A Short Introduction To Social Network Analysis Dr. Mishari Alnahedh Kuwait University College of Business Administration

Size: px
Start display at page:

Download "A Short Introduction To Social Network Analysis Dr. Mishari Alnahedh Kuwait University College of Business Administration"

Transcription

1 A Short Introduction To Social Network Analysis Dr. Kuwait University College of Business Administration

2 Introduction A network is a collection of points linked through some type of association. These points can represent any object or subject Examples of subjects: people, places and resources. Examples of relationships: route, distance and family membership So, Social Network Analysis is the process of investigating the social structures through the use of networks.

3 Introduction Social network structures are characterized in terms of: 1) Nodes: the individual actors of people 2) Edges or links: the relationships or interactions that connect the nodes. Source: mathinsight.org

4 Introduction Online Social Networks

5 Introduction Communication Networks

6 Introduction Road Networks

7 Introduction Online Reviews Network

8 Introduction Online Reviews Network Example: Qaym.com

9 Introduction So What? Any problem or solution that has a network structure can be approached through social network analysis (SNA). SNA is a unique perspective on how society functions. Instead of focusing on individuals and their attributes, SNA centers on relations between individuals, groups or institutions. In society, individuals are embedded in a network of relations and their social behavior can be explained by looking at the structures of these networks.

10 Basic Concepts Adjacency Matrix We can track users of a network and examine the underlying social network: Useful to look at network data structure Creation and diffusion of knowledge Ali Fahad Fahad Ali Omar Saad Fahad Omar Saad Ali Omar Saad

11 Basic Concepts Degree Centrality A measure of a node s degree of connectedness and hence also influence and/or popularity. Useful in assessing which nodes are central with respect to spreading information and influencing others in their immediate neighborhood.

12 Basic Concepts Paths A path between two nodes is any sequence of non-repeating nodes that connects the two nodes. The shortest path between two nodes is the path that connects the two nodes with the shortest number of edges. Shortest paths are important when the speed of communication or exchange is desired.

13 Basic Concepts Shortest Path: an example What is the shortest path between nodes 1 and 4?

14 Basic Concepts Shortest Path: an example What is the shortest path between nodes 1 and 4?

15 Basic Concepts Shortest Path: an example What is the shortest path between nodes 1 and 4?

16 Basic Concepts Network Density A network s density is the ratio of the number of edges in the network over the total number of possible edges between all pairs of nodes. It is a common measure of how well connected a network is. A perfectly connected network has density = Density = 5/6=0.83

17 Basic Concepts Small Worlds A small world is a network where nodes tend to cluster locally together. Source: pbs.org

18

19 When to use SNA Use SNA whenever you wish to understand how to improve the effectiveness of a network. Or if you want to visualize the network data to uncover patterns in relationships or interactions. Or if you want to follow the path of anything that flows in social networks.

20 Applications: Examples Board Interlocks and Corporate Governance Interlock occurs when a director of one company sits on the board of directors of other companies. Conflicts of interests occurs Other possible examples of hidden connections between government bodies and businesses. Source: ucsc.edu

21 Applications: Examples Collaboration Networks How do people pick who to collaborate with? Example: scientific collaboration network and small worlds (i.e. clusters) Based on the nature of the collaboration network, how can we develop the network? Example: hiring new employees

22 Applications: Examples Network Data We can track users of a network and examine the underlying social network: Useful to look at network data structure Creation and diffusion of knowledge and information

23 Applications: Examples Social Marketing How should our company decide on where to market its products (or spread its marketing campaign s message)?

24 Software for SNA Multiple software programs are available for network data visualization: EgoNet Gephi

25 Software for SNA Multiple software programs are available for SNA: UCINET OAJEK Netdraw R packages for SNA Many more

26 END Thank you! For more resources about SNA, you can contact alnahedh@cba.edu.kw Slides are available at mishari.com/sna

Social Network Analysis

Social Network Analysis Social Network Analysis Mathematics of Networks Manar Mohaisen Department of EEC Engineering Adjacency matrix Network types Edge list Adjacency list Graph representation 2 Adjacency matrix Adjacency matrix

More information

Web Structure Mining Community Detection and Evaluation

Web Structure Mining Community Detection and Evaluation Web Structure Mining Community Detection and Evaluation 1 Community Community. It is formed by individuals such that those within a group interact with each other more frequently than with those outside

More information

Social Network Analysis (SNA) including a tutorial on concepts and methods

Social Network Analysis (SNA) including a tutorial on concepts and methods Social Network Analysis (SNA) including a tutorial on concepts and methods Social Media Dr. Giorgos Cheliotis (gcheliotis@nus.edu.sg) Communications and New Media, National University of Singapore Source

More information

Definition: Implications: Analysis:

Definition: Implications: Analysis: Analyzing Two mode Network Data Definition: One mode networks detail the relationship between one type of entity, for example between people. In contrast, two mode networks are composed of two types of

More information

Graph/Network Visualization

Graph/Network Visualization Graph/Network Visualization Data model: graph structures (relations, knowledge) and networks. Applications: Telecommunication systems, Internet and WWW, Retailers distribution networks knowledge representation

More information

THE KNOWLEDGE MANAGEMENT STRATEGY IN ORGANIZATIONS. Summer semester, 2016/2017

THE KNOWLEDGE MANAGEMENT STRATEGY IN ORGANIZATIONS. Summer semester, 2016/2017 THE KNOWLEDGE MANAGEMENT STRATEGY IN ORGANIZATIONS Summer semester, 2016/2017 SOCIAL NETWORK ANALYSIS: THEORY AND APPLICATIONS 1. A FEW THINGS ABOUT NETWORKS NETWORKS IN THE REAL WORLD There are four categories

More information

Quick Review of Graphs

Quick Review of Graphs COMP 102: Excursions in Computer Science Lecture 11: Graphs Instructor: (jpineau@cs.mcgill.ca) Class web page: www.cs.mcgill.ca/~jpineau/comp102 Quick Review of Graphs A graph is an abstract representation

More information

Centrality Book. cohesion.

Centrality Book. cohesion. Cohesion The graph-theoretic terms discussed in the previous chapter have very specific and concrete meanings which are highly shared across the field of graph theory and other fields like social network

More information

- relationships (edges) among entities (nodes) - technology: Internet, World Wide Web - biology: genomics, gene expression, proteinprotein

- relationships (edges) among entities (nodes) - technology: Internet, World Wide Web - biology: genomics, gene expression, proteinprotein Complex networks Phys 7682: Computational Methods for Nonlinear Systems networks are everywhere (and always have been) - relationships (edges) among entities (nodes) explosion of interest in network structure,

More information

Networks in economics and finance. Lecture 1 - Measuring networks

Networks in economics and finance. Lecture 1 - Measuring networks Networks in economics and finance Lecture 1 - Measuring networks What are networks and why study them? A network is a set of items (nodes) connected by edges or links. Units (nodes) Individuals Firms Banks

More information

Air Force Institute of Technology

Air Force Institute of Technology Air Force Institute of Technology Automatic Generation of Social Network Data from Electronic- Mail Communications Jason W.S. Yee Robert F. Mills Gilbert L. Peterson Summer Bartczak Air Force Institute

More information

Rockefeller College University at Albany

Rockefeller College University at Albany Rockefeller College University at Albany Problem Set #7: Handling Egocentric Network Data Adapted from original by Peter V. Marsden, Harvard University Egocentric network data sometimes known as personal

More information

2.2. Data Format Save as UCINET files in Netdraw Import from VNA format Node Level Analysis Degree...

2.2. Data Format Save as UCINET files in Netdraw Import from VNA format Node Level Analysis Degree... Contents 0. Processing the Tie Data and Create a VNA File for Binary Network... 2 1. Appearance of UCINET... 4 2. UCINET dataset... 5 2.1 Set Default Folder... 5 2.2. Data Format... 5 2.3 Save as UCINET

More information

Introduction Types of Social Network Analysis Social Networks in the Online Age Data Mining for Social Network Analysis Applications Conclusion

Introduction Types of Social Network Analysis Social Networks in the Online Age Data Mining for Social Network Analysis Applications Conclusion Introduction Types of Social Network Analysis Social Networks in the Online Age Data Mining for Social Network Analysis Applications Conclusion References Social Network Social Network Analysis Sociocentric

More information

Algorithmic and Economic Aspects of Networks. Nicole Immorlica

Algorithmic and Economic Aspects of Networks. Nicole Immorlica Algorithmic and Economic Aspects of Networks Nicole Immorlica Syllabus 1. Jan. 8 th (today): Graph theory, network structure 2. Jan. 15 th : Random graphs, probabilistic network formation 3. Jan. 20 th

More information

Mapping Networks. Livingmaps Review. Drew Mackie and David Wilcox Network Thinking

Mapping Networks. Livingmaps Review. Drew Mackie and David Wilcox  Network Thinking 1 Mapping Networks Drew Mackie and David Wilcox david@socialreporter.com drew@drewmackie.co.uk Network Thinking One of the most overused words in the discussion of communities and the agencies that serve

More information

Blockmodels/Positional Analysis : Fundamentals. PAD 637, Lab 10 Spring 2013 Yoonie Lee

Blockmodels/Positional Analysis : Fundamentals. PAD 637, Lab 10 Spring 2013 Yoonie Lee Blockmodels/Positional Analysis : Fundamentals PAD 637, Lab 10 Spring 2013 Yoonie Lee Review of PS5 Main question was To compare blockmodeling results using PROFILE and CONCOR, respectively. Data: Krackhardt

More information

Math/Stat 2300 Modeling using Graph Theory (March 23/25) from text A First Course in Mathematical Modeling, Giordano, Fox, Horton, Weir, 2009.

Math/Stat 2300 Modeling using Graph Theory (March 23/25) from text A First Course in Mathematical Modeling, Giordano, Fox, Horton, Weir, 2009. Math/Stat 2300 Modeling using Graph Theory (March 23/25) from text A First Course in Mathematical Modeling, Giordano, Fox, Horton, Weir, 2009. Describing Graphs (8.2) A graph is a mathematical way of describing

More information

Community Detection. Community

Community Detection. Community Community Detection Community In social sciences: Community is formed by individuals such that those within a group interact with each other more frequently than with those outside the group a.k.a. group,

More information

Basic Network Concepts

Basic Network Concepts Basic Network Concepts Basic Vocabulary Alice Graph Network Edges Links Nodes Vertices Chuck Bob Edges Alice Chuck Bob Edge Weights Alice Chuck Bob Apollo 13 Movie Network Main Actors in Apollo 13 the

More information

Graph Data Management Systems in New Applications Domains. Mikko Halin

Graph Data Management Systems in New Applications Domains. Mikko Halin Graph Data Management Systems in New Applications Domains Mikko Halin Introduction Presentation is based on two papers Graph Data Management Systems for New Application Domains - Philippe Cudré-Mauroux,

More information

Week 7 Picturing Network. Vahe and Bethany

Week 7 Picturing Network. Vahe and Bethany Week 7 Picturing Network Vahe and Bethany Freeman (2005) - Graphic Techniques for Exploring Social Network Data The two main goals of analyzing social network data are identification of cohesive groups

More information

Social Network Analysis With igraph & R. Ofrit Lesser December 11 th, 2014

Social Network Analysis With igraph & R. Ofrit Lesser December 11 th, 2014 Social Network Analysis With igraph & R Ofrit Lesser ofrit.lesser@gmail.com December 11 th, 2014 Outline The igraph R package Basic graph concepts What can you do with igraph? Construction Attributes Centrality

More information

Clusters and Communities

Clusters and Communities Clusters and Communities Lecture 7 CSCI 4974/6971 22 Sep 2016 1 / 14 Today s Biz 1. Reminders 2. Review 3. Communities 4. Betweenness and Graph Partitioning 5. Label Propagation 2 / 14 Today s Biz 1. Reminders

More information

Constructing a G(N, p) Network

Constructing a G(N, p) Network Random Graph Theory Dr. Natarajan Meghanathan Associate Professor Department of Computer Science Jackson State University, Jackson, MS E-mail: natarajan.meghanathan@jsums.edu Introduction At first inspection,

More information

Distributed caching for multiple databases

Distributed caching for multiple databases Distributed caching for multiple databases K. V. Santhilata, Post Graduate Research Student, Department of Informatics, School of Natural and Mathematical Sciences, King's College London, London, U.K 1

More information

Cascades. Rik Sarkar. Social and Technological Networks. University of Edinburgh, 2018.

Cascades. Rik Sarkar. Social and Technological Networks. University of Edinburgh, 2018. Cascades Social and Technological Networks Rik Sarkar University of Edinburgh, 2018. Course Solutions to Ex0 are up Make sure you are comfortable with this material Notes 1 with exercise questions are

More information

Two mode Network. PAD 637, Lab 8 Spring 2013 Yoonie Lee

Two mode Network. PAD 637, Lab 8 Spring 2013 Yoonie Lee Two mode Network PAD 637, Lab 8 Spring 2013 Yoonie Lee Lab exercises Two- mode Davis QAP correlation Multiple regression QAP Types of network data One-mode network (M M ) Two-mode network (M N ) M1 M2

More information

Joining efforts. Colocation of CRP research activities within Burkina Faso. Michael Balinga and Julien Colomer

Joining efforts. Colocation of CRP research activities within Burkina Faso. Michael Balinga and Julien Colomer Joining efforts. Colocation of CRP research activities within Burkina Faso Sentinel Landscapes Meeting Costa Rica: 3 March 2014 Michael Balinga and Julien Colomer Main Purpose Annex 4 Cross regional comparison

More information

Constructing a G(N, p) Network

Constructing a G(N, p) Network Random Graph Theory Dr. Natarajan Meghanathan Professor Department of Computer Science Jackson State University, Jackson, MS E-mail: natarajan.meghanathan@jsums.edu Introduction At first inspection, most

More information

An Investigation into the Free/Open Source Software Phenomenon using Data Mining, Social Network Theory, and Agent-Based

An Investigation into the Free/Open Source Software Phenomenon using Data Mining, Social Network Theory, and Agent-Based An Investigation into the Free/Open Source Software Phenomenon using Data Mining, Social Network Theory, and Agent-Based Greg Madey Computer Science & Engineering University of Notre Dame UIUC - NSF Workshop

More information

Building the Multiplex: An Agent-Based Model of Formal and Informal Network Relations

Building the Multiplex: An Agent-Based Model of Formal and Informal Network Relations Building the Multiplex: An Agent-Based Model of Formal and Informal Network Relations EURO 2016 POZNAN POLAND, 4 JULY 2016 Duncan A. Robertson and Leroy White Loughborough University, UK; Warwick Business

More information

Graph Theory. Network Science: Graph theory. Graph theory Terminology and notation. Graph theory Graph visualization

Graph Theory. Network Science: Graph theory. Graph theory Terminology and notation. Graph theory Graph visualization Network Science: Graph Theory Ozalp abaoglu ipartimento di Informatica Scienza e Ingegneria Università di ologna www.cs.unibo.it/babaoglu/ ranch of mathematics for the study of structures called graphs

More information

Cluster Analysis. Ying Shen, SSE, Tongji University

Cluster Analysis. Ying Shen, SSE, Tongji University Cluster Analysis Ying Shen, SSE, Tongji University Cluster analysis Cluster analysis groups data objects based only on the attributes in the data. The main objective is that The objects within a group

More information

Oh Pott, Oh Pott! or how to detect community structure in complex networks

Oh Pott, Oh Pott! or how to detect community structure in complex networks Oh Pott, Oh Pott! or how to detect community structure in complex networks Jörg Reichardt Interdisciplinary Centre for Bioinformatics, Leipzig, Germany (Host of the 2012 Olympics) Questions to start from

More information

ABSTRACT I. INTRODUCTION II. METHODS AND MATERIAL

ABSTRACT I. INTRODUCTION II. METHODS AND MATERIAL ABSTRACT 2017 IJSRSET Volume 3 Issue 1 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section: Engineering and Technology Comparative Analysis of Social Network Analysis and Visualisation Tools Prof.

More information

Alessandro Del Ponte, Weijia Ran PAD 637 Week 3 Summary January 31, Wasserman and Faust, Chapter 3: Notation for Social Network Data

Alessandro Del Ponte, Weijia Ran PAD 637 Week 3 Summary January 31, Wasserman and Faust, Chapter 3: Notation for Social Network Data Wasserman and Faust, Chapter 3: Notation for Social Network Data Three different network notational schemes Graph theoretic: the most useful for centrality and prestige methods, cohesive subgroup ideas,

More information

Detecting and Analyzing Communities in Social Network Graphs for Targeted Marketing

Detecting and Analyzing Communities in Social Network Graphs for Targeted Marketing Detecting and Analyzing Communities in Social Network Graphs for Targeted Marketing Gautam Bhat, Rajeev Kumar Singh Department of Computer Science and Engineering Shiv Nadar University Gautam Buddh Nagar,

More information

Basics of Network Analysis

Basics of Network Analysis Basics of Network Analysis Hiroki Sayama sayama@binghamton.edu Graph = Network G(V, E): graph (network) V: vertices (nodes), E: edges (links) 1 Nodes = 1, 2, 3, 4, 5 2 3 Links = 12, 13, 15, 23,

More information

BCS Higher Education Qualifications. Diploma in IT. Professional Project Syllabus

BCS Higher Education Qualifications. Diploma in IT. Professional Project Syllabus BCS Higher Education Qualifications Diploma in IT Professional Project Syllabus Version 2.0 December 2016 This is a United Kingdom government regulated qualification which is administered and approved

More information

UCINET Quick Start Guide

UCINET Quick Start Guide UCINET Quick Start Guide This guide provides a quick introduction to UCINET. It assumes that the software has been installed with the data in the folder C:\Program Files\Analytic Technologies\Ucinet 6\DataFiles

More information

The Network Analysis Five-Number Summary

The Network Analysis Five-Number Summary Chapter 2 The Network Analysis Five-Number Summary There is nothing like looking, if you want to find something. You certainly usually find something, if you look, but it is not always quite the something

More information

Modeling and Simulating Social Systems with MATLAB

Modeling and Simulating Social Systems with MATLAB Modeling and Simulating Social Systems with MATLAB Lecture 8 Introduction to Graphs/Networks Olivia Woolley, Stefano Balietti, Lloyd Sanders, Dirk Helbing Chair of Sociology, in particular of Modeling

More information

Dynamically Motivated Models for Multiplex Networks 1

Dynamically Motivated Models for Multiplex Networks 1 Introduction Dynamically Motivated Models for Multiplex Networks 1 Daryl DeFord Dartmouth College Department of Mathematics Santa Fe institute Inference on Networks: Algorithms, Phase Transitions, New

More information

Graphs. Pseudograph: multiple edges and loops allowed

Graphs. Pseudograph: multiple edges and loops allowed Graphs G = (V, E) V - set of vertices, E - set of edges Undirected graphs Simple graph: V - nonempty set of vertices, E - set of unordered pairs of distinct vertices (no multiple edges or loops) Multigraph:

More information

Using graph theoretic measures to predict the performance of associative memory models

Using graph theoretic measures to predict the performance of associative memory models Using graph theoretic measures to predict the performance of associative memory models Lee Calcraft, Rod Adams, Weiliang Chen and Neil Davey School of Computer Science, University of Hertfordshire College

More information

Cybersecurity in Higher Ed

Cybersecurity in Higher Ed Cybersecurity in Higher Ed 1 Overview Universities are a treasure trove of information. With cyber threats constantly changing, there is a need to be vigilant in protecting information related to students,

More information

2009 LINKS Center Summer SNA Workshop. Slide 1. SNA Software Tools. Tuesday Afternoon. Tuesday Afternoon 2009 LINKS Center Software

2009 LINKS Center Summer SNA Workshop. Slide 1. SNA Software Tools. Tuesday Afternoon. Tuesday Afternoon 2009 LINKS Center Software Slide 1 SNA Tools Slide 2 tools UCINET This is social network analysis software Allows for the computational aspects of analysis, including calculating various measures (e.g., centrality, cohesion, brokerage)

More information

Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society ECOSOC Resolution 2008/3 Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society The Economic and Social Council, Recalling

More information

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure

More information

BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks

BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks 1 BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks Pan Hui, Jon Crowcroft, Eiko Yoneki Presented By: Shaymaa Khater 2 Outline Introduction. Goals. Data Sets. Community Detection Algorithms

More information

Modularity CMSC 858L

Modularity CMSC 858L Modularity CMSC 858L Module-detection for Function Prediction Biological networks generally modular (Hartwell+, 1999) We can try to find the modules within a network. Once we find modules, we can look

More information

Graph Visualization with Gephi

Graph Visualization with Gephi gephi.md - Grip Graph Visualization with Gephi by Alex Razoumov Intro 1. Scientific visualization in traditional computational sciences http://bit.ly/cctopviz. 2. Graph/network visualization falls more

More information

How Do Real Networks Look? Networked Life NETS 112 Fall 2014 Prof. Michael Kearns

How Do Real Networks Look? Networked Life NETS 112 Fall 2014 Prof. Michael Kearns How Do Real Networks Look? Networked Life NETS 112 Fall 2014 Prof. Michael Kearns Roadmap Next several lectures: universal structural properties of networks Each large-scale network is unique microscopically,

More information

Network Science. Frank Takes. January 9, LIACS, Leiden University, The Netherlands. Scientific Meeting UL/EPO January 9, / 19

Network Science. Frank Takes. January 9, LIACS, Leiden University, The Netherlands. Scientific Meeting UL/EPO January 9, / 19 Network Science Frank Takes LIACS, Leiden University, The Netherlands January 9, 2015 Scientific Meeting UL/EPO January 9, 2015 1 / 19 Data Network Science Data Data Analysis Data Mining Data Science Big

More information

DAMAGE DISCOVERY IN DISTRIBUTED DATABASE SYSTEMS

DAMAGE DISCOVERY IN DISTRIBUTED DATABASE SYSTEMS DAMAGE DISCOVERY IN DISTRIBUTED DATABASE SYSTEMS Yanjun Zuo and Brajendra Panda Abstract Damage assessment and recovery in a distributed database system in a post information attack detection scenario

More information

LEHMAN COLLEGE OF THE CITY UNIVERSITY OF NEW YORK. Department of Economics and Business. Curriculum Change

LEHMAN COLLEGE OF THE CITY UNIVERSITY OF NEW YORK. Department of Economics and Business. Curriculum Change Senate Meeting of April 28, 2010 Graduate Studies Committee Hegis Code: 0502 Program Code: 32786 LEHMAN COLLEGE OF THE CITY UNIVERSITY OF NEW YORK Department of Economics and Business Curriculum Change

More information

PROFESSIONAL DEVELOPMENT CORPORATE SURVEY SUMMARY RESEARCH REPORT

PROFESSIONAL DEVELOPMENT CORPORATE SURVEY SUMMARY RESEARCH REPORT PROFESSIONAL DEVELOPMENT CORPORATE SURVEY SUMMARY RESEARCH REPORT 2004 Published by The British Computer Society and InfoBasis Limited For further information, contact: Donald Taylor Strategic Alliances

More information

Legal, Ethical, and Professional Issues in Information Security

Legal, Ethical, and Professional Issues in Information Security Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN

More information

Package NetCluster. R topics documented: February 19, Type Package Version 0.2 Date Title Clustering for networks

Package NetCluster. R topics documented: February 19, Type Package Version 0.2 Date Title Clustering for networks Type Package Version 0.2 Date 2010-05-09 Title Clustering for networks Package NetCluster February 19, 2015 Author Mike Nowak , Solomon Messing , Sean

More information

Graph Theory and its Applications

Graph Theory and its Applications Department of Mathematics and Statistics deeringj@goldmail.etsu.edu October 17, 2012 What is a Graph? Introduction Graphs Graph Theory Simply a modeling tool or set of relationships Graphs Graph Theory

More information

Table XXX MBA Assessment Results for Basic Content Knowledge Learning Goal: Aggregate Subject Matter Scores

Table XXX MBA Assessment Results for Basic Content Knowledge Learning Goal: Aggregate Subject Matter Scores MBA for Basic Content Knowledge Learning Goal: Aggregate Subject Matter Scores Subject Matter Accounting Finance Information Systems Supply chain and analytics Management Marketing accounting related finance

More information

A Branch-and-Cut Algorithm for Constrained Graph Clustering

A Branch-and-Cut Algorithm for Constrained Graph Clustering A Branch-and-Cut Algorithm for Constrained Graph Clustering Behrouz Babaki, Dries Van Daele, Bram Weytjens, Tias Guns, Department of Computer Science, KU Leuven, Belgium Department of of Microbial and

More information

Gotcha! Network Analytics to augment Fraud Detection Big Data in the Food Chain: the un(der)explored goldmine?

Gotcha! Network Analytics to augment Fraud Detection Big Data in the Food Chain: the un(der)explored goldmine? Gotcha! Network Analytics to augment Fraud Detection Big Data in the Food Chain: the un(der)explored goldmine? December 4th, 2018 Author: Véronique Van Vlasselaer SAS Pre-Sales Analytical Consultant Introduction

More information

An Introduction of Gephi

An Introduction of Gephi An Introduction of Gephi CITI Visualization Group February 21, 2017 Contents 1 Introduction 2 2 File Formats and Basic Data Structures 2 3 Creating Visualizations 4 1 1 Introduction Gephi(https://gephi.org/)

More information

Extracting Information from Complex Networks

Extracting Information from Complex Networks Extracting Information from Complex Networks 1 Complex Networks Networks that arise from modeling complex systems: relationships Social networks Biological networks Distinguish from random networks uniform

More information

International Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.7, No.3, May Dr.Zakea Il-Agure and Mr.Hicham Noureddine Itani

International Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.7, No.3, May Dr.Zakea Il-Agure and Mr.Hicham Noureddine Itani LINK MINING PROCESS Dr.Zakea Il-Agure and Mr.Hicham Noureddine Itani Higher Colleges of Technology, United Arab Emirates ABSTRACT Many data mining and knowledge discovery methodologies and process models

More information

CSE 701: LARGE-SCALE GRAPH MINING. A. Erdem Sariyuce

CSE 701: LARGE-SCALE GRAPH MINING. A. Erdem Sariyuce CSE 701: LARGE-SCALE GRAPH MINING A. Erdem Sariyuce WHO AM I? My name is Erdem Office: 323 Davis Hall Office hours: Wednesday 2-4 pm Research on graph (network) mining & management Practical algorithms

More information

DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS

DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS Todd Waskiewicz and Peter LaMonica Air Force Research Laboratory Information and Intelligence Exploitation Division {Todd.Waskiewicz,

More information

Lecture Note: Computation problems in social. network analysis

Lecture Note: Computation problems in social. network analysis Lecture Note: Computation problems in social network analysis Bang Ye Wu CSIE, Chung Cheng University, Taiwan September 29, 2008 In this lecture note, several computational problems are listed, including

More information

Cyber Security Development. Ghana in Perspective

Cyber Security Development. Ghana in Perspective Cyber Security Development Ghana in Perspective GHANA S CYBER SECURITY JOURNEY NCSPS Development Establishment of CERT NCSPS Validation 2015 Adoption of NCSPS by Cabinet 2016 NCSTWG NCSIAC NCSPS Review

More information

Scott Philips, Edward Kao, Michael Yee and Christian Anderson. Graph Exploitation Symposium August 9 th 2011

Scott Philips, Edward Kao, Michael Yee and Christian Anderson. Graph Exploitation Symposium August 9 th 2011 Activity-Based Community Detection Scott Philips, Edward Kao, Michael Yee and Christian Anderson Graph Exploitation Symposium August 9 th 2011 23-1 This work is sponsored by the Office of Naval Research

More information

acknowledged by the United Nations University

acknowledged by the United Nations University Regional Centre of Expertise in Sustainability Education acknowledged by the United Nations University RCE Severn Network RCE Severn is a Regional Centre of Expertise (RCE) for Sustainability Education,

More information

Senior Technical Specialist, IBM. Charles Price (Primary) Advisory Software Engineer, IBM. Matthias Falkenberg DX Development Team Lead, IBM

Senior Technical Specialist, IBM. Charles Price (Primary) Advisory Software Engineer, IBM. Matthias Falkenberg DX Development Team Lead, IBM Session ID: DDX-15 Session Title: Building Rich, OmniChannel Digital Experiences for Enterprise, Social and Storefront Commerce Data with Digital Data Connector Part 2: Social Rendering Instructors: Bryan

More information

Fuzzy Reasoning. Linguistic Variables

Fuzzy Reasoning. Linguistic Variables Fuzzy Reasoning Linguistic Variables Linguistic variable is an important concept in fuzzy logic and plays a key role in its applications, especially in the fuzzy expert system Linguistic variable is a

More information

Chapter 5: Outlier Detection

Chapter 5: Outlier Detection Ludwig-Maximilians-Universität München Institut für Informatik Lehr- und Forschungseinheit für Datenbanksysteme Knowledge Discovery in Databases SS 2016 Chapter 5: Outlier Detection Lecture: Prof. Dr.

More information

Analysis and visualization with v isone

Analysis and visualization with v isone Analysis and visualization with v isone Jürgen Lerner University of Konstanz Egoredes Summerschool Barcelona, 21. 25. June, 2010 About v isone. Visone is the Italian word for mink. In Spanish visón. visone

More information

DIGITAL TECHNOLOGIES - IT

DIGITAL TECHNOLOGIES - IT DIGITAL TECHNOLOGIES - IT Years 7 & 8 Digital Technologies Years 9 & 10 Years 9 & 10 Programming Business IT VCE Computing VCE Informatics VCE Software Development VCE Certificate III in IDMT - Game Programming

More information

Machine Learning for Data Science (CS4786) Lecture 11

Machine Learning for Data Science (CS4786) Lecture 11 Machine Learning for Data Science (CS4786) Lecture 11 Spectral Clustering Course Webpage : http://www.cs.cornell.edu/courses/cs4786/2016fa/ Survey Survey Survey Competition I Out! Preliminary report of

More information

Integrating Venue-Based Social Network Analysis and Geographic Information System Analysis to Guide Targeted HIV Prevention

Integrating Venue-Based Social Network Analysis and Geographic Information System Analysis to Guide Targeted HIV Prevention Integrating Venue-Based Social Network Analysis and Geographic Information System Analysis to Guide Targeted HIV Prevention Ian Holloway, PhD, MSW, MPH Assistant Professor Department of Social Welfare

More information

Figure 1: Workflow of object-based classification

Figure 1: Workflow of object-based classification Technical Specifications Object Analyst Object Analyst is an add-on package for Geomatica that provides tools for segmentation, classification, and feature extraction. Object Analyst includes an all-in-one

More information

Hybrid Recommendation System Using Clustering and Collaborative Filtering

Hybrid Recommendation System Using Clustering and Collaborative Filtering Hybrid Recommendation System Using Clustering and Collaborative Filtering Roshni Padate Assistant Professor roshni@frcrce.ac.in Priyanka Bane B.E. Student priyankabane56@gmail.com Jayesh Kudase B.E. Student

More information

Topology Enhancement in Wireless Multihop Networks: A Top-down Approach

Topology Enhancement in Wireless Multihop Networks: A Top-down Approach Topology Enhancement in Wireless Multihop Networks: A Top-down Approach Symeon Papavassiliou (joint work with Eleni Stai and Vasileios Karyotis) National Technical University of Athens (NTUA) School of

More information

Ministry of Higher Education and Scientific Research

Ministry of Higher Education and Scientific Research Morning Study Department of information technology Institute of Technical - Duhok. University of Polytechnic Duhok. Subject: Web Technology Course book for 2nd year. Lecturer s name: MSc. Ayman Nashwan

More information

ArchiMate symbols for relating system elements

ArchiMate symbols for relating system elements ArchiMate symbols for relating system elements Including diagrams and definitions edited from the ArchiMate 2.1 standard. Copyright The Open Group, All Rights Reserved. ArchiMate is a registered trademark

More information

Automatic basis selection for RBF networks using Stein s unbiased risk estimator

Automatic basis selection for RBF networks using Stein s unbiased risk estimator Automatic basis selection for RBF networks using Stein s unbiased risk estimator Ali Ghodsi School of omputer Science University of Waterloo University Avenue West NL G anada Email: aghodsib@cs.uwaterloo.ca

More information

Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques

Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology,

More information

This is not the chapter you re looking for [handwave]

This is not the chapter you re looking for [handwave] Chapter 4 This is not the chapter you re looking for [handwave] The plan of this course was to have 4 parts, and the fourth part would be half on analyzing random graphs, and looking at different models,

More information

LAWGIX LAWYERS, LLC. External Privacy Policy Policy ID: 3214 Date Last Revised: January 16, Internal Use Only 1

LAWGIX LAWYERS, LLC. External Privacy Policy Policy ID: 3214 Date Last Revised: January 16, Internal Use Only 1 LAWGIX LAWYERS, LLC External Privacy Policy Policy ID: 3214 Date Last Revised: January 16, 2019 1 Document Summary Policy Title: Procedure Owner: External Privacy Policy Steering Committee Effective Date:

More information

Full Name of Centre:... Date of establishment:... Address: Telephone No:... Fax No: (Please include area codes)

Full Name of Centre:... Date of establishment:... Address: Telephone No:... Fax No: (Please include area codes) APPLICATION for AIES CENTRE REGISTRATION 2017/18 2512 Chambers Road, Tustin CA 92780, USA Tel: 949-501-3701 Email: info@aiesus.org Website: www.aiesus.org Please read the instructions and terms of contract

More information

SOMSN: An Effective Self Organizing Map for Clustering of Social Networks

SOMSN: An Effective Self Organizing Map for Clustering of Social Networks SOMSN: An Effective Self Organizing Map for Clustering of Social Networks Fatemeh Ghaemmaghami Research Scholar, CSE and IT Dept. Shiraz University, Shiraz, Iran Reza Manouchehri Sarhadi Research Scholar,

More information

Introduction to Engineering Systems, ESD.00. Networks. Lecturers: Professor Joseph Sussman Dr. Afreen Siddiqi TA: Regina Clewlow

Introduction to Engineering Systems, ESD.00. Networks. Lecturers: Professor Joseph Sussman Dr. Afreen Siddiqi TA: Regina Clewlow Introduction to Engineering Systems, ESD.00 Lecture 7 Networks Lecturers: Professor Joseph Sussman Dr. Afreen Siddiqi TA: Regina Clewlow The Bridges of Königsberg The town of Konigsberg in 18 th century

More information

Centralities (4) By: Ralucca Gera, NPS. Excellence Through Knowledge

Centralities (4) By: Ralucca Gera, NPS. Excellence Through Knowledge Centralities (4) By: Ralucca Gera, NPS Excellence Through Knowledge Some slide from last week that we didn t talk about in class: 2 PageRank algorithm Eigenvector centrality: i s Rank score is the sum

More information

Data Mining Chapter 9: Descriptive Modeling Fall 2011 Ming Li Department of Computer Science and Technology Nanjing University

Data Mining Chapter 9: Descriptive Modeling Fall 2011 Ming Li Department of Computer Science and Technology Nanjing University Data Mining Chapter 9: Descriptive Modeling Fall 2011 Ming Li Department of Computer Science and Technology Nanjing University Descriptive model A descriptive model presents the main features of the data

More information

Challenges in Multiresolution Methods for Graph-based Learning

Challenges in Multiresolution Methods for Graph-based Learning Challenges in Multiresolution Methods for Graph-based Learning Michael W. Mahoney ICSI and Dept of Statistics, UC Berkeley ( For more info, see: http: // www. stat. berkeley. edu/ ~ mmahoney or Google

More information

Section 2.7 BIPARTITE NETWORKS

Section 2.7 BIPARTITE NETWORKS Section 2.7 BIPARTITE NETWORKS BIPARTITE GRAPHS bipartite graph (or bigraph) is a graph whose nodes can be divided into two disjoint sets U and V such that every link connects a node in U to one in V;

More information

Non Overlapping Communities

Non Overlapping Communities Non Overlapping Communities Davide Mottin, Konstantina Lazaridou HassoPlattner Institute Graph Mining course Winter Semester 2016 Acknowledgements Most of this lecture is taken from: http://web.stanford.edu/class/cs224w/slides

More information

TCM Health-keeping Proverb English Translation Management Platform based on SQL Server Database

TCM Health-keeping Proverb English Translation Management Platform based on SQL Server Database 2019 2nd International Conference on Computer Science and Advanced Materials (CSAM 2019) TCM Health-keeping Proverb English Translation Management Platform based on SQL Server Database Qiuxia Zeng1, Jianpeng

More information

ehealth in Southwestern Ontario

ehealth in Southwestern Ontario ehealth in Southwestern Ontario Adding Value to the Healthcare System November 2, 2016 Prepared by: Michael Barrett, CEO, South West LHIN at the request of Ed Clark Page 1 Table of Contents Table of Contents

More information

Methods of Technical Risk Assessment in a Regional Context

Methods of Technical Risk Assessment in a Regional Context Methods of Technical Risk Assessment in a Regional Context Wolfgang Kröger, Professor and Head of former Laboratory for Safety Analysis (www.lsa.ethz.ch) Founding Rector of International Risk Governance

More information