SlideShare una empresa de Scribd logo
1 de 20
Introduction to Networks and
Business Intelligence
Prof. Dr. Daning Hu
Department of Informatics
University of Zurich
Sep, 2012
2
Outline
 Network Science
 A “Random” History
 Network Analysis
 Network Topological Analysis: Random, Scale-Free, and Small-world
Networks
 Node level analysis
 Link Analysis
 Network Visualization
 Network-based Business Intelligence Application
3
Network Science
 Network science is an interdisciplinary academic field which
studies complex networks such as information networks,
biological networks, cognitive and semantic networks, and social
networks. It draws on theories and methods including (Wiki)
 Graph theory from mathematics, e.g., Small-world
 Statistical mechanics from physics, e.g., Rich get richer,
 Data mining and information visualization from computer science,
 Inferential modeling from statistics, e.g., Collaborative filtering
 Social structure from sociology, e.g., weak tie, structural holes
 The National Research Council defines network science as "the
study of network representations of physical, biological, and social
phenomena leading to predictive models of these phenomena.”
4
A “Random” History: Math, Psychology, Sociology…
 The study of networks has emerged in diverse disciplines as a
means of analyzing complex relational data.
 Network science has its root in Graph Theory.
 Seven Bridges of Königsberg written by Leonhard Euler in 1736.
 Vertices, Edges, Nodes, Links,
 a branch of mathematics that studies the properties of pairwise relations in a
network structure
 Social Network Analysis
 Jacob Moreno, a psychologist, developed the Sociogram and to “precisely
describe the interpersonal structure of a group”.
 Jacob’s experiment is the first to use Social Network Analysis and was
published in the New York Times (April 3, 1933, page 17).
 Stanley Milgram (Small World Experiment: Six Degrees of Separation,
1960s). Facebook: 5.28 steps in 2008, 4.74 in 2011.
5
Jacob Moreno’s experiment on Friendship Network
6
Now…
Node Link
Social network People Friendship, kinship, collaboration
Inter-organizational
network
Companies Strategic alliance, buyer-seller
relation, joint venture
Citation network Documents/authors Citation
Internet Routers/computers Wire, cable
WWW Web pages hyperlink
Biochemical network Genes/proteins Regulatory effect
… … …
Complex Networks in the Real World
7
Examples of Real-World Complex Networks
A collaboration network of
physicists (size < 1K)
Source: (Newman & Girvan,
2004)
The Internet
(size > 150K),
Source: Lumeta Corp.,
The Internet Mapping
Project
8
Network Analysis: Topology Analysis
 Network Topology Analysis takes a macro perspective to study
the physical properties of network structures. Network topological
measures include:
 Size,
 Density,
 Average Degree,
 Average Path Length: on average, the number of steps it takes to get
from one member of the network to another.
 Diameter
 Clustering Coefficient: a measure of an "all-my-friends-know-each-
other" property; small-world feature





1
)
(
)
1
(
2
)
(
i
i
i
i
i
Coeff
Clustering
CC
k
k
E
i
CC
ki = Cd(i) = # of neighbors of node i
Ei = # of links actually exist between ki nodes
9
Topology Analysis: Three Topology Models
 Random Network
 Erdős–Rényi Random Graph model
 used for generating random graphs in which edges are set between nodes
with equal probabilities
10
Topology Analysis: Three Topology Models
 Small-World Network
 Watts-Strogatz Small World model
 used for generating graphs with small-world properties
 large clustering coefficient
 high average path length
11
Topology Analysis: Three Topology Models
 Scale-Free Network
 Barabási–Albert (BA) Preferential Attachment model
 A network model used to demonstrate a preferential attachment or a "rich-
get-richer" effect.
 an edge is most likely to attach to
nodes with higher degrees.
 Power-law degree distribution
12
Network Analysis: Topology Analysis
Topology Average Path Length
(L)
Clustering
Coefficient (CC)
Degree Distribution
(P(k))
Random Graph Poisson Dist.:
Small World
(Watts & Strogatz, 1998)
Lsw  Lrand CCsw  CCrand
Similar to random
graph
Scale-Free network LSF  Lrand Power-law
Distribution:
P(k) ~ k-

k
N
Lrand
ln
ln
~
N
k
CCrand



!
)
(
k
k
e
k
P
k
k 

 



k : Average degree
13
Network Scientists
• Paul Erdős (Random graph model)
• Duncan Watts (Small-World model)
• A.-L. Barabási (Scale-Free model); “Linked”
• Mark Newman (SW and SF models)
14
Network Analysis: Node-level Analysis
 Node Centrality can be viewed as a measure of influence or
importance of nodes in a network.
 Degree
 the number of links that a node possesses in a network. In a directed
network, one must differentiate between in-links and out-links by
calculating in-degree and out-degree.
 Betweeness
 the number of shortest paths in a network that traverse through that node.
 Closeness
 the average distance that each node is from all other nodes in the network
15
Example: Centrality Measures of Bin Laden in a
Global Terrorist Network
0
10
20
30
40
50
60
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
Degree
0
500
1000
1500
2000
2500
3000
3500
4000
4500
5000
1
9
8
9
1
9
9
0
1
9
9
1
1
9
9
2
1
9
9
3
1
9
9
4
1
9
9
5
1
9
9
6
1
9
9
7
1
9
9
8
1
9
9
9
2
0
0
0
2
0
0
1
2
0
0
2
Betweenness
0
50
100
150
200
250
300
350
400
1
9
8
9
1
9
9
0
1
9
9
1
1
9
9
2
1
9
9
3
1
9
9
4
1
9
9
5
1
9
9
6
1
9
9
7
1
9
9
8
1
9
9
9
2
0
0
0
2
0
0
1
2
0
0
2
Closeness
 The changes in the degree,
betweenness and closeness of
the node bin Laden from 1989
to 2002
16
Findings and Possible Explanations
 The changes described in the above figure show that
 From 1994 to 1996, bin Laden’s betweenness decreased a lot and then increased
until 2001
 In 1994, The Saudi government revoked his citizenship and expelled him from
the country
 In 1995, he then went to Khartoum, Sudan, but under U.S. pressure was
expelled Again
 In 1996, bin Laden returned to Afghanistan established camps and refuge
there
 From 1998 to 1999, there is another sharp decrease in betweenness
 After 1998 bombings of the United States embassies around world, President
Bill Clinton ordered a freeze on assets linked to bin Laden
 Since then, bin Laden was officially listed as one of the FBI Ten Most Wanted
Fugitives and FBI Most Wanted Terrorists
 In August 1998, the U.S. military launched an assassination but failed to harm
bin Laden but killed 19 other people
 In 1999, United States convinced the United Nations to impose sanctions
against Afghanistan in an attempt to force the Taliban to extradite him
17
Network Analysis: Link Analysis
 Link analysis focuses on the prediction of link formations
between a pair of nodes based on various network factors. Its
applications include:
 Finance: Insurance fraud detections
 E-commerce: recommendation systems, e.g., Amazon
 Internet Search Engine: Google PageRank
 Law Enforcement: Crime link predictions
18
Network Visualization: Expert Partition of the
Collaboration Network
Weapons of
massive
destruction
Terrorism in
Europe
Criminal
justice
An international
terrorism conf.
Rand Corp.
Historical and policy
perspective of
terrorism
Not well-defined
group
Legal
perspective of
terrorism
19
20
Network-based Business Applications
 Facebook: People you may know

Más contenido relacionado

Similar a intro to sna.ppt

02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and OverviewDuke Network Analysis Center
 
ICPSR - Complex Systems Models in the Social Sciences - Lecture 2 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 2 - Professor...ICPSR - Complex Systems Models in the Social Sciences - Lecture 2 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 2 - Professor...Daniel Katz
 
An Introduction to Network Theory
An Introduction to Network TheoryAn Introduction to Network Theory
An Introduction to Network TheorySocialphysicist
 
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)Daniel Katz
 
Visually Exploring Social Participation in Encyclopedia of Life
Visually Exploring Social Participation in Encyclopedia of LifeVisually Exploring Social Participation in Encyclopedia of Life
Visually Exploring Social Participation in Encyclopedia of LifeHarish Vaidyanathan
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network AnalysisMarc Smith
 
Socialnetworkanalysis
SocialnetworkanalysisSocialnetworkanalysis
Socialnetworkanalysiskcarter14
 
Descobrindo o tesouro escondido nos seus dados usando grafos.
Descobrindo o tesouro escondido nos seus dados usando grafos.Descobrindo o tesouro escondido nos seus dados usando grafos.
Descobrindo o tesouro escondido nos seus dados usando grafos.Ana Appel
 
Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Tin180 VietNam
 
Social networkanalysisfinal
Social networkanalysisfinalSocial networkanalysisfinal
Social networkanalysisfinalkcarter14
 
Defining Business Network
Defining Business NetworkDefining Business Network
Defining Business NetworkWaqas Tariq
 
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...Marc Smith
 
New Metrics for New Media Bay Area CIO IT Executives Meetup
New Metrics for New Media Bay Area CIO IT Executives MeetupNew Metrics for New Media Bay Area CIO IT Executives Meetup
New Metrics for New Media Bay Area CIO IT Executives MeetupTatyana Kanzaveli
 
Network Structure For Social Network
Network Structure For Social NetworkNetwork Structure For Social Network
Network Structure For Social NetworkVaibhav Sathe
 
2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith
2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith
2010-November-8-NIA - Smart Society and Civic Culture - Marc SmithMarc Smith
 
Why rumors spread fast in social networks
Why rumors spread fast in social networksWhy rumors spread fast in social networks
Why rumors spread fast in social networksaugustodefranco .
 
History of the Internet.doc
History of the Internet.docHistory of the Internet.doc
History of the Internet.docNPeredaSamyJ
 

Similar a intro to sna.ppt (20)

02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview
 
Network Science: Theory, Modeling and Applications
Network Science: Theory, Modeling and ApplicationsNetwork Science: Theory, Modeling and Applications
Network Science: Theory, Modeling and Applications
 
ICPSR - Complex Systems Models in the Social Sciences - Lecture 2 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 2 - Professor...ICPSR - Complex Systems Models in the Social Sciences - Lecture 2 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 2 - Professor...
 
An Introduction to Network Theory
An Introduction to Network TheoryAn Introduction to Network Theory
An Introduction to Network Theory
 
DREaM Event 2: Louise Cooke
DREaM Event 2: Louise CookeDREaM Event 2: Louise Cooke
DREaM Event 2: Louise Cooke
 
SSRI_pt1.ppt
SSRI_pt1.pptSSRI_pt1.ppt
SSRI_pt1.ppt
 
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
 
Visually Exploring Social Participation in Encyclopedia of Life
Visually Exploring Social Participation in Encyclopedia of LifeVisually Exploring Social Participation in Encyclopedia of Life
Visually Exploring Social Participation in Encyclopedia of Life
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
 
Socialnetworkanalysis
SocialnetworkanalysisSocialnetworkanalysis
Socialnetworkanalysis
 
Descobrindo o tesouro escondido nos seus dados usando grafos.
Descobrindo o tesouro escondido nos seus dados usando grafos.Descobrindo o tesouro escondido nos seus dados usando grafos.
Descobrindo o tesouro escondido nos seus dados usando grafos.
 
Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)
 
Social networkanalysisfinal
Social networkanalysisfinalSocial networkanalysisfinal
Social networkanalysisfinal
 
Defining Business Network
Defining Business NetworkDefining Business Network
Defining Business Network
 
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
 
New Metrics for New Media Bay Area CIO IT Executives Meetup
New Metrics for New Media Bay Area CIO IT Executives MeetupNew Metrics for New Media Bay Area CIO IT Executives Meetup
New Metrics for New Media Bay Area CIO IT Executives Meetup
 
Network Structure For Social Network
Network Structure For Social NetworkNetwork Structure For Social Network
Network Structure For Social Network
 
2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith
2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith
2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith
 
Why rumors spread fast in social networks
Why rumors spread fast in social networksWhy rumors spread fast in social networks
Why rumors spread fast in social networks
 
History of the Internet.doc
History of the Internet.docHistory of the Internet.doc
History of the Internet.doc
 

Más de NISHASOMSCS113

Building blocks of Algblocks of Alg.pptx
Building blocks of Algblocks of Alg.pptxBuilding blocks of Algblocks of Alg.pptx
Building blocks of Algblocks of Alg.pptxNISHASOMSCS113
 
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...NISHASOMSCS113
 
Exception handling.pptx
Exception handling.pptxException handling.pptx
Exception handling.pptxNISHASOMSCS113
 
Introduction to Information Storage.pptx
Introduction to Information Storage.pptxIntroduction to Information Storage.pptx
Introduction to Information Storage.pptxNISHASOMSCS113
 

Más de NISHASOMSCS113 (9)

Building blocks of Algblocks of Alg.pptx
Building blocks of Algblocks of Alg.pptxBuilding blocks of Algblocks of Alg.pptx
Building blocks of Algblocks of Alg.pptx
 
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
Exception handling.pptx
Exception handling.pptxException handling.pptx
Exception handling.pptx
 
Introduction to Information Storage.pptx
Introduction to Information Storage.pptxIntroduction to Information Storage.pptx
Introduction to Information Storage.pptx
 
recursion.ppt
recursion.pptrecursion.ppt
recursion.ppt
 
social.pptx
social.pptxsocial.pptx
social.pptx
 
Data Management.pptx
Data Management.pptxData Management.pptx
Data Management.pptx
 
intro.ppt
intro.pptintro.ppt
intro.ppt
 

Último

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Último (20)

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

intro to sna.ppt

  • 1. Introduction to Networks and Business Intelligence Prof. Dr. Daning Hu Department of Informatics University of Zurich Sep, 2012
  • 2. 2 Outline  Network Science  A “Random” History  Network Analysis  Network Topological Analysis: Random, Scale-Free, and Small-world Networks  Node level analysis  Link Analysis  Network Visualization  Network-based Business Intelligence Application
  • 3. 3 Network Science  Network science is an interdisciplinary academic field which studies complex networks such as information networks, biological networks, cognitive and semantic networks, and social networks. It draws on theories and methods including (Wiki)  Graph theory from mathematics, e.g., Small-world  Statistical mechanics from physics, e.g., Rich get richer,  Data mining and information visualization from computer science,  Inferential modeling from statistics, e.g., Collaborative filtering  Social structure from sociology, e.g., weak tie, structural holes  The National Research Council defines network science as "the study of network representations of physical, biological, and social phenomena leading to predictive models of these phenomena.”
  • 4. 4 A “Random” History: Math, Psychology, Sociology…  The study of networks has emerged in diverse disciplines as a means of analyzing complex relational data.  Network science has its root in Graph Theory.  Seven Bridges of Königsberg written by Leonhard Euler in 1736.  Vertices, Edges, Nodes, Links,  a branch of mathematics that studies the properties of pairwise relations in a network structure  Social Network Analysis  Jacob Moreno, a psychologist, developed the Sociogram and to “precisely describe the interpersonal structure of a group”.  Jacob’s experiment is the first to use Social Network Analysis and was published in the New York Times (April 3, 1933, page 17).  Stanley Milgram (Small World Experiment: Six Degrees of Separation, 1960s). Facebook: 5.28 steps in 2008, 4.74 in 2011.
  • 5. 5 Jacob Moreno’s experiment on Friendship Network
  • 6. 6 Now… Node Link Social network People Friendship, kinship, collaboration Inter-organizational network Companies Strategic alliance, buyer-seller relation, joint venture Citation network Documents/authors Citation Internet Routers/computers Wire, cable WWW Web pages hyperlink Biochemical network Genes/proteins Regulatory effect … … … Complex Networks in the Real World
  • 7. 7 Examples of Real-World Complex Networks A collaboration network of physicists (size < 1K) Source: (Newman & Girvan, 2004) The Internet (size > 150K), Source: Lumeta Corp., The Internet Mapping Project
  • 8. 8 Network Analysis: Topology Analysis  Network Topology Analysis takes a macro perspective to study the physical properties of network structures. Network topological measures include:  Size,  Density,  Average Degree,  Average Path Length: on average, the number of steps it takes to get from one member of the network to another.  Diameter  Clustering Coefficient: a measure of an "all-my-friends-know-each- other" property; small-world feature      1 ) ( ) 1 ( 2 ) ( i i i i i Coeff Clustering CC k k E i CC ki = Cd(i) = # of neighbors of node i Ei = # of links actually exist between ki nodes
  • 9. 9 Topology Analysis: Three Topology Models  Random Network  Erdős–Rényi Random Graph model  used for generating random graphs in which edges are set between nodes with equal probabilities
  • 10. 10 Topology Analysis: Three Topology Models  Small-World Network  Watts-Strogatz Small World model  used for generating graphs with small-world properties  large clustering coefficient  high average path length
  • 11. 11 Topology Analysis: Three Topology Models  Scale-Free Network  Barabási–Albert (BA) Preferential Attachment model  A network model used to demonstrate a preferential attachment or a "rich- get-richer" effect.  an edge is most likely to attach to nodes with higher degrees.  Power-law degree distribution
  • 12. 12 Network Analysis: Topology Analysis Topology Average Path Length (L) Clustering Coefficient (CC) Degree Distribution (P(k)) Random Graph Poisson Dist.: Small World (Watts & Strogatz, 1998) Lsw  Lrand CCsw  CCrand Similar to random graph Scale-Free network LSF  Lrand Power-law Distribution: P(k) ~ k-  k N Lrand ln ln ~ N k CCrand    ! ) ( k k e k P k k        k : Average degree
  • 13. 13 Network Scientists • Paul Erdős (Random graph model) • Duncan Watts (Small-World model) • A.-L. Barabási (Scale-Free model); “Linked” • Mark Newman (SW and SF models)
  • 14. 14 Network Analysis: Node-level Analysis  Node Centrality can be viewed as a measure of influence or importance of nodes in a network.  Degree  the number of links that a node possesses in a network. In a directed network, one must differentiate between in-links and out-links by calculating in-degree and out-degree.  Betweeness  the number of shortest paths in a network that traverse through that node.  Closeness  the average distance that each node is from all other nodes in the network
  • 15. 15 Example: Centrality Measures of Bin Laden in a Global Terrorist Network 0 10 20 30 40 50 60 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 Degree 0 500 1000 1500 2000 2500 3000 3500 4000 4500 5000 1 9 8 9 1 9 9 0 1 9 9 1 1 9 9 2 1 9 9 3 1 9 9 4 1 9 9 5 1 9 9 6 1 9 9 7 1 9 9 8 1 9 9 9 2 0 0 0 2 0 0 1 2 0 0 2 Betweenness 0 50 100 150 200 250 300 350 400 1 9 8 9 1 9 9 0 1 9 9 1 1 9 9 2 1 9 9 3 1 9 9 4 1 9 9 5 1 9 9 6 1 9 9 7 1 9 9 8 1 9 9 9 2 0 0 0 2 0 0 1 2 0 0 2 Closeness  The changes in the degree, betweenness and closeness of the node bin Laden from 1989 to 2002
  • 16. 16 Findings and Possible Explanations  The changes described in the above figure show that  From 1994 to 1996, bin Laden’s betweenness decreased a lot and then increased until 2001  In 1994, The Saudi government revoked his citizenship and expelled him from the country  In 1995, he then went to Khartoum, Sudan, but under U.S. pressure was expelled Again  In 1996, bin Laden returned to Afghanistan established camps and refuge there  From 1998 to 1999, there is another sharp decrease in betweenness  After 1998 bombings of the United States embassies around world, President Bill Clinton ordered a freeze on assets linked to bin Laden  Since then, bin Laden was officially listed as one of the FBI Ten Most Wanted Fugitives and FBI Most Wanted Terrorists  In August 1998, the U.S. military launched an assassination but failed to harm bin Laden but killed 19 other people  In 1999, United States convinced the United Nations to impose sanctions against Afghanistan in an attempt to force the Taliban to extradite him
  • 17. 17 Network Analysis: Link Analysis  Link analysis focuses on the prediction of link formations between a pair of nodes based on various network factors. Its applications include:  Finance: Insurance fraud detections  E-commerce: recommendation systems, e.g., Amazon  Internet Search Engine: Google PageRank  Law Enforcement: Crime link predictions
  • 18. 18 Network Visualization: Expert Partition of the Collaboration Network Weapons of massive destruction Terrorism in Europe Criminal justice An international terrorism conf. Rand Corp. Historical and policy perspective of terrorism Not well-defined group Legal perspective of terrorism
  • 19. 19
  • 20. 20 Network-based Business Applications  Facebook: People you may know