SlideShare una empresa de Scribd logo
1 de 10
Betweenness
an attribute of each edge:
the number of pairs of nodes whose shortest path contain current edge.
To find communities, we could do this:
while exist betweenness > threshold
a) cut the edge with largest betweenness;
b) recalculate betweenness
Community partition
GN algorithm
GN algorithm is used to calculate
the betweenness of a graph.
step1
step2
step3
Community partition
Maximal clique, Complete bi-partite subgraph, and Frequent itemset
Find a core of a graph, expand it by including more nodes whose number of
edges to the core are large than a threshold.
Here is a conclusion about complete bi-partite subgraph:
assume the average degree of a graph with n nodes is d, then there must have at
least one complete bi-partite subgraph Ks,t if below inequality is true.
n(d/n)t
≥ s
Community partition
Normailized cuts
Community partition
Vol(S) is the number of edges with at least one end in S.
Cut(S,T) is the number of edges that connect a node in S to a node in T.
The small the normalized cut, the better, for it means we cut less edge and keep
more edges in each subgraph.
Eigenvalues and Eigenvectors of the Laplacian Matrix
Laplacian Matrix = Degree Matrix - Adjacency Matrix
Community partition
Article in below link answered why the 2nd eigenvector of Laplacian Matrix give us a
suggestion of how to partition.
http://www.cnblogs.com/vivounicorn/archive/2012/02/10/2343377.html
in this article, there are 3 partition methods based on Laplacian matrix:
Minimum Cut, Ratio Cut and Normalized Cut
Simrank approach
simrank is used to measure the similarity between nodes.
Node Similarity
Random walks with restart.
v' = βMv + (1-β)eN
v : the column vector that reflects the probability the walker is at each of the nodes at
previous round, we could init v as eN.
v' : the result of current round.
M : the transition matrix.
N : the node we are dealing with.
β: the probability that walker continue going to other nodes but node N. we say 'restart'
based on the probability of (1-β) that walker would go back to N on each round.
eN : a column vector that has 1 in the row for node N and 0’s elsewhere, thus (1-β)eN is
the contribution to current result when walker 'restart'.
transition matrix iterator result
A scenario when dealing
with Page Rank
Add a probability factor
to walk out circle
No probability factor,
trapped in the circle
m
Counting Triangles
m
Intuitively, in a social network, a friend of my friend stands a good chance to be
my friend too, so counting the number of triangles helps us to measure the extent
to which a graph looks like a social network.
In a graph that has n nodes with m≥n edges, there must be no more than 2 nodes
whose degree are larger than , we call these nodes the heavy hitter.
We reduce the time complexity of counting triangles by dividing nodes into heavy
hitter group and non-heavy hitter group.
Neighborhood Properties of Graphs
Neighborhood
The neighborhood of radius d for a node v is the set of nodes u for which
there is a path of length at most d from v to u, denoted by N(v,d).
The diameter of a directed graph is the smallest integer d such that for every
two nodes u and v there is a path of length d or less from u to v. For a undirected
graph, we treat each edge as double-direction edge.
Transitive Closure and Reachability
The transitive closure of a graph is the set of pairs of nodes (u, v) such that
there is a path from u to v of length zero or more.
We say node u reaches node v if (u,v) is an item of transitive closure of the
graph.
Neighborhood Properties of Graphs
Neighborhood
The neighborhood of radius d for a node v is the set of nodes u for which
there is a path of length at most d from v to u, denoted by N(v,d).
The diameter of a directed graph is the smallest integer d such that for every
two nodes u and v there is a path of length d or less from u to v. For a undirected
graph, we treat each edge as double-direction edge.
Transitive Closure and Reachability
The transitive closure of a graph is the set of pairs of nodes (u, v) such that
there is a path from u to v of length zero or more.
We say node u reaches node v if (u,v) is an item of transitive closure of the
graph.

Más contenido relacionado

Similar a Social network analysis

Similar a Social network analysis (20)

NON-LINEAR DATA STRUCTURE-Graphs.pptx
NON-LINEAR DATA STRUCTURE-Graphs.pptxNON-LINEAR DATA STRUCTURE-Graphs.pptx
NON-LINEAR DATA STRUCTURE-Graphs.pptx
 
Lecture 5b graphs and hashing
Lecture 5b graphs and hashingLecture 5b graphs and hashing
Lecture 5b graphs and hashing
 
Distributed coloring with O(sqrt. log n) bits
Distributed coloring with O(sqrt. log n) bitsDistributed coloring with O(sqrt. log n) bits
Distributed coloring with O(sqrt. log n) bits
 
10.graph
10.graph10.graph
10.graph
 
06 Vector Visualization
06 Vector Visualization06 Vector Visualization
06 Vector Visualization
 
Graphs
GraphsGraphs
Graphs
 
Graph in data structure
Graph in data structureGraph in data structure
Graph in data structure
 
graph ASS (1).ppt
graph ASS (1).pptgraph ASS (1).ppt
graph ASS (1).ppt
 
Applications of graphs
Applications of graphsApplications of graphs
Applications of graphs
 
logic.pptx
logic.pptxlogic.pptx
logic.pptx
 
Deepwalk vs Node2vec
Deepwalk vs Node2vecDeepwalk vs Node2vec
Deepwalk vs Node2vec
 
Deepwalk vs Node2vec
Deepwalk vs Node2vecDeepwalk vs Node2vec
Deepwalk vs Node2vec
 
Graph terminology and algorithm and tree.pptx
Graph terminology and algorithm and tree.pptxGraph terminology and algorithm and tree.pptx
Graph terminology and algorithm and tree.pptx
 
DATA STRUCTURES.pptx
DATA STRUCTURES.pptxDATA STRUCTURES.pptx
DATA STRUCTURES.pptx
 
Dijkstra
DijkstraDijkstra
Dijkstra
 
d
dd
d
 
Graph therory
Graph theroryGraph therory
Graph therory
 
Shortest path (Dijkistra's Algorithm) & Spanning Tree (Prim's Algorithm)
Shortest path (Dijkistra's Algorithm) & Spanning Tree (Prim's Algorithm)Shortest path (Dijkistra's Algorithm) & Spanning Tree (Prim's Algorithm)
Shortest path (Dijkistra's Algorithm) & Spanning Tree (Prim's Algorithm)
 
Graphs in Data Structure
Graphs in Data StructureGraphs in Data Structure
Graphs in Data Structure
 
Class01_Computer_Contest_Level_3_Notes_Sep_07 - Copy.pdf
Class01_Computer_Contest_Level_3_Notes_Sep_07 - Copy.pdfClass01_Computer_Contest_Level_3_Notes_Sep_07 - Copy.pdf
Class01_Computer_Contest_Level_3_Notes_Sep_07 - Copy.pdf
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Último (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Social network analysis

  • 1. Betweenness an attribute of each edge: the number of pairs of nodes whose shortest path contain current edge. To find communities, we could do this: while exist betweenness > threshold a) cut the edge with largest betweenness; b) recalculate betweenness Community partition
  • 2. GN algorithm GN algorithm is used to calculate the betweenness of a graph. step1 step2 step3 Community partition
  • 3. Maximal clique, Complete bi-partite subgraph, and Frequent itemset Find a core of a graph, expand it by including more nodes whose number of edges to the core are large than a threshold. Here is a conclusion about complete bi-partite subgraph: assume the average degree of a graph with n nodes is d, then there must have at least one complete bi-partite subgraph Ks,t if below inequality is true. n(d/n)t ≥ s Community partition
  • 4. Normailized cuts Community partition Vol(S) is the number of edges with at least one end in S. Cut(S,T) is the number of edges that connect a node in S to a node in T. The small the normalized cut, the better, for it means we cut less edge and keep more edges in each subgraph.
  • 5. Eigenvalues and Eigenvectors of the Laplacian Matrix Laplacian Matrix = Degree Matrix - Adjacency Matrix Community partition Article in below link answered why the 2nd eigenvector of Laplacian Matrix give us a suggestion of how to partition. http://www.cnblogs.com/vivounicorn/archive/2012/02/10/2343377.html in this article, there are 3 partition methods based on Laplacian matrix: Minimum Cut, Ratio Cut and Normalized Cut
  • 6. Simrank approach simrank is used to measure the similarity between nodes. Node Similarity Random walks with restart. v' = βMv + (1-β)eN v : the column vector that reflects the probability the walker is at each of the nodes at previous round, we could init v as eN. v' : the result of current round. M : the transition matrix. N : the node we are dealing with. β: the probability that walker continue going to other nodes but node N. we say 'restart' based on the probability of (1-β) that walker would go back to N on each round. eN : a column vector that has 1 in the row for node N and 0’s elsewhere, thus (1-β)eN is the contribution to current result when walker 'restart'. transition matrix iterator result
  • 7. A scenario when dealing with Page Rank Add a probability factor to walk out circle No probability factor, trapped in the circle
  • 8. m Counting Triangles m Intuitively, in a social network, a friend of my friend stands a good chance to be my friend too, so counting the number of triangles helps us to measure the extent to which a graph looks like a social network. In a graph that has n nodes with m≥n edges, there must be no more than 2 nodes whose degree are larger than , we call these nodes the heavy hitter. We reduce the time complexity of counting triangles by dividing nodes into heavy hitter group and non-heavy hitter group.
  • 9. Neighborhood Properties of Graphs Neighborhood The neighborhood of radius d for a node v is the set of nodes u for which there is a path of length at most d from v to u, denoted by N(v,d). The diameter of a directed graph is the smallest integer d such that for every two nodes u and v there is a path of length d or less from u to v. For a undirected graph, we treat each edge as double-direction edge. Transitive Closure and Reachability The transitive closure of a graph is the set of pairs of nodes (u, v) such that there is a path from u to v of length zero or more. We say node u reaches node v if (u,v) is an item of transitive closure of the graph.
  • 10. Neighborhood Properties of Graphs Neighborhood The neighborhood of radius d for a node v is the set of nodes u for which there is a path of length at most d from v to u, denoted by N(v,d). The diameter of a directed graph is the smallest integer d such that for every two nodes u and v there is a path of length d or less from u to v. For a undirected graph, we treat each edge as double-direction edge. Transitive Closure and Reachability The transitive closure of a graph is the set of pairs of nodes (u, v) such that there is a path from u to v of length zero or more. We say node u reaches node v if (u,v) is an item of transitive closure of the graph.