SlideShare une entreprise Scribd logo
1  sur  25
Network analysis basic
• in-degree: how many directed edges (arcs)
are incident on a node
• out-degree: how may directed edges
originate at a node
• Degree sequence: [4, 4, 3, 7, …]
Node properties
Generated properties of node
• Clustering coefficient: how your neighbors
connected together
• ego-density: density of the surrounding net
UCINET: Network>Ego-networks>egonet basic measures
• Directed or undirected
• Weight, ranking, ...
• Type, negative or positive, ...
• Assigned-properties depending on
calculating network itself, e.g., betweenness
Edge properties
Network Properties
• Degree distribution: Frequency of degree
sequences
• Size: number of nodes (n)
• Density: real relations divided by the maximum
possible relations
• Diameter: the length of the longest path
• Average degree of separation:Average length of all
possible shorted path
UCINET: Network>Cohesion>Density
Mode of network
• One-mode network
‣ Friendship
‣ Collaboration e.g., User-paper represented by 2-mode network
• Two-mode network—bipartite network
‣ User-borrowed book, co-bought
‣ Affiliation network— e.g., Member-Guild, Employee-Company
Resolved by co-occurrence-ship
Network analysis basic
• Degree
How many resource do you have?
• Closeness
How far apart are you from others?
• Betweenness
How important are you for bridging
sub-communities?
• Centralization
How balanced are actors’ centrality?
Centrality
Individual
level
Global
level
• Density
How does the network tied together?
• Separation, Diameter
How far apart are you and your friends?
• Cluster Coefficient
How do your neighbors be connected?
Individual
level
Global
level
Visualization through analysis process
1. Take a look
2. Analyze and find significant features such as sub-
components or special positions
3. Draw the network according to the result of
analysis
4. Color by the node features (e.g., sex, position, ...)
and create hypothesis
5. Verify the hypothesis
• Ego-network Analysis
-
-
• Partial Network Analysis
- One, two or three steps network two steps network
- Boundary or sub-cluster of network
• Whole Network Analysis
- /
Motif
-
Levels of network analysis
• Data is recorded with a clear natural-occurring
boundary and nodes in a boundary form a finite
set.
• What should be a possible boundary?
‣ A fixed location or room, specified time or day, a finite contact
tracing, a formal group in an organization, a family.
‣ The boundary is known or decided firstly, a priori, to be a
network.
Policy of recording data
• No sampling and tend to include all of the actors
in some population(s).
• Because network methods focus on relations
among actors, actors cannot be sampled
independently to be included as observations.
Policy of recording data (2)
• positivity A Priori
metaphysics
-
• -
• -
-
Butts, Carter T. "Revisiting the foundations of network analysis." Science325.5939 (2009): 414-416.
• Closed Complete
- finite
set
-
• Singularity
-
• Consistency
-
Butts, Carter T. "Revisiting the foundations of network analysis." Science325.5939 (2009): 414-416.
• Different relation sampling policy will cause
different results—Threshold effects on network
properties
• Threshold
Threshold
• Threshold 0
Connectedness
Betweenness
• Threshold Betweenness
Degree Betweenness
• facebook
10
Application
• Full network data is necessary to properly define and measure
many of the structural concepts of network analysis (e.g.
between-ness), however, very expensive.
• Snowball methods begin with a focal actor or set of actors until
no new actors are identified, or until we decide to stop.
- Useful to track down “special” population such as business contact networks, community
elites, deviant sub-cultures, avid stamp collectors, and kinship networks.
- The snowball method may tend to overstate the "connectedness" and "solidarity" of
populations of actors.
- There is no guaranteed way of finding all of the connected individuals in the population.
- How to select the first node (initial problem of sampling)?
- Incomplete problem of the snowball methods can be solved by use of multiple initial nodes.
Methods of sampling ties
Visualization
X Crossed-edges
X Uninformed-edge
length
X Overlapped
nodes and edges
A B C D E F G H I J
A 0 1 1 1 0 1 0 0 0 0
B 1 0 0 1 1 0 1 0 0 0
C 1 0 0 1 0 1 0 0 0 0
D 1 1 1 0 1 1 1 0 0 0
E 0 1 0 1 0 0 1 0 0 0
F 1 0 1 1 0 0 1 1 0 0
G 0 1 0 1 1 1 0 1 0 0
H 0 0 0 0 0 1 1 0 1 0
I 0 0 0 0 0 0 0 1 0 1
J 0 0 0 0 0 0 0 0 1 0
Adjacent matrix
degree of B
Symmetric
M(1,4)=1, M(1,5)=0
Homans(1951) Metrics representation and manipulation
A B C D E F G H
A 1 1 1 1 1
B 1 1 1
C 1 1 1 1
D 1 1 1
E 1 1 1
F 1 1 1
G 1 1 1
H 1 1 1 1
D E C H A B F G
D 1 1 1
E 1 1 1
C 1 1 1 1
H 1 1 1 1
A 1 1 1 1 1
B 1 1 1
F 1 1 1
G 1 1 1

Contenu connexe

En vedette

Cómo incorporar Periscope y Snapchat a tu estrategia digital: Webinar
Cómo incorporar Periscope y Snapchat a tu estrategia digital: WebinarCómo incorporar Periscope y Snapchat a tu estrategia digital: Webinar
Cómo incorporar Periscope y Snapchat a tu estrategia digital: WebinarIEBSchool
 
Microorganism By Azka Cantik
Microorganism By Azka CantikMicroorganism By Azka Cantik
Microorganism By Azka Cantikazkajoyo
 
Medios Sociales con Sentido
Medios Sociales con SentidoMedios Sociales con Sentido
Medios Sociales con SentidoCarlos Jiménez
 
Genba OR Gemba- A Problem Solving Technique
Genba OR Gemba- A Problem Solving TechniqueGenba OR Gemba- A Problem Solving Technique
Genba OR Gemba- A Problem Solving TechniqueSyed Anas Abdali
 
XING - Braucht man das oder kann das weg ...? #barcampDUS
XING - Braucht man das oder kann das weg ...? #barcampDUSXING - Braucht man das oder kann das weg ...? #barcampDUS
XING - Braucht man das oder kann das weg ...? #barcampDUSHolger Gottesmann
 
UR Sponsorship Proposal 2012
UR Sponsorship Proposal 2012 UR Sponsorship Proposal 2012
UR Sponsorship Proposal 2012 Stuart Meachem
 
NASCAR Sponsorship Package
NASCAR Sponsorship PackageNASCAR Sponsorship Package
NASCAR Sponsorship PackageZEALstreet
 
searchmetrics-webcast-importance-backlinks
searchmetrics-webcast-importance-backlinkssearchmetrics-webcast-importance-backlinks
searchmetrics-webcast-importance-backlinksJulia Schoenegger
 

En vedette (10)

Cómo incorporar Periscope y Snapchat a tu estrategia digital: Webinar
Cómo incorporar Periscope y Snapchat a tu estrategia digital: WebinarCómo incorporar Periscope y Snapchat a tu estrategia digital: Webinar
Cómo incorporar Periscope y Snapchat a tu estrategia digital: Webinar
 
Microorganism By Azka Cantik
Microorganism By Azka CantikMicroorganism By Azka Cantik
Microorganism By Azka Cantik
 
Abc costing
Abc costingAbc costing
Abc costing
 
Medios Sociales con Sentido
Medios Sociales con SentidoMedios Sociales con Sentido
Medios Sociales con Sentido
 
Team buraq racing car
Team buraq racing carTeam buraq racing car
Team buraq racing car
 
Genba OR Gemba- A Problem Solving Technique
Genba OR Gemba- A Problem Solving TechniqueGenba OR Gemba- A Problem Solving Technique
Genba OR Gemba- A Problem Solving Technique
 
XING - Braucht man das oder kann das weg ...? #barcampDUS
XING - Braucht man das oder kann das weg ...? #barcampDUSXING - Braucht man das oder kann das weg ...? #barcampDUS
XING - Braucht man das oder kann das weg ...? #barcampDUS
 
UR Sponsorship Proposal 2012
UR Sponsorship Proposal 2012 UR Sponsorship Proposal 2012
UR Sponsorship Proposal 2012
 
NASCAR Sponsorship Package
NASCAR Sponsorship PackageNASCAR Sponsorship Package
NASCAR Sponsorship Package
 
searchmetrics-webcast-importance-backlinks
searchmetrics-webcast-importance-backlinkssearchmetrics-webcast-importance-backlinks
searchmetrics-webcast-importance-backlinks
 

Similaire à 4.1 network analysis basic

Network sampling, community detection
Network sampling, community detectionNetwork sampling, community detection
Network sampling, community detectionroberval mariano
 
network mining and representation learning
network mining and representation learningnetwork mining and representation learning
network mining and representation learningsun peiyuan
 
Social network analysis basics
Social network analysis basicsSocial network analysis basics
Social network analysis basicsPradeep Kumar
 
2016 Cytoscape 3.3 Tutorial
2016 Cytoscape 3.3 Tutorial2016 Cytoscape 3.3 Tutorial
2016 Cytoscape 3.3 TutorialAlexander Pico
 
02 Network Data Collection
02 Network Data Collection02 Network Data Collection
02 Network Data Collectiondnac
 
Graph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear AlgebraGraph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear AlgebraJason Riedy
 
CS6010 Social Network Analysis Unit V
CS6010 Social Network Analysis Unit VCS6010 Social Network Analysis Unit V
CS6010 Social Network Analysis Unit Vpkaviya
 
Practice discovering biological knowledge using networks approach.
Practice discovering biological knowledge using networks approach.Practice discovering biological knowledge using networks approach.
Practice discovering biological knowledge using networks approach.Elena Sügis
 
Efficient Reduced BIAS Genetic Algorithm for Generic Community Detection Obje...
Efficient Reduced BIAS Genetic Algorithm for Generic Community Detection Obje...Efficient Reduced BIAS Genetic Algorithm for Generic Community Detection Obje...
Efficient Reduced BIAS Genetic Algorithm for Generic Community Detection Obje...Aditya K G
 
Higher-order Link Prediction GraphEx
Higher-order Link Prediction GraphExHigher-order Link Prediction GraphEx
Higher-order Link Prediction GraphExAustin Benson
 
DS9 - Clustering.pptx
DS9 - Clustering.pptxDS9 - Clustering.pptx
DS9 - Clustering.pptxJK970901
 
Anomaly detection (Unsupervised Learning) in Machine Learning
Anomaly detection (Unsupervised Learning) in Machine LearningAnomaly detection (Unsupervised Learning) in Machine Learning
Anomaly detection (Unsupervised Learning) in Machine LearningKuppusamy P
 
Group and Community Detection in Social Networks
Group and Community Detection in Social NetworksGroup and Community Detection in Social Networks
Group and Community Detection in Social NetworksKent State University
 
3b318431-df9f-4a2c-9909-61ecb6af8444.pptx
3b318431-df9f-4a2c-9909-61ecb6af8444.pptx3b318431-df9f-4a2c-9909-61ecb6af8444.pptx
3b318431-df9f-4a2c-9909-61ecb6af8444.pptxNANDHINIS900805
 
Social network analysis
Social network analysisSocial network analysis
Social network analysisCaleb Jones
 

Similaire à 4.1 network analysis basic (20)

Network sampling, community detection
Network sampling, community detectionNetwork sampling, community detection
Network sampling, community detection
 
network mining and representation learning
network mining and representation learningnetwork mining and representation learning
network mining and representation learning
 
Social network analysis basics
Social network analysis basicsSocial network analysis basics
Social network analysis basics
 
2016 Cytoscape 3.3 Tutorial
2016 Cytoscape 3.3 Tutorial2016 Cytoscape 3.3 Tutorial
2016 Cytoscape 3.3 Tutorial
 
02 Network Data Collection
02 Network Data Collection02 Network Data Collection
02 Network Data Collection
 
02 Network Data Collection (2016)
02 Network Data Collection (2016)02 Network Data Collection (2016)
02 Network Data Collection (2016)
 
05 Whole Network Descriptive Stats
05 Whole Network Descriptive Stats05 Whole Network Descriptive Stats
05 Whole Network Descriptive Stats
 
Graph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear AlgebraGraph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear Algebra
 
CS6010 Social Network Analysis Unit V
CS6010 Social Network Analysis Unit VCS6010 Social Network Analysis Unit V
CS6010 Social Network Analysis Unit V
 
Practice discovering biological knowledge using networks approach.
Practice discovering biological knowledge using networks approach.Practice discovering biological knowledge using networks approach.
Practice discovering biological knowledge using networks approach.
 
Efficient Reduced BIAS Genetic Algorithm for Generic Community Detection Obje...
Efficient Reduced BIAS Genetic Algorithm for Generic Community Detection Obje...Efficient Reduced BIAS Genetic Algorithm for Generic Community Detection Obje...
Efficient Reduced BIAS Genetic Algorithm for Generic Community Detection Obje...
 
Higher-order Link Prediction GraphEx
Higher-order Link Prediction GraphExHigher-order Link Prediction GraphEx
Higher-order Link Prediction GraphEx
 
DS9 - Clustering.pptx
DS9 - Clustering.pptxDS9 - Clustering.pptx
DS9 - Clustering.pptx
 
Anomaly detection (Unsupervised Learning) in Machine Learning
Anomaly detection (Unsupervised Learning) in Machine LearningAnomaly detection (Unsupervised Learning) in Machine Learning
Anomaly detection (Unsupervised Learning) in Machine Learning
 
02 Descriptive Statistics (2017)
02 Descriptive Statistics (2017)02 Descriptive Statistics (2017)
02 Descriptive Statistics (2017)
 
Group and Community Detection in Social Networks
Group and Community Detection in Social NetworksGroup and Community Detection in Social Networks
Group and Community Detection in Social Networks
 
3b318431-df9f-4a2c-9909-61ecb6af8444.pptx
3b318431-df9f-4a2c-9909-61ecb6af8444.pptx3b318431-df9f-4a2c-9909-61ecb6af8444.pptx
3b318431-df9f-4a2c-9909-61ecb6af8444.pptx
 
Pathway and network analysis
Pathway and network analysisPathway and network analysis
Pathway and network analysis
 
Social network analysis
Social network analysisSocial network analysis
Social network analysis
 
13047926.ppt
13047926.ppt13047926.ppt
13047926.ppt
 

Plus de jilung hsieh

"Indesign + folio - first class" for ntnu library workshop
"Indesign + folio - first class" for ntnu library workshop"Indesign + folio - first class" for ntnu library workshop
"Indesign + folio - first class" for ntnu library workshopjilung hsieh
 
"Introduction to making ebook" for ntnu library workshop
"Introduction to making ebook" for ntnu library workshop"Introduction to making ebook" for ntnu library workshop
"Introduction to making ebook" for ntnu library workshopjilung hsieh
 
e-magazine design by InDesign+folio - Multiple images
e-magazine design by InDesign+folio - Multiple imagese-magazine design by InDesign+folio - Multiple images
e-magazine design by InDesign+folio - Multiple imagesjilung hsieh
 
4.0 social network analysis
4.0 social network analysis4.0 social network analysis
4.0 social network analysisjilung hsieh
 
3.social network sites
3.social network sites3.social network sites
3.social network sitesjilung hsieh
 
2.social recommedation
2.social recommedation2.social recommedation
2.social recommedationjilung hsieh
 
0.introduction to social computing
0.introduction to social computing0.introduction to social computing
0.introduction to social computingjilung hsieh
 
Thinking in presentation
Thinking in presentationThinking in presentation
Thinking in presentationjilung hsieh
 
Tag system 教學投影片
Tag system 教學投影片Tag system 教學投影片
Tag system 教學投影片jilung hsieh
 
師大圖資研究生論文
師大圖資研究生論文師大圖資研究生論文
師大圖資研究生論文jilung hsieh
 
如何定義你的題目.Pptx
如何定義你的題目.Pptx如何定義你的題目.Pptx
如何定義你的題目.Pptxjilung hsieh
 
碩士論文寫作要點.Ppt
碩士論文寫作要點.Ppt碩士論文寫作要點.Ppt
碩士論文寫作要點.Pptjilung hsieh
 
如何定義你的題目.Pptx
如何定義你的題目.Pptx如何定義你的題目.Pptx
如何定義你的題目.Pptxjilung hsieh
 
碩士論文寫作要點.Ppt
碩士論文寫作要點.Ppt碩士論文寫作要點.Ppt
碩士論文寫作要點.Pptjilung hsieh
 
Reviewing abstract
Reviewing abstractReviewing abstract
Reviewing abstractjilung hsieh
 
Scott 校外口試
Scott 校外口試Scott 校外口試
Scott 校外口試jilung hsieh
 
Scott Complex Networks
Scott Complex NetworksScott Complex Networks
Scott Complex Networksjilung hsieh
 

Plus de jilung hsieh (18)

"Indesign + folio - first class" for ntnu library workshop
"Indesign + folio - first class" for ntnu library workshop"Indesign + folio - first class" for ntnu library workshop
"Indesign + folio - first class" for ntnu library workshop
 
"Introduction to making ebook" for ntnu library workshop
"Introduction to making ebook" for ntnu library workshop"Introduction to making ebook" for ntnu library workshop
"Introduction to making ebook" for ntnu library workshop
 
e-magazine design by InDesign+folio - Multiple images
e-magazine design by InDesign+folio - Multiple imagese-magazine design by InDesign+folio - Multiple images
e-magazine design by InDesign+folio - Multiple images
 
4.0 social network analysis
4.0 social network analysis4.0 social network analysis
4.0 social network analysis
 
3.social network sites
3.social network sites3.social network sites
3.social network sites
 
2.social recommedation
2.social recommedation2.social recommedation
2.social recommedation
 
0.introduction to social computing
0.introduction to social computing0.introduction to social computing
0.introduction to social computing
 
Thinking in presentation
Thinking in presentationThinking in presentation
Thinking in presentation
 
Tag system 教學投影片
Tag system 教學投影片Tag system 教學投影片
Tag system 教學投影片
 
師大圖資研究生論文
師大圖資研究生論文師大圖資研究生論文
師大圖資研究生論文
 
如何定義你的題目.Pptx
如何定義你的題目.Pptx如何定義你的題目.Pptx
如何定義你的題目.Pptx
 
碩士論文寫作要點.Ppt
碩士論文寫作要點.Ppt碩士論文寫作要點.Ppt
碩士論文寫作要點.Ppt
 
如何定義你的題目.Pptx
如何定義你的題目.Pptx如何定義你的題目.Pptx
如何定義你的題目.Pptx
 
碩士論文寫作要點.Ppt
碩士論文寫作要點.Ppt碩士論文寫作要點.Ppt
碩士論文寫作要點.Ppt
 
Reviewing abstract
Reviewing abstractReviewing abstract
Reviewing abstract
 
Scott 校外口試
Scott 校外口試Scott 校外口試
Scott 校外口試
 
Scott Complex Networks
Scott Complex NetworksScott Complex Networks
Scott Complex Networks
 
Game Researches
Game ResearchesGame Researches
Game Researches
 

Dernier

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Dernier (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

4.1 network analysis basic

  • 2. • in-degree: how many directed edges (arcs) are incident on a node • out-degree: how may directed edges originate at a node • Degree sequence: [4, 4, 3, 7, …] Node properties
  • 3. Generated properties of node • Clustering coefficient: how your neighbors connected together • ego-density: density of the surrounding net UCINET: Network>Ego-networks>egonet basic measures
  • 4. • Directed or undirected • Weight, ranking, ... • Type, negative or positive, ... • Assigned-properties depending on calculating network itself, e.g., betweenness Edge properties
  • 5. Network Properties • Degree distribution: Frequency of degree sequences • Size: number of nodes (n) • Density: real relations divided by the maximum possible relations • Diameter: the length of the longest path • Average degree of separation:Average length of all possible shorted path UCINET: Network>Cohesion>Density
  • 6. Mode of network • One-mode network ‣ Friendship ‣ Collaboration e.g., User-paper represented by 2-mode network • Two-mode network—bipartite network ‣ User-borrowed book, co-bought ‣ Affiliation network— e.g., Member-Guild, Employee-Company
  • 9. • Degree How many resource do you have? • Closeness How far apart are you from others? • Betweenness How important are you for bridging sub-communities? • Centralization How balanced are actors’ centrality? Centrality Individual level Global level
  • 10. • Density How does the network tied together? • Separation, Diameter How far apart are you and your friends? • Cluster Coefficient How do your neighbors be connected? Individual level Global level
  • 11. Visualization through analysis process 1. Take a look 2. Analyze and find significant features such as sub- components or special positions 3. Draw the network according to the result of analysis 4. Color by the node features (e.g., sex, position, ...) and create hypothesis 5. Verify the hypothesis
  • 12. • Ego-network Analysis - - • Partial Network Analysis - One, two or three steps network two steps network - Boundary or sub-cluster of network • Whole Network Analysis - / Motif - Levels of network analysis
  • 13. • Data is recorded with a clear natural-occurring boundary and nodes in a boundary form a finite set. • What should be a possible boundary? ‣ A fixed location or room, specified time or day, a finite contact tracing, a formal group in an organization, a family. ‣ The boundary is known or decided firstly, a priori, to be a network. Policy of recording data
  • 14. • No sampling and tend to include all of the actors in some population(s). • Because network methods focus on relations among actors, actors cannot be sampled independently to be included as observations. Policy of recording data (2)
  • 15. • positivity A Priori metaphysics - • - • - - Butts, Carter T. "Revisiting the foundations of network analysis." Science325.5939 (2009): 414-416.
  • 16. • Closed Complete - finite set - • Singularity - • Consistency - Butts, Carter T. "Revisiting the foundations of network analysis." Science325.5939 (2009): 414-416.
  • 17. • Different relation sampling policy will cause different results—Threshold effects on network properties • Threshold Threshold • Threshold 0 Connectedness Betweenness • Threshold Betweenness Degree Betweenness • facebook 10 Application
  • 18. • Full network data is necessary to properly define and measure many of the structural concepts of network analysis (e.g. between-ness), however, very expensive. • Snowball methods begin with a focal actor or set of actors until no new actors are identified, or until we decide to stop. - Useful to track down “special” population such as business contact networks, community elites, deviant sub-cultures, avid stamp collectors, and kinship networks. - The snowball method may tend to overstate the "connectedness" and "solidarity" of populations of actors. - There is no guaranteed way of finding all of the connected individuals in the population. - How to select the first node (initial problem of sampling)? - Incomplete problem of the snowball methods can be solved by use of multiple initial nodes. Methods of sampling ties
  • 20. X Crossed-edges X Uninformed-edge length X Overlapped nodes and edges
  • 21.
  • 22.
  • 23.
  • 24. A B C D E F G H I J A 0 1 1 1 0 1 0 0 0 0 B 1 0 0 1 1 0 1 0 0 0 C 1 0 0 1 0 1 0 0 0 0 D 1 1 1 0 1 1 1 0 0 0 E 0 1 0 1 0 0 1 0 0 0 F 1 0 1 1 0 0 1 1 0 0 G 0 1 0 1 1 1 0 1 0 0 H 0 0 0 0 0 1 1 0 1 0 I 0 0 0 0 0 0 0 1 0 1 J 0 0 0 0 0 0 0 0 1 0 Adjacent matrix degree of B Symmetric M(1,4)=1, M(1,5)=0
  • 25. Homans(1951) Metrics representation and manipulation A B C D E F G H A 1 1 1 1 1 B 1 1 1 C 1 1 1 1 D 1 1 1 E 1 1 1 F 1 1 1 G 1 1 1 H 1 1 1 1 D E C H A B F G D 1 1 1 E 1 1 1 C 1 1 1 1 H 1 1 1 1 A 1 1 1 1 1 B 1 1 1 F 1 1 1 G 1 1 1