 
Neo4j_Jesus Barrasa_The Art of the Possible with Graph.pptx.pdf
Neo4j_Jesus Barrasa_The Art of the Possible with Graph.pptx.pdfNeo4j_Jesus Barrasa_The Art of the Possible with Graph.pptx.pdf
Neo4j_Jesus Barrasa_The Art of the Possible with Graph.pptx.pdfNeo4j
 
Data Analytics Fundamentals: data analytics types.potx
Data Analytics Fundamentals: data analytics types.potxData Analytics Fundamentals: data analytics types.potx
Data Analytics Fundamentals: data analytics types.potxEmmanuel Dauda
 
Báo cáo Social Media Benchmark 2024 cho dân Marketing
Báo cáo Social Media Benchmark 2024 cho dân MarketingBáo cáo Social Media Benchmark 2024 cho dân Marketing
Báo cáo Social Media Benchmark 2024 cho dân MarketingMarketingTrips
 
Microeconomic Group Presentation Apple.pdf
Microeconomic Group Presentation Apple.pdfMicroeconomic Group Presentation Apple.pdf
Microeconomic Group Presentation Apple.pdfmxlos0
 
Brain Tumor Detection with Machine Learning.pptx
Brain Tumor Detection with Machine Learning.pptxBrain Tumor Detection with Machine Learning.pptx
Brain Tumor Detection with Machine Learning.pptxShammiRai3
 
Empowering Decisions A Guide to Embedded Analytics
Empowering Decisions A Guide to Embedded AnalyticsEmpowering Decisions A Guide to Embedded Analytics
Empowering Decisions A Guide to Embedded AnalyticsGain Insights
 

Último (20)

Deloitte+RedCross_Talk to your data with Knowledge-enriched Generative AI.ppt...
Deloitte+RedCross_Talk to your data with Knowledge-enriched Generative AI.ppt...Deloitte+RedCross_Talk to your data with Knowledge-enriched Generative AI.ppt...
Deloitte+RedCross_Talk to your data with Knowledge-enriched Generative AI.ppt...
 
Prediction Of Cryptocurrency Prices Using Lstm, Svm And Polynomial Regression...
Prediction Of Cryptocurrency Prices Using Lstm, Svm And Polynomial Regression...Prediction Of Cryptocurrency Prices Using Lstm, Svm And Polynomial Regression...
Prediction Of Cryptocurrency Prices Using Lstm, Svm And Polynomial Regression...
 
The market for cross-border mortgages in Europe
The market for cross-border mortgages in EuropeThe market for cross-border mortgages in Europe
The market for cross-border mortgages in Europe
 
Using DAX & Time-based Analysis in Data Warehouse
Using DAX & Time-based Analysis in Data WarehouseUsing DAX & Time-based Analysis in Data Warehouse
Using DAX & Time-based Analysis in Data Warehouse
 
Paul Martin (Gartner) - Show Me the AI Money.pdf
Paul Martin (Gartner) - Show Me the AI Money.pdfPaul Martin (Gartner) - Show Me the AI Money.pdf
Paul Martin (Gartner) - Show Me the AI Money.pdf
 
Understanding the Impact of video length on student performance
Understanding the Impact of video length on student performanceUnderstanding the Impact of video length on student performance
Understanding the Impact of video length on student performance
 
How to Build an Experimentation Culture for Data-Driven Product Development
How to Build an Experimentation Culture for Data-Driven Product DevelopmentHow to Build an Experimentation Culture for Data-Driven Product Development
How to Build an Experimentation Culture for Data-Driven Product Development
 
STOCK PRICE ANALYSIS Furkan Ali TASCI --.pptx
STOCK PRICE ANALYSIS  Furkan Ali TASCI --.pptxSTOCK PRICE ANALYSIS  Furkan Ali TASCI --.pptx
STOCK PRICE ANALYSIS Furkan Ali TASCI --.pptx
 
Bengaluru Tableau UG event- 2nd March 2024 Q1
Bengaluru Tableau UG event- 2nd March 2024 Q1Bengaluru Tableau UG event- 2nd March 2024 Q1
Bengaluru Tableau UG event- 2nd March 2024 Q1
 
Enabling GenAI Breakthroughs with Knowledge Graphs
Enabling GenAI Breakthroughs with Knowledge GraphsEnabling GenAI Breakthroughs with Knowledge Graphs
Enabling GenAI Breakthroughs with Knowledge Graphs
 
Elements of language learning - an analysis of how different elements of lang...
Elements of language learning - an analysis of how different elements of lang...Elements of language learning - an analysis of how different elements of lang...
Elements of language learning - an analysis of how different elements of lang...
 
Unleashing Datas Potential - Mastering Precision with FCO-IM
Unleashing Datas Potential - Mastering Precision with FCO-IMUnleashing Datas Potential - Mastering Precision with FCO-IM
Unleashing Datas Potential - Mastering Precision with FCO-IM
 
Data Collection from Social Media Platforms
Data Collection from Social Media PlatformsData Collection from Social Media Platforms
Data Collection from Social Media Platforms
 
Neo4j_Jesus Barrasa_The Art of the Possible with Graph.pptx.pdf
Neo4j_Jesus Barrasa_The Art of the Possible with Graph.pptx.pdfNeo4j_Jesus Barrasa_The Art of the Possible with Graph.pptx.pdf
Neo4j_Jesus Barrasa_The Art of the Possible with Graph.pptx.pdf
 
Data Analytics Fundamentals: data analytics types.potx
Data Analytics Fundamentals: data analytics types.potxData Analytics Fundamentals: data analytics types.potx
Data Analytics Fundamentals: data analytics types.potx
 
Báo cáo Social Media Benchmark 2024 cho dân Marketing
Báo cáo Social Media Benchmark 2024 cho dân MarketingBáo cáo Social Media Benchmark 2024 cho dân Marketing
Báo cáo Social Media Benchmark 2024 cho dân Marketing
 
Microeconomic Group Presentation Apple.pdf
Microeconomic Group Presentation Apple.pdfMicroeconomic Group Presentation Apple.pdf
Microeconomic Group Presentation Apple.pdf
 
Brain Tumor Detection with Machine Learning.pptx
Brain Tumor Detection with Machine Learning.pptxBrain Tumor Detection with Machine Learning.pptx
Brain Tumor Detection with Machine Learning.pptx
 
Empowering Decisions A Guide to Embedded Analytics
Empowering Decisions A Guide to Embedded AnalyticsEmpowering Decisions A Guide to Embedded Analytics
Empowering Decisions A Guide to Embedded Analytics
 
Target_Company_Data_breach_2013_110million
Target_Company_Data_breach_2013_110millionTarget_Company_Data_breach_2013_110million
Target_Company_Data_breach_2013_110million
 

Kick start graph visualization projects

  • 1. by Sébastien Heymann seb@linkurio.us Kick-start Graph Visualization Projects.
  • 2. ...with software. Co-founder of the Gephi project - 2008 Co-founder of the Linkurious startup - 2013 PhD in computer science, UPMC LIP6 - 2013 A few words about me I democratise graph thinking (with pink titles) makes graphs handy
  • 3. Open source project started in 2008 Built to solve large graph visualization problems Latest version downloaded ~ 400,000 times http://gephi.org A few words about me / Gephi makes graphs handy
  • 4. A few words about me / Gephi
  • 5. A few words about me / Linkurious Started by a collaboration with Stanford - Mapping the Republic of Letters and DensityDesign in 2012. Now French startup of 3 people. Linkurious helps companies make sense of data with user- friendly visualization software. We help business analysts, R&D teams, developers and scientists.
  • 6. A few words about me / Linkurious
  • 8. 0. Why? 1. Key takeaways a. The 5 questions b. User stories c. Design visualization + interaction 2. Fraud detection use case 3. Q&A How to create and use graph visualization successfully? Agenda PRACTICE PRACTICE
  • 10. What is a graph? This is a graph. Father Of Father Of Siblings
  • 11. What is a graph? / Nodes & relationships A graph is a set of nodes linked by relationships. Father Of Father Of Siblings This is a node This is a relationship
  • 12. People, objects, movies, restaurants, music... Antennas, servers, phones, people... Supplier, roads, warehouses, products... Graphs can be used to model many domains. Supply chains Social networks Communications Differents domains where graphs are important
  • 13. Graph visualization can help you in many ways. Do you have a graph project?
  • 14. “The greatest value of a picture is when it forces us to notice what we never expected to see.” Why? John Tukey (1962)
  • 15. How to create and use graph visualization successfully? 1. Key takeaways to kick-start your projects. a. Ask 5 questions. b. Write user stories. c. Design visualization and interaction.
  • 16. Ask 5 questions / Q1: Data, tadaa? You need data. sourcing - cleaning - update
  • 17. sensemaking - scale - complexity Ask 5 questions / Q1: Data, tadaa? Can you model data as graphs? image: Martin Grandjean
  • 18. Hypothesis discovery, evidence finding Impact analysis, reportingData modelling, database administration Set up your goal. Administrate Understand Monitor Ask 5 questions / Q2: Why using graph visualization in your project? images: XKCD & the web
  • 19. Ask 5 questions / Q3: Who will use it? Define personas. data scientist business analyst developer public audience images: PhdComics & Despicable Me
  • 20. Short-term memory max 7 items otherwise the ability to make decisions drops Vision more than 10 000 nodes is generally useless Ask 5 questions / Q4: What are the constraints? Acknowledge human limits.
  • 21. 50 nodes – 1B nodes Graph size Machine performances Server side VS client side rendering Interactive VS print Ask 5 questions / Q4: What are the constraints? Acknowledge technical limits.
  • 22. individual use VS collaborative work artwork VS integrated into an application Ask 5 questions / Q5: How is it used? Define scope.
  • 23. 1. What are the data? 2. What is your goal? 3. Who is your end-user? 4. What are the constraints? 5. How is it used? Ask 5 questions / Summary The 5 questions
  • 24. Ask 5 questions / Your turn! Answer the 5 questions of your project. PRACTICE
  • 25. How to create and use graph visualization successfully? 1. Key takeaways to kick-start your projects. a. Ask 5 questions. b. Write user stories. c. Design visualization and interaction.
  • 26. I define a data model. I generate a significant graph sample. I create a business query with Cypher. I visualize the query result. I iterate on the data model until it is satisfying. Write user story / The developer story “I am creating a Neo4j graph database for my application.”
  • 27. Write user story / Your turn! Write your own user story. PRACTICE
  • 28. How to create and use graph visualization successfully? 1. Key takeaways to kick-start your projects. a. Ask 5 questions. b. Write user stories. c. Design visualization and interaction.
  • 30. Design visualization How to represent graphs?
  • 31. (a) Nodes are ordered as rows and columns; connections are indicated as filled cells. (b) A matrix representation of a typical biological pathway. in (Gehlenborg 2012) Design visualization / Common graph representations Matrices
  • 32. (a) A directed graph typical of a biological pathway. (b) An undirected graph with nodes arranged in a circle. (c) A spring-embedded layout of data from b. in (Gehlenborg 2012) Design visualization / Common graph representations Node-link diagrams
  • 33. Design visualization Let’s choose node- link diagrams because it’s more common.
  • 34. Design visualization Map data to visual variables. proximity hierarchy group
  • 36. Design visualization and interaction / Graph Viz 101 Learn more at http://linkurio.us/graph-viz-101
  • 37. How to create and use graph visualization successfully? 1. Key takeaways to kick-start your projects. a. Ask 5 questions. b. Write user stories. c. Design visualization and interaction.
  • 38. Use case 2. Bank loan fraud detection use case.
  • 39. Use case / The cost of fraud $28.6B AITE Group estimates that first party fraud will cost $28.6 billion in credit card losses a year by 2016. http://news.alaric.com/industry-news/fraud/a-new-approach-to-first-party-fraud-reducing-bad-debt/ http://bankinganalyticsblog.fico.com/2013/02/first-party-fraud-it-was-me.html
  • 40. A criminal uses the fake identity to register a bank account. He acts like a normal customer and tries to secure a loan. Once the criminal feels he cannot get access to more money he carefully prepares his exit : in a short amount of time he empties all of his accounts and disappears. A criminal or a group of criminal mix pieces of information (addresses, phone numbers, social security number) to create a “synthetic-identity”. A look at a common fraud scenario banks face. Create a fake identity Go to the bank, ask for a loan Disappear with the money Use case / A common fraud scenario
  • 41. Use case / How do we set up a graph-based fraud detection system? Let’s ask our 5 questions. 1. What are the data? 2. What is your goal? 3. Who is your end-user? 4. What are the constraints? 5. How is it used?
  • 42. Use case / Q1: What are the data? We model customer data as a graph. Loan $25k Home address 58, Eisenhower Square Customer name J. Smith Phone number +33 5 68 98 25 74 Credit card 1 234$ ID J. Smith A graph showing a legitimate customer and the information she is linked to.
  • 43. Use case / Q1: What are the data? In a fraud ring people share the same information. 58, Eisenhower Square 14, Roses Street +33 6 75 89 22 14 $7k P. Martin $12,5k +331 42 58 66 00 J. Smith SSN 17873897893 31195855 $20k E. Selmati SSN 1787576553 $45k P. Smith SSN 1787579953 SSN 1267576553 31184274
  • 44. Use case / Q2: What is your goal? We want to detect fake customer identities.
  • 45. She is a fraud expert but has limited data and computer skills. She works with a team of data analysts for a large bank. When an alert is triggered, she checks if the customer account belongs to a potential fraud ring. Use case / Q3: Who is your end-user? Our user is a fraud analyst. image: PhdComics
  • 46. Thousands of new loans per month. Time: a few days Investigate before transferring more money. Interaction Detect fraud rings by exploring the graph gradually. Use case / Q4: What are the constraints? We have a large graph on a single database.
  • 47. Use case / Q5: How it is used? The visualization is embedded in a business process. Lifecycle events trigger security checks A new customer opens an account An existing customer asks for a loan A customer skips a loan payment A Neo4j Cypher query runs to detect patterns An analyst visualizes the connections to make an informed decision.
  • 48. Use case / The user story The fraud teams acts faster and more fraud cases can be avoided. If something suspicious comes up, the analysts can use Linkurious to quickly assess the situation. Linkurious allows the fraud teams to go deep in the data and build cases against fraud rings. Treat false positives Investigate serious cases Save money Linkurious allows you to control the alerts and make sure your customers are not treated like criminals.
  • 49. Max 200 nodes visualized Relationships information is important Multiple node categories (address, phone, ..) -> node-link diagram -> icons or node colors by category Interactivity : yes Display node and rels information on demand Expand node connections on demand Use case / Visualization and interaction design Design
  • 51. Conclusion Graph visualization can add a great value to your project, learn to leverage it.
  • 52. Contact us to discuss your projects: contact@linkurio.us Case studies: http://linkurio.us/blog Follow @linkurious #GraphViz101
  • 54. Detailed use case on our blog : ● Part 1 : http://linkurio.us/how-to-detect-bank-loan-fraud-with-graphs-part-1/ ● Part 2 : http://linkurio.us/how-to-detect-bank-loan-fraud-with-graphs-part-2/ ● Neo4j data set : https://www.dropbox.com/s/wk8k5r23syp6kbx/fraud%20detection.zip GraphGist by Kenny Bastani : http://gist.neo4j.org/?github-neo4j-contrib%2Fgists%2F%2Fother% 2FBankFraudDetection.adoc Video demonstration : https://vimeo.com/76891393 (around the 12 minutes mark) Graph Visualization 101: http://linkurio.us/graph-viz-101/ Resources Resources
  • 55. Research papers Visual Analysis of Complex Networks for Business Intelligence with Gephi. Sébastien Heymann and Bénédicte Le Grand. to appear in the Proceedings of the 1st International Symposium on Visualisation and Business Intelligence, in conjunction with the 17th International Conference Information Visualisation (IV 2013 - VBI). Gephi: an open source software for exploring and manipulating networks. Mathieu Bastian, Sébastien Heymann and Mathieu Jacomy. in Proceedings of the Third International AAAI Conference on Weblogs and Social Media (ICWSM'09), in American Journal of Sociology (2009), pp.361-362 Points of View: Bar Charts and Box Plots. M Streit and N Gehlenborg. Nature Methods 11(2):117 (2014). Book chapters Exploratory Network Analysis: Visualization and Interaction. Sébastien Heymann and Bénédicte Le Grand. to appear in Hocine Cherifi (editor), Complex Networks and their Applications, Cambridge University Press. Gephi. Sébastien Heymann. to appear in the Encyclopedia of Social Networks and Mining (ESNAM), Springer. Books Exploratory data analysis. Tukey, J. W. (1977). References References
  • 56. Linkurious technology Cloud ready and open source based.