SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Royi Itzhack
 Large number of
  “interactomes” are currently
  accumulated.
 These interaction networks
  combine measurements from
  a large number of sources to
  produce a network of
  interactions.
 We here assume that the
  network is only characterized
  by the graph of interactions
  and nothing is known about
  the content of the nodes.
   Interactomes occur in
    biology:
    • protein networks.
    • genetic networks. neural
      networks.
   in social sciences
    • Social networks
   In information
    • Wikipediae
    • Content networks
   Most such networks are
    not validated and contain a
    large amount of
    superfluous data.
 We  are looking for important features in
  the networks.
 These features can be:
1. Important nodes.
2. Information flow.
 We propose algorithms to extract those
   from the network topology and methods
   to validate the results.
 We compared the ratio of scores of two
 neighboring nodes, and define that a node is
 higher in hierarchy than its neighbor and if its
 score is higher and the score ratio is between the
 lower and upper thresholds.
 For many neighboring nodes there is no
 hierarchical relation. Their score ratio can be too
 close to one and thus above the upper threshold
 (e.g. cheese and meat).
 Their ratio could also be too far from one and
 thus below the lower threshold (e.g. Obama and
 myself)
• The Hierarchy score is the centrality normalized to the
indegree and the outdegree.
• We checked whether the nodes participation in
information flow on the network (betweenness) is higher
or lower than what is expected merely from its
connectivity.


                           CB (i)
    H (i)
                   (kin (i) 1)(kout (i) 1)
•The score is proportional only to the local neighberhood
      •Very fast – low CPU and memory cost
      •Average 82%

                           kin                           kout
           H (i)                   kin                           kout
                       (kin kout )                   (kin kout )

Problem : the algorithm is not sensitive to the network structure
for example: for binary tree the algorithm is inefficient
Nin (m)      m           N out (m)     m
H (i)                          /
         m    Nin (m)              m   N out (m)


  Nin (i) number of incoming neighbours of level m
   Nin (i) average number of neighbours of level m
       weighted base
   As we decrease the upper
    threshold, we reduce the
    fraction of node couples for
    which a hierarchical position
    can be obtained
   On the other hand, we
    increase the success rate for
    the remaining node couples.
   Low upper cutoff leads to a
    tight definition of the
    hierarchy, with practically all
    edges in the proper
    direction, but with a low
    number of categorized edges,
   High upper cutoff leads to a
    hierarchy, which is often
    unnatural.
   Microsoft Windows XP Pro operating system.
   Links are directional and that the obtained network is
    practically acyclic,
   Using the attraction basin hierarchy 6869 links out of
    6899 (99.57%) were marked in the proper direction.
    local hierarchy producing 98.57% of properly
    computed links,
   PageRank with 96.13%.
   HITS 90%
   The centrality-based hierarchy 63%
 Isthere a
  meaningful
  information flow
  between nodes in
  networks?
 Specifically, can we
  extract from the
  network the
  meaningful paths of
  information?
 Ifinformation flows, it should be sensitive
  to the precise direction of each edge.
 We thus checked what happens when the
  direction of edges is flipped.
 Strangely nothing changes in the network
  except for two things:
 The distance distribution gets slightly
  shorter.
 The circle distribution length gets
  drastically shorter.
 The  long circles include a well defined
  limited number of essential genes/neurons.
 In the neural network these neurons map
  to the main trajectories from the sensor to
  the interneuron circles to the motor
  neurons.
 In genetic network these trajectories relate
  the most essential genes (genes that their
  deletion leads to organism death).
A simple toy network explains the
 observed results.
 The  spaghetti ball of networks can be
  replaced by clear hierarchies or organized
  information pathways.
 The vast majority of edges can be removed
  while maintaining the important information
  flow.
Network Flow

Weitere ähnliche Inhalte

Was ist angesagt?

Optimizing
 sentinel
 surveillance 
in
 static
 and 
temporal 
networks
Optimizing
 sentinel
 surveillance 
in
 static
 and 
temporal 
networksOptimizing
 sentinel
 surveillance 
in
 static
 and 
temporal 
networks
Optimizing
 sentinel
 surveillance 
in
 static
 and 
temporal 
networksPetter Holme
 
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
Java Abs   Peer To Peer Design & Implementation Of A Tuple SpaceJava Abs   Peer To Peer Design & Implementation Of A Tuple Space
Java Abs Peer To Peer Design & Implementation Of A Tuple Spacencct
 
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet TransmissionBehavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet TransmissionIOSR Journals
 
Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Tin180 VietNam
 
An efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharingAn efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharingambitlick
 
An Improved PageRank Algorithm for Multilayer Networks
An Improved PageRank Algorithm for Multilayer NetworksAn Improved PageRank Algorithm for Multilayer Networks
An Improved PageRank Algorithm for Multilayer NetworksSubhajit Sahu
 
Java on exploiting transient social contact patterns for data forwarding in ...
Java  on exploiting transient social contact patterns for data forwarding in ...Java  on exploiting transient social contact patterns for data forwarding in ...
Java on exploiting transient social contact patterns for data forwarding in ...ecwayerode
 
Classification of Computer Networks
Classification of Computer NetworksClassification of Computer Networks
Classification of Computer NetworksShohanaakterKakon
 
Exploiting friendship relations for efficient routing in mobile
Exploiting friendship relations for efficient routing in mobileExploiting friendship relations for efficient routing in mobile
Exploiting friendship relations for efficient routing in mobileramya1591
 
Turing Talk Slides
Turing Talk SlidesTuring Talk Slides
Turing Talk SlidesAnnu Sharma
 
Social Network Analysis and Visualization
Social Network Analysis and VisualizationSocial Network Analysis and Visualization
Social Network Analysis and VisualizationAlberto Ramirez
 
LocWeb2015 - Reconnecting Digital Publications to the Web Using their Spatial...
LocWeb2015 - Reconnecting Digital Publications to the Web Using their Spatial...LocWeb2015 - Reconnecting Digital Publications to the Web Using their Spatial...
LocWeb2015 - Reconnecting Digital Publications to the Web Using their Spatial...Ben De Meester
 
P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE ijp2p
 
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatramanOdsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatramanvenkatramanJ4
 

Was ist angesagt? (17)

Optimizing
 sentinel
 surveillance 
in
 static
 and 
temporal 
networks
Optimizing
 sentinel
 surveillance 
in
 static
 and 
temporal 
networksOptimizing
 sentinel
 surveillance 
in
 static
 and 
temporal 
networks
Optimizing
 sentinel
 surveillance 
in
 static
 and 
temporal 
networks
 
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
Java Abs   Peer To Peer Design & Implementation Of A Tuple SpaceJava Abs   Peer To Peer Design & Implementation Of A Tuple Space
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
 
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet TransmissionBehavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
 
Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)
 
An efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharingAn efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharing
 
An Improved PageRank Algorithm for Multilayer Networks
An Improved PageRank Algorithm for Multilayer NetworksAn Improved PageRank Algorithm for Multilayer Networks
An Improved PageRank Algorithm for Multilayer Networks
 
Java on exploiting transient social contact patterns for data forwarding in ...
Java  on exploiting transient social contact patterns for data forwarding in ...Java  on exploiting transient social contact patterns for data forwarding in ...
Java on exploiting transient social contact patterns for data forwarding in ...
 
Classification of Computer Networks
Classification of Computer NetworksClassification of Computer Networks
Classification of Computer Networks
 
Exploiting friendship relations for efficient routing in mobile
Exploiting friendship relations for efficient routing in mobileExploiting friendship relations for efficient routing in mobile
Exploiting friendship relations for efficient routing in mobile
 
Turing Talk Slides
Turing Talk SlidesTuring Talk Slides
Turing Talk Slides
 
Social Network Analysis and Visualization
Social Network Analysis and VisualizationSocial Network Analysis and Visualization
Social Network Analysis and Visualization
 
3 Centrality
3 Centrality3 Centrality
3 Centrality
 
27
2727
27
 
LocWeb2015 - Reconnecting Digital Publications to the Web Using their Spatial...
LocWeb2015 - Reconnecting Digital Publications to the Web Using their Spatial...LocWeb2015 - Reconnecting Digital Publications to the Web Using their Spatial...
LocWeb2015 - Reconnecting Digital Publications to the Web Using their Spatial...
 
P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE
 
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatramanOdsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
 
14 Dynamic Networks
14 Dynamic Networks14 Dynamic Networks
14 Dynamic Networks
 

Ähnlich wie Network Flow

Higher-order clustering coefficients at Purdue CSoI
Higher-order clustering coefficients at Purdue CSoIHigher-order clustering coefficients at Purdue CSoI
Higher-order clustering coefficients at Purdue CSoIAustin Benson
 
Topology ppt
Topology pptTopology ppt
Topology pptboocse11
 
Interpretation of the biological knowledge using networks approach
Interpretation of the biological knowledge using networks approachInterpretation of the biological knowledge using networks approach
Interpretation of the biological knowledge using networks approachElena Sügis
 
network mining and representation learning
network mining and representation learningnetwork mining and representation learning
network mining and representation learningsun peiyuan
 
Clique-based Network Clustering
Clique-based Network ClusteringClique-based Network Clustering
Clique-based Network ClusteringGuang Ouyang
 
Distribution of maximal clique size of the
Distribution of maximal clique size of theDistribution of maximal clique size of the
Distribution of maximal clique size of theIJCNCJournal
 
Scale-Free Networks to Search in Unstructured Peer-To-Peer Networks
Scale-Free Networks to Search in Unstructured Peer-To-Peer NetworksScale-Free Networks to Search in Unstructured Peer-To-Peer Networks
Scale-Free Networks to Search in Unstructured Peer-To-Peer NetworksIOSR Journals
 
Mining and analyzing social media part 2 - hicss47 tutorial - dave king
Mining and analyzing social media   part 2 - hicss47 tutorial - dave kingMining and analyzing social media   part 2 - hicss47 tutorial - dave king
Mining and analyzing social media part 2 - hicss47 tutorial - dave kingDave King
 
Community detection in social networks[1]
Community detection in social networks[1]Community detection in social networks[1]
Community detection in social networks[1]sdnumaygmailcom
 
Lecture 5 - Qunatifying a Network.pdf
Lecture 5 - Qunatifying a Network.pdfLecture 5 - Qunatifying a Network.pdf
Lecture 5 - Qunatifying a Network.pdfclararoumany1
 
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...csandit
 
Computational Frameworks for Higher-order Network Data Analysis
Computational Frameworks for Higher-order Network Data AnalysisComputational Frameworks for Higher-order Network Data Analysis
Computational Frameworks for Higher-order Network Data AnalysisAustin Benson
 
Simplicial closure and higher-order link prediction (SIAMNS18)
Simplicial closure and higher-order link prediction (SIAMNS18)Simplicial closure and higher-order link prediction (SIAMNS18)
Simplicial closure and higher-order link prediction (SIAMNS18)Austin Benson
 
Complex Network Analysis
Complex Network Analysis Complex Network Analysis
Complex Network Analysis Annu Sharma
 
Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018Arsalan Khan
 
Jürgens diata12-communities
Jürgens diata12-communitiesJürgens diata12-communities
Jürgens diata12-communitiesPascal Juergens
 
OccupyWallStreetNetworkAnalysis.pptx
OccupyWallStreetNetworkAnalysis.pptxOccupyWallStreetNetworkAnalysis.pptx
OccupyWallStreetNetworkAnalysis.pptxFabrizioLanubile
 

Ähnlich wie Network Flow (20)

Higher-order clustering coefficients at Purdue CSoI
Higher-order clustering coefficients at Purdue CSoIHigher-order clustering coefficients at Purdue CSoI
Higher-order clustering coefficients at Purdue CSoI
 
Topology ppt
Topology pptTopology ppt
Topology ppt
 
Topology ppt
Topology pptTopology ppt
Topology ppt
 
Topology ppt
Topology pptTopology ppt
Topology ppt
 
TopologyPPT.ppt
TopologyPPT.pptTopologyPPT.ppt
TopologyPPT.ppt
 
Interpretation of the biological knowledge using networks approach
Interpretation of the biological knowledge using networks approachInterpretation of the biological knowledge using networks approach
Interpretation of the biological knowledge using networks approach
 
network mining and representation learning
network mining and representation learningnetwork mining and representation learning
network mining and representation learning
 
Clique-based Network Clustering
Clique-based Network ClusteringClique-based Network Clustering
Clique-based Network Clustering
 
Distribution of maximal clique size of the
Distribution of maximal clique size of theDistribution of maximal clique size of the
Distribution of maximal clique size of the
 
Scale-Free Networks to Search in Unstructured Peer-To-Peer Networks
Scale-Free Networks to Search in Unstructured Peer-To-Peer NetworksScale-Free Networks to Search in Unstructured Peer-To-Peer Networks
Scale-Free Networks to Search in Unstructured Peer-To-Peer Networks
 
Mining and analyzing social media part 2 - hicss47 tutorial - dave king
Mining and analyzing social media   part 2 - hicss47 tutorial - dave kingMining and analyzing social media   part 2 - hicss47 tutorial - dave king
Mining and analyzing social media part 2 - hicss47 tutorial - dave king
 
Community detection in social networks[1]
Community detection in social networks[1]Community detection in social networks[1]
Community detection in social networks[1]
 
Lecture 5 - Qunatifying a Network.pdf
Lecture 5 - Qunatifying a Network.pdfLecture 5 - Qunatifying a Network.pdf
Lecture 5 - Qunatifying a Network.pdf
 
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
 
Computational Frameworks for Higher-order Network Data Analysis
Computational Frameworks for Higher-order Network Data AnalysisComputational Frameworks for Higher-order Network Data Analysis
Computational Frameworks for Higher-order Network Data Analysis
 
Simplicial closure and higher-order link prediction (SIAMNS18)
Simplicial closure and higher-order link prediction (SIAMNS18)Simplicial closure and higher-order link prediction (SIAMNS18)
Simplicial closure and higher-order link prediction (SIAMNS18)
 
Complex Network Analysis
Complex Network Analysis Complex Network Analysis
Complex Network Analysis
 
Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018
 
Jürgens diata12-communities
Jürgens diata12-communitiesJürgens diata12-communities
Jürgens diata12-communities
 
OccupyWallStreetNetworkAnalysis.pptx
OccupyWallStreetNetworkAnalysis.pptxOccupyWallStreetNetworkAnalysis.pptx
OccupyWallStreetNetworkAnalysis.pptx
 

Kürzlich hochgeladen

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 

Kürzlich hochgeladen (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 

Network Flow

  • 2.  Large number of “interactomes” are currently accumulated.  These interaction networks combine measurements from a large number of sources to produce a network of interactions.  We here assume that the network is only characterized by the graph of interactions and nothing is known about the content of the nodes.
  • 3. Interactomes occur in biology: • protein networks. • genetic networks. neural networks.  in social sciences • Social networks  In information • Wikipediae • Content networks  Most such networks are not validated and contain a large amount of superfluous data.
  • 4.  We are looking for important features in the networks.  These features can be: 1. Important nodes. 2. Information flow.  We propose algorithms to extract those from the network topology and methods to validate the results.
  • 5.
  • 6.  We compared the ratio of scores of two neighboring nodes, and define that a node is higher in hierarchy than its neighbor and if its score is higher and the score ratio is between the lower and upper thresholds.  For many neighboring nodes there is no hierarchical relation. Their score ratio can be too close to one and thus above the upper threshold (e.g. cheese and meat).  Their ratio could also be too far from one and thus below the lower threshold (e.g. Obama and myself)
  • 7. • The Hierarchy score is the centrality normalized to the indegree and the outdegree. • We checked whether the nodes participation in information flow on the network (betweenness) is higher or lower than what is expected merely from its connectivity. CB (i) H (i) (kin (i) 1)(kout (i) 1)
  • 8. •The score is proportional only to the local neighberhood •Very fast – low CPU and memory cost •Average 82% kin kout H (i) kin kout (kin kout ) (kin kout ) Problem : the algorithm is not sensitive to the network structure for example: for binary tree the algorithm is inefficient
  • 9. Nin (m) m N out (m) m H (i) / m Nin (m) m N out (m) Nin (i) number of incoming neighbours of level m Nin (i) average number of neighbours of level m weighted base
  • 10.
  • 11. As we decrease the upper threshold, we reduce the fraction of node couples for which a hierarchical position can be obtained  On the other hand, we increase the success rate for the remaining node couples.  Low upper cutoff leads to a tight definition of the hierarchy, with practically all edges in the proper direction, but with a low number of categorized edges,  High upper cutoff leads to a hierarchy, which is often unnatural.
  • 12.
  • 13. Microsoft Windows XP Pro operating system.  Links are directional and that the obtained network is practically acyclic,  Using the attraction basin hierarchy 6869 links out of 6899 (99.57%) were marked in the proper direction.  local hierarchy producing 98.57% of properly computed links,  PageRank with 96.13%.  HITS 90%  The centrality-based hierarchy 63%
  • 14.
  • 15.
  • 16.  Isthere a meaningful information flow between nodes in networks?  Specifically, can we extract from the network the meaningful paths of information?
  • 17.
  • 18.  Ifinformation flows, it should be sensitive to the precise direction of each edge.  We thus checked what happens when the direction of edges is flipped.  Strangely nothing changes in the network except for two things:  The distance distribution gets slightly shorter.  The circle distribution length gets drastically shorter.
  • 19.
  • 20.
  • 21.  The long circles include a well defined limited number of essential genes/neurons.  In the neural network these neurons map to the main trajectories from the sensor to the interneuron circles to the motor neurons.  In genetic network these trajectories relate the most essential genes (genes that their deletion leads to organism death).
  • 22. A simple toy network explains the observed results.
  • 23.  The spaghetti ball of networks can be replaced by clear hierarchies or organized information pathways.  The vast majority of edges can be removed while maintaining the important information flow.