Submit Search
Upload
Graph Gurus Episode 6: Community Detection
•
0 likes
•
298 views
TigerGraph
Follow
Community Detection using a Native Parallel Database
Read less
Read more
Software
Report
Share
Report
Share
1 of 31
Download now
Download to read offline
Recommended
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
TigerGraph
Using Graph Algorithms For Advanced Analytics - Part 4 Similarity 30 graph al...
Using Graph Algorithms For Advanced Analytics - Part 4 Similarity 30 graph al...
TigerGraph
Graph Gurus Episode 4: Detecting Fraud and Money Laudering in Real-Time Part 2
Graph Gurus Episode 4: Detecting Fraud and Money Laudering in Real-Time Part 2
TigerGraph
National Hackathon - Problem Statements
National Hackathon - Problem Statements
Zaki Haider
Applying Statistical Modeling and Machine Learning to Perform Time-Series For...
Applying Statistical Modeling and Machine Learning to Perform Time-Series For...
PyData
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
TigerGraph
How Graph Algorithms Answer your Business Questions in Banking and Beyond
How Graph Algorithms Answer your Business Questions in Banking and Beyond
Neo4j
project report of social networking web sites
project report of social networking web sites
Gyanendra Pratap Singh
Recommended
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
TigerGraph
Using Graph Algorithms For Advanced Analytics - Part 4 Similarity 30 graph al...
Using Graph Algorithms For Advanced Analytics - Part 4 Similarity 30 graph al...
TigerGraph
Graph Gurus Episode 4: Detecting Fraud and Money Laudering in Real-Time Part 2
Graph Gurus Episode 4: Detecting Fraud and Money Laudering in Real-Time Part 2
TigerGraph
National Hackathon - Problem Statements
National Hackathon - Problem Statements
Zaki Haider
Applying Statistical Modeling and Machine Learning to Perform Time-Series For...
Applying Statistical Modeling and Machine Learning to Perform Time-Series For...
PyData
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
TigerGraph
How Graph Algorithms Answer your Business Questions in Banking and Beyond
How Graph Algorithms Answer your Business Questions in Banking and Beyond
Neo4j
project report of social networking web sites
project report of social networking web sites
Gyanendra Pratap Singh
Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017
Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017
MLconf
15 puzzle problem using branch and bound
15 puzzle problem using branch and bound
Abhishek Singh
Voice assistant ppt
Voice assistant ppt
AkashKumbhar18
Using Graph Algorithms for Advanced Analytics - Part 5 Classification
Using Graph Algorithms for Advanced Analytics - Part 5 Classification
TigerGraph
Graph Gurus Episode 3: Anti Fraud and AML Part 1
Graph Gurus Episode 3: Anti Fraud and AML Part 1
TigerGraph
Comparing three data ingestion approaches where Apache Kafka integrates with ...
Comparing three data ingestion approaches where Apache Kafka integrates with ...
HostedbyConfluent
ChatGPT 研究框架(2023).pdf
ChatGPT 研究框架(2023).pdf
灿辉 葛
Diabetes prediction using machine learning
Diabetes prediction using machine learning
dataalcott
Applications of graphs
Applications of graphs
Tech_MX
report on internship
report on internship
AdityaChoudhary187465
Machine Learning for Weather Forecasts
Machine Learning for Weather Forecasts
inside-BigData.com
Eigenvalues and eigenvectors
Eigenvalues and eigenvectors
iraq
Sentiment analysis
Sentiment analysis
Makrand Patil
Hate Speech Recognition System through NLP and Deep Learning
Hate Speech Recognition System through NLP and Deep Learning
IRJET Journal
Graph theory in network system
Graph theory in network system
Manikanta satyala
Approximation algorithms
Approximation algorithms
Bipesh Raj Subedi
Intermediate Cypher.pdf
Intermediate Cypher.pdf
Neo4j
2-Approximation Vertex Cover
2-Approximation Vertex Cover
Kowshik Roy
PROJECT REPORT
PROJECT REPORT
Renuka Deshmukh
Clique problem step_by_step
Clique problem step_by_step
Sing Kuang Tan
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
TigerGraph
Graph Gurus Episode 29: Using Graph Algorithms for Advanced Analytics Part 3
Graph Gurus Episode 29: Using Graph Algorithms for Advanced Analytics Part 3
TigerGraph
More Related Content
What's hot
Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017
Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017
MLconf
15 puzzle problem using branch and bound
15 puzzle problem using branch and bound
Abhishek Singh
Voice assistant ppt
Voice assistant ppt
AkashKumbhar18
Using Graph Algorithms for Advanced Analytics - Part 5 Classification
Using Graph Algorithms for Advanced Analytics - Part 5 Classification
TigerGraph
Graph Gurus Episode 3: Anti Fraud and AML Part 1
Graph Gurus Episode 3: Anti Fraud and AML Part 1
TigerGraph
Comparing three data ingestion approaches where Apache Kafka integrates with ...
Comparing three data ingestion approaches where Apache Kafka integrates with ...
HostedbyConfluent
ChatGPT 研究框架(2023).pdf
ChatGPT 研究框架(2023).pdf
灿辉 葛
Diabetes prediction using machine learning
Diabetes prediction using machine learning
dataalcott
Applications of graphs
Applications of graphs
Tech_MX
report on internship
report on internship
AdityaChoudhary187465
Machine Learning for Weather Forecasts
Machine Learning for Weather Forecasts
inside-BigData.com
Eigenvalues and eigenvectors
Eigenvalues and eigenvectors
iraq
Sentiment analysis
Sentiment analysis
Makrand Patil
Hate Speech Recognition System through NLP and Deep Learning
Hate Speech Recognition System through NLP and Deep Learning
IRJET Journal
Graph theory in network system
Graph theory in network system
Manikanta satyala
Approximation algorithms
Approximation algorithms
Bipesh Raj Subedi
Intermediate Cypher.pdf
Intermediate Cypher.pdf
Neo4j
2-Approximation Vertex Cover
2-Approximation Vertex Cover
Kowshik Roy
PROJECT REPORT
PROJECT REPORT
Renuka Deshmukh
Clique problem step_by_step
Clique problem step_by_step
Sing Kuang Tan
What's hot
(20)
Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017
Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017
15 puzzle problem using branch and bound
15 puzzle problem using branch and bound
Voice assistant ppt
Voice assistant ppt
Using Graph Algorithms for Advanced Analytics - Part 5 Classification
Using Graph Algorithms for Advanced Analytics - Part 5 Classification
Graph Gurus Episode 3: Anti Fraud and AML Part 1
Graph Gurus Episode 3: Anti Fraud and AML Part 1
Comparing three data ingestion approaches where Apache Kafka integrates with ...
Comparing three data ingestion approaches where Apache Kafka integrates with ...
ChatGPT 研究框架(2023).pdf
ChatGPT 研究框架(2023).pdf
Diabetes prediction using machine learning
Diabetes prediction using machine learning
Applications of graphs
Applications of graphs
report on internship
report on internship
Machine Learning for Weather Forecasts
Machine Learning for Weather Forecasts
Eigenvalues and eigenvectors
Eigenvalues and eigenvectors
Sentiment analysis
Sentiment analysis
Hate Speech Recognition System through NLP and Deep Learning
Hate Speech Recognition System through NLP and Deep Learning
Graph theory in network system
Graph theory in network system
Approximation algorithms
Approximation algorithms
Intermediate Cypher.pdf
Intermediate Cypher.pdf
2-Approximation Vertex Cover
2-Approximation Vertex Cover
PROJECT REPORT
PROJECT REPORT
Clique problem step_by_step
Clique problem step_by_step
Similar to Graph Gurus Episode 6: Community Detection
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
TigerGraph
Graph Gurus Episode 29: Using Graph Algorithms for Advanced Analytics Part 3
Graph Gurus Episode 29: Using Graph Algorithms for Advanced Analytics Part 3
TigerGraph
Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...
Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...
TigerGraph
Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5
Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5
TigerGraph
Propagating Data Policies - A User Study
Propagating Data Policies - A User Study
Enrico Daga
Shift Remote: AI: Smarter AI with analytical graph databases - Victor Lee (Ti...
Shift Remote: AI: Smarter AI with analytical graph databases - Victor Lee (Ti...
Shift Conference
Data Analytics Using R - Report
Data Analytics Using R - Report
Akanksha Gohil
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
TigerGraph
Matching Social Issues to Technologies for Civic Tech by Association Rule Min...
Matching Social Issues to Technologies for Civic Tech by Association Rule Min...
MasatoKikuchi4
IRJET- Machine Learning: Survey, Types and Challenges
IRJET- Machine Learning: Survey, Types and Challenges
IRJET Journal
A MATHEMATICAL MODEL OF ACCESS CONTROL IN BIG DATA USING CONFIDENCE INTERVAL ...
A MATHEMATICAL MODEL OF ACCESS CONTROL IN BIG DATA USING CONFIDENCE INTERVAL ...
cscpconf
A mathematical model of access control in big data using confidence interval ...
A mathematical model of access control in big data using confidence interval ...
csandit
Graph Gurus Episode 5: Webinar PageRank
Graph Gurus Episode 5: Webinar PageRank
TigerGraph
Graph Gurus Episode 17: Seven Key Data Science Capabilities Powered by a Nati...
Graph Gurus Episode 17: Seven Key Data Science Capabilities Powered by a Nati...
TigerGraph
Make Sense Out of Data with Feature Engineering
Make Sense Out of Data with Feature Engineering
DataRobot
Collusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sum
nexgentech15
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
Nexgen Technology
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
nexgentechnology
Collusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sum
Nexgen Technology
Artificial Intelligence at LinkedIn
Artificial Intelligence at LinkedIn
Bill Liu
Similar to Graph Gurus Episode 6: Community Detection
(20)
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
Graph Gurus Episode 29: Using Graph Algorithms for Advanced Analytics Part 3
Graph Gurus Episode 29: Using Graph Algorithms for Advanced Analytics Part 3
Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...
Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...
Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5
Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5
Propagating Data Policies - A User Study
Propagating Data Policies - A User Study
Shift Remote: AI: Smarter AI with analytical graph databases - Victor Lee (Ti...
Shift Remote: AI: Smarter AI with analytical graph databases - Victor Lee (Ti...
Data Analytics Using R - Report
Data Analytics Using R - Report
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Matching Social Issues to Technologies for Civic Tech by Association Rule Min...
Matching Social Issues to Technologies for Civic Tech by Association Rule Min...
IRJET- Machine Learning: Survey, Types and Challenges
IRJET- Machine Learning: Survey, Types and Challenges
A MATHEMATICAL MODEL OF ACCESS CONTROL IN BIG DATA USING CONFIDENCE INTERVAL ...
A MATHEMATICAL MODEL OF ACCESS CONTROL IN BIG DATA USING CONFIDENCE INTERVAL ...
A mathematical model of access control in big data using confidence interval ...
A mathematical model of access control in big data using confidence interval ...
Graph Gurus Episode 5: Webinar PageRank
Graph Gurus Episode 5: Webinar PageRank
Graph Gurus Episode 17: Seven Key Data Science Capabilities Powered by a Nati...
Graph Gurus Episode 17: Seven Key Data Science Capabilities Powered by a Nati...
Make Sense Out of Data with Feature Engineering
Make Sense Out of Data with Feature Engineering
Collusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sum
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
Collusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sum
Artificial Intelligence at LinkedIn
Artificial Intelligence at LinkedIn
More from TigerGraph
MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
TigerGraph
Better Together: How Graph database enables easy data integration with Spark ...
Better Together: How Graph database enables easy data integration with Spark ...
TigerGraph
Building an accurate understanding of consumers based on real-world signals
Building an accurate understanding of consumers based on real-world signals
TigerGraph
Care Intervention Assistant - Omaha Clinical Data Information System
Care Intervention Assistant - Omaha Clinical Data Information System
TigerGraph
Correspondent Banking Networks
Correspondent Banking Networks
TigerGraph
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
TigerGraph
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
TigerGraph
Fraud Detection and Compliance with Graph Learning
Fraud Detection and Compliance with Graph Learning
TigerGraph
Fraudulent credit card cash-out detection On Graphs
Fraudulent credit card cash-out detection On Graphs
TigerGraph
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
TigerGraph
Customer Experience Management
Customer Experience Management
TigerGraph
Graph+AI for Fin. Services
Graph+AI for Fin. Services
TigerGraph
Davraz - A graph visualization and exploration software.
Davraz - A graph visualization and exploration software.
TigerGraph
Plume - A Code Property Graph Extraction and Analysis Library
Plume - A Code Property Graph Extraction and Analysis Library
TigerGraph
TigerGraph.js
TigerGraph.js
TigerGraph
GRAPHS FOR THE FUTURE ENERGY SYSTEMS
GRAPHS FOR THE FUTURE ENERGY SYSTEMS
TigerGraph
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
TigerGraph
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
TigerGraph
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUI
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUI
TigerGraph
Recommendation Engine with In-Database Machine Learning
Recommendation Engine with In-Database Machine Learning
TigerGraph
More from TigerGraph
(20)
MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
Better Together: How Graph database enables easy data integration with Spark ...
Better Together: How Graph database enables easy data integration with Spark ...
Building an accurate understanding of consumers based on real-world signals
Building an accurate understanding of consumers based on real-world signals
Care Intervention Assistant - Omaha Clinical Data Information System
Care Intervention Assistant - Omaha Clinical Data Information System
Correspondent Banking Networks
Correspondent Banking Networks
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
Fraud Detection and Compliance with Graph Learning
Fraud Detection and Compliance with Graph Learning
Fraudulent credit card cash-out detection On Graphs
Fraudulent credit card cash-out detection On Graphs
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
Customer Experience Management
Customer Experience Management
Graph+AI for Fin. Services
Graph+AI for Fin. Services
Davraz - A graph visualization and exploration software.
Davraz - A graph visualization and exploration software.
Plume - A Code Property Graph Extraction and Analysis Library
Plume - A Code Property Graph Extraction and Analysis Library
TigerGraph.js
TigerGraph.js
GRAPHS FOR THE FUTURE ENERGY SYSTEMS
GRAPHS FOR THE FUTURE ENERGY SYSTEMS
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUI
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUI
Recommendation Engine with In-Database Machine Learning
Recommendation Engine with In-Database Machine Learning
Recently uploaded
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Drew Moseley
Cyber security and its impact on E commerce
Cyber security and its impact on E commerce
manigoyal112
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Natan Silnitsky
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
OnePlan Solutions
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
Hr365.us smith
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
Philip Schwarz
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
confluent
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
vaddepallysandeep122
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
Marharyta Nedzelska
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
BrainSell Technologies
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
Akihiro Suda
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
Lionel Briand
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Cizo Technology Services
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
preethippts
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
Hironori Washizaki
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
Safe Software
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
FerryKemperman
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
team-WIBU
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
Sujith Sukumaran
Recently uploaded
(20)
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Cyber security and its impact on E commerce
Cyber security and its impact on E commerce
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
Graph Gurus Episode 6: Community Detection
1.
Graph Gurus Episode
6 Birds of a Feather - Community Detection with a Native Parallel Graph Database
2.
© 2018 TigerGraph.
All Rights Reserved Welcome ● Attendees are muted but you can talk to us via Chat in Zoom ● Send questions at any time using the Q&A tab in the Zoom menu ● We will have 10 min for Q&A at the end ● The webinar will be recorded and sent via email ● A link to the presentation and reproducible steps will be emailed 2 NOTE: update to the latest version of Zoom to avoid bugs
3.
© 2018 TigerGraph.
All Rights Reserved Developer Edition Available We now offer Docker versions and VirtualBox versions of the TigerGraph Developer Edition, so you can now run on ● MacOS ● Windows 10 ● Linux Developer Edition Download https://www.tigergraph.com/developer/
4.
© 2018 TigerGraph.
All Rights Reserved Today's Gurus 4 Victor Lee Director of Product Management ● BS in Electrical Engineering and Computer Science from UC Berkeley, MS in Electrical Engineering from Stanford University ● PhD in Computer Science from Kent State University focused on graph data mining ● 15+ years in tech industry Emma Liu Product Manager ● BS in Engineering from Harvey Mudd College, MS in Engineering Systems from MIT ● Prior work experience at Oracle and MarkLogic ● Focus - Cloud, Containers, Enterprise Infra, Monitoring, Management, Connectors Huiting Su Software Engineer ● Masters in Industrial Engineering from Purdue ● Focus - Graph Algorithms and Analytics, Machine Learning ● Resident GSQL Expert
5.
© 2018 TigerGraph.
All Rights Reserved Graph Algorithms, Part 2 Part 1 discussed PageRank (Graph Gurus Episode 5).
6.
© 2018 TigerGraph.
All Rights Reserved Communities can be Natural Phenomena Natural Organic - human-made, but without central control DBpedia pages, with links between pages https://www.hackdiary.com/2012/04/05/extracting-a-social-graph-fro m-wikipedia-people-pages/Protein interaction network for Schziophrenia, https://en.wikipedia.org/wiki/Interactome
7.
© 2018 TigerGraph.
All Rights Reserved … or Engineered Communities Congressional Committees and Subcommittees http://www.pnas.org/content/102/20/7057
8.
© 2018 TigerGraph.
All Rights Reserved 8 Understanding Connected Communities 1. How do I find the most influential provider in each region (e.g. healthcare local market) delivering care for a related group of codes for a condition (Diabetes, Cardiac Care, etc.)? 2. Who is influenced by these leaders (e.g. other doctors, chiropractors, physical therapists, facilities)? 3. What is the community size and impact (patients and providers) around these hubs? Questions Use Case Understand care and referral dynamics better Target education at the influencers Identify which influencers are also best-practice practitioners Based on work by Large US Pharma
9.
© 2018 TigerGraph.
All Rights Reserved 9 How do I find the most influential provider in each region for a particular medical condition? Whole-Graph Compute problem 1. Analyze claims data to identify referral relationships among providers (Time Series Analysis) 2. Create subsets of claims around each condition with a group of healthcare codes (e.g. CPT codes) for each region (e.g. local healthcare market) 3. Utilize PageRank to score hubs within each market Dr. Thomas Condition: Diabetes Healthcare Market: S. San Jose, CA Hub Identified: Dr. Thomas
10.
© 2018 TigerGraph.
All Rights Reserved 10 Who is influenced by these leaders (e.g. other doctors, chiropractors, physical therapists, facilities)? Utilize Community Detection 1. Identify communities of providers around each hub for each region and for a specific condition 2. Track changes over time to detect significant shifts in communities Dr. Thomas Condition: Diabetes Healthcare Market: S. San Jose, CA Hub Identified: Dr. Thomas Community Detected: Diabetes – S. San Jose – Dr. Thomas
11.
© 2018 TigerGraph.
All Rights Reserved 11 What is the community size and impact (patients and providers) around these hubs? 1. Compute cost of care for initial diagnosis and follow-on treatment for each community 2. Compare with other communities with similar patient population 3. Track changes over time to detect significant changes in cost of care Dr. Thomas Condition: Diabetes Healthcare Market: S. San Jose, CA Hub Identified: Dr. Thomas Community Detected: Diabetes – S. San Jose – Dr. Thomas Cost of care: initial diagnosis, follow-on care (medicine, tests, treatment)
12.
© 2018 TigerGraph.
All Rights Reserved Other Use Cases ● Business: ○ Who is trading with whom? ○ What products or services are often purchased together? ● Government: ○ Determine natural groupings of persons & needs, for more efficient delivery of services ● Criminal Investigation ○ Detect collusion/conspiracy ○ Detect persons at risk of criminal influence
13.
© 2018 TigerGraph.
All Rights Reserved What is a Community? Who are its members? ● Several different definitions of community ● Usually based on direct connections: The set of vertices C are a community if 1. Every member in C has a direct connection to every other member, or 2. Every member in C has a path to every other member, or 3. The majority of C's neighbors also belong to C. 4. The density of connections within V is greater than expected if connections were random. C
14.
© 2018 TigerGraph.
All Rights Reserved 1: Everyone is connected to everyone. ● This type of subgraph is called a complete graph. ● The collection of vertices is called a clique. ● Too strict for most real-world uses. http://mathworld.wolfram.com/CompleteGraph.html
15.
© 2018 TigerGraph.
All Rights Reserved 2: A Path to every member. ● Instead of direct connection, we allow indirect connection. ● A connected component is the subgraph of vertices which are connected. ○ Weakly Connected Component (WCC) - undirected edges ○ Strongly Connected Component (SCC) - directed edges ● Important, but still strict
16.
© 2018 TigerGraph.
All Rights Reserved 3: Same community with most of your neighbors. ● Allows individuals to link to multiple communities. ● What if there's an equal number of in-group and out-group links? ● What is the right number of communities? LabelRank: https://ieeexplore.ieee.org/document/6609210
17.
© 2018 TigerGraph.
All Rights Reserved Parsimony: The simplest answer is best. ● cf. Occam's razor. ● If you have a choose of 2 communities or 3 communities, and a both "explain" the data equally well → pick the smaller number of communities (2). ● If 3 communities gives a "cleaner explanation" of the data than 2 communities → probably go with 3.
18.
© 2018 TigerGraph.
All Rights Reserved 4: More in-group connections that out-group. ● Modularity is the fraction of the edges that fall within the given groups minus the expected fraction if edges were distributed at random. (Newman and Girvan) ● The value of the modularity lies in the range [-1,1] ● Choose the partitioning (grouping) that has the highest modularity score. http://www.ludowaltman.nl/slm/
19.
© 2018 TigerGraph.
All Rights Reserved Community Detection Algorithms 1. Complete Graph Discovery Every member in C has a direct connection to every other member 2. Connected Components: Every member in C has a path to every other member, or 3. Label Propagation: The majority of C's neighbors also belong to C. 4. Modularity Optimization (Louvain method): The density of connections within V is greater than expected if connections were random. ● Each has a different level of computational complexity (how long it takes to compute, when the graph is very big.)
20.
© 2018 TigerGraph.
All Rights Reserved GSQL Graph Algorithm Library https://github.com/tigergraph/ecosys/tree/master/graph_algorithms Each graph algorithm is a GSQL query. ● May have zero or more input parameters. ● Typically 3 variations: ○ Standard JSON output ○ Write to a CSV file ○ Save to vertex attributes (requires that the attributes exist)
21.
© 2018 TigerGraph.
All Rights Reserved Connected Component Algorithm 1. Label each vertex with a unique community ID (Each vertex is a community of size 1.) 2. Repeat a. For each edge, set the commID of the target vertex to be the smaller of the two commIDs. b. If there are no commID changes, then exit. c. Otherwise, repeat.
22.
© 2018 TigerGraph.
All Rights Reserved CREATE QUERY conn_comp () FOR GRAPH generic { MinAccum<int> @cc_id = 0; # each vertex's tentative component id SumAccum<int> @old_id = 0; OrAccum<bool> @active; # Initialize: Label each vertex with its own internal ID Start = {Node.*}; S = SELECT x FROM Start:x POST-ACCUM x.@cc_id = getvid(x), x.@old_id = getvid(x); # Propagate smaller internal IDs until no more ID changes can be done WHILE (Start.size()>0) DO Start = SELECT t FROM Start:s -(Link:e)-> :t ACCUM t.@cc_id += s.@cc_id // If s has a smaller id than t, copy the id to t POST-ACCUM CASE WHEN t.@old_id != t.@cc_id THEN // If t's id has changed t.@old_id = t.@cc_id, t.@active = true ELSE t.@active = false END HAVING t.@active == true; END; }
23.
© 2018 TigerGraph.
All Rights Reserved Connected Component Results ● Dataset: Zachary's Karate Club ○ Well-known social network study in 1977. ○ Friendship network of 34 karate club members, who fractured into 2 clubs. ● It's one connected component. ● CC is more important for very large graphs, to find isolated subgroups.
24.
© 2018 TigerGraph.
All Rights Reserved Label Propagation Algorithm 1. Label each vertex with a unique community ID (Each vertex is a community of size 1.) 2. Repeat a. For each vertex, count the commIDs of its neighbors. b. For each vertex, update its commID to be the most commonly seen commID among its neighbors. c. If there are no commID changes or you have reached the maximum number of iterations, then exit. d. Otherwise, repeat.
25.
© 2018 TigerGraph.
All Rights Reserved CREATE QUERY label_prop (INT maxIter) FOR GRAPH generic { OrAccum @@changed = true; MapAccum<int, int> @map; # local <communityId, numNeighbors> MapAccum<int, int> @@commSizes; # global <communityId, numMembers> SumAccum<int> @label, @num; Start = {Node.*}; # Assign unique labels to each vertex Start = SELECT s FROM Start:s ACCUM s.@label = getvid(s); # Continued on next slide
26.
© 2018 TigerGraph.
All Rights Reserved # Propagate labels to neighbors until labels converge or the max iterations is reached WHILE @@changed == true LIMIT maxIter DO @@changed = false; Start = SELECT s FROM Start:s -(Link:e)-> :t ACCUM t.@map += (s.@label -> 1) # count the occurrences of neighbor's labels POST-ACCUM INT maxV = 0, INT label = 0, # Iterate over the map to get the neighbor label that occurs most often FOREACH (k,v) IN t.@map DO CASE WHEN v > maxV THEN maxV = v, label = k END END, # When the neighbor search finds a label AND it is a new label # AND the label's count has increased, update the label. CASE WHEN label != 0 AND t.@label != label AND maxV > t.@num THEN @@changed += true, t.@label = label, t.@num = maxV END, t.@map.clear(); END; }
27.
© 2018 TigerGraph.
All Rights Reserved Label Propagation Results ● Zachary's Karate Club again ● 2 large groups ● 2 or 3 small groups
28.
Real World Use
Case Finding communities among Health Care Providers Please send your questions via Q&A at any time
29.
Q&A Please send your
questions via the Q&A menu in Zoom 29
30.
© 2018 TigerGraph.
All Rights Reserved Episode 7: WEDNESDAY, DECEMBER 5 AT 11:00 A.M. PT / 2:00 P.M. ET Connecting the Dots in Real-Time: Deep Link Analysis with a Native Parallel Graph Database to Uncover Hidden Relationships https://info.tigergraph.com/graph-gurus-7 30 REGISTER FOR MORE WEBINARS AT https://www.tigergraph.com/ webinars-and-events/
31.
© 2018 TigerGraph.
All Rights Reserved Additional Resources 31 New Developer Portal https://www.tigergraph.com/developers/ Download the Developer Edition or Enterprise Free Trial https://www.tigergraph.com/download/ Guru Scripts https://github.com/tigergraph/ecosys/tree/master/guru_scripts Join our Developer Forum https://groups.google.com/a/opengsql.org/forum/#!forum/gsql-users @TigerGraphDB youtube.com/tigergraph facebook.com/TigerGraphDB linkedin.com/company/TigerGraph
Download now