SlideShare a Scribd company logo
1 of 20
Introduction to Networks and
Business Intelligence
Prof. Dr. Daning Hu
Department of Informatics
University of Zurich
Sep, 2012
2
Outline
 Network Science
 A “Random” History
 Network Analysis
 Network Topological Analysis: Random, Scale-Free, and Small-world
Networks
 Node level analysis
 Link Analysis
 Network Visualization
 Network-based Business Intelligence Application
3
Network Science
 Network science is an interdisciplinary academic field which
studies complex networks such as information networks,
biological networks, cognitive and semantic networks, and social
networks. It draws on theories and methods including (Wiki)
 Graph theory from mathematics, e.g., Small-world
 Statistical mechanics from physics, e.g., Rich get richer,
 Data mining and information visualization from computer science,
 Inferential modeling from statistics, e.g., Collaborative filtering
 Social structure from sociology, e.g., weak tie, structural holes
 The National Research Council defines network science as "the
study of network representations of physical, biological, and social
phenomena leading to predictive models of these phenomena.”
4
A “Random” History: Math, Psychology, Sociology…
 The study of networks has emerged in diverse disciplines as a
means of analyzing complex relational data.
 Network science has its root in Graph Theory.
 Seven Bridges of Königsberg written by Leonhard Euler in 1736.
 Vertices, Edges, Nodes, Links,
 a branch of mathematics that studies the properties of pairwise relations in a
network structure
 Social Network Analysis
 Jacob Moreno, a psychologist, developed the Sociogram and to “precisely
describe the interpersonal structure of a group”.
 Jacob’s experiment is the first to use Social Network Analysis and was
published in the New York Times (April 3, 1933, page 17).
 Stanley Milgram (Small World Experiment: Six Degrees of Separation,
1960s). Facebook: 5.28 steps in 2008, 4.74 in 2011.
5
Jacob Moreno’s experiment on Friendship Network
6
Now…
Node Link
Social network People Friendship, kinship, collaboration
Inter-organizational
network
Companies Strategic alliance, buyer-seller
relation, joint venture
Citation network Documents/authors Citation
Internet Routers/computers Wire, cable
WWW Web pages hyperlink
Biochemical network Genes/proteins Regulatory effect
… … …
Complex Networks in the Real World
7
Examples of Real-World Complex Networks
A collaboration network of
physicists (size < 1K)
Source: (Newman & Girvan,
2004)
The Internet
(size > 150K),
Source: Lumeta Corp.,
The Internet Mapping
Project
8
Network Analysis: Topology Analysis
 Network Topology Analysis takes a macro perspective to study
the physical properties of network structures. Network topological
measures include:
 Size,
 Density,
 Average Degree,
 Average Path Length: on average, the number of steps it takes to get
from one member of the network to another.
 Diameter
 Clustering Coefficient: a measure of an "all-my-friends-know-each-
other" property; small-world feature





1
)
(
)
1
(
2
)
(
i
i
i
i
i
Coeff
Clustering
CC
k
k
E
i
CC
ki = Cd(i) = # of neighbors of node i
Ei = # of links actually exist between ki nodes
9
Topology Analysis: Three Topology Models
 Random Network
 Erdős–Rényi Random Graph model
 used for generating random graphs in which edges are set between nodes
with equal probabilities
10
Topology Analysis: Three Topology Models
 Small-World Network
 Watts-Strogatz Small World model
 used for generating graphs with small-world properties
 large clustering coefficient
 high average path length
11
Topology Analysis: Three Topology Models
 Scale-Free Network
 Barabási–Albert (BA) Preferential Attachment model
 A network model used to demonstrate a preferential attachment or a "rich-
get-richer" effect.
 an edge is most likely to attach to
nodes with higher degrees.
 Power-law degree distribution
12
Network Analysis: Topology Analysis
Topology Average Path Length
(L)
Clustering
Coefficient (CC)
Degree Distribution
(P(k))
Random Graph Poisson Dist.:
Small World
(Watts & Strogatz, 1998)
Lsw  Lrand CCsw  CCrand
Similar to random
graph
Scale-Free network LSF  Lrand Power-law
Distribution:
P(k) ~ k-

k
N
Lrand
ln
ln
~
N
k
CCrand



!
)
(
k
k
e
k
P
k
k 

 



k : Average degree
13
Network Scientists
• Paul Erdős (Random graph model)
• Duncan Watts (Small-World model)
• A.-L. Barabási (Scale-Free model); “Linked”
• Mark Newman (SW and SF models)
14
Network Analysis: Node-level Analysis
 Node Centrality can be viewed as a measure of influence or
importance of nodes in a network.
 Degree
 the number of links that a node possesses in a network. In a directed
network, one must differentiate between in-links and out-links by
calculating in-degree and out-degree.
 Betweeness
 the number of shortest paths in a network that traverse through that node.
 Closeness
 the average distance that each node is from all other nodes in the network
15
Example: Centrality Measures of Bin Laden in a
Global Terrorist Network
0
10
20
30
40
50
60
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
Degree
0
500
1000
1500
2000
2500
3000
3500
4000
4500
5000
1
9
8
9
1
9
9
0
1
9
9
1
1
9
9
2
1
9
9
3
1
9
9
4
1
9
9
5
1
9
9
6
1
9
9
7
1
9
9
8
1
9
9
9
2
0
0
0
2
0
0
1
2
0
0
2
Betweenness
0
50
100
150
200
250
300
350
400
1
9
8
9
1
9
9
0
1
9
9
1
1
9
9
2
1
9
9
3
1
9
9
4
1
9
9
5
1
9
9
6
1
9
9
7
1
9
9
8
1
9
9
9
2
0
0
0
2
0
0
1
2
0
0
2
Closeness
 The changes in the degree,
betweenness and closeness of
the node bin Laden from 1989
to 2002
16
Findings and Possible Explanations
 The changes described in the above figure show that
 From 1994 to 1996, bin Laden’s betweenness decreased a lot and then increased
until 2001
 In 1994, The Saudi government revoked his citizenship and expelled him from
the country
 In 1995, he then went to Khartoum, Sudan, but under U.S. pressure was
expelled Again
 In 1996, bin Laden returned to Afghanistan established camps and refuge
there
 From 1998 to 1999, there is another sharp decrease in betweenness
 After 1998 bombings of the United States embassies around world, President
Bill Clinton ordered a freeze on assets linked to bin Laden
 Since then, bin Laden was officially listed as one of the FBI Ten Most Wanted
Fugitives and FBI Most Wanted Terrorists
 In August 1998, the U.S. military launched an assassination but failed to harm
bin Laden but killed 19 other people
 In 1999, United States convinced the United Nations to impose sanctions
against Afghanistan in an attempt to force the Taliban to extradite him
17
Network Analysis: Link Analysis
 Link analysis focuses on the prediction of link formations
between a pair of nodes based on various network factors. Its
applications include:
 Finance: Insurance fraud detections
 E-commerce: recommendation systems, e.g., Amazon
 Internet Search Engine: Google PageRank
 Law Enforcement: Crime link predictions
18
Network Visualization: Expert Partition of the
Collaboration Network
Weapons of
massive
destruction
Terrorism in
Europe
Criminal
justice
An international
terrorism conf.
Rand Corp.
Historical and policy
perspective of
terrorism
Not well-defined
group
Legal
perspective of
terrorism
19
20
Network-based Business Applications
 Facebook: People you may know

More Related Content

Similar to intro to sna.ppt

02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and OverviewDuke Network Analysis Center
 
ICPSR - Complex Systems Models in the Social Sciences - Lecture 2 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 2 - Professor...ICPSR - Complex Systems Models in the Social Sciences - Lecture 2 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 2 - Professor...Daniel Katz
 
An Introduction to Network Theory
An Introduction to Network TheoryAn Introduction to Network Theory
An Introduction to Network TheorySocialphysicist
 
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)Daniel Katz
 
Visually Exploring Social Participation in Encyclopedia of Life
Visually Exploring Social Participation in Encyclopedia of LifeVisually Exploring Social Participation in Encyclopedia of Life
Visually Exploring Social Participation in Encyclopedia of LifeHarish Vaidyanathan
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network AnalysisMarc Smith
 
Socialnetworkanalysis
SocialnetworkanalysisSocialnetworkanalysis
Socialnetworkanalysiskcarter14
 
Descobrindo o tesouro escondido nos seus dados usando grafos.
Descobrindo o tesouro escondido nos seus dados usando grafos.Descobrindo o tesouro escondido nos seus dados usando grafos.
Descobrindo o tesouro escondido nos seus dados usando grafos.Ana Appel
 
Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Tin180 VietNam
 
Social networkanalysisfinal
Social networkanalysisfinalSocial networkanalysisfinal
Social networkanalysisfinalkcarter14
 
Defining Business Network
Defining Business NetworkDefining Business Network
Defining Business NetworkWaqas Tariq
 
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...Marc Smith
 
New Metrics for New Media Bay Area CIO IT Executives Meetup
New Metrics for New Media Bay Area CIO IT Executives MeetupNew Metrics for New Media Bay Area CIO IT Executives Meetup
New Metrics for New Media Bay Area CIO IT Executives MeetupTatyana Kanzaveli
 
Network Structure For Social Network
Network Structure For Social NetworkNetwork Structure For Social Network
Network Structure For Social NetworkVaibhav Sathe
 
2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith
2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith
2010-November-8-NIA - Smart Society and Civic Culture - Marc SmithMarc Smith
 
Why rumors spread fast in social networks
Why rumors spread fast in social networksWhy rumors spread fast in social networks
Why rumors spread fast in social networksaugustodefranco .
 
History of the Internet.doc
History of the Internet.docHistory of the Internet.doc
History of the Internet.docNPeredaSamyJ
 

Similar to intro to sna.ppt (20)

02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview
 
Network Science: Theory, Modeling and Applications
Network Science: Theory, Modeling and ApplicationsNetwork Science: Theory, Modeling and Applications
Network Science: Theory, Modeling and Applications
 
ICPSR - Complex Systems Models in the Social Sciences - Lecture 2 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 2 - Professor...ICPSR - Complex Systems Models in the Social Sciences - Lecture 2 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 2 - Professor...
 
An Introduction to Network Theory
An Introduction to Network TheoryAn Introduction to Network Theory
An Introduction to Network Theory
 
DREaM Event 2: Louise Cooke
DREaM Event 2: Louise CookeDREaM Event 2: Louise Cooke
DREaM Event 2: Louise Cooke
 
SSRI_pt1.ppt
SSRI_pt1.pptSSRI_pt1.ppt
SSRI_pt1.ppt
 
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
 
Visually Exploring Social Participation in Encyclopedia of Life
Visually Exploring Social Participation in Encyclopedia of LifeVisually Exploring Social Participation in Encyclopedia of Life
Visually Exploring Social Participation in Encyclopedia of Life
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
 
Socialnetworkanalysis
SocialnetworkanalysisSocialnetworkanalysis
Socialnetworkanalysis
 
Descobrindo o tesouro escondido nos seus dados usando grafos.
Descobrindo o tesouro escondido nos seus dados usando grafos.Descobrindo o tesouro escondido nos seus dados usando grafos.
Descobrindo o tesouro escondido nos seus dados usando grafos.
 
Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)
 
Social networkanalysisfinal
Social networkanalysisfinalSocial networkanalysisfinal
Social networkanalysisfinal
 
Defining Business Network
Defining Business NetworkDefining Business Network
Defining Business Network
 
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
 
New Metrics for New Media Bay Area CIO IT Executives Meetup
New Metrics for New Media Bay Area CIO IT Executives MeetupNew Metrics for New Media Bay Area CIO IT Executives Meetup
New Metrics for New Media Bay Area CIO IT Executives Meetup
 
Network Structure For Social Network
Network Structure For Social NetworkNetwork Structure For Social Network
Network Structure For Social Network
 
2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith
2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith
2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith
 
Why rumors spread fast in social networks
Why rumors spread fast in social networksWhy rumors spread fast in social networks
Why rumors spread fast in social networks
 
History of the Internet.doc
History of the Internet.docHistory of the Internet.doc
History of the Internet.doc
 

More from NISHASOMSCS113

Building blocks of Algblocks of Alg.pptx
Building blocks of Algblocks of Alg.pptxBuilding blocks of Algblocks of Alg.pptx
Building blocks of Algblocks of Alg.pptxNISHASOMSCS113
 
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...NISHASOMSCS113
 
Exception handling.pptx
Exception handling.pptxException handling.pptx
Exception handling.pptxNISHASOMSCS113
 
Introduction to Information Storage.pptx
Introduction to Information Storage.pptxIntroduction to Information Storage.pptx
Introduction to Information Storage.pptxNISHASOMSCS113
 

More from NISHASOMSCS113 (9)

Building blocks of Algblocks of Alg.pptx
Building blocks of Algblocks of Alg.pptxBuilding blocks of Algblocks of Alg.pptx
Building blocks of Algblocks of Alg.pptx
 
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
Exception handling.pptx
Exception handling.pptxException handling.pptx
Exception handling.pptx
 
Introduction to Information Storage.pptx
Introduction to Information Storage.pptxIntroduction to Information Storage.pptx
Introduction to Information Storage.pptx
 
recursion.ppt
recursion.pptrecursion.ppt
recursion.ppt
 
social.pptx
social.pptxsocial.pptx
social.pptx
 
Data Management.pptx
Data Management.pptxData Management.pptx
Data Management.pptx
 
intro.ppt
intro.pptintro.ppt
intro.ppt
 

Recently uploaded

An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 

Recently uploaded (20)

An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 

intro to sna.ppt

  • 1. Introduction to Networks and Business Intelligence Prof. Dr. Daning Hu Department of Informatics University of Zurich Sep, 2012
  • 2. 2 Outline  Network Science  A “Random” History  Network Analysis  Network Topological Analysis: Random, Scale-Free, and Small-world Networks  Node level analysis  Link Analysis  Network Visualization  Network-based Business Intelligence Application
  • 3. 3 Network Science  Network science is an interdisciplinary academic field which studies complex networks such as information networks, biological networks, cognitive and semantic networks, and social networks. It draws on theories and methods including (Wiki)  Graph theory from mathematics, e.g., Small-world  Statistical mechanics from physics, e.g., Rich get richer,  Data mining and information visualization from computer science,  Inferential modeling from statistics, e.g., Collaborative filtering  Social structure from sociology, e.g., weak tie, structural holes  The National Research Council defines network science as "the study of network representations of physical, biological, and social phenomena leading to predictive models of these phenomena.”
  • 4. 4 A “Random” History: Math, Psychology, Sociology…  The study of networks has emerged in diverse disciplines as a means of analyzing complex relational data.  Network science has its root in Graph Theory.  Seven Bridges of Königsberg written by Leonhard Euler in 1736.  Vertices, Edges, Nodes, Links,  a branch of mathematics that studies the properties of pairwise relations in a network structure  Social Network Analysis  Jacob Moreno, a psychologist, developed the Sociogram and to “precisely describe the interpersonal structure of a group”.  Jacob’s experiment is the first to use Social Network Analysis and was published in the New York Times (April 3, 1933, page 17).  Stanley Milgram (Small World Experiment: Six Degrees of Separation, 1960s). Facebook: 5.28 steps in 2008, 4.74 in 2011.
  • 5. 5 Jacob Moreno’s experiment on Friendship Network
  • 6. 6 Now… Node Link Social network People Friendship, kinship, collaboration Inter-organizational network Companies Strategic alliance, buyer-seller relation, joint venture Citation network Documents/authors Citation Internet Routers/computers Wire, cable WWW Web pages hyperlink Biochemical network Genes/proteins Regulatory effect … … … Complex Networks in the Real World
  • 7. 7 Examples of Real-World Complex Networks A collaboration network of physicists (size < 1K) Source: (Newman & Girvan, 2004) The Internet (size > 150K), Source: Lumeta Corp., The Internet Mapping Project
  • 8. 8 Network Analysis: Topology Analysis  Network Topology Analysis takes a macro perspective to study the physical properties of network structures. Network topological measures include:  Size,  Density,  Average Degree,  Average Path Length: on average, the number of steps it takes to get from one member of the network to another.  Diameter  Clustering Coefficient: a measure of an "all-my-friends-know-each- other" property; small-world feature      1 ) ( ) 1 ( 2 ) ( i i i i i Coeff Clustering CC k k E i CC ki = Cd(i) = # of neighbors of node i Ei = # of links actually exist between ki nodes
  • 9. 9 Topology Analysis: Three Topology Models  Random Network  Erdős–Rényi Random Graph model  used for generating random graphs in which edges are set between nodes with equal probabilities
  • 10. 10 Topology Analysis: Three Topology Models  Small-World Network  Watts-Strogatz Small World model  used for generating graphs with small-world properties  large clustering coefficient  high average path length
  • 11. 11 Topology Analysis: Three Topology Models  Scale-Free Network  Barabási–Albert (BA) Preferential Attachment model  A network model used to demonstrate a preferential attachment or a "rich- get-richer" effect.  an edge is most likely to attach to nodes with higher degrees.  Power-law degree distribution
  • 12. 12 Network Analysis: Topology Analysis Topology Average Path Length (L) Clustering Coefficient (CC) Degree Distribution (P(k)) Random Graph Poisson Dist.: Small World (Watts & Strogatz, 1998) Lsw  Lrand CCsw  CCrand Similar to random graph Scale-Free network LSF  Lrand Power-law Distribution: P(k) ~ k-  k N Lrand ln ln ~ N k CCrand    ! ) ( k k e k P k k        k : Average degree
  • 13. 13 Network Scientists • Paul Erdős (Random graph model) • Duncan Watts (Small-World model) • A.-L. Barabási (Scale-Free model); “Linked” • Mark Newman (SW and SF models)
  • 14. 14 Network Analysis: Node-level Analysis  Node Centrality can be viewed as a measure of influence or importance of nodes in a network.  Degree  the number of links that a node possesses in a network. In a directed network, one must differentiate between in-links and out-links by calculating in-degree and out-degree.  Betweeness  the number of shortest paths in a network that traverse through that node.  Closeness  the average distance that each node is from all other nodes in the network
  • 15. 15 Example: Centrality Measures of Bin Laden in a Global Terrorist Network 0 10 20 30 40 50 60 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 Degree 0 500 1000 1500 2000 2500 3000 3500 4000 4500 5000 1 9 8 9 1 9 9 0 1 9 9 1 1 9 9 2 1 9 9 3 1 9 9 4 1 9 9 5 1 9 9 6 1 9 9 7 1 9 9 8 1 9 9 9 2 0 0 0 2 0 0 1 2 0 0 2 Betweenness 0 50 100 150 200 250 300 350 400 1 9 8 9 1 9 9 0 1 9 9 1 1 9 9 2 1 9 9 3 1 9 9 4 1 9 9 5 1 9 9 6 1 9 9 7 1 9 9 8 1 9 9 9 2 0 0 0 2 0 0 1 2 0 0 2 Closeness  The changes in the degree, betweenness and closeness of the node bin Laden from 1989 to 2002
  • 16. 16 Findings and Possible Explanations  The changes described in the above figure show that  From 1994 to 1996, bin Laden’s betweenness decreased a lot and then increased until 2001  In 1994, The Saudi government revoked his citizenship and expelled him from the country  In 1995, he then went to Khartoum, Sudan, but under U.S. pressure was expelled Again  In 1996, bin Laden returned to Afghanistan established camps and refuge there  From 1998 to 1999, there is another sharp decrease in betweenness  After 1998 bombings of the United States embassies around world, President Bill Clinton ordered a freeze on assets linked to bin Laden  Since then, bin Laden was officially listed as one of the FBI Ten Most Wanted Fugitives and FBI Most Wanted Terrorists  In August 1998, the U.S. military launched an assassination but failed to harm bin Laden but killed 19 other people  In 1999, United States convinced the United Nations to impose sanctions against Afghanistan in an attempt to force the Taliban to extradite him
  • 17. 17 Network Analysis: Link Analysis  Link analysis focuses on the prediction of link formations between a pair of nodes based on various network factors. Its applications include:  Finance: Insurance fraud detections  E-commerce: recommendation systems, e.g., Amazon  Internet Search Engine: Google PageRank  Law Enforcement: Crime link predictions
  • 18. 18 Network Visualization: Expert Partition of the Collaboration Network Weapons of massive destruction Terrorism in Europe Criminal justice An international terrorism conf. Rand Corp. Historical and policy perspective of terrorism Not well-defined group Legal perspective of terrorism
  • 19. 19
  • 20. 20 Network-based Business Applications  Facebook: People you may know