SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Introduction to Networks and
Business Intelligence
Prof. Dr. Daning Hu
Department of Informatics
University of Zurich
Sep, 2012
2
Outline
 Network Science
 A “Random” History
 Network Analysis
 Network Topological Analysis: Random, Scale-Free, and Small-world
Networks
 Node level analysis
 Link Analysis
 Network Visualization
 Network-based Business Intelligence Application
3
Network Science
 Network science is an interdisciplinary academic field which
studies complex networks such as information networks,
biological networks, cognitive and semantic networks, and social
networks. It draws on theories and methods including (Wiki)
 Graph theory from mathematics, e.g., Small-world
 Statistical mechanics from physics, e.g., Rich get richer,
 Data mining and information visualization from computer science,
 Inferential modeling from statistics, e.g., Collaborative filtering
 Social structure from sociology, e.g., weak tie, structural holes
 The National Research Council defines network science as "the
study of network representations of physical, biological, and social
phenomena leading to predictive models of these phenomena.”
4
A “Random” History: Math, Psychology, Sociology…
 The study of networks has emerged in diverse disciplines as a
means of analyzing complex relational data.
 Network science has its root in Graph Theory.
 Seven Bridges of Königsberg written by Leonhard Euler in 1736.
 Vertices, Edges, Nodes, Links,
 a branch of mathematics that studies the properties of pairwise relations in a
network structure
 Social Network Analysis
 Jacob Moreno, a psychologist, developed the Sociogram and to “precisely
describe the interpersonal structure of a group”.
 Jacob’s experiment is the first to use Social Network Analysis and was
published in the New York Times (April 3, 1933, page 17).
 Stanley Milgram (Small World Experiment: Six Degrees of Separation,
1960s). Facebook: 5.28 steps in 2008, 4.74 in 2011.
5
Jacob Moreno’s experiment on Friendship Network
6
Now…
Node Link
Social network People Friendship, kinship, collaboration
Inter-organizational
network
Companies Strategic alliance, buyer-seller
relation, joint venture
Citation network Documents/authors Citation
Internet Routers/computers Wire, cable
WWW Web pages hyperlink
Biochemical network Genes/proteins Regulatory effect
… … …
Complex Networks in the Real World
7
Examples of Real-World Complex Networks
A collaboration network of
physicists (size < 1K)
Source: (Newman & Girvan,
2004)
The Internet
(size > 150K),
Source: Lumeta Corp.,
The Internet Mapping
Project
8
Network Analysis: Topology Analysis
 Network Topology Analysis takes a macro perspective to study
the physical properties of network structures. Network topological
measures include:
 Size,
 Density,
 Average Degree,
 Average Path Length: on average, the number of steps it takes to get
from one member of the network to another.
 Diameter
 Clustering Coefficient: a measure of an "all-my-friends-know-each-
other" property; small-world feature





1
)
(
)
1
(
2
)
(
i
i
i
i
i
Coeff
Clustering
CC
k
k
E
i
CC
ki = Cd(i) = # of neighbors of node i
Ei = # of links actually exist between ki nodes
9
Topology Analysis: Three Topology Models
 Random Network
 Erdős–Rényi Random Graph model
 used for generating random graphs in which edges are set between nodes
with equal probabilities
10
Topology Analysis: Three Topology Models
 Small-World Network
 Watts-Strogatz Small World model
 used for generating graphs with small-world properties
 large clustering coefficient
 high average path length
11
Topology Analysis: Three Topology Models
 Scale-Free Network
 Barabási–Albert (BA) Preferential Attachment model
 A network model used to demonstrate a preferential attachment or a "rich-
get-richer" effect.
 an edge is most likely to attach to
nodes with higher degrees.
 Power-law degree distribution
12
Network Analysis: Topology Analysis
Topology Average Path Length
(L)
Clustering
Coefficient (CC)
Degree Distribution
(P(k))
Random Graph Poisson Dist.:
Small World
(Watts & Strogatz, 1998)
Lsw  Lrand CCsw  CCrand
Similar to random
graph
Scale-Free network LSF  Lrand Power-law
Distribution:
P(k) ~ k-

k
N
Lrand
ln
ln
~
N
k
CCrand



!
)
(
k
k
e
k
P
k
k 

 



k : Average degree
13
Network Scientists
• Paul Erdős (Random graph model)
• Duncan Watts (Small-World model)
• A.-L. Barabási (Scale-Free model); “Linked”
• Mark Newman (SW and SF models)
14
Network Analysis: Node-level Analysis
 Node Centrality can be viewed as a measure of influence or
importance of nodes in a network.
 Degree
 the number of links that a node possesses in a network. In a directed
network, one must differentiate between in-links and out-links by
calculating in-degree and out-degree.
 Betweeness
 the number of shortest paths in a network that traverse through that node.
 Closeness
 the average distance that each node is from all other nodes in the network
15
Example: Centrality Measures of Bin Laden in a
Global Terrorist Network
0
10
20
30
40
50
60
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
Degree
0
500
1000
1500
2000
2500
3000
3500
4000
4500
5000
1
9
8
9
1
9
9
0
1
9
9
1
1
9
9
2
1
9
9
3
1
9
9
4
1
9
9
5
1
9
9
6
1
9
9
7
1
9
9
8
1
9
9
9
2
0
0
0
2
0
0
1
2
0
0
2
Betweenness
0
50
100
150
200
250
300
350
400
1
9
8
9
1
9
9
0
1
9
9
1
1
9
9
2
1
9
9
3
1
9
9
4
1
9
9
5
1
9
9
6
1
9
9
7
1
9
9
8
1
9
9
9
2
0
0
0
2
0
0
1
2
0
0
2
Closeness
 The changes in the degree,
betweenness and closeness of
the node bin Laden from 1989
to 2002
16
Findings and Possible Explanations
 The changes described in the above figure show that
 From 1994 to 1996, bin Laden’s betweenness decreased a lot and then increased
until 2001
 In 1994, The Saudi government revoked his citizenship and expelled him from
the country
 In 1995, he then went to Khartoum, Sudan, but under U.S. pressure was
expelled Again
 In 1996, bin Laden returned to Afghanistan established camps and refuge
there
 From 1998 to 1999, there is another sharp decrease in betweenness
 After 1998 bombings of the United States embassies around world, President
Bill Clinton ordered a freeze on assets linked to bin Laden
 Since then, bin Laden was officially listed as one of the FBI Ten Most Wanted
Fugitives and FBI Most Wanted Terrorists
 In August 1998, the U.S. military launched an assassination but failed to harm
bin Laden but killed 19 other people
 In 1999, United States convinced the United Nations to impose sanctions
against Afghanistan in an attempt to force the Taliban to extradite him
17
Network Analysis: Link Analysis
 Link analysis focuses on the prediction of link formations
between a pair of nodes based on various network factors. Its
applications include:
 Finance: Insurance fraud detections
 E-commerce: recommendation systems, e.g., Amazon
 Internet Search Engine: Google PageRank
 Law Enforcement: Crime link predictions
18
Network Visualization: Expert Partition of the
Collaboration Network
Weapons of
massive
destruction
Terrorism in
Europe
Criminal
justice
An international
terrorism conf.
Rand Corp.
Historical and policy
perspective of
terrorism
Not well-defined
group
Legal
perspective of
terrorism
19
20
Network-based Business Applications
 Facebook: People you may know

Weitere ähnliche Inhalte

Ähnlich wie intro to sna.ppt

02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and OverviewDuke Network Analysis Center
 
ICPSR - Complex Systems Models in the Social Sciences - Lecture 2 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 2 - Professor...ICPSR - Complex Systems Models in the Social Sciences - Lecture 2 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 2 - Professor...Daniel Katz
 
An Introduction to Network Theory
An Introduction to Network TheoryAn Introduction to Network Theory
An Introduction to Network TheorySocialphysicist
 
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)Daniel Katz
 
Visually Exploring Social Participation in Encyclopedia of Life
Visually Exploring Social Participation in Encyclopedia of LifeVisually Exploring Social Participation in Encyclopedia of Life
Visually Exploring Social Participation in Encyclopedia of LifeHarish Vaidyanathan
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network AnalysisMarc Smith
 
Socialnetworkanalysis
SocialnetworkanalysisSocialnetworkanalysis
Socialnetworkanalysiskcarter14
 
Descobrindo o tesouro escondido nos seus dados usando grafos.
Descobrindo o tesouro escondido nos seus dados usando grafos.Descobrindo o tesouro escondido nos seus dados usando grafos.
Descobrindo o tesouro escondido nos seus dados usando grafos.Ana Appel
 
Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Tin180 VietNam
 
Social networkanalysisfinal
Social networkanalysisfinalSocial networkanalysisfinal
Social networkanalysisfinalkcarter14
 
Defining Business Network
Defining Business NetworkDefining Business Network
Defining Business NetworkWaqas Tariq
 
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...Marc Smith
 
New Metrics for New Media Bay Area CIO IT Executives Meetup
New Metrics for New Media Bay Area CIO IT Executives MeetupNew Metrics for New Media Bay Area CIO IT Executives Meetup
New Metrics for New Media Bay Area CIO IT Executives MeetupTatyana Kanzaveli
 
Network Structure For Social Network
Network Structure For Social NetworkNetwork Structure For Social Network
Network Structure For Social NetworkVaibhav Sathe
 
2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith
2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith
2010-November-8-NIA - Smart Society and Civic Culture - Marc SmithMarc Smith
 
Why rumors spread fast in social networks
Why rumors spread fast in social networksWhy rumors spread fast in social networks
Why rumors spread fast in social networksaugustodefranco .
 
History of the Internet.doc
History of the Internet.docHistory of the Internet.doc
History of the Internet.docNPeredaSamyJ
 

Ähnlich wie intro to sna.ppt (20)

02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview
 
Network Science: Theory, Modeling and Applications
Network Science: Theory, Modeling and ApplicationsNetwork Science: Theory, Modeling and Applications
Network Science: Theory, Modeling and Applications
 
ICPSR - Complex Systems Models in the Social Sciences - Lecture 2 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 2 - Professor...ICPSR - Complex Systems Models in the Social Sciences - Lecture 2 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 2 - Professor...
 
An Introduction to Network Theory
An Introduction to Network TheoryAn Introduction to Network Theory
An Introduction to Network Theory
 
DREaM Event 2: Louise Cooke
DREaM Event 2: Louise CookeDREaM Event 2: Louise Cooke
DREaM Event 2: Louise Cooke
 
SSRI_pt1.ppt
SSRI_pt1.pptSSRI_pt1.ppt
SSRI_pt1.ppt
 
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
 
Visually Exploring Social Participation in Encyclopedia of Life
Visually Exploring Social Participation in Encyclopedia of LifeVisually Exploring Social Participation in Encyclopedia of Life
Visually Exploring Social Participation in Encyclopedia of Life
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
 
Socialnetworkanalysis
SocialnetworkanalysisSocialnetworkanalysis
Socialnetworkanalysis
 
Descobrindo o tesouro escondido nos seus dados usando grafos.
Descobrindo o tesouro escondido nos seus dados usando grafos.Descobrindo o tesouro escondido nos seus dados usando grafos.
Descobrindo o tesouro escondido nos seus dados usando grafos.
 
Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)
 
Social networkanalysisfinal
Social networkanalysisfinalSocial networkanalysisfinal
Social networkanalysisfinal
 
Defining Business Network
Defining Business NetworkDefining Business Network
Defining Business Network
 
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
 
New Metrics for New Media Bay Area CIO IT Executives Meetup
New Metrics for New Media Bay Area CIO IT Executives MeetupNew Metrics for New Media Bay Area CIO IT Executives Meetup
New Metrics for New Media Bay Area CIO IT Executives Meetup
 
Network Structure For Social Network
Network Structure For Social NetworkNetwork Structure For Social Network
Network Structure For Social Network
 
2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith
2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith
2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith
 
Why rumors spread fast in social networks
Why rumors spread fast in social networksWhy rumors spread fast in social networks
Why rumors spread fast in social networks
 
History of the Internet.doc
History of the Internet.docHistory of the Internet.doc
History of the Internet.doc
 

Mehr von NISHASOMSCS113

Building blocks of Algblocks of Alg.pptx
Building blocks of Algblocks of Alg.pptxBuilding blocks of Algblocks of Alg.pptx
Building blocks of Algblocks of Alg.pptxNISHASOMSCS113
 
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...NISHASOMSCS113
 
Exception handling.pptx
Exception handling.pptxException handling.pptx
Exception handling.pptxNISHASOMSCS113
 
Introduction to Information Storage.pptx
Introduction to Information Storage.pptxIntroduction to Information Storage.pptx
Introduction to Information Storage.pptxNISHASOMSCS113
 

Mehr von NISHASOMSCS113 (9)

Building blocks of Algblocks of Alg.pptx
Building blocks of Algblocks of Alg.pptxBuilding blocks of Algblocks of Alg.pptx
Building blocks of Algblocks of Alg.pptx
 
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
Exception handling.pptx
Exception handling.pptxException handling.pptx
Exception handling.pptx
 
Introduction to Information Storage.pptx
Introduction to Information Storage.pptxIntroduction to Information Storage.pptx
Introduction to Information Storage.pptx
 
recursion.ppt
recursion.pptrecursion.ppt
recursion.ppt
 
social.pptx
social.pptxsocial.pptx
social.pptx
 
Data Management.pptx
Data Management.pptxData Management.pptx
Data Management.pptx
 
intro.ppt
intro.pptintro.ppt
intro.ppt
 

Kürzlich hochgeladen

Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisDr.Costas Sachpazis
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfEr.Sonali Nasikkar
 
Electrical shop management system project report.pdf
Electrical shop management system project report.pdfElectrical shop management system project report.pdf
Electrical shop management system project report.pdfKamal Acharya
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualBalamuruganV28
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxKarpagam Institute of Teechnology
 
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesLinux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesRashidFaridChishti
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024EMMANUELLEFRANCEHELI
 
"United Nations Park" Site Visit Report.
"United Nations Park" Site  Visit Report."United Nations Park" Site  Visit Report.
"United Nations Park" Site Visit Report.MdManikurRahman
 
Lesson no16 application of Induction Generator in Wind.ppsx
Lesson no16 application of Induction Generator in Wind.ppsxLesson no16 application of Induction Generator in Wind.ppsx
Lesson no16 application of Induction Generator in Wind.ppsxmichaelprrior
 
Intelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent ActsIntelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent ActsSheetal Jain
 
Lab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docxLab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docxRashidFaridChishti
 
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...ShivamTiwari995432
 
Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdfKamal Acharya
 
Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AIIntroduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AISheetal Jain
 
Piping and instrumentation diagram p.pdf
Piping and instrumentation diagram p.pdfPiping and instrumentation diagram p.pdf
Piping and instrumentation diagram p.pdfAshrafRagab14
 
Supermarket billing system project report..pdf
Supermarket billing system project report..pdfSupermarket billing system project report..pdf
Supermarket billing system project report..pdfKamal Acharya
 
Artificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian ReasoningArtificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian Reasoninghotman30312
 
BORESCOPE INSPECTION for engins CFM56.pdf
BORESCOPE INSPECTION for engins CFM56.pdfBORESCOPE INSPECTION for engins CFM56.pdf
BORESCOPE INSPECTION for engins CFM56.pdfomarzaboub1997
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..MaherOthman7
 
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfMadan Karki
 

Kürzlich hochgeladen (20)

Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
Electrical shop management system project report.pdf
Electrical shop management system project report.pdfElectrical shop management system project report.pdf
Electrical shop management system project report.pdf
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesLinux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
 
"United Nations Park" Site Visit Report.
"United Nations Park" Site  Visit Report."United Nations Park" Site  Visit Report.
"United Nations Park" Site Visit Report.
 
Lesson no16 application of Induction Generator in Wind.ppsx
Lesson no16 application of Induction Generator in Wind.ppsxLesson no16 application of Induction Generator in Wind.ppsx
Lesson no16 application of Induction Generator in Wind.ppsx
 
Intelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent ActsIntelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent Acts
 
Lab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docxLab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docx
 
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
 
Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdf
 
Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AIIntroduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AI
 
Piping and instrumentation diagram p.pdf
Piping and instrumentation diagram p.pdfPiping and instrumentation diagram p.pdf
Piping and instrumentation diagram p.pdf
 
Supermarket billing system project report..pdf
Supermarket billing system project report..pdfSupermarket billing system project report..pdf
Supermarket billing system project report..pdf
 
Artificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian ReasoningArtificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian Reasoning
 
BORESCOPE INSPECTION for engins CFM56.pdf
BORESCOPE INSPECTION for engins CFM56.pdfBORESCOPE INSPECTION for engins CFM56.pdf
BORESCOPE INSPECTION for engins CFM56.pdf
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
 

intro to sna.ppt

  • 1. Introduction to Networks and Business Intelligence Prof. Dr. Daning Hu Department of Informatics University of Zurich Sep, 2012
  • 2. 2 Outline  Network Science  A “Random” History  Network Analysis  Network Topological Analysis: Random, Scale-Free, and Small-world Networks  Node level analysis  Link Analysis  Network Visualization  Network-based Business Intelligence Application
  • 3. 3 Network Science  Network science is an interdisciplinary academic field which studies complex networks such as information networks, biological networks, cognitive and semantic networks, and social networks. It draws on theories and methods including (Wiki)  Graph theory from mathematics, e.g., Small-world  Statistical mechanics from physics, e.g., Rich get richer,  Data mining and information visualization from computer science,  Inferential modeling from statistics, e.g., Collaborative filtering  Social structure from sociology, e.g., weak tie, structural holes  The National Research Council defines network science as "the study of network representations of physical, biological, and social phenomena leading to predictive models of these phenomena.”
  • 4. 4 A “Random” History: Math, Psychology, Sociology…  The study of networks has emerged in diverse disciplines as a means of analyzing complex relational data.  Network science has its root in Graph Theory.  Seven Bridges of Königsberg written by Leonhard Euler in 1736.  Vertices, Edges, Nodes, Links,  a branch of mathematics that studies the properties of pairwise relations in a network structure  Social Network Analysis  Jacob Moreno, a psychologist, developed the Sociogram and to “precisely describe the interpersonal structure of a group”.  Jacob’s experiment is the first to use Social Network Analysis and was published in the New York Times (April 3, 1933, page 17).  Stanley Milgram (Small World Experiment: Six Degrees of Separation, 1960s). Facebook: 5.28 steps in 2008, 4.74 in 2011.
  • 5. 5 Jacob Moreno’s experiment on Friendship Network
  • 6. 6 Now… Node Link Social network People Friendship, kinship, collaboration Inter-organizational network Companies Strategic alliance, buyer-seller relation, joint venture Citation network Documents/authors Citation Internet Routers/computers Wire, cable WWW Web pages hyperlink Biochemical network Genes/proteins Regulatory effect … … … Complex Networks in the Real World
  • 7. 7 Examples of Real-World Complex Networks A collaboration network of physicists (size < 1K) Source: (Newman & Girvan, 2004) The Internet (size > 150K), Source: Lumeta Corp., The Internet Mapping Project
  • 8. 8 Network Analysis: Topology Analysis  Network Topology Analysis takes a macro perspective to study the physical properties of network structures. Network topological measures include:  Size,  Density,  Average Degree,  Average Path Length: on average, the number of steps it takes to get from one member of the network to another.  Diameter  Clustering Coefficient: a measure of an "all-my-friends-know-each- other" property; small-world feature      1 ) ( ) 1 ( 2 ) ( i i i i i Coeff Clustering CC k k E i CC ki = Cd(i) = # of neighbors of node i Ei = # of links actually exist between ki nodes
  • 9. 9 Topology Analysis: Three Topology Models  Random Network  Erdős–Rényi Random Graph model  used for generating random graphs in which edges are set between nodes with equal probabilities
  • 10. 10 Topology Analysis: Three Topology Models  Small-World Network  Watts-Strogatz Small World model  used for generating graphs with small-world properties  large clustering coefficient  high average path length
  • 11. 11 Topology Analysis: Three Topology Models  Scale-Free Network  Barabási–Albert (BA) Preferential Attachment model  A network model used to demonstrate a preferential attachment or a "rich- get-richer" effect.  an edge is most likely to attach to nodes with higher degrees.  Power-law degree distribution
  • 12. 12 Network Analysis: Topology Analysis Topology Average Path Length (L) Clustering Coefficient (CC) Degree Distribution (P(k)) Random Graph Poisson Dist.: Small World (Watts & Strogatz, 1998) Lsw  Lrand CCsw  CCrand Similar to random graph Scale-Free network LSF  Lrand Power-law Distribution: P(k) ~ k-  k N Lrand ln ln ~ N k CCrand    ! ) ( k k e k P k k        k : Average degree
  • 13. 13 Network Scientists • Paul Erdős (Random graph model) • Duncan Watts (Small-World model) • A.-L. Barabási (Scale-Free model); “Linked” • Mark Newman (SW and SF models)
  • 14. 14 Network Analysis: Node-level Analysis  Node Centrality can be viewed as a measure of influence or importance of nodes in a network.  Degree  the number of links that a node possesses in a network. In a directed network, one must differentiate between in-links and out-links by calculating in-degree and out-degree.  Betweeness  the number of shortest paths in a network that traverse through that node.  Closeness  the average distance that each node is from all other nodes in the network
  • 15. 15 Example: Centrality Measures of Bin Laden in a Global Terrorist Network 0 10 20 30 40 50 60 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 Degree 0 500 1000 1500 2000 2500 3000 3500 4000 4500 5000 1 9 8 9 1 9 9 0 1 9 9 1 1 9 9 2 1 9 9 3 1 9 9 4 1 9 9 5 1 9 9 6 1 9 9 7 1 9 9 8 1 9 9 9 2 0 0 0 2 0 0 1 2 0 0 2 Betweenness 0 50 100 150 200 250 300 350 400 1 9 8 9 1 9 9 0 1 9 9 1 1 9 9 2 1 9 9 3 1 9 9 4 1 9 9 5 1 9 9 6 1 9 9 7 1 9 9 8 1 9 9 9 2 0 0 0 2 0 0 1 2 0 0 2 Closeness  The changes in the degree, betweenness and closeness of the node bin Laden from 1989 to 2002
  • 16. 16 Findings and Possible Explanations  The changes described in the above figure show that  From 1994 to 1996, bin Laden’s betweenness decreased a lot and then increased until 2001  In 1994, The Saudi government revoked his citizenship and expelled him from the country  In 1995, he then went to Khartoum, Sudan, but under U.S. pressure was expelled Again  In 1996, bin Laden returned to Afghanistan established camps and refuge there  From 1998 to 1999, there is another sharp decrease in betweenness  After 1998 bombings of the United States embassies around world, President Bill Clinton ordered a freeze on assets linked to bin Laden  Since then, bin Laden was officially listed as one of the FBI Ten Most Wanted Fugitives and FBI Most Wanted Terrorists  In August 1998, the U.S. military launched an assassination but failed to harm bin Laden but killed 19 other people  In 1999, United States convinced the United Nations to impose sanctions against Afghanistan in an attempt to force the Taliban to extradite him
  • 17. 17 Network Analysis: Link Analysis  Link analysis focuses on the prediction of link formations between a pair of nodes based on various network factors. Its applications include:  Finance: Insurance fraud detections  E-commerce: recommendation systems, e.g., Amazon  Internet Search Engine: Google PageRank  Law Enforcement: Crime link predictions
  • 18. 18 Network Visualization: Expert Partition of the Collaboration Network Weapons of massive destruction Terrorism in Europe Criminal justice An international terrorism conf. Rand Corp. Historical and policy perspective of terrorism Not well-defined group Legal perspective of terrorism
  • 19. 19
  • 20. 20 Network-based Business Applications  Facebook: People you may know