SlideShare a Scribd company logo
1 of 31
Download to read offline
Graph Gurus Episode 6
Birds of a Feather - Community Detection with
a Native Parallel Graph Database
© 2018 TigerGraph. All Rights Reserved
Welcome
● Attendees are muted but you can talk to us via Chat in Zoom
● Send questions at any time using the Q&A tab in the Zoom menu
● We will have 10 min for Q&A at the end
● The webinar will be recorded and sent via email
● A link to the presentation and reproducible steps will be emailed
2
NOTE: update to the latest version of Zoom to avoid bugs
© 2018 TigerGraph. All Rights Reserved
Developer Edition Available
We now offer Docker versions and VirtualBox versions of the TigerGraph
Developer Edition, so you can now run on
● MacOS
● Windows 10
● Linux
Developer Edition Download https://www.tigergraph.com/developer/
© 2018 TigerGraph. All Rights Reserved
Today's Gurus
4
Victor Lee
Director of Product Management
● BS in Electrical Engineering and
Computer Science from UC Berkeley,
MS in Electrical Engineering from
Stanford University
● PhD in Computer Science from Kent
State University focused on graph data
mining
● 15+ years in tech industry
Emma Liu
Product Manager
● BS in Engineering from Harvey
Mudd College, MS in Engineering
Systems from MIT
● Prior work experience at Oracle
and MarkLogic
● Focus - Cloud, Containers,
Enterprise Infra, Monitoring,
Management, Connectors
Huiting Su
Software Engineer
● Masters in Industrial
Engineering from Purdue
● Focus - Graph Algorithms and
Analytics, Machine Learning
● Resident GSQL Expert
© 2018 TigerGraph. All Rights Reserved
Graph Algorithms, Part 2
Part 1 discussed PageRank (Graph Gurus Episode 5).
© 2018 TigerGraph. All Rights
Reserved
Communities can be Natural Phenomena
Natural Organic - human-made, but without
central control
DBpedia pages, with links between pages
https://www.hackdiary.com/2012/04/05/extracting-a-social-graph-fro
m-wikipedia-people-pages/Protein interaction network for Schziophrenia,
https://en.wikipedia.org/wiki/Interactome
© 2018 TigerGraph. All Rights
Reserved
… or Engineered Communities
Congressional Committees
and Subcommittees
http://www.pnas.org/content/102/20/7057
© 2018 TigerGraph. All Rights Reserved 8
Understanding Connected Communities
1. How do I find the most influential provider in each
region (e.g. healthcare local market) delivering care
for a related group of codes for a condition
(Diabetes, Cardiac Care, etc.)?
2. Who is influenced by these leaders (e.g. other
doctors, chiropractors, physical therapists, facilities)?
3. What is the community size and impact
(patients and providers) around these hubs?
Questions Use Case
Understand care
and referral
dynamics better
Target education at
the influencers
Identify which
influencers are also
best-practice
practitioners
Based on work by Large US Pharma
© 2018 TigerGraph. All Rights Reserved 9
How do I find the most influential provider in each
region for a particular medical condition?
Whole-Graph Compute problem
1. Analyze claims data to identify referral relationships
among providers (Time Series Analysis)
2. Create subsets of claims around each condition with
a group of healthcare codes (e.g. CPT codes) for
each region (e.g. local healthcare market)
3. Utilize PageRank to score hubs within each market Dr. Thomas
Condition: Diabetes
Healthcare Market: S. San Jose, CA
Hub Identified: Dr. Thomas
© 2018 TigerGraph. All Rights Reserved 10
Who is influenced by these leaders (e.g. other doctors,
chiropractors, physical therapists, facilities)?
Utilize Community Detection
1. Identify communities of providers
around each hub for each region and
for a specific condition
2. Track changes over time to detect
significant shifts in communities
Dr. Thomas
Condition: Diabetes
Healthcare Market: S. San Jose, CA
Hub Identified: Dr. Thomas
Community Detected: Diabetes – S. San Jose – Dr. Thomas
© 2018 TigerGraph. All Rights Reserved 11
What is the community size and impact (patients and
providers) around these hubs?
1. Compute cost of care for initial diagnosis and
follow-on treatment for each community
2. Compare with other communities with similar
patient population
3. Track changes over time to detect significant
changes in cost of care
Dr. Thomas
Condition: Diabetes
Healthcare Market: S. San Jose, CA
Hub Identified: Dr. Thomas
Community Detected: Diabetes – S. San Jose – Dr. Thomas
Cost of care: initial diagnosis, follow-on care (medicine, tests, treatment)
© 2018 TigerGraph. All Rights
Reserved
Other Use Cases
● Business:
○ Who is trading with whom?
○ What products or services are often purchased together?
● Government:
○ Determine natural groupings of persons & needs, for more
efficient delivery of services
● Criminal Investigation
○ Detect collusion/conspiracy
○ Detect persons at risk of criminal influence
© 2018 TigerGraph. All Rights
Reserved
What is a Community? Who are its members?
● Several different definitions of community
● Usually based on direct connections:
The set of vertices C are a community if
1. Every member in C has a direct connection to every other member, or
2. Every member in C has a path to every other member, or
3. The majority of C's neighbors also belong to C.
4. The density of connections within V is greater than expected if
connections were random.
C
© 2018 TigerGraph. All Rights
Reserved
1: Everyone is connected to everyone.
● This type of subgraph is called
a complete graph.
● The collection of vertices is
called a clique.
● Too strict for most real-world
uses.
http://mathworld.wolfram.com/CompleteGraph.html
© 2018 TigerGraph. All Rights
Reserved
2: A Path to every member.
● Instead of direct connection, we allow
indirect connection.
● A connected component is the
subgraph of vertices which are
connected.
○ Weakly Connected Component
(WCC) - undirected edges
○ Strongly Connected Component
(SCC) - directed edges
● Important, but still strict
© 2018 TigerGraph. All Rights
Reserved
3: Same community with most of your neighbors.
● Allows individuals to link to
multiple communities.
● What if there's an equal
number of in-group and
out-group links?
● What is the right number of
communities?
LabelRank: https://ieeexplore.ieee.org/document/6609210
© 2018 TigerGraph. All Rights
Reserved
Parsimony: The simplest answer is best.
● cf. Occam's razor.
● If you have a choose of 2 communities or 3 communities,
and a both "explain" the data equally well
→ pick the smaller number of communities (2).
● If 3 communities gives a "cleaner explanation" of the data
than 2 communities
→ probably go with 3.
© 2018 TigerGraph. All Rights
Reserved
4: More in-group connections that out-group.
● Modularity is the fraction of the
edges that fall within the given
groups minus the expected
fraction if edges were distributed
at random. (Newman and
Girvan)
● The value of the modularity lies in
the range [-1,1]
● Choose the partitioning
(grouping) that has the highest
modularity score.
http://www.ludowaltman.nl/slm/
© 2018 TigerGraph. All Rights
Reserved
Community Detection Algorithms
1. Complete Graph Discovery
Every member in C has a direct connection to every other member
2. Connected Components:
Every member in C has a path to every other member, or
3. Label Propagation:
The majority of C's neighbors also belong to C.
4. Modularity Optimization (Louvain method):
The density of connections within V is greater than expected if connections
were random.
● Each has a different level of computational complexity (how long it
takes to compute, when the graph is very big.)
© 2018 TigerGraph. All Rights
Reserved
GSQL Graph Algorithm Library
https://github.com/tigergraph/ecosys/tree/master/graph_algorithms
Each graph algorithm is a GSQL query.
● May have zero or more input parameters.
● Typically 3 variations:
○ Standard JSON output
○ Write to a CSV file
○ Save to vertex attributes (requires that the attributes exist)
© 2018 TigerGraph. All Rights
Reserved
Connected Component Algorithm
1. Label each vertex with a unique community ID
(Each vertex is a community of size 1.)
2. Repeat
a. For each edge, set the commID of the target vertex to be the
smaller of the two commIDs.
b. If there are no commID changes, then exit.
c. Otherwise, repeat.
© 2018 TigerGraph. All Rights
Reserved
CREATE QUERY conn_comp () FOR GRAPH generic {
MinAccum<int> @cc_id = 0; # each vertex's tentative component id
SumAccum<int> @old_id = 0;
OrAccum<bool> @active;
# Initialize: Label each vertex with its own internal ID
Start = {Node.*};
S = SELECT x FROM Start:x
POST-ACCUM
x.@cc_id = getvid(x), x.@old_id = getvid(x);
# Propagate smaller internal IDs until no more ID changes can be done
WHILE (Start.size()>0) DO
Start = SELECT t
FROM Start:s -(Link:e)-> :t
ACCUM t.@cc_id += s.@cc_id // If s has a smaller id than t, copy the id to t
POST-ACCUM
CASE WHEN t.@old_id != t.@cc_id THEN // If t's id has changed
t.@old_id = t.@cc_id,
t.@active = true
ELSE
t.@active = false
END
HAVING t.@active == true;
END;
}
© 2018 TigerGraph. All Rights
Reserved
Connected Component Results
● Dataset: Zachary's Karate Club
○ Well-known social network
study in 1977.
○ Friendship network of 34
karate club members, who
fractured into 2 clubs.
● It's one connected component.
● CC is more important for very
large graphs, to find isolated
subgroups.
© 2018 TigerGraph. All Rights
Reserved
Label Propagation Algorithm
1. Label each vertex with a unique community ID
(Each vertex is a community of size 1.)
2. Repeat
a. For each vertex, count the commIDs of its neighbors.
b. For each vertex, update its commID to be the most commonly
seen commID among its neighbors.
c. If there are no commID changes or you have reached the
maximum number of iterations, then exit.
d. Otherwise, repeat.
© 2018 TigerGraph. All Rights
Reserved
CREATE QUERY label_prop (INT maxIter) FOR GRAPH generic {
OrAccum @@changed = true;
MapAccum<int, int> @map; # local <communityId, numNeighbors>
MapAccum<int, int> @@commSizes; # global <communityId, numMembers>
SumAccum<int> @label, @num;
Start = {Node.*};
# Assign unique labels to each vertex
Start = SELECT s FROM Start:s
ACCUM s.@label = getvid(s);
# Continued on next slide
© 2018 TigerGraph. All Rights
Reserved
# Propagate labels to neighbors until labels converge or the max iterations is reached
WHILE @@changed == true LIMIT maxIter DO
@@changed = false;
Start = SELECT s FROM Start:s -(Link:e)-> :t
ACCUM t.@map += (s.@label -> 1) # count the occurrences of neighbor's labels
POST-ACCUM
INT maxV = 0,
INT label = 0,
# Iterate over the map to get the neighbor label that occurs most often
FOREACH (k,v) IN t.@map DO
CASE WHEN v > maxV THEN
maxV = v,
label = k
END
END,
# When the neighbor search finds a label AND it is a new label
# AND the label's count has increased, update the label.
CASE WHEN label != 0 AND t.@label != label AND maxV > t.@num THEN
@@changed += true,
t.@label = label,
t.@num = maxV
END,
t.@map.clear();
END;
}
© 2018 TigerGraph. All Rights
Reserved
Label Propagation Results
● Zachary's Karate
Club again
● 2 large groups
● 2 or 3 small
groups
Real World Use Case
Finding communities among Health Care Providers
Please send your questions via Q&A at any time
Q&A
Please send your questions via the Q&A menu in Zoom
29
© 2018 TigerGraph. All Rights Reserved
Episode 7:
WEDNESDAY, DECEMBER 5 AT 11:00 A.M. PT / 2:00 P.M. ET
Connecting the Dots in Real-Time: Deep Link Analysis with a
Native Parallel Graph Database to Uncover Hidden Relationships
https://info.tigergraph.com/graph-gurus-7
30
REGISTER FOR MORE
WEBINARS AT
https://www.tigergraph.com/
webinars-and-events/
© 2018 TigerGraph. All Rights Reserved
Additional Resources
31
New Developer Portal
https://www.tigergraph.com/developers/
Download the Developer Edition or Enterprise Free Trial
https://www.tigergraph.com/download/
Guru Scripts
https://github.com/tigergraph/ecosys/tree/master/guru_scripts
Join our Developer Forum
https://groups.google.com/a/opengsql.org/forum/#!forum/gsql-users
@TigerGraphDB youtube.com/tigergraph facebook.com/TigerGraphDB linkedin.com/company/TigerGraph

More Related Content

What's hot

Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017
Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017
Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017MLconf
 
15 puzzle problem using branch and bound
15 puzzle problem using branch and bound15 puzzle problem using branch and bound
15 puzzle problem using branch and boundAbhishek Singh
 
Using Graph Algorithms for Advanced Analytics - Part 5 Classification
Using Graph Algorithms for Advanced Analytics - Part 5 ClassificationUsing Graph Algorithms for Advanced Analytics - Part 5 Classification
Using Graph Algorithms for Advanced Analytics - Part 5 ClassificationTigerGraph
 
Graph Gurus Episode 3: Anti Fraud and AML Part 1
Graph Gurus Episode 3: Anti Fraud and AML Part 1Graph Gurus Episode 3: Anti Fraud and AML Part 1
Graph Gurus Episode 3: Anti Fraud and AML Part 1TigerGraph
 
Comparing three data ingestion approaches where Apache Kafka integrates with ...
Comparing three data ingestion approaches where Apache Kafka integrates with ...Comparing three data ingestion approaches where Apache Kafka integrates with ...
Comparing three data ingestion approaches where Apache Kafka integrates with ...HostedbyConfluent
 
ChatGPT 研究框架(2023).pdf
ChatGPT 研究框架(2023).pdfChatGPT 研究框架(2023).pdf
ChatGPT 研究框架(2023).pdf灿辉 葛
 
Diabetes prediction using machine learning
Diabetes prediction using machine learningDiabetes prediction using machine learning
Diabetes prediction using machine learningdataalcott
 
Applications of graphs
Applications of graphsApplications of graphs
Applications of graphsTech_MX
 
Machine Learning for Weather Forecasts
Machine Learning for Weather ForecastsMachine Learning for Weather Forecasts
Machine Learning for Weather Forecastsinside-BigData.com
 
Eigenvalues and eigenvectors
Eigenvalues and eigenvectorsEigenvalues and eigenvectors
Eigenvalues and eigenvectorsiraq
 
Hate Speech Recognition System through NLP and Deep Learning
Hate Speech Recognition System through NLP and Deep LearningHate Speech Recognition System through NLP and Deep Learning
Hate Speech Recognition System through NLP and Deep LearningIRJET Journal
 
Graph theory in network system
Graph theory in network systemGraph theory in network system
Graph theory in network systemManikanta satyala
 
Intermediate Cypher.pdf
Intermediate Cypher.pdfIntermediate Cypher.pdf
Intermediate Cypher.pdfNeo4j
 
2-Approximation Vertex Cover
2-Approximation Vertex Cover2-Approximation Vertex Cover
2-Approximation Vertex CoverKowshik Roy
 
Clique problem step_by_step
Clique problem step_by_stepClique problem step_by_step
Clique problem step_by_stepSing Kuang Tan
 

What's hot (20)

Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017
Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017
Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017
 
15 puzzle problem using branch and bound
15 puzzle problem using branch and bound15 puzzle problem using branch and bound
15 puzzle problem using branch and bound
 
Voice assistant ppt
Voice assistant pptVoice assistant ppt
Voice assistant ppt
 
Using Graph Algorithms for Advanced Analytics - Part 5 Classification
Using Graph Algorithms for Advanced Analytics - Part 5 ClassificationUsing Graph Algorithms for Advanced Analytics - Part 5 Classification
Using Graph Algorithms for Advanced Analytics - Part 5 Classification
 
Graph Gurus Episode 3: Anti Fraud and AML Part 1
Graph Gurus Episode 3: Anti Fraud and AML Part 1Graph Gurus Episode 3: Anti Fraud and AML Part 1
Graph Gurus Episode 3: Anti Fraud and AML Part 1
 
Comparing three data ingestion approaches where Apache Kafka integrates with ...
Comparing three data ingestion approaches where Apache Kafka integrates with ...Comparing three data ingestion approaches where Apache Kafka integrates with ...
Comparing three data ingestion approaches where Apache Kafka integrates with ...
 
ChatGPT 研究框架(2023).pdf
ChatGPT 研究框架(2023).pdfChatGPT 研究框架(2023).pdf
ChatGPT 研究框架(2023).pdf
 
Diabetes prediction using machine learning
Diabetes prediction using machine learningDiabetes prediction using machine learning
Diabetes prediction using machine learning
 
Applications of graphs
Applications of graphsApplications of graphs
Applications of graphs
 
report on internship
report on internshipreport on internship
report on internship
 
Machine Learning for Weather Forecasts
Machine Learning for Weather ForecastsMachine Learning for Weather Forecasts
Machine Learning for Weather Forecasts
 
Eigenvalues and eigenvectors
Eigenvalues and eigenvectorsEigenvalues and eigenvectors
Eigenvalues and eigenvectors
 
Sentiment analysis
Sentiment analysisSentiment analysis
Sentiment analysis
 
Hate Speech Recognition System through NLP and Deep Learning
Hate Speech Recognition System through NLP and Deep LearningHate Speech Recognition System through NLP and Deep Learning
Hate Speech Recognition System through NLP and Deep Learning
 
Graph theory in network system
Graph theory in network systemGraph theory in network system
Graph theory in network system
 
Approximation algorithms
Approximation  algorithms Approximation  algorithms
Approximation algorithms
 
Intermediate Cypher.pdf
Intermediate Cypher.pdfIntermediate Cypher.pdf
Intermediate Cypher.pdf
 
2-Approximation Vertex Cover
2-Approximation Vertex Cover2-Approximation Vertex Cover
2-Approximation Vertex Cover
 
PROJECT REPORT
PROJECT REPORTPROJECT REPORT
PROJECT REPORT
 
Clique problem step_by_step
Clique problem step_by_stepClique problem step_by_step
Clique problem step_by_step
 

Similar to Graph Gurus Episode 6: Community Detection

Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
Using Graph Algorithms for Advanced Analytics - Part 2 CentralityUsing Graph Algorithms for Advanced Analytics - Part 2 Centrality
Using Graph Algorithms for Advanced Analytics - Part 2 CentralityTigerGraph
 
Graph Gurus Episode 29: Using Graph Algorithms for Advanced Analytics Part 3
Graph Gurus Episode 29: Using Graph Algorithms for Advanced Analytics Part 3Graph Gurus Episode 29: Using Graph Algorithms for Advanced Analytics Part 3
Graph Gurus Episode 29: Using Graph Algorithms for Advanced Analytics Part 3TigerGraph
 
Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...
Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...
Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...TigerGraph
 
Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5
Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5
Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5TigerGraph
 
Propagating Data Policies - A User Study
Propagating Data Policies - A User StudyPropagating Data Policies - A User Study
Propagating Data Policies - A User StudyEnrico Daga
 
Shift Remote: AI: Smarter AI with analytical graph databases - Victor Lee (Ti...
Shift Remote: AI: Smarter AI with analytical graph databases - Victor Lee (Ti...Shift Remote: AI: Smarter AI with analytical graph databases - Victor Lee (Ti...
Shift Remote: AI: Smarter AI with analytical graph databases - Victor Lee (Ti...Shift Conference
 
Data Analytics Using R - Report
Data Analytics Using R - ReportData Analytics Using R - Report
Data Analytics Using R - ReportAkanksha Gohil
 
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...TigerGraph
 
Matching Social Issues to Technologies for Civic Tech by Association Rule Min...
Matching Social Issues to Technologies for Civic Tech by Association Rule Min...Matching Social Issues to Technologies for Civic Tech by Association Rule Min...
Matching Social Issues to Technologies for Civic Tech by Association Rule Min...MasatoKikuchi4
 
IRJET- Machine Learning: Survey, Types and Challenges
IRJET- Machine Learning: Survey, Types and ChallengesIRJET- Machine Learning: Survey, Types and Challenges
IRJET- Machine Learning: Survey, Types and ChallengesIRJET Journal
 
A MATHEMATICAL MODEL OF ACCESS CONTROL IN BIG DATA USING CONFIDENCE INTERVAL ...
A MATHEMATICAL MODEL OF ACCESS CONTROL IN BIG DATA USING CONFIDENCE INTERVAL ...A MATHEMATICAL MODEL OF ACCESS CONTROL IN BIG DATA USING CONFIDENCE INTERVAL ...
A MATHEMATICAL MODEL OF ACCESS CONTROL IN BIG DATA USING CONFIDENCE INTERVAL ...cscpconf
 
A mathematical model of access control in big data using confidence interval ...
A mathematical model of access control in big data using confidence interval ...A mathematical model of access control in big data using confidence interval ...
A mathematical model of access control in big data using confidence interval ...csandit
 
Graph Gurus Episode 5: Webinar PageRank
Graph Gurus Episode 5: Webinar PageRankGraph Gurus Episode 5: Webinar PageRank
Graph Gurus Episode 5: Webinar PageRankTigerGraph
 
Graph Gurus Episode 17: Seven Key Data Science Capabilities Powered by a Nati...
Graph Gurus Episode 17: Seven Key Data Science Capabilities Powered by a Nati...Graph Gurus Episode 17: Seven Key Data Science Capabilities Powered by a Nati...
Graph Gurus Episode 17: Seven Key Data Science Capabilities Powered by a Nati...TigerGraph
 
Make Sense Out of Data with Feature Engineering
Make Sense Out of Data with Feature EngineeringMake Sense Out of Data with Feature Engineering
Make Sense Out of Data with Feature EngineeringDataRobot
 
Collusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumCollusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumnexgentech15
 
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...Nexgen Technology
 
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...nexgentechnology
 
Collusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumCollusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumNexgen Technology
 
Artificial Intelligence at LinkedIn
Artificial Intelligence at LinkedInArtificial Intelligence at LinkedIn
Artificial Intelligence at LinkedInBill Liu
 

Similar to Graph Gurus Episode 6: Community Detection (20)

Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
Using Graph Algorithms for Advanced Analytics - Part 2 CentralityUsing Graph Algorithms for Advanced Analytics - Part 2 Centrality
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
 
Graph Gurus Episode 29: Using Graph Algorithms for Advanced Analytics Part 3
Graph Gurus Episode 29: Using Graph Algorithms for Advanced Analytics Part 3Graph Gurus Episode 29: Using Graph Algorithms for Advanced Analytics Part 3
Graph Gurus Episode 29: Using Graph Algorithms for Advanced Analytics Part 3
 
Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...
Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...
Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...
 
Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5
Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5
Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5
 
Propagating Data Policies - A User Study
Propagating Data Policies - A User StudyPropagating Data Policies - A User Study
Propagating Data Policies - A User Study
 
Shift Remote: AI: Smarter AI with analytical graph databases - Victor Lee (Ti...
Shift Remote: AI: Smarter AI with analytical graph databases - Victor Lee (Ti...Shift Remote: AI: Smarter AI with analytical graph databases - Victor Lee (Ti...
Shift Remote: AI: Smarter AI with analytical graph databases - Victor Lee (Ti...
 
Data Analytics Using R - Report
Data Analytics Using R - ReportData Analytics Using R - Report
Data Analytics Using R - Report
 
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
 
Matching Social Issues to Technologies for Civic Tech by Association Rule Min...
Matching Social Issues to Technologies for Civic Tech by Association Rule Min...Matching Social Issues to Technologies for Civic Tech by Association Rule Min...
Matching Social Issues to Technologies for Civic Tech by Association Rule Min...
 
IRJET- Machine Learning: Survey, Types and Challenges
IRJET- Machine Learning: Survey, Types and ChallengesIRJET- Machine Learning: Survey, Types and Challenges
IRJET- Machine Learning: Survey, Types and Challenges
 
A MATHEMATICAL MODEL OF ACCESS CONTROL IN BIG DATA USING CONFIDENCE INTERVAL ...
A MATHEMATICAL MODEL OF ACCESS CONTROL IN BIG DATA USING CONFIDENCE INTERVAL ...A MATHEMATICAL MODEL OF ACCESS CONTROL IN BIG DATA USING CONFIDENCE INTERVAL ...
A MATHEMATICAL MODEL OF ACCESS CONTROL IN BIG DATA USING CONFIDENCE INTERVAL ...
 
A mathematical model of access control in big data using confidence interval ...
A mathematical model of access control in big data using confidence interval ...A mathematical model of access control in big data using confidence interval ...
A mathematical model of access control in big data using confidence interval ...
 
Graph Gurus Episode 5: Webinar PageRank
Graph Gurus Episode 5: Webinar PageRankGraph Gurus Episode 5: Webinar PageRank
Graph Gurus Episode 5: Webinar PageRank
 
Graph Gurus Episode 17: Seven Key Data Science Capabilities Powered by a Nati...
Graph Gurus Episode 17: Seven Key Data Science Capabilities Powered by a Nati...Graph Gurus Episode 17: Seven Key Data Science Capabilities Powered by a Nati...
Graph Gurus Episode 17: Seven Key Data Science Capabilities Powered by a Nati...
 
Make Sense Out of Data with Feature Engineering
Make Sense Out of Data with Feature EngineeringMake Sense Out of Data with Feature Engineering
Make Sense Out of Data with Feature Engineering
 
Collusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumCollusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sum
 
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
 
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
 
Collusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumCollusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sum
 
Artificial Intelligence at LinkedIn
Artificial Intelligence at LinkedInArtificial Intelligence at LinkedIn
Artificial Intelligence at LinkedIn
 

More from TigerGraph

MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATIONMAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATIONTigerGraph
 
Better Together: How Graph database enables easy data integration with Spark ...
Better Together: How Graph database enables easy data integration with Spark ...Better Together: How Graph database enables easy data integration with Spark ...
Better Together: How Graph database enables easy data integration with Spark ...TigerGraph
 
Building an accurate understanding of consumers based on real-world signals
Building an accurate understanding of consumers based on real-world signalsBuilding an accurate understanding of consumers based on real-world signals
Building an accurate understanding of consumers based on real-world signalsTigerGraph
 
Care Intervention Assistant - Omaha Clinical Data Information System
Care Intervention Assistant - Omaha Clinical Data Information SystemCare Intervention Assistant - Omaha Clinical Data Information System
Care Intervention Assistant - Omaha Clinical Data Information SystemTigerGraph
 
Correspondent Banking Networks
Correspondent Banking NetworksCorrespondent Banking Networks
Correspondent Banking NetworksTigerGraph
 
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...TigerGraph
 
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...TigerGraph
 
Fraud Detection and Compliance with Graph Learning
Fraud Detection and Compliance with Graph LearningFraud Detection and Compliance with Graph Learning
Fraud Detection and Compliance with Graph LearningTigerGraph
 
Fraudulent credit card cash-out detection On Graphs
Fraudulent credit card cash-out detection On GraphsFraudulent credit card cash-out detection On Graphs
Fraudulent credit card cash-out detection On GraphsTigerGraph
 
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraphFROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraphTigerGraph
 
Customer Experience Management
Customer Experience ManagementCustomer Experience Management
Customer Experience ManagementTigerGraph
 
Graph+AI for Fin. Services
Graph+AI for Fin. ServicesGraph+AI for Fin. Services
Graph+AI for Fin. ServicesTigerGraph
 
Davraz - A graph visualization and exploration software.
Davraz - A graph visualization and exploration software.Davraz - A graph visualization and exploration software.
Davraz - A graph visualization and exploration software.TigerGraph
 
Plume - A Code Property Graph Extraction and Analysis Library
Plume - A Code Property Graph Extraction and Analysis LibraryPlume - A Code Property Graph Extraction and Analysis Library
Plume - A Code Property Graph Extraction and Analysis LibraryTigerGraph
 
GRAPHS FOR THE FUTURE ENERGY SYSTEMS
GRAPHS FOR THE FUTURE ENERGY SYSTEMSGRAPHS FOR THE FUTURE ENERGY SYSTEMS
GRAPHS FOR THE FUTURE ENERGY SYSTEMSTigerGraph
 
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...TigerGraph
 
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...TigerGraph
 
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUI
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUIMachine Learning Feature Design with TigerGraph 3.0 No-Code GUI
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUITigerGraph
 
Recommendation Engine with In-Database Machine Learning
Recommendation Engine with In-Database Machine LearningRecommendation Engine with In-Database Machine Learning
Recommendation Engine with In-Database Machine LearningTigerGraph
 

More from TigerGraph (20)

MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATIONMAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
 
Better Together: How Graph database enables easy data integration with Spark ...
Better Together: How Graph database enables easy data integration with Spark ...Better Together: How Graph database enables easy data integration with Spark ...
Better Together: How Graph database enables easy data integration with Spark ...
 
Building an accurate understanding of consumers based on real-world signals
Building an accurate understanding of consumers based on real-world signalsBuilding an accurate understanding of consumers based on real-world signals
Building an accurate understanding of consumers based on real-world signals
 
Care Intervention Assistant - Omaha Clinical Data Information System
Care Intervention Assistant - Omaha Clinical Data Information SystemCare Intervention Assistant - Omaha Clinical Data Information System
Care Intervention Assistant - Omaha Clinical Data Information System
 
Correspondent Banking Networks
Correspondent Banking NetworksCorrespondent Banking Networks
Correspondent Banking Networks
 
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
 
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
 
Fraud Detection and Compliance with Graph Learning
Fraud Detection and Compliance with Graph LearningFraud Detection and Compliance with Graph Learning
Fraud Detection and Compliance with Graph Learning
 
Fraudulent credit card cash-out detection On Graphs
Fraudulent credit card cash-out detection On GraphsFraudulent credit card cash-out detection On Graphs
Fraudulent credit card cash-out detection On Graphs
 
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraphFROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
 
Customer Experience Management
Customer Experience ManagementCustomer Experience Management
Customer Experience Management
 
Graph+AI for Fin. Services
Graph+AI for Fin. ServicesGraph+AI for Fin. Services
Graph+AI for Fin. Services
 
Davraz - A graph visualization and exploration software.
Davraz - A graph visualization and exploration software.Davraz - A graph visualization and exploration software.
Davraz - A graph visualization and exploration software.
 
Plume - A Code Property Graph Extraction and Analysis Library
Plume - A Code Property Graph Extraction and Analysis LibraryPlume - A Code Property Graph Extraction and Analysis Library
Plume - A Code Property Graph Extraction and Analysis Library
 
TigerGraph.js
TigerGraph.jsTigerGraph.js
TigerGraph.js
 
GRAPHS FOR THE FUTURE ENERGY SYSTEMS
GRAPHS FOR THE FUTURE ENERGY SYSTEMSGRAPHS FOR THE FUTURE ENERGY SYSTEMS
GRAPHS FOR THE FUTURE ENERGY SYSTEMS
 
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
 
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
 
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUI
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUIMachine Learning Feature Design with TigerGraph 3.0 No-Code GUI
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUI
 
Recommendation Engine with In-Database Machine Learning
Recommendation Engine with In-Database Machine LearningRecommendation Engine with In-Database Machine Learning
Recommendation Engine with In-Database Machine Learning
 

Recently uploaded

Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...Akihiro Suda
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 

Recently uploaded (20)

Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 

Graph Gurus Episode 6: Community Detection

  • 1. Graph Gurus Episode 6 Birds of a Feather - Community Detection with a Native Parallel Graph Database
  • 2. © 2018 TigerGraph. All Rights Reserved Welcome ● Attendees are muted but you can talk to us via Chat in Zoom ● Send questions at any time using the Q&A tab in the Zoom menu ● We will have 10 min for Q&A at the end ● The webinar will be recorded and sent via email ● A link to the presentation and reproducible steps will be emailed 2 NOTE: update to the latest version of Zoom to avoid bugs
  • 3. © 2018 TigerGraph. All Rights Reserved Developer Edition Available We now offer Docker versions and VirtualBox versions of the TigerGraph Developer Edition, so you can now run on ● MacOS ● Windows 10 ● Linux Developer Edition Download https://www.tigergraph.com/developer/
  • 4. © 2018 TigerGraph. All Rights Reserved Today's Gurus 4 Victor Lee Director of Product Management ● BS in Electrical Engineering and Computer Science from UC Berkeley, MS in Electrical Engineering from Stanford University ● PhD in Computer Science from Kent State University focused on graph data mining ● 15+ years in tech industry Emma Liu Product Manager ● BS in Engineering from Harvey Mudd College, MS in Engineering Systems from MIT ● Prior work experience at Oracle and MarkLogic ● Focus - Cloud, Containers, Enterprise Infra, Monitoring, Management, Connectors Huiting Su Software Engineer ● Masters in Industrial Engineering from Purdue ● Focus - Graph Algorithms and Analytics, Machine Learning ● Resident GSQL Expert
  • 5. © 2018 TigerGraph. All Rights Reserved Graph Algorithms, Part 2 Part 1 discussed PageRank (Graph Gurus Episode 5).
  • 6. © 2018 TigerGraph. All Rights Reserved Communities can be Natural Phenomena Natural Organic - human-made, but without central control DBpedia pages, with links between pages https://www.hackdiary.com/2012/04/05/extracting-a-social-graph-fro m-wikipedia-people-pages/Protein interaction network for Schziophrenia, https://en.wikipedia.org/wiki/Interactome
  • 7. © 2018 TigerGraph. All Rights Reserved … or Engineered Communities Congressional Committees and Subcommittees http://www.pnas.org/content/102/20/7057
  • 8. © 2018 TigerGraph. All Rights Reserved 8 Understanding Connected Communities 1. How do I find the most influential provider in each region (e.g. healthcare local market) delivering care for a related group of codes for a condition (Diabetes, Cardiac Care, etc.)? 2. Who is influenced by these leaders (e.g. other doctors, chiropractors, physical therapists, facilities)? 3. What is the community size and impact (patients and providers) around these hubs? Questions Use Case Understand care and referral dynamics better Target education at the influencers Identify which influencers are also best-practice practitioners Based on work by Large US Pharma
  • 9. © 2018 TigerGraph. All Rights Reserved 9 How do I find the most influential provider in each region for a particular medical condition? Whole-Graph Compute problem 1. Analyze claims data to identify referral relationships among providers (Time Series Analysis) 2. Create subsets of claims around each condition with a group of healthcare codes (e.g. CPT codes) for each region (e.g. local healthcare market) 3. Utilize PageRank to score hubs within each market Dr. Thomas Condition: Diabetes Healthcare Market: S. San Jose, CA Hub Identified: Dr. Thomas
  • 10. © 2018 TigerGraph. All Rights Reserved 10 Who is influenced by these leaders (e.g. other doctors, chiropractors, physical therapists, facilities)? Utilize Community Detection 1. Identify communities of providers around each hub for each region and for a specific condition 2. Track changes over time to detect significant shifts in communities Dr. Thomas Condition: Diabetes Healthcare Market: S. San Jose, CA Hub Identified: Dr. Thomas Community Detected: Diabetes – S. San Jose – Dr. Thomas
  • 11. © 2018 TigerGraph. All Rights Reserved 11 What is the community size and impact (patients and providers) around these hubs? 1. Compute cost of care for initial diagnosis and follow-on treatment for each community 2. Compare with other communities with similar patient population 3. Track changes over time to detect significant changes in cost of care Dr. Thomas Condition: Diabetes Healthcare Market: S. San Jose, CA Hub Identified: Dr. Thomas Community Detected: Diabetes – S. San Jose – Dr. Thomas Cost of care: initial diagnosis, follow-on care (medicine, tests, treatment)
  • 12. © 2018 TigerGraph. All Rights Reserved Other Use Cases ● Business: ○ Who is trading with whom? ○ What products or services are often purchased together? ● Government: ○ Determine natural groupings of persons & needs, for more efficient delivery of services ● Criminal Investigation ○ Detect collusion/conspiracy ○ Detect persons at risk of criminal influence
  • 13. © 2018 TigerGraph. All Rights Reserved What is a Community? Who are its members? ● Several different definitions of community ● Usually based on direct connections: The set of vertices C are a community if 1. Every member in C has a direct connection to every other member, or 2. Every member in C has a path to every other member, or 3. The majority of C's neighbors also belong to C. 4. The density of connections within V is greater than expected if connections were random. C
  • 14. © 2018 TigerGraph. All Rights Reserved 1: Everyone is connected to everyone. ● This type of subgraph is called a complete graph. ● The collection of vertices is called a clique. ● Too strict for most real-world uses. http://mathworld.wolfram.com/CompleteGraph.html
  • 15. © 2018 TigerGraph. All Rights Reserved 2: A Path to every member. ● Instead of direct connection, we allow indirect connection. ● A connected component is the subgraph of vertices which are connected. ○ Weakly Connected Component (WCC) - undirected edges ○ Strongly Connected Component (SCC) - directed edges ● Important, but still strict
  • 16. © 2018 TigerGraph. All Rights Reserved 3: Same community with most of your neighbors. ● Allows individuals to link to multiple communities. ● What if there's an equal number of in-group and out-group links? ● What is the right number of communities? LabelRank: https://ieeexplore.ieee.org/document/6609210
  • 17. © 2018 TigerGraph. All Rights Reserved Parsimony: The simplest answer is best. ● cf. Occam's razor. ● If you have a choose of 2 communities or 3 communities, and a both "explain" the data equally well → pick the smaller number of communities (2). ● If 3 communities gives a "cleaner explanation" of the data than 2 communities → probably go with 3.
  • 18. © 2018 TigerGraph. All Rights Reserved 4: More in-group connections that out-group. ● Modularity is the fraction of the edges that fall within the given groups minus the expected fraction if edges were distributed at random. (Newman and Girvan) ● The value of the modularity lies in the range [-1,1] ● Choose the partitioning (grouping) that has the highest modularity score. http://www.ludowaltman.nl/slm/
  • 19. © 2018 TigerGraph. All Rights Reserved Community Detection Algorithms 1. Complete Graph Discovery Every member in C has a direct connection to every other member 2. Connected Components: Every member in C has a path to every other member, or 3. Label Propagation: The majority of C's neighbors also belong to C. 4. Modularity Optimization (Louvain method): The density of connections within V is greater than expected if connections were random. ● Each has a different level of computational complexity (how long it takes to compute, when the graph is very big.)
  • 20. © 2018 TigerGraph. All Rights Reserved GSQL Graph Algorithm Library https://github.com/tigergraph/ecosys/tree/master/graph_algorithms Each graph algorithm is a GSQL query. ● May have zero or more input parameters. ● Typically 3 variations: ○ Standard JSON output ○ Write to a CSV file ○ Save to vertex attributes (requires that the attributes exist)
  • 21. © 2018 TigerGraph. All Rights Reserved Connected Component Algorithm 1. Label each vertex with a unique community ID (Each vertex is a community of size 1.) 2. Repeat a. For each edge, set the commID of the target vertex to be the smaller of the two commIDs. b. If there are no commID changes, then exit. c. Otherwise, repeat.
  • 22. © 2018 TigerGraph. All Rights Reserved CREATE QUERY conn_comp () FOR GRAPH generic { MinAccum<int> @cc_id = 0; # each vertex's tentative component id SumAccum<int> @old_id = 0; OrAccum<bool> @active; # Initialize: Label each vertex with its own internal ID Start = {Node.*}; S = SELECT x FROM Start:x POST-ACCUM x.@cc_id = getvid(x), x.@old_id = getvid(x); # Propagate smaller internal IDs until no more ID changes can be done WHILE (Start.size()>0) DO Start = SELECT t FROM Start:s -(Link:e)-> :t ACCUM t.@cc_id += s.@cc_id // If s has a smaller id than t, copy the id to t POST-ACCUM CASE WHEN t.@old_id != t.@cc_id THEN // If t's id has changed t.@old_id = t.@cc_id, t.@active = true ELSE t.@active = false END HAVING t.@active == true; END; }
  • 23. © 2018 TigerGraph. All Rights Reserved Connected Component Results ● Dataset: Zachary's Karate Club ○ Well-known social network study in 1977. ○ Friendship network of 34 karate club members, who fractured into 2 clubs. ● It's one connected component. ● CC is more important for very large graphs, to find isolated subgroups.
  • 24. © 2018 TigerGraph. All Rights Reserved Label Propagation Algorithm 1. Label each vertex with a unique community ID (Each vertex is a community of size 1.) 2. Repeat a. For each vertex, count the commIDs of its neighbors. b. For each vertex, update its commID to be the most commonly seen commID among its neighbors. c. If there are no commID changes or you have reached the maximum number of iterations, then exit. d. Otherwise, repeat.
  • 25. © 2018 TigerGraph. All Rights Reserved CREATE QUERY label_prop (INT maxIter) FOR GRAPH generic { OrAccum @@changed = true; MapAccum<int, int> @map; # local <communityId, numNeighbors> MapAccum<int, int> @@commSizes; # global <communityId, numMembers> SumAccum<int> @label, @num; Start = {Node.*}; # Assign unique labels to each vertex Start = SELECT s FROM Start:s ACCUM s.@label = getvid(s); # Continued on next slide
  • 26. © 2018 TigerGraph. All Rights Reserved # Propagate labels to neighbors until labels converge or the max iterations is reached WHILE @@changed == true LIMIT maxIter DO @@changed = false; Start = SELECT s FROM Start:s -(Link:e)-> :t ACCUM t.@map += (s.@label -> 1) # count the occurrences of neighbor's labels POST-ACCUM INT maxV = 0, INT label = 0, # Iterate over the map to get the neighbor label that occurs most often FOREACH (k,v) IN t.@map DO CASE WHEN v > maxV THEN maxV = v, label = k END END, # When the neighbor search finds a label AND it is a new label # AND the label's count has increased, update the label. CASE WHEN label != 0 AND t.@label != label AND maxV > t.@num THEN @@changed += true, t.@label = label, t.@num = maxV END, t.@map.clear(); END; }
  • 27. © 2018 TigerGraph. All Rights Reserved Label Propagation Results ● Zachary's Karate Club again ● 2 large groups ● 2 or 3 small groups
  • 28. Real World Use Case Finding communities among Health Care Providers Please send your questions via Q&A at any time
  • 29. Q&A Please send your questions via the Q&A menu in Zoom 29
  • 30. © 2018 TigerGraph. All Rights Reserved Episode 7: WEDNESDAY, DECEMBER 5 AT 11:00 A.M. PT / 2:00 P.M. ET Connecting the Dots in Real-Time: Deep Link Analysis with a Native Parallel Graph Database to Uncover Hidden Relationships https://info.tigergraph.com/graph-gurus-7 30 REGISTER FOR MORE WEBINARS AT https://www.tigergraph.com/ webinars-and-events/
  • 31. © 2018 TigerGraph. All Rights Reserved Additional Resources 31 New Developer Portal https://www.tigergraph.com/developers/ Download the Developer Edition or Enterprise Free Trial https://www.tigergraph.com/download/ Guru Scripts https://github.com/tigergraph/ecosys/tree/master/guru_scripts Join our Developer Forum https://groups.google.com/a/opengsql.org/forum/#!forum/gsql-users @TigerGraphDB youtube.com/tigergraph facebook.com/TigerGraphDB linkedin.com/company/TigerGraph