SlideShare une entreprise Scribd logo
1  sur  25
Network analysis basic
• in-degree: how many directed edges (arcs)
are incident on a node
• out-degree: how may directed edges
originate at a node
• Degree sequence: [4, 4, 3, 7, …]
Node properties
Generated properties of node
• Clustering coefficient: how your neighbors
connected together
• ego-density: density of the surrounding net
UCINET: Network>Ego-networks>egonet basic measures
• Directed or undirected
• Weight, ranking, ...
• Type, negative or positive, ...
• Assigned-properties depending on
calculating network itself, e.g., betweenness
Edge properties
Network Properties
• Degree distribution: Frequency of degree
sequences
• Size: number of nodes (n)
• Density: real relations divided by the maximum
possible relations
• Diameter: the length of the longest path
• Average degree of separation:Average length of all
possible shorted path
UCINET: Network>Cohesion>Density
Mode of network
• One-mode network
‣ Friendship
‣ Collaboration e.g., User-paper represented by 2-mode network
• Two-mode network—bipartite network
‣ User-borrowed book, co-bought
‣ Affiliation network— e.g., Member-Guild, Employee-Company
Resolved by co-occurrence-ship
Network analysis basic
• Degree
How many resource do you have?
• Closeness
How far apart are you from others?
• Betweenness
How important are you for bridging
sub-communities?
• Centralization
How balanced are actors’ centrality?
Centrality
Individual
level
Global
level
• Density
How does the network tied together?
• Separation, Diameter
How far apart are you and your friends?
• Cluster Coefficient
How do your neighbors be connected?
Individual
level
Global
level
Visualization through analysis process
1. Take a look
2. Analyze and find significant features such as sub-
components or special positions
3. Draw the network according to the result of
analysis
4. Color by the node features (e.g., sex, position, ...)
and create hypothesis
5. Verify the hypothesis
• Ego-network Analysis
-
-
• Partial Network Analysis
- One, two or three steps network two steps network
- Boundary or sub-cluster of network
• Whole Network Analysis
- /
Motif
-
Levels of network analysis
• Data is recorded with a clear natural-occurring
boundary and nodes in a boundary form a finite
set.
• What should be a possible boundary?
‣ A fixed location or room, specified time or day, a finite contact
tracing, a formal group in an organization, a family.
‣ The boundary is known or decided firstly, a priori, to be a
network.
Policy of recording data
• No sampling and tend to include all of the actors
in some population(s).
• Because network methods focus on relations
among actors, actors cannot be sampled
independently to be included as observations.
Policy of recording data (2)
• positivity A Priori
metaphysics
-
• -
• -
-
Butts, Carter T. "Revisiting the foundations of network analysis." Science325.5939 (2009): 414-416.
• Closed Complete
- finite
set
-
• Singularity
-
• Consistency
-
Butts, Carter T. "Revisiting the foundations of network analysis." Science325.5939 (2009): 414-416.
• Different relation sampling policy will cause
different results—Threshold effects on network
properties
• Threshold
Threshold
• Threshold 0
Connectedness
Betweenness
• Threshold Betweenness
Degree Betweenness
• facebook
10
Application
• Full network data is necessary to properly define and measure
many of the structural concepts of network analysis (e.g.
between-ness), however, very expensive.
• Snowball methods begin with a focal actor or set of actors until
no new actors are identified, or until we decide to stop.
- Useful to track down “special” population such as business contact networks, community
elites, deviant sub-cultures, avid stamp collectors, and kinship networks.
- The snowball method may tend to overstate the "connectedness" and "solidarity" of
populations of actors.
- There is no guaranteed way of finding all of the connected individuals in the population.
- How to select the first node (initial problem of sampling)?
- Incomplete problem of the snowball methods can be solved by use of multiple initial nodes.
Methods of sampling ties
Visualization
X Crossed-edges
X Uninformed-edge
length
X Overlapped
nodes and edges
A B C D E F G H I J
A 0 1 1 1 0 1 0 0 0 0
B 1 0 0 1 1 0 1 0 0 0
C 1 0 0 1 0 1 0 0 0 0
D 1 1 1 0 1 1 1 0 0 0
E 0 1 0 1 0 0 1 0 0 0
F 1 0 1 1 0 0 1 1 0 0
G 0 1 0 1 1 1 0 1 0 0
H 0 0 0 0 0 1 1 0 1 0
I 0 0 0 0 0 0 0 1 0 1
J 0 0 0 0 0 0 0 0 1 0
Adjacent matrix
degree of B
Symmetric
M(1,4)=1, M(1,5)=0
Homans(1951) Metrics representation and manipulation
A B C D E F G H
A 1 1 1 1 1
B 1 1 1
C 1 1 1 1
D 1 1 1
E 1 1 1
F 1 1 1
G 1 1 1
H 1 1 1 1
D E C H A B F G
D 1 1 1
E 1 1 1
C 1 1 1 1
H 1 1 1 1
A 1 1 1 1 1
B 1 1 1
F 1 1 1
G 1 1 1

Contenu connexe

En vedette

Cómo incorporar Periscope y Snapchat a tu estrategia digital: Webinar
Cómo incorporar Periscope y Snapchat a tu estrategia digital: WebinarCómo incorporar Periscope y Snapchat a tu estrategia digital: Webinar
Cómo incorporar Periscope y Snapchat a tu estrategia digital: WebinarIEBSchool
 
Microorganism By Azka Cantik
Microorganism By Azka CantikMicroorganism By Azka Cantik
Microorganism By Azka Cantikazkajoyo
 
Medios Sociales con Sentido
Medios Sociales con SentidoMedios Sociales con Sentido
Medios Sociales con SentidoCarlos Jiménez
 
Genba OR Gemba- A Problem Solving Technique
Genba OR Gemba- A Problem Solving TechniqueGenba OR Gemba- A Problem Solving Technique
Genba OR Gemba- A Problem Solving TechniqueSyed Anas Abdali
 
XING - Braucht man das oder kann das weg ...? #barcampDUS
XING - Braucht man das oder kann das weg ...? #barcampDUSXING - Braucht man das oder kann das weg ...? #barcampDUS
XING - Braucht man das oder kann das weg ...? #barcampDUSHolger Gottesmann
 
UR Sponsorship Proposal 2012
UR Sponsorship Proposal 2012 UR Sponsorship Proposal 2012
UR Sponsorship Proposal 2012 Stuart Meachem
 
NASCAR Sponsorship Package
NASCAR Sponsorship PackageNASCAR Sponsorship Package
NASCAR Sponsorship PackageZEALstreet
 
searchmetrics-webcast-importance-backlinks
searchmetrics-webcast-importance-backlinkssearchmetrics-webcast-importance-backlinks
searchmetrics-webcast-importance-backlinksJulia Schoenegger
 

En vedette (10)

Cómo incorporar Periscope y Snapchat a tu estrategia digital: Webinar
Cómo incorporar Periscope y Snapchat a tu estrategia digital: WebinarCómo incorporar Periscope y Snapchat a tu estrategia digital: Webinar
Cómo incorporar Periscope y Snapchat a tu estrategia digital: Webinar
 
Microorganism By Azka Cantik
Microorganism By Azka CantikMicroorganism By Azka Cantik
Microorganism By Azka Cantik
 
Abc costing
Abc costingAbc costing
Abc costing
 
Medios Sociales con Sentido
Medios Sociales con SentidoMedios Sociales con Sentido
Medios Sociales con Sentido
 
Team buraq racing car
Team buraq racing carTeam buraq racing car
Team buraq racing car
 
Genba OR Gemba- A Problem Solving Technique
Genba OR Gemba- A Problem Solving TechniqueGenba OR Gemba- A Problem Solving Technique
Genba OR Gemba- A Problem Solving Technique
 
XING - Braucht man das oder kann das weg ...? #barcampDUS
XING - Braucht man das oder kann das weg ...? #barcampDUSXING - Braucht man das oder kann das weg ...? #barcampDUS
XING - Braucht man das oder kann das weg ...? #barcampDUS
 
UR Sponsorship Proposal 2012
UR Sponsorship Proposal 2012 UR Sponsorship Proposal 2012
UR Sponsorship Proposal 2012
 
NASCAR Sponsorship Package
NASCAR Sponsorship PackageNASCAR Sponsorship Package
NASCAR Sponsorship Package
 
searchmetrics-webcast-importance-backlinks
searchmetrics-webcast-importance-backlinkssearchmetrics-webcast-importance-backlinks
searchmetrics-webcast-importance-backlinks
 

Similaire à 4.1 network analysis basic

Network sampling, community detection
Network sampling, community detectionNetwork sampling, community detection
Network sampling, community detectionroberval mariano
 
network mining and representation learning
network mining and representation learningnetwork mining and representation learning
network mining and representation learningsun peiyuan
 
Social network analysis basics
Social network analysis basicsSocial network analysis basics
Social network analysis basicsPradeep Kumar
 
2016 Cytoscape 3.3 Tutorial
2016 Cytoscape 3.3 Tutorial2016 Cytoscape 3.3 Tutorial
2016 Cytoscape 3.3 TutorialAlexander Pico
 
02 Network Data Collection
02 Network Data Collection02 Network Data Collection
02 Network Data Collectiondnac
 
Graph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear AlgebraGraph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear AlgebraJason Riedy
 
CS6010 Social Network Analysis Unit V
CS6010 Social Network Analysis Unit VCS6010 Social Network Analysis Unit V
CS6010 Social Network Analysis Unit Vpkaviya
 
Practice discovering biological knowledge using networks approach.
Practice discovering biological knowledge using networks approach.Practice discovering biological knowledge using networks approach.
Practice discovering biological knowledge using networks approach.Elena Sügis
 
Efficient Reduced BIAS Genetic Algorithm for Generic Community Detection Obje...
Efficient Reduced BIAS Genetic Algorithm for Generic Community Detection Obje...Efficient Reduced BIAS Genetic Algorithm for Generic Community Detection Obje...
Efficient Reduced BIAS Genetic Algorithm for Generic Community Detection Obje...Aditya K G
 
Higher-order Link Prediction GraphEx
Higher-order Link Prediction GraphExHigher-order Link Prediction GraphEx
Higher-order Link Prediction GraphExAustin Benson
 
DS9 - Clustering.pptx
DS9 - Clustering.pptxDS9 - Clustering.pptx
DS9 - Clustering.pptxJK970901
 
Anomaly detection (Unsupervised Learning) in Machine Learning
Anomaly detection (Unsupervised Learning) in Machine LearningAnomaly detection (Unsupervised Learning) in Machine Learning
Anomaly detection (Unsupervised Learning) in Machine LearningKuppusamy P
 
Group and Community Detection in Social Networks
Group and Community Detection in Social NetworksGroup and Community Detection in Social Networks
Group and Community Detection in Social NetworksKent State University
 
3b318431-df9f-4a2c-9909-61ecb6af8444.pptx
3b318431-df9f-4a2c-9909-61ecb6af8444.pptx3b318431-df9f-4a2c-9909-61ecb6af8444.pptx
3b318431-df9f-4a2c-9909-61ecb6af8444.pptxNANDHINIS900805
 
Social network analysis
Social network analysisSocial network analysis
Social network analysisCaleb Jones
 

Similaire à 4.1 network analysis basic (20)

Network sampling, community detection
Network sampling, community detectionNetwork sampling, community detection
Network sampling, community detection
 
network mining and representation learning
network mining and representation learningnetwork mining and representation learning
network mining and representation learning
 
Social network analysis basics
Social network analysis basicsSocial network analysis basics
Social network analysis basics
 
2016 Cytoscape 3.3 Tutorial
2016 Cytoscape 3.3 Tutorial2016 Cytoscape 3.3 Tutorial
2016 Cytoscape 3.3 Tutorial
 
02 Network Data Collection
02 Network Data Collection02 Network Data Collection
02 Network Data Collection
 
02 Network Data Collection (2016)
02 Network Data Collection (2016)02 Network Data Collection (2016)
02 Network Data Collection (2016)
 
05 Whole Network Descriptive Stats
05 Whole Network Descriptive Stats05 Whole Network Descriptive Stats
05 Whole Network Descriptive Stats
 
Graph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear AlgebraGraph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear Algebra
 
CS6010 Social Network Analysis Unit V
CS6010 Social Network Analysis Unit VCS6010 Social Network Analysis Unit V
CS6010 Social Network Analysis Unit V
 
Practice discovering biological knowledge using networks approach.
Practice discovering biological knowledge using networks approach.Practice discovering biological knowledge using networks approach.
Practice discovering biological knowledge using networks approach.
 
Efficient Reduced BIAS Genetic Algorithm for Generic Community Detection Obje...
Efficient Reduced BIAS Genetic Algorithm for Generic Community Detection Obje...Efficient Reduced BIAS Genetic Algorithm for Generic Community Detection Obje...
Efficient Reduced BIAS Genetic Algorithm for Generic Community Detection Obje...
 
Higher-order Link Prediction GraphEx
Higher-order Link Prediction GraphExHigher-order Link Prediction GraphEx
Higher-order Link Prediction GraphEx
 
DS9 - Clustering.pptx
DS9 - Clustering.pptxDS9 - Clustering.pptx
DS9 - Clustering.pptx
 
Anomaly detection (Unsupervised Learning) in Machine Learning
Anomaly detection (Unsupervised Learning) in Machine LearningAnomaly detection (Unsupervised Learning) in Machine Learning
Anomaly detection (Unsupervised Learning) in Machine Learning
 
02 Descriptive Statistics (2017)
02 Descriptive Statistics (2017)02 Descriptive Statistics (2017)
02 Descriptive Statistics (2017)
 
Group and Community Detection in Social Networks
Group and Community Detection in Social NetworksGroup and Community Detection in Social Networks
Group and Community Detection in Social Networks
 
3b318431-df9f-4a2c-9909-61ecb6af8444.pptx
3b318431-df9f-4a2c-9909-61ecb6af8444.pptx3b318431-df9f-4a2c-9909-61ecb6af8444.pptx
3b318431-df9f-4a2c-9909-61ecb6af8444.pptx
 
Pathway and network analysis
Pathway and network analysisPathway and network analysis
Pathway and network analysis
 
Social network analysis
Social network analysisSocial network analysis
Social network analysis
 
13047926.ppt
13047926.ppt13047926.ppt
13047926.ppt
 

Plus de jilung hsieh

"Indesign + folio - first class" for ntnu library workshop
"Indesign + folio - first class" for ntnu library workshop"Indesign + folio - first class" for ntnu library workshop
"Indesign + folio - first class" for ntnu library workshopjilung hsieh
 
"Introduction to making ebook" for ntnu library workshop
"Introduction to making ebook" for ntnu library workshop"Introduction to making ebook" for ntnu library workshop
"Introduction to making ebook" for ntnu library workshopjilung hsieh
 
e-magazine design by InDesign+folio - Multiple images
e-magazine design by InDesign+folio - Multiple imagese-magazine design by InDesign+folio - Multiple images
e-magazine design by InDesign+folio - Multiple imagesjilung hsieh
 
4.0 social network analysis
4.0 social network analysis4.0 social network analysis
4.0 social network analysisjilung hsieh
 
3.social network sites
3.social network sites3.social network sites
3.social network sitesjilung hsieh
 
2.social recommedation
2.social recommedation2.social recommedation
2.social recommedationjilung hsieh
 
0.introduction to social computing
0.introduction to social computing0.introduction to social computing
0.introduction to social computingjilung hsieh
 
Thinking in presentation
Thinking in presentationThinking in presentation
Thinking in presentationjilung hsieh
 
Tag system 教學投影片
Tag system 教學投影片Tag system 教學投影片
Tag system 教學投影片jilung hsieh
 
師大圖資研究生論文
師大圖資研究生論文師大圖資研究生論文
師大圖資研究生論文jilung hsieh
 
如何定義你的題目.Pptx
如何定義你的題目.Pptx如何定義你的題目.Pptx
如何定義你的題目.Pptxjilung hsieh
 
碩士論文寫作要點.Ppt
碩士論文寫作要點.Ppt碩士論文寫作要點.Ppt
碩士論文寫作要點.Pptjilung hsieh
 
如何定義你的題目.Pptx
如何定義你的題目.Pptx如何定義你的題目.Pptx
如何定義你的題目.Pptxjilung hsieh
 
碩士論文寫作要點.Ppt
碩士論文寫作要點.Ppt碩士論文寫作要點.Ppt
碩士論文寫作要點.Pptjilung hsieh
 
Reviewing abstract
Reviewing abstractReviewing abstract
Reviewing abstractjilung hsieh
 
Scott 校外口試
Scott 校外口試Scott 校外口試
Scott 校外口試jilung hsieh
 
Scott Complex Networks
Scott Complex NetworksScott Complex Networks
Scott Complex Networksjilung hsieh
 

Plus de jilung hsieh (18)

"Indesign + folio - first class" for ntnu library workshop
"Indesign + folio - first class" for ntnu library workshop"Indesign + folio - first class" for ntnu library workshop
"Indesign + folio - first class" for ntnu library workshop
 
"Introduction to making ebook" for ntnu library workshop
"Introduction to making ebook" for ntnu library workshop"Introduction to making ebook" for ntnu library workshop
"Introduction to making ebook" for ntnu library workshop
 
e-magazine design by InDesign+folio - Multiple images
e-magazine design by InDesign+folio - Multiple imagese-magazine design by InDesign+folio - Multiple images
e-magazine design by InDesign+folio - Multiple images
 
4.0 social network analysis
4.0 social network analysis4.0 social network analysis
4.0 social network analysis
 
3.social network sites
3.social network sites3.social network sites
3.social network sites
 
2.social recommedation
2.social recommedation2.social recommedation
2.social recommedation
 
0.introduction to social computing
0.introduction to social computing0.introduction to social computing
0.introduction to social computing
 
Thinking in presentation
Thinking in presentationThinking in presentation
Thinking in presentation
 
Tag system 教學投影片
Tag system 教學投影片Tag system 教學投影片
Tag system 教學投影片
 
師大圖資研究生論文
師大圖資研究生論文師大圖資研究生論文
師大圖資研究生論文
 
如何定義你的題目.Pptx
如何定義你的題目.Pptx如何定義你的題目.Pptx
如何定義你的題目.Pptx
 
碩士論文寫作要點.Ppt
碩士論文寫作要點.Ppt碩士論文寫作要點.Ppt
碩士論文寫作要點.Ppt
 
如何定義你的題目.Pptx
如何定義你的題目.Pptx如何定義你的題目.Pptx
如何定義你的題目.Pptx
 
碩士論文寫作要點.Ppt
碩士論文寫作要點.Ppt碩士論文寫作要點.Ppt
碩士論文寫作要點.Ppt
 
Reviewing abstract
Reviewing abstractReviewing abstract
Reviewing abstract
 
Scott 校外口試
Scott 校外口試Scott 校外口試
Scott 校外口試
 
Scott Complex Networks
Scott Complex NetworksScott Complex Networks
Scott Complex Networks
 
Game Researches
Game ResearchesGame Researches
Game Researches
 

Dernier

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Dernier (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

4.1 network analysis basic

  • 2. • in-degree: how many directed edges (arcs) are incident on a node • out-degree: how may directed edges originate at a node • Degree sequence: [4, 4, 3, 7, …] Node properties
  • 3. Generated properties of node • Clustering coefficient: how your neighbors connected together • ego-density: density of the surrounding net UCINET: Network>Ego-networks>egonet basic measures
  • 4. • Directed or undirected • Weight, ranking, ... • Type, negative or positive, ... • Assigned-properties depending on calculating network itself, e.g., betweenness Edge properties
  • 5. Network Properties • Degree distribution: Frequency of degree sequences • Size: number of nodes (n) • Density: real relations divided by the maximum possible relations • Diameter: the length of the longest path • Average degree of separation:Average length of all possible shorted path UCINET: Network>Cohesion>Density
  • 6. Mode of network • One-mode network ‣ Friendship ‣ Collaboration e.g., User-paper represented by 2-mode network • Two-mode network—bipartite network ‣ User-borrowed book, co-bought ‣ Affiliation network— e.g., Member-Guild, Employee-Company
  • 9. • Degree How many resource do you have? • Closeness How far apart are you from others? • Betweenness How important are you for bridging sub-communities? • Centralization How balanced are actors’ centrality? Centrality Individual level Global level
  • 10. • Density How does the network tied together? • Separation, Diameter How far apart are you and your friends? • Cluster Coefficient How do your neighbors be connected? Individual level Global level
  • 11. Visualization through analysis process 1. Take a look 2. Analyze and find significant features such as sub- components or special positions 3. Draw the network according to the result of analysis 4. Color by the node features (e.g., sex, position, ...) and create hypothesis 5. Verify the hypothesis
  • 12. • Ego-network Analysis - - • Partial Network Analysis - One, two or three steps network two steps network - Boundary or sub-cluster of network • Whole Network Analysis - / Motif - Levels of network analysis
  • 13. • Data is recorded with a clear natural-occurring boundary and nodes in a boundary form a finite set. • What should be a possible boundary? ‣ A fixed location or room, specified time or day, a finite contact tracing, a formal group in an organization, a family. ‣ The boundary is known or decided firstly, a priori, to be a network. Policy of recording data
  • 14. • No sampling and tend to include all of the actors in some population(s). • Because network methods focus on relations among actors, actors cannot be sampled independently to be included as observations. Policy of recording data (2)
  • 15. • positivity A Priori metaphysics - • - • - - Butts, Carter T. "Revisiting the foundations of network analysis." Science325.5939 (2009): 414-416.
  • 16. • Closed Complete - finite set - • Singularity - • Consistency - Butts, Carter T. "Revisiting the foundations of network analysis." Science325.5939 (2009): 414-416.
  • 17. • Different relation sampling policy will cause different results—Threshold effects on network properties • Threshold Threshold • Threshold 0 Connectedness Betweenness • Threshold Betweenness Degree Betweenness • facebook 10 Application
  • 18. • Full network data is necessary to properly define and measure many of the structural concepts of network analysis (e.g. between-ness), however, very expensive. • Snowball methods begin with a focal actor or set of actors until no new actors are identified, or until we decide to stop. - Useful to track down “special” population such as business contact networks, community elites, deviant sub-cultures, avid stamp collectors, and kinship networks. - The snowball method may tend to overstate the "connectedness" and "solidarity" of populations of actors. - There is no guaranteed way of finding all of the connected individuals in the population. - How to select the first node (initial problem of sampling)? - Incomplete problem of the snowball methods can be solved by use of multiple initial nodes. Methods of sampling ties
  • 20. X Crossed-edges X Uninformed-edge length X Overlapped nodes and edges
  • 21.
  • 22.
  • 23.
  • 24. A B C D E F G H I J A 0 1 1 1 0 1 0 0 0 0 B 1 0 0 1 1 0 1 0 0 0 C 1 0 0 1 0 1 0 0 0 0 D 1 1 1 0 1 1 1 0 0 0 E 0 1 0 1 0 0 1 0 0 0 F 1 0 1 1 0 0 1 1 0 0 G 0 1 0 1 1 1 0 1 0 0 H 0 0 0 0 0 1 1 0 1 0 I 0 0 0 0 0 0 0 1 0 1 J 0 0 0 0 0 0 0 0 1 0 Adjacent matrix degree of B Symmetric M(1,4)=1, M(1,5)=0
  • 25. Homans(1951) Metrics representation and manipulation A B C D E F G H A 1 1 1 1 1 B 1 1 1 C 1 1 1 1 D 1 1 1 E 1 1 1 F 1 1 1 G 1 1 1 H 1 1 1 1 D E C H A B F G D 1 1 1 E 1 1 1 C 1 1 1 1 H 1 1 1 1 A 1 1 1 1 1 B 1 1 1 F 1 1 1 G 1 1 1