Robustness of Centrality Measures for Small-World Networks Containing Systematic Error

Size: px
Start display at page:

Download "Robustness of Centrality Measures for Small-World Networks Containing Systematic Error"

Transcription

1 Robustness of Centrality Measures for Small-World Networks Containing Systematic Error Amanda Lannie Analytical Systems Branch, Air Force Research Laboratory, NY, USA Abstract Social network analysis is a necessary aspect of learning terrorist/criminal networks, or of how people interact through social networking sites like Facebook and Twitter. The metrics used to evaluate these networks are equally as important, centrality measures being the most common. Being the most routinely used metrics, centrality measures have been tested under various conditions. However, there is a lacking focus on systematic error applied to computer generated connected undirected smallworld networks. The goal of this paper is to test the centrality measures (betweenness, closeness, and degree) in such networks and test their robustness after the introduction of systematic error. The experiment found that the metrics performed poorly and their use would have to be determined based on the situation and consequences. Keywords: networks centrality; systematic error; small-world 1 INTRODUCTION The centrality measures betweenness, closeness, and degree are common metrics for measuring aspects of a social network. Betweenness is the measure of the number of nodes between a pair of nodes. In [1], Freeman claims that to calculate betweenness one must compute: ( ) ( ) (1) σ st is the total number of paths from node s to node t. σ st (v) is the number of σ st paths that contain node v. Explicitly, Equation 1 is the sum of the quotients (σ st (v) divided by σ st ) for all pairs of nodes. The value computed represents a node s ability to control the flow of information. Closeness measures a node s number of contacts including both direct and indirect ones; thus, the measure is a representation of how well connected a node is. The formula for calculating closeness from [2] is: ( ) (2) where d vj is the shortest path from v to j. Degree is the number of direct contacts a node has. According to [2], the equation to compute degree can be defined as: ( ) (3) The a ij is representative of an element in an adjacency matrix representation of the graph. The more direct connections a node has the more possibilities the node has to send/receive information. Betweenness, closeness, and degree are sensitive to changes made to a social network. Consider Figure 1 and assume the network shown is complete. Now look at Figure 2; it is missing the black node in the previous figure. That is four missing connections and now the node with the most connections is missing. In addition, the betweenness and closeness values for Figure 2 would differ from Figure 1. The values would be misleading and possibly detrimental to someone using the measures to focus on important nodes (people) like someone tracking a criminal or terrorist network. Therefore, in the case of Figure 2, the most important person according to the degree measure is missing. Besides real world scenarios, it is crucial to test the robustness of centrality measures since they are the most frequently used metrics for social network analysis. Our contribution is to determine the robustness of betweenness, closeness, and degree when it comes to small-world networks with systematic error introduced which will create bias in the subgraphs. According to [3], systematic error is error that is not determined by chance but is introduced by an inaccuracy, by observation or measurement, inherent in the system. This research uses connected small-world networks for the ground truths to simulate real world data as closely as possible. A ground truth network represents a complete network, one without missing information like a person or relationship. To mimic cases of missing information and bias (introducing systematic error), we use subgraphs of the ground truths. The creation of subgraphs involves choosing one node as the starting point and like real world scenarios the further away a node is from the starting point the less likely it will be discovered. The setup is analogous to tracking a criminal/terrorist network, and the goal was to study the performance of the metrics used on the subgraphs, specifically their robustness.

2 Fig. 1. A connected undirected small-world network where the number of neighbors was originally two. The black node is the most important person in terms of degree. 2 RELATED WORK In 1988, John M. Bolland published a paper that explores the robustness of the centrality measures (betweenness, closeness, degree, and eigenvector). He used a real world network and manipulated versions of it. Bolland then inserted random systematic variation into the data from which he was able to make several conclusions. Betweenness is usually unstable when up against random error and is sensitive to systematic variation. Secondly, closeness is susceptible to both random and systematic variation on the outer edges of a network. Bolland also concluded that degree is useful in its ability to concurrently ignore random variation while reacting to systematic variation [4]. Costenbader and Valente also dealt with real data, specifically 59 networks. Their approach uses bootstrap sampling processes to establish how sampling influences the stability of 11 different network centrality measures [5]. Of the 11, among them were betweenness, closeness, and degree. From their research, Constenbader and Valente were able to conclude that betweenness and degree had lower correlations for an undirected graph than a directed one where the correlation is between actual and sampled measures. Additionally, closeness has superior performance for directed graphs when compared to undirected ones. In 2006, Borgatti, Carley, and Krackhardt tested the Fig. 2. Figure 1 with missing information, the black node and its connections. robustness of degree, betweenness, closeness, and eigenvector centralities when it came to a large sample of random graphs. The authors of [6] control the amount of error in the observed graphs by adding or removing edges or nodes. They concluded that the measures are robust if the error is less than or equal to 10%. They were of the mind that it would be difficult to tell if such accuracy (61% or better depending on the amount of error of 10% or less) would be acceptable since it would depend on the situation and consequences. Unlike [6], this research focuses on the robustness of centrality measures under systematic instead of random Node Level TABLE I. WHY THERE ARE 171 GROUND TRUTHS WHEN THERE IS ONE SET FOR EVERY NODE LEVEL. 8% Number of Neighbors to Control (#) means the actual density of the graph 16% 24% 32% 40% 10 2 (22) 4 (44) (25) 8 (33) 10 (41) 48% Fig. 3. With increasing randomness, k-circulant graphs evolve to exhibit properties of random graphs in G(n, p). Small-world networks are intermediate between k-circulant graphs and random graphs in G(n, p) [7].

3 Algorithm 1 Altered Breadth First Search 1 st pass /* origgraph is a graph and a member to the class to which these methods belong */ Input: start node Output: hops Create hashtable visited, queue current, queue nextit Set hops to 0 Add start node to visited origgraph.getneighbors(start node) for each neighbor of the start node Add neighbor to current while current and nextit aren t empty while current is not empty Remove node from current Add node to visited origgraph.getneighbors(node) for each neighbor of the node if current, nextit, and visited doesn t contain the neighbor then Add neighbor to nextit end if Increment hops Copy contents of nextit to current error. Additionally, different from [4] and [5], the networks used are not based on real data, but are created from an algorithm to generate small-world graphs. Furthermore, [4] introduces systematic variation into the ground truth network by adding randomly-selected links to four different nodes. In contrast, we introduce a bias during the creation of subgraphs that comes from a focus on one specific node and nodes further away from the start node are less likely to be added to the subgraph. 3 METHODOLOGY Nine hundred sixty-three ground truth networks (connected undirected small-world graphs) were made using Python 2.7 and NetworkX ([7]). A ground truth network has 10, 25, 50, or 100 nodes. For each of those possibilities, a graph was generated with the probability of rewiring edges of with increments of 0.1. The higher the probability the more likely edges are to change thus creating a more random graph instead of maintaining its circulant form, see Figure 3. When rewiring an edge, one end remains the same and the other receives a new node; this introduces randomness into the network. For each generated subgraph, there would be a density of approximately 8%, 16%, 24%, 32%, 40%, and 48%, constraints permitting. NetworkX s method uses a third parameter, number of neighbors, to control the density of the graph. Neighbors are the number of nodes every node has a connection to. The algorithm in [8] considers the basis for a small-world graph is a k-circulant graph. According to [8], k is the number of neighbors every node has and must be even. Choosing four neighbors would Algorithm 2 Altered Breadth First Search 2 nd pass /* origgraph is a graph and a member to the class to which these methods belong */ Input: start node, hops, thresholdincrements Output: subgraphnodes Create hashtable subgraphnodes, hashtable visited, queue current, queue nextit Set hops to number from 1 st pass Add start node to visited origgraph.getneighbors(start node) for each neighbor of the start node Add neighbor to current while current and nextit aren t empty while current is not empty Remove node from current Add node to visited origgraph.getneighbors(node) for each neighbor of the node if current, nextit, and visited doesn t contain the neighbor then Add neighbor to nextit end if Generate a random number between 0 and 1 if generated number >= (1 (thresholdincrements * (hops + 1)) then Add node to subgraphnodes end if Decrement hops Copy contents of nextit to current mean that for each node, the node has connections to the two nodes on its left and the two on its right. The number of neighbors also has the constraint that they be less than Equation 4. (4) Any additional neighbors than that and the graph will contain duplicate edges. After the generation of the k- circulant graph, the method would randomly choose edges to rewire. One full set is 171 ground truths; for a view of the setup to determine this number see Table I. However, there was concern of a bias towards the subgraphs generated from the 100 node cases. The experiment considers every node in a ground truth as a starting point from which to create a subgraph. This is why there is a need to generate more cases for ten, twentyfive, and fifty node cases. As Table II shows, the experiment has thirty-four sets of ground truths for 10 node cases, five for 25 nodes, and two for 50. Thus, the number of instances with a ground truth of 10 nodes became 20,533; 18,606 for 25 nodes; 21,595 for 50 nodes; and 21,600 for 100 nodes. The number of samples does not include cases where a subgraph had no nodes or was exactly like a ground truth network. The additional instances allows for a more even distribution among the node levels, which will remove the bias when computing overall measures. For instance,

4 without the correction, if we compute the betweenness at every percent error value, then we would get values closer to the results of the 100 nodes cases rather than ones that represent all four node levels equally. Writing a plug-in for Gephi, open source software for graphs that allows the user to visualize and manipulate them, we were able to create all of the subgraphs. The creation process of a subgraph inserts the systematic error. Each node from the ground truth is chosen as the focal point for the subgraph. As the focal point, the other nodes surrounding it are considered to have less visibility and thereby less probability of being included in the subgraph, introducing bias. If a node is not included, then neither is its connections. This is different than [6] s approach of determining the robustness of centrality measures on imperfect data where random nodes and edges were added or removed to create a new graph. The algorithm to create a subgraph uses a slightly altered breadth first search (BFS) for connected graphs; see Algorithms 1 and 2. Instead of using one queue, the modified breadth first search uses two. One queue is for the current level of nodes for the ground truth and the second is for the next level out. A subgraph generation requires two passes through the amended BFS. The first pass (Algorithm 1) determines the number of hops (steps from the start node to the outer most node(s)). Hops or steps are the maximum number of edges it takes to visit all nodes. In Algorithm 1, every time the queue for the current level is empty, the number of hops is increased by one. Figuring out the number of steps determines the possibility of keeping (visibility) of each node. If there were four hops and the initial visibility was one, then the probability of keeping a node decreases by 0.2 at each step. Dividing the initial visibility (0.25, 0.5, 0.75, and 1, each is applied to all ground truths) by number of steps plus one allows for the possibility of keeping the outer most node(s) instead of removing them all together. Additionally, the start node has the possibility of not being included in the final subgraph. During the second pass (Algorithm 2), all nodes receive a visibility based on the number of steps it is from the start node. In addition, each node receives a number that represents its actual visibility. If the actual number of steps is greater than or equal to one minus the visibility the node is included in the subgraph. After deciding for every node in the ground truth to keep it or not, the edges that were connected to the removed nodes are also removed. The leftover nodes and edges make up the resulting subgraph. For every ground truth, the Gephi plug-in generates two output files. One contains the centrality values (betweenness, closeness, and degree) for each node and the other has the absolute difference of the subgraph values and ground truth values. The centrality values come from a statistics plug-in that came with the Gephi code. Production of the betweenness values is different than Equation 1. Instead, the creators of Gephi decided to use the algorithm in [2] to improve the speed of the calculations; the authors claim to compute the exact answer produced by Equation 1 unlike other methods that reduce computation time which only produce an approximate answer. Like betweenness, Gephi s closeness computations come to the same answers, but use an alternate algorithm. Gephi uses the algorithm from [2] that determines shortest paths. For degree, Gephi uses a node s degree. In addition to the new centrality files, a delta file contains the metrics Top 1, Top 3, and Top 10% from [6]. Top 1: Proportion of times that the most central node in the true network is also the most central node in the observed network. Top 3: Proportion of times that the most central node in the observed network is among the top three most central nodes in the true network. Top 10%: Proportion of times that the most central node in the observed network is among the top ten percent of nodes in the true network. The measures were a way of determining if the top person in a subgraph was in the set of top people in the corresponding ground truth. For the cases where multiple nodes had the same value, all nodes are included in the set of top nodes. The top measures consider this case during computation. 4 RESULTS A great deal of data was generated for and from this experiment. As mentioned before, 963 ground truths were created using NetworkX. From those, Gephi was able to create 82,334 subgraphs. The breakdown based on node level is in Table II. According to Figure 4, by increasing the number of nodes in a subgraph, it reduces the amount of error within it. We use to compute the amount of error in a subgraph. Additionally, the more nodes in a subgraph, the more accurate the centrality values are. According to Figure 5, regardless of centrality measure, the more error in a subgraph the less accurate the centrality values were. Inaccuracy in Figures 5, 6, and 7 is calculated as (6) (5)

5 Fig. 4. The average percent error for each number of nodes in a subgraph for every node level. Fig. 7. The average amount of inaccuracy for each percent error shown for every node level. TABLE II. NUMBER OF SUBGRAPHS GENERATED FROM 963 GROUND TRUTHS. IT DOES NOT INCLUDE CASES WHERE THERE WERE NO NODES OR THE SUBGRAPH WAS THE SAME AS THE GROUND TRUTH. Number of Nodes in Ground Truth Number of Subgraphs Generated for Node Level Number of Sets Created to Avoid Bias 10 20, , , ,600 1 Fig. 5. The average amount of inaccuracy for percent error shown for each centrality measure. Fig. 6. A closer look at Figure 5 s closeness and degree. and is a representation of how different the subgraph s value was to the ground truth s and how that difference compares to the ground truth s value. Betweenness had the worst performance because at 60% error the node levels started to have different amounts of inaccuracy, see Figure 7. The nodes in subgraphs, generated from ground truths with 50 and 100 nodes, had vastly different values in comparison to the ground truth values. Those cases had to compensate for a great deal of missing nodes. A subgraph made from a 50 nodes ground truth, according to the data and as seen in Figure 4, could contain 1 to 38 nodes. Figure 4 also shows that for 100 node cases, the subgraphs had anywhere from 2 to 69 nodes. We suspect the gap comes from how the subgraphs are generated and how the hops played out. Total 82,334 By observing Table III, we can see that the top person in the subgraphs is hardly ever in the top portion in the ground truths. Table IV compares our results to Borgatti et al s results for the 100 nodes, 50% density, and 50% error removed nodes case. Our values are from 100 nodes, 50% error, and 48% density; it is the case closest to Borgatti et al. s. In comparison to Borgatti et al. s case, our numbers are lower, significantly so for Top 3 and Top 10%. They concluded that the measures are robust for networks that contain error of 10% or less, even then whether the levels of accuracy are sufficient for any given purpose depends on external factors such as the consequences of error [6]. Since the accuracy levels for this experiment are lower, this indicates that betweenness, closeness, and degree are not robust when used on small-world networks containing systematic error. 5 CONCLUSION Based on Table III, it appears that the information about the top nodes in the ground truths is lost when looking at subgraphs. Not only that, according to Figure 5, the centrality values for the individual nodes in the subgraphs vary from the ground truth values, particularly betweenness. The accuracies in Table III prove that the centrality measures of betweenness, closeness, and degree are not robust enough to withstand missing information (systematic error) in connected undirected small-world networks. At least, they should not be used if the situation and consequences could not handle such low accuracy. Additionally, while Borgatti et al. found the measures to be

6 robust for small measures of error, based on Figures 5 and 6 this is not the case for this experiment. 6 FUTURE WORK Despite all the research done on the robustness of betweenness, closeness, and degree, it could be furthered still in the following ways. Firstly, an experiment could be removing edges only instead of nodes. This could then be compared to Borgatti et al.'s case for removed edges. Such an experiment would test the robustness of the centrality measures for the case where all people are known but not all of the relationships between them are. Additionally, another way to expand upon this paper's research is to always keep the start node. By doing this, one could use Bolland's metrics of local and configural sensitivity and be able to compare those results with his data. This study would determine how sensitive biased graphs (social networks where their creation starts with a focus on one person) are and possibly where. Finally, investigating the robustness of centrality measures when focusing on the most and least important nodes could further this study. We could determine how well those measures perform if the network was created from the most or least important person. REFERENCES [1] L. C. Freeman, A Set of Measures of Centrality Based on Betweenness, Sociometry, vol. 40, 1977, pp [2] U. Brandes, A Faster Algorithm for Betweenness Centrality, Journal of Mathematical Sociology, vol. 25, 2001, pp [3] (2013, May 28). Systematic error [Online]. Available: [4] J. M. Bolland, Sorting Out Centrality: An Analysis of the Performance of Four Centrality Models in Real and Simulated Networks, Social Networks, vol. 10, Sept. 1988, pp , doi: / (88) [5] E. Costenbader and T. W. Valente, The Stability of Centrality Measures When Networks are Sampled, Social Networks, vol. 25, Oct. 2003, pp , doi: /S (03) [6] S. P. Borgatti, K. M. Carley, and D. Krackhardt, On the Robustness of Centrality Measures Under Conditions of Imperfect Data, Social Networks, vol. 28, May 2006, pp , doi: /j.socnet [7] (2011, Oct. 21). NetworkX [Online]. Available: [8] D. Joyner, M. Van Nguyen, and N. Cohen, Algorithmic Graph Theory TABLE III. AVERAGE ACCURACY 10 Nodes 25 Nodes 50 Nodes 100 Nodes All Node Levels Top Top Top 10% TABLE IV. ACCURACY RESULTS FOR GRAPHS OF 100 NODES AND 50% DENSITY AND 50% ERROR Betweenness Closeness Degree Borgatti et al. s Results Our Results Borgatti et al. s Results Our Results Borgatti et al. s Results Our Results Top 1 Top 3 Top 10%

ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT

ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT Xiaojia He 1 and Natarajan Meghanathan 2 1 University of Georgia, GA, USA, 2 Jackson State University, MS, USA 2 natarajan.meghanathan@jsums.edu

More information

Centralities (4) By: Ralucca Gera, NPS. Excellence Through Knowledge

Centralities (4) By: Ralucca Gera, NPS. Excellence Through Knowledge Centralities (4) By: Ralucca Gera, NPS Excellence Through Knowledge Some slide from last week that we didn t talk about in class: 2 PageRank algorithm Eigenvector centrality: i s Rank score is the sum

More information

Graph Structure Over Time

Graph Structure Over Time Graph Structure Over Time Observing how time alters the structure of the IEEE data set Priti Kumar Computer Science Rensselaer Polytechnic Institute Troy, NY Kumarp3@rpi.edu Abstract This paper examines

More information

Centrality Book. cohesion.

Centrality Book. cohesion. Cohesion The graph-theoretic terms discussed in the previous chapter have very specific and concrete meanings which are highly shared across the field of graph theory and other fields like social network

More information

THE KNOWLEDGE MANAGEMENT STRATEGY IN ORGANIZATIONS. Summer semester, 2016/2017

THE KNOWLEDGE MANAGEMENT STRATEGY IN ORGANIZATIONS. Summer semester, 2016/2017 THE KNOWLEDGE MANAGEMENT STRATEGY IN ORGANIZATIONS Summer semester, 2016/2017 SOCIAL NETWORK ANALYSIS: THEORY AND APPLICATIONS 1. A FEW THINGS ABOUT NETWORKS NETWORKS IN THE REAL WORLD There are four categories

More information

An Information Theory Approach to Identify Sets of Key Players

An Information Theory Approach to Identify Sets of Key Players An Information Theory Approach to Identify Sets of Key Players Daniel Ortiz-Arroyo and Akbar Hussain Electronics Department Aalborg University Niels Bohrs Vej 8, 6700 Esbjerg Denmark do@cs.aaue.dk, akbar@cs.aaue.dk

More information

CONTRIBUTION TO THE INVESTIGATION OF STOPPING SIGHT DISTANCE IN THREE-DIMENSIONAL SPACE

CONTRIBUTION TO THE INVESTIGATION OF STOPPING SIGHT DISTANCE IN THREE-DIMENSIONAL SPACE National Technical University of Athens School of Civil Engineering Department of Transportation Planning and Engineering Doctoral Dissertation CONTRIBUTION TO THE INVESTIGATION OF STOPPING SIGHT DISTANCE

More information

Figure 1: A directed graph.

Figure 1: A directed graph. 1 Graphs A graph is a data structure that expresses relationships between objects. The objects are called nodes and the relationships are called edges. For example, social networks can be represented as

More information

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr. Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.

More information

TIE Graph algorithms

TIE Graph algorithms TIE-20106 239 11 Graph algorithms This chapter discusses the data structure that is a collection of points (called nodes or vertices) and connections between them (called edges or arcs) a graph. The common

More information

Robust Ring Detection In Phase Correlation Surfaces

Robust Ring Detection In Phase Correlation Surfaces Griffith Research Online https://research-repository.griffith.edu.au Robust Ring Detection In Phase Correlation Surfaces Author Gonzalez, Ruben Published 2013 Conference Title 2013 International Conference

More information

Lecture (08, 09) Routing in Switched Networks

Lecture (08, 09) Routing in Switched Networks Agenda Lecture (08, 09) Routing in Switched Networks Dr. Ahmed ElShafee Routing protocols Fixed Flooding Random Adaptive ARPANET Routing Strategies ١ Dr. Ahmed ElShafee, ACU Fall 2011, Networks I ٢ Dr.

More information

A COMPUTATIONAL METHOD FOR CALCULATING UNCERTAINTY IN PROJECT NETWORKS WITH DEPENDENCIES

A COMPUTATIONAL METHOD FOR CALCULATING UNCERTAINTY IN PROJECT NETWORKS WITH DEPENDENCIES Proceedings from the 2004 ASEM National Conference pp. 453-460, Alexandria, VA (October 20-23, 2004) A COMPUTATIONAL METHOD FOR CALCULATING UNCERTAINTY IN PROJECT NETWORKS WITH DEPENDENCIES Santiago Erquicia,

More information

CS 310 Advanced Data Structures and Algorithms

CS 310 Advanced Data Structures and Algorithms CS 31 Advanced Data Structures and Algorithms Graphs July 18, 17 Tong Wang UMass Boston CS 31 July 18, 17 1 / 4 Graph Definitions Graph a mathematical construction that describes objects and relations

More information

Finding a winning strategy in variations of Kayles

Finding a winning strategy in variations of Kayles Finding a winning strategy in variations of Kayles Simon Prins ICA-3582809 Utrecht University, The Netherlands July 15, 2015 Abstract Kayles is a two player game played on a graph. The game can be dened

More information

Samuel Coolidge, Dan Simon, Dennis Shasha, Technical Report NYU/CIMS/TR

Samuel Coolidge, Dan Simon, Dennis Shasha, Technical Report NYU/CIMS/TR Detecting Missing and Spurious Edges in Large, Dense Networks Using Parallel Computing Samuel Coolidge, sam.r.coolidge@gmail.com Dan Simon, des480@nyu.edu Dennis Shasha, shasha@cims.nyu.edu Technical Report

More information

1 More configuration model

1 More configuration model 1 More configuration model In the last lecture, we explored the definition of the configuration model, a simple method for drawing networks from the ensemble, and derived some of its mathematical properties.

More information

TIE Graph algorithms

TIE Graph algorithms TIE-20106 1 1 Graph algorithms This chapter discusses the data structure that is a collection of points (called nodes or vertices) and connections between them (called edges or arcs) a graph. The common

More information

Breadth First Search. Graph Traversal. CSE 2011 Winter Application examples. Two common graph traversal algorithms

Breadth First Search. Graph Traversal. CSE 2011 Winter Application examples. Two common graph traversal algorithms Breadth irst Search CSE Winter Graph raversal Application examples Given a graph representation and a vertex s in the graph ind all paths from s to the other vertices wo common graph traversal algorithms

More information

A System for Bidirectional Robotic Pathfinding

A System for Bidirectional Robotic Pathfinding A System for Bidirectional Robotic Pathfinding Tesca K. Fitzgerald Department of Computer Science, Portland State University PO Box 751 Portland, OR 97207 USA tesca@cs.pdx.edu TR 12-02 November 2012 Abstract

More information

13: Betweenness Centrality

13: Betweenness Centrality 13: Betweenness Centrality Machine Learning and Real-world Data Ann Copestake and Simone Teufel Computer Laboratory University of Cambridge Lent 2017 Last session: some simple network statistics You measured

More information

Graphs. The ultimate data structure. graphs 1

Graphs. The ultimate data structure. graphs 1 Graphs The ultimate data structure graphs 1 Definition of graph Non-linear data structure consisting of nodes & links between them (like trees in this sense) Unlike trees, graph nodes may be completely

More information

Detecting and Analyzing Communities in Social Network Graphs for Targeted Marketing

Detecting and Analyzing Communities in Social Network Graphs for Targeted Marketing Detecting and Analyzing Communities in Social Network Graphs for Targeted Marketing Gautam Bhat, Rajeev Kumar Singh Department of Computer Science and Engineering Shiv Nadar University Gautam Buddh Nagar,

More information

CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION

CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION 6.1 INTRODUCTION Fuzzy logic based computational techniques are becoming increasingly important in the medical image analysis arena. The significant

More information

Section 7.12: Similarity. By: Ralucca Gera, NPS

Section 7.12: Similarity. By: Ralucca Gera, NPS Section 7.12: Similarity By: Ralucca Gera, NPS Motivation We talked about global properties Average degree, average clustering, ave path length We talked about local properties: Some node centralities

More information

Complementary Graph Coloring

Complementary Graph Coloring International Journal of Computer (IJC) ISSN 2307-4523 (Print & Online) Global Society of Scientific Research and Researchers http://ijcjournal.org/ Complementary Graph Coloring Mohamed Al-Ibrahim a*,

More information

Conway s Game of Life Wang An Aloysius & Koh Shang Hui

Conway s Game of Life Wang An Aloysius & Koh Shang Hui Wang An Aloysius & Koh Shang Hui Winner of Foo Kean Pew Memorial Prize and Gold Award Singapore Mathematics Project Festival 2014 Abstract Conway s Game of Life is a cellular automaton devised by the British

More information

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi

More information

DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS

DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS Todd Waskiewicz and Peter LaMonica Air Force Research Laboratory Information and Intelligence Exploitation Division {Todd.Waskiewicz,

More information

GEPHI Introduction to network analysis and visualization

GEPHI Introduction to network analysis and visualization GEPHI Introduction to network analysis and visualization GRANDJEAN, Martin (2015) «GEPHI Introduction to network analysis and visualization», http://www.martingrandjean.ch/gephi-introduction 15 minutes

More information

Constructing a G(N, p) Network

Constructing a G(N, p) Network Random Graph Theory Dr. Natarajan Meghanathan Associate Professor Department of Computer Science Jackson State University, Jackson, MS E-mail: natarajan.meghanathan@jsums.edu Introduction At first inspection,

More information

A Parallel Algorithm for Finding Sub-graph Isomorphism

A Parallel Algorithm for Finding Sub-graph Isomorphism CS420: Parallel Programming, Fall 2008 Final Project A Parallel Algorithm for Finding Sub-graph Isomorphism Ashish Sharma, Santosh Bahir, Sushant Narsale, Unmil Tambe Department of Computer Science, Johns

More information

Cursor Design Considerations For the Pointer-based Television

Cursor Design Considerations For the Pointer-based Television Hillcrest Labs Design Note Cursor Design Considerations For the Pointer-based Television Designing the cursor for a pointing-based television must consider factors that differ from the implementation of

More information

Chapter 10. Fundamental Network Algorithms. M. E. J. Newman. May 6, M. E. J. Newman Chapter 10 May 6, / 33

Chapter 10. Fundamental Network Algorithms. M. E. J. Newman. May 6, M. E. J. Newman Chapter 10 May 6, / 33 Chapter 10 Fundamental Network Algorithms M. E. J. Newman May 6, 2015 M. E. J. Newman Chapter 10 May 6, 2015 1 / 33 Table of Contents 1 Algorithms for Degrees and Degree Distributions Degree-Degree Correlation

More information

Assignment No 2 (Group B)

Assignment No 2 (Group B) Assignment No 2 (Group B) 1 Problem Statement : Concurrent Implementation of Travelling Salesman Problem. 2 Objective : To develop problem solving abilities using Mathematical Modeling. To apply algorithmic

More information

Dr. Amotz Bar-Noy s Compendium of Algorithms Problems. Problems, Hints, and Solutions

Dr. Amotz Bar-Noy s Compendium of Algorithms Problems. Problems, Hints, and Solutions Dr. Amotz Bar-Noy s Compendium of Algorithms Problems Problems, Hints, and Solutions Chapter 1 Searching and Sorting Problems 1 1.1 Array with One Missing 1.1.1 Problem Let A = A[1],..., A[n] be an array

More information

Social Networks and Graph Theory. Holly Hirst Mathematical Sciences Appalachian State NCCTM - November 2, 2017

Social Networks and Graph Theory. Holly Hirst Mathematical Sciences Appalachian State NCCTM - November 2, 2017 Social Networks and Graph Theory Holly Hirst Mathematical Sciences Appalachian State NCCTM - November 2, 2017 Graphs l A graph is an ordered pair G = (V;E), where l V is a set of vertices (aka nodes )

More information

SUMMARY: DISTINCTIVE IMAGE FEATURES FROM SCALE- INVARIANT KEYPOINTS

SUMMARY: DISTINCTIVE IMAGE FEATURES FROM SCALE- INVARIANT KEYPOINTS SUMMARY: DISTINCTIVE IMAGE FEATURES FROM SCALE- INVARIANT KEYPOINTS Cognitive Robotics Original: David G. Lowe, 004 Summary: Coen van Leeuwen, s1460919 Abstract: This article presents a method to extract

More information

W4231: Analysis of Algorithms

W4231: Analysis of Algorithms W4231: Analysis of Algorithms 10/21/1999 Definitions for graphs Breadth First Search and Depth First Search Topological Sort. Graphs AgraphG is given by a set of vertices V and a set of edges E. Normally

More information

Beyond community detection on undirected, unweighted graphs

Beyond community detection on undirected, unweighted graphs Beyond community detection on undirected, unweighted graphs Vipul Pandey vpandey1@stanford.edu Juthika Dabholkar juthika@stanford.edu November 17, 2011 Rex Kirshner rbk@stanford.edu 1 Abstract unity detection

More information

Theme Identification in RDF Graphs

Theme Identification in RDF Graphs Theme Identification in RDF Graphs Hanane Ouksili PRiSM, Univ. Versailles St Quentin, UMR CNRS 8144, Versailles France hanane.ouksili@prism.uvsq.fr Abstract. An increasing number of RDF datasets is published

More information

Node Similarity. Ralucca Gera, Applied Mathematics Dept. Naval Postgraduate School Monterey, California

Node Similarity. Ralucca Gera, Applied Mathematics Dept. Naval Postgraduate School Monterey, California Node Similarity Ralucca Gera, Applied Mathematics Dept. Naval Postgraduate School Monterey, California rgera@nps.edu Motivation We talked about global properties Average degree, average clustering, ave

More information

24 - TEAMWORK... 1 HOW DOES MAXQDA SUPPORT TEAMWORK?... 1 TRANSFER A MAXQDA PROJECT TO OTHER TEAM MEMBERS... 2

24 - TEAMWORK... 1 HOW DOES MAXQDA SUPPORT TEAMWORK?... 1 TRANSFER A MAXQDA PROJECT TO OTHER TEAM MEMBERS... 2 24 - Teamwork Contents 24 - TEAMWORK... 1 HOW DOES MAXQDA SUPPORT TEAMWORK?... 1 TRANSFER A MAXQDA PROJECT TO OTHER TEAM MEMBERS... 2 Sharing projects that include external files... 3 TRANSFER CODED SEGMENTS,

More information

Maximum number of edges in claw-free graphs whose maximum degree and matching number are bounded

Maximum number of edges in claw-free graphs whose maximum degree and matching number are bounded Maximum number of edges in claw-free graphs whose maximum degree and matching number are bounded Cemil Dibek Tınaz Ekim Pinar Heggernes Abstract We determine the maximum number of edges that a claw-free

More information

Efficient Mining Algorithms for Large-scale Graphs

Efficient Mining Algorithms for Large-scale Graphs Efficient Mining Algorithms for Large-scale Graphs Yasunari Kishimoto, Hiroaki Shiokawa, Yasuhiro Fujiwara, and Makoto Onizuka Abstract This article describes efficient graph mining algorithms designed

More information

Centralities (4) Ralucca Gera, Applied Mathematics Dept. Naval Postgraduate School Monterey, California Excellence Through Knowledge

Centralities (4) Ralucca Gera, Applied Mathematics Dept. Naval Postgraduate School Monterey, California Excellence Through Knowledge Centralities (4) Ralucca Gera, Applied Mathematics Dept. Naval Postgraduate School Monterey, California rgera@nps.edu Excellence Through Knowledge Different types of centralities: Betweenness Centrality

More information

Whitepaper US SEO Ranking Factors 2012

Whitepaper US SEO Ranking Factors 2012 Whitepaper US SEO Ranking Factors 2012 Authors: Marcus Tober, Sebastian Weber Searchmetrics Inc. 1115 Broadway 12th Floor, Room 1213 New York, NY 10010 Phone: 1 866-411-9494 E-Mail: sales-us@searchmetrics.com

More information

Constructing a G(N, p) Network

Constructing a G(N, p) Network Random Graph Theory Dr. Natarajan Meghanathan Professor Department of Computer Science Jackson State University, Jackson, MS E-mail: natarajan.meghanathan@jsums.edu Introduction At first inspection, most

More information

1. Estimation equations for strip transect sampling, using notation consistent with that used to

1. Estimation equations for strip transect sampling, using notation consistent with that used to Web-based Supplementary Materials for Line Transect Methods for Plant Surveys by S.T. Buckland, D.L. Borchers, A. Johnston, P.A. Henrys and T.A. Marques Web Appendix A. Introduction In this on-line appendix,

More information

Truncation Errors. Applied Numerical Methods with MATLAB for Engineers and Scientists, 2nd ed., Steven C. Chapra, McGraw Hill, 2008, Ch. 4.

Truncation Errors. Applied Numerical Methods with MATLAB for Engineers and Scientists, 2nd ed., Steven C. Chapra, McGraw Hill, 2008, Ch. 4. Chapter 4: Roundoff and Truncation Errors Applied Numerical Methods with MATLAB for Engineers and Scientists, 2nd ed., Steven C. Chapra, McGraw Hill, 2008, Ch. 4. 1 Outline Errors Accuracy and Precision

More information

(Refer Slide Time: 02.06)

(Refer Slide Time: 02.06) Data Structures and Algorithms Dr. Naveen Garg Department of Computer Science and Engineering Indian Institute of Technology, Delhi Lecture 27 Depth First Search (DFS) Today we are going to be talking

More information

Lesson 4. Random graphs. Sergio Barbarossa. UPC - Barcelona - July 2008

Lesson 4. Random graphs. Sergio Barbarossa. UPC - Barcelona - July 2008 Lesson 4 Random graphs Sergio Barbarossa Graph models 1. Uncorrelated random graph (Erdős, Rényi) N nodes are connected through n edges which are chosen randomly from the possible configurations 2. Binomial

More information

Algorithms and Applications in Social Networks. 2017/2018, Semester B Slava Novgorodov

Algorithms and Applications in Social Networks. 2017/2018, Semester B Slava Novgorodov Algorithms and Applications in Social Networks 2017/2018, Semester B Slava Novgorodov 1 Lesson #1 Administrative questions Course overview Introduction to Social Networks Basic definitions Network properties

More information

Localized Bridging Centrality for Distributed Network Analysis

Localized Bridging Centrality for Distributed Network Analysis Localized Bridging Centrality for Distributed Network Analysis Soumendra Nanda Department of Computer Science Dartmouth College David Kotz Institute for Security Technology Studies Dartmouth College Abstract

More information

Distributed STDMA in Ad Hoc Networks

Distributed STDMA in Ad Hoc Networks Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad

More information

2015, IJARCSSE All Rights Reserved Page 31

2015, IJARCSSE All Rights Reserved Page 31 Volume 5, Issue 7, July 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Procedural Cognitive

More information

Robustness of Selective Desensitization Perceptron Against Irrelevant and Partially Relevant Features in Pattern Classification

Robustness of Selective Desensitization Perceptron Against Irrelevant and Partially Relevant Features in Pattern Classification Robustness of Selective Desensitization Perceptron Against Irrelevant and Partially Relevant Features in Pattern Classification Tomohiro Tanno, Kazumasa Horie, Jun Izawa, and Masahiko Morita University

More information

Challenges in large-scale graph processing on HPC platforms and the Graph500 benchmark. by Nkemdirim Dockery

Challenges in large-scale graph processing on HPC platforms and the Graph500 benchmark. by Nkemdirim Dockery Challenges in large-scale graph processing on HPC platforms and the Graph500 benchmark by Nkemdirim Dockery High Performance Computing Workloads Core-memory sized Floating point intensive Well-structured

More information

Future-ready IT Systems with Performance Prediction using Analytical Models

Future-ready IT Systems with Performance Prediction using Analytical Models Future-ready IT Systems with Performance Prediction using Analytical Models Madhu Tanikella Infosys Abstract Large and complex distributed software systems can impact overall software cost and risk for

More information

Definition f(n) = O(g(n)) if there exists n 0, c such that for all n n 0, f(n) cg(n). g is an asymptotic upper bound on f.

Definition f(n) = O(g(n)) if there exists n 0, c such that for all n n 0, f(n) cg(n). g is an asymptotic upper bound on f. Announcements CMPSC 311: ntroduction to Algorithms Akshay Krishnamurthy University of Massachusetts Homework 1 released (Due 2/7 11:59pm) Quiz 1 out (Due 1/30 11:59pm) Discussion section Friday Last Compiled:

More information

Development of a tool for the easy determination of control factor interaction in the Design of Experiments and the Taguchi Methods

Development of a tool for the easy determination of control factor interaction in the Design of Experiments and the Taguchi Methods Development of a tool for the easy determination of control factor interaction in the Design of Experiments and the Taguchi Methods IKUO TANABE Department of Mechanical Engineering, Nagaoka University

More information

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Greedy Algorithms (continued) The best known application where the greedy algorithm is optimal is surely

More information

How to explore big networks? Question: Perform a random walk on G. What is the average node degree among visited nodes, if avg degree in G is 200?

How to explore big networks? Question: Perform a random walk on G. What is the average node degree among visited nodes, if avg degree in G is 200? How to explore big networks? Question: Perform a random walk on G. What is the average node degree among visited nodes, if avg degree in G is 200? Questions from last time Avg. FB degree is 200 (suppose).

More information

Different Optimal Solutions in Shared Path Graphs

Different Optimal Solutions in Shared Path Graphs Different Optimal Solutions in Shared Path Graphs Kira Goldner Oberlin College Oberlin, OH 44074 (610) 324-3931 ksgoldner@gmail.com ABSTRACT We examine an expansion upon the basic shortest path in graphs

More information

Best First and Greedy Search Based CFS and Naïve Bayes Algorithms for Hepatitis Diagnosis

Best First and Greedy Search Based CFS and Naïve Bayes Algorithms for Hepatitis Diagnosis Best First and Greedy Search Based CFS and Naïve Bayes Algorithms for Hepatitis Diagnosis CHAPTER 3 BEST FIRST AND GREEDY SEARCH BASED CFS AND NAÏVE BAYES ALGORITHMS FOR HEPATITIS DIAGNOSIS 3.1 Introduction

More information

Whitepaper Spain SEO Ranking Factors 2012

Whitepaper Spain SEO Ranking Factors 2012 Whitepaper Spain SEO Ranking Factors 2012 Authors: Marcus Tober, Sebastian Weber Searchmetrics GmbH Greifswalder Straße 212 10405 Berlin Phone: +49-30-3229535-0 Fax: +49-30-3229535-99 E-Mail: info@searchmetrics.com

More information

Available online at ScienceDirect. Procedia Computer Science 59 (2015 )

Available online at   ScienceDirect. Procedia Computer Science 59 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 59 (2015 ) 419 426 International Conference on Computer Science and Computational Intelligence (ICCSCI 2015) Degree Centrality

More information

GRAPH THEORY AND COMBINATORICS ( Common to CSE and ISE ) UNIT 1

GRAPH THEORY AND COMBINATORICS ( Common to CSE and ISE ) UNIT 1 GRAPH THEORY AND COMBINATORICS ( Common to CSE and ISE ) Sub code : 06CS42 UNIT 1 Introduction to Graph Theory : Definition and Examples Subgraphs Complements, and Graph Isomorphism Vertex Degree, Euler

More information

Divisibility Rules and Their Explanations

Divisibility Rules and Their Explanations Divisibility Rules and Their Explanations Increase Your Number Sense These divisibility rules apply to determining the divisibility of a positive integer (1, 2, 3, ) by another positive integer or 0 (although

More information

Graphs. Graph G = (V, E) Types of graphs E = O( V 2 ) V = set of vertices E = set of edges (V V)

Graphs. Graph G = (V, E) Types of graphs E = O( V 2 ) V = set of vertices E = set of edges (V V) Graph Algorithms Graphs Graph G = (V, E) V = set of vertices E = set of edges (V V) Types of graphs Undirected: edge (u, v) = (v, u); for all v, (v, v) E (No self loops.) Directed: (u, v) is edge from

More information

The Bootstrap and Jackknife

The Bootstrap and Jackknife The Bootstrap and Jackknife Summer 2017 Summer Institutes 249 Bootstrap & Jackknife Motivation In scientific research Interest often focuses upon the estimation of some unknown parameter, θ. The parameter

More information

DESIGN AND ANALYSIS OF ALGORITHMS GREEDY METHOD

DESIGN AND ANALYSIS OF ALGORITHMS GREEDY METHOD 1 DESIGN AND ANALYSIS OF ALGORITHMS UNIT II Objectives GREEDY METHOD Explain and detail about greedy method Explain the concept of knapsack problem and solve the problems in knapsack Discuss the applications

More information

Graph: representation and traversal

Graph: representation and traversal Graph: representation and traversal CISC4080, Computer Algorithms CIS, Fordham Univ. Instructor: X. Zhang! Acknowledgement The set of slides have use materials from the following resources Slides for textbook

More information

A Routing Table Insertion (RTI) Attack on Freenet

A Routing Table Insertion (RTI) Attack on Freenet A Routing Table Insertion (RTI) Attack on Freenet Technical Report University of Hawaii at Manoa Project Members Todd Baumeister Yingfei Dong Zhenhai Duan Guanyu Tian Date 9/18/2012 1 Table of Contents

More information

ANNUAL REPORT OF HAIL STUDIES NEIL G, TOWERY AND RAND I OLSON. Report of Research Conducted. 15 May May For. The Country Companies

ANNUAL REPORT OF HAIL STUDIES NEIL G, TOWERY AND RAND I OLSON. Report of Research Conducted. 15 May May For. The Country Companies ISWS CR 182 Loan c.l ANNUAL REPORT OF HAIL STUDIES BY NEIL G, TOWERY AND RAND I OLSON Report of Research Conducted 15 May 1976-14 May 1977 For The Country Companies May 1977 ANNUAL REPORT OF HAIL STUDIES

More information

Algorithms: Lecture 10. Chalmers University of Technology

Algorithms: Lecture 10. Chalmers University of Technology Algorithms: Lecture 10 Chalmers University of Technology Today s Topics Basic Definitions Path, Cycle, Tree, Connectivity, etc. Graph Traversal Depth First Search Breadth First Search Testing Bipartatiness

More information

Non Overlapping Communities

Non Overlapping Communities Non Overlapping Communities Davide Mottin, Konstantina Lazaridou HassoPlattner Institute Graph Mining course Winter Semester 2016 Acknowledgements Most of this lecture is taken from: http://web.stanford.edu/class/cs224w/slides

More information

Chapter 2 Basic Structure of High-Dimensional Spaces

Chapter 2 Basic Structure of High-Dimensional Spaces Chapter 2 Basic Structure of High-Dimensional Spaces Data is naturally represented geometrically by associating each record with a point in the space spanned by the attributes. This idea, although simple,

More information

Measuring algorithm efficiency

Measuring algorithm efficiency CMPT 225 Measuring algorithm efficiency Timing Counting Cost functions Cases Best case Average case Worst case Searching Sorting O Notation O notation's mathematical basis O notation classes and notations

More information

Supplementary material to Epidemic spreading on complex networks with community structures

Supplementary material to Epidemic spreading on complex networks with community structures Supplementary material to Epidemic spreading on complex networks with community structures Clara Stegehuis, Remco van der Hofstad, Johan S. H. van Leeuwaarden Supplementary otes Supplementary ote etwork

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

Basics of Network Analysis

Basics of Network Analysis Basics of Network Analysis Hiroki Sayama sayama@binghamton.edu Graph = Network G(V, E): graph (network) V: vertices (nodes), E: edges (links) 1 Nodes = 1, 2, 3, 4, 5 2 3 Links = 12, 13, 15, 23,

More information

Comparison of Recommender System Algorithms focusing on the New-Item and User-Bias Problem

Comparison of Recommender System Algorithms focusing on the New-Item and User-Bias Problem Comparison of Recommender System Algorithms focusing on the New-Item and User-Bias Problem Stefan Hauger 1, Karen H. L. Tso 2, and Lars Schmidt-Thieme 2 1 Department of Computer Science, University of

More information

Graph Sampling Approach for Reducing. Computational Complexity of. Large-Scale Social Network

Graph Sampling Approach for Reducing. Computational Complexity of. Large-Scale Social Network Journal of Innovative Technology and Education, Vol. 3, 216, no. 1, 131-137 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/1.12988/jite.216.6828 Graph Sampling Approach for Reducing Computational Complexity

More information

Introduction To Graphs and Networks. Fall 2013 Carola Wenk

Introduction To Graphs and Networks. Fall 2013 Carola Wenk Introduction To Graphs and Networks Fall 203 Carola Wenk On the Internet, links are essentially weighted by factors such as transit time, or cost. The goal is to find the shortest path from one node to

More information

13. Learning Ballistic Movementsof a Robot Arm 212

13. Learning Ballistic Movementsof a Robot Arm 212 13. Learning Ballistic Movementsof a Robot Arm 212 13. LEARNING BALLISTIC MOVEMENTS OF A ROBOT ARM 13.1 Problem and Model Approach After a sufficiently long training phase, the network described in the

More information

google SEO UpdatE the RiSE Of NOt provided and hummingbird october 2013

google SEO UpdatE the RiSE Of NOt provided and hummingbird october 2013 google SEO Update The Rise of Not Provided and Hummingbird October 2013 Lead contributors David Freeman Head of SEO Havas Media UK david.freeman@havasmedia.com Winston Burton VP, Director of SEO Havas

More information

Graphs. Terminology. Graphs & Breadth First Search (BFS) Extremely useful tool in modeling problems. Consist of: Vertices Edges

Graphs. Terminology. Graphs & Breadth First Search (BFS) Extremely useful tool in modeling problems. Consist of: Vertices Edges COMP Spring Graphs & BS / Slide Graphs Graphs & Breadth irst Search (BS) Extremely useful tool in modeling problems. Consist of: Vertices Edges Vertex A B D C E Edge Vertices can be considered sites or

More information

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) Ngo Duc Thuan 1,, Hiroki Nishiyama 1, Nirwan Ansari 2,andNeiKato 1 1 Graduate School of Information

More information

Breadth First Search. cse2011 section 13.3 of textbook

Breadth First Search. cse2011 section 13.3 of textbook Breadth irst Search cse section. of textbook Graph raversal (.) Application example Given a graph representation and a vertex s in the graph, find all paths from s to the other vertices. wo common graph

More information

Ranking Clustered Data with Pairwise Comparisons

Ranking Clustered Data with Pairwise Comparisons Ranking Clustered Data with Pairwise Comparisons Alisa Maas ajmaas@cs.wisc.edu 1. INTRODUCTION 1.1 Background Machine learning often relies heavily on being able to rank the relative fitness of instances

More information

CHAPTER 4 PROPOSED ARCHITECTURE FOR INCREMENTAL PARALLEL WEBCRAWLER

CHAPTER 4 PROPOSED ARCHITECTURE FOR INCREMENTAL PARALLEL WEBCRAWLER CHAPTER 4 PROPOSED ARCHITECTURE FOR INCREMENTAL PARALLEL WEBCRAWLER 4.1 INTRODUCTION In 1994, the World Wide Web Worm (WWWW), one of the first web search engines had an index of 110,000 web pages [2] but

More information

A Novel Extreme Point Selection Algorithm in SIFT

A Novel Extreme Point Selection Algorithm in SIFT A Novel Extreme Point Selection Algorithm in SIFT Ding Zuchun School of Electronic and Communication, South China University of Technolog Guangzhou, China zucding@gmail.com Abstract. This paper proposes

More information

1 Introduction RHIT UNDERGRAD. MATH. J., VOL. 17, NO. 1 PAGE 159

1 Introduction RHIT UNDERGRAD. MATH. J., VOL. 17, NO. 1 PAGE 159 RHIT UNDERGRAD. MATH. J., VOL. 17, NO. 1 PAGE 159 1 Introduction Kidney transplantation is widely accepted as the preferred treatment for the majority of patients with end stage renal disease [11]. Patients

More information

Lecture 3. Brute Force

Lecture 3. Brute Force Lecture 3 Brute Force 1 Lecture Contents 1. Selection Sort and Bubble Sort 2. Sequential Search and Brute-Force String Matching 3. Closest-Pair and Convex-Hull Problems by Brute Force 4. Exhaustive Search

More information

Summer 2013 Modules 9-13

Summer 2013 Modules 9-13 Summer 201 Modules 9-1 Mastering the Fundamentals Chris Millett Copyright 201 All rights reserved. Written permission must be secured from the author to use or reproduce any part of this book. Academic

More information

Graph Algorithms. Revised based on the slides by Ruoming Kent State

Graph Algorithms. Revised based on the slides by Ruoming Kent State Graph Algorithms Adapted from UMD Jimmy Lin s slides, which is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States. See http://creativecommons.org/licenses/by-nc-sa/3.0/us/

More information

An Algorithmic Approach to Graph Theory Neetu Rawat

An Algorithmic Approach to Graph Theory Neetu Rawat An Algorithmic Approach to Graph Theory Neetu Rawat nrwt12345@gmail.com, Assistant Professor, Chameli Devi Group of Institutions, Indore. India. Abstract This paper compares two different minimum spanning

More information

Week - 01 Lecture - 03 Euclid's Algorithm for gcd. Let us continue with our running example of gcd to explore more issues involved with program.

Week - 01 Lecture - 03 Euclid's Algorithm for gcd. Let us continue with our running example of gcd to explore more issues involved with program. Programming, Data Structures and Algorithms in Python Prof. Madhavan Mukund Department of Computer Science and Engineering Indian Institute of Technology, Madras Week - 01 Lecture - 03 Euclid's Algorithm

More information

DESIGN AND IMPLEMENTATION OF VARIABLE RADIUS SPHERE DECODING ALGORITHM

DESIGN AND IMPLEMENTATION OF VARIABLE RADIUS SPHERE DECODING ALGORITHM DESIGN AND IMPLEMENTATION OF VARIABLE RADIUS SPHERE DECODING ALGORITHM Wu Di, Li Dezhi and Wang Zhenyong School of Electronics and Information Engineering, Harbin Institute of Technology, Harbin, China

More information