SlideShare une entreprise Scribd logo
Social Network Analysis
Eytan Adar
590AI
Some content from Lada Adamic
Vocabulary Lesson
Actor
Relational Tie
parentOf
supervisorOf
reallyHates (+/-)
…
Dyad
Person
Group
Event
…
Relation: collection of ties of a specific type
(every parentOf tie)
Vocabulary Lesson
Triad
If A likes B and B likes C then A likes C (transitivity)
If A likes B and C likes B then A likes C
…
Vocabulary Lesson
Social
Network
One mode
Vocabulary Lesson
Social
Network
Two mode
Vocabulary Lesson
Ego-Centered
Network
(egonet)
ego
Describing Networks
• Graph theoretic
– Nodes/edges, what you’d expect
• Sociometric
– Sociomatrix (2D matrix representation)
– Sociogram (the adjacency matrix)
• Algebraic
– ni  nj
– Also what you’d expect
• Basically complimentary
Stanford
Describing Networks
MIT
Describing Networks
• Geodesic
– shortest_path(n,m)
• Diameter
– max(geodesic(n,m)) n,m actors in graph
• Density
– Number of existing edges / All possible edges
• Degree distribution
Types of Networks/Models
• A few quick examples
– Erdős–Rényi
• G(n,M): randomly draw M edges between n nodes
• Does not really model the real world
– Average connectivity on nodes conserved
Types of Networks/Models
• A few quick examples
– Erdős–Rényi
– Small World
• Watts-Strogatz
• Kleinberg lattice model
NE
MA
Milgram’s experiment (1960’s):
Given a target individual and a particular property, pass the message to a person
you correspond with who is “closest” to the target.
Small world experiments then
Watts-Strogatz Ring Lattice Rewiring
• As in many network generating algorithms
• Disallow self-edges
• Disallow multiple edges
Select a fraction p of
edges
Reposition on of their
endpoints
Add a fraction p of
additional edges leaving
underlying lattice intact
NE
MA
Geographical search
Kleinberg Lattice Model
nodes are placed on a lattice and
connect to nearest neighbors
additional links placed with puv ~ r
uv
d
Kleinberg, ‘The Small World Phenomenon, An Algorithmic Perspective’
(Nature 2000)
A little more on degree distribution
• Power-laws, zipf, etc.
Distribution of users among
web sites
CDF of users to sites
Sites ranked by popularity
A little more on degree distribution
• Pareto/Power-law
– Pareto: CDF P[X > x] ~ x-k
– Power-law: PDF P[X = x] ~ x-(k+1) = x-a
– Some recent debate (Aaron Clauset)
• http://arxiv.org/abs/0706.1062
• Zipf
– Frequency versus rank y ~ r-b (small b)
• More info:
– Zipf, Power-laws, and Pareto – a ranking tutorial
(http://www.hpl.hp.com/research/idl/papers/ranking
/ranking.html)
Types of Networks/Models
• A few quick examples
– Erdős–Rényi
– Small World
• Watts-Strogatz
• Kleinberg lattice model
– Preferential Attachment
• Generally attributed to Barabási & Albert
Basic BA-model
• Very simple algorithm to implement
– start with an initial set of m0 fully connected nodes
• e.g. m0 = 3
– now add new vertices one by one, each one with exactly m
edges
– each new edge connects to an existing vertex in proportion
to the number of edges that vertex already has →
preferential attachment
Properties of the BA graph
• The distribution is scale free with exponent a = 3
P(k) = 2 m2/k3
• The graph is connected
– Every new vertex is born with a link or several links
(depending on whether m = 1 or m > 1)
– It then connects to an ‘older’ vertex, which itself
connected to another vertex when it was introduced
– And we started from a connected core
• The older are richer
– Nodes accumulate links as time goes on, which gives older
nodes an advantage since newer nodes are going to attach
preferentially – and older nodes have a higher degree to
tempt them with than some new kid on the block
Common Tasks
• Measuring “importance”
– Centrality, prestige
• Link prediction
• Diffusion modeling
– Epidemiological
• Clustering
– Blockmodeling, Girvan-Newman
• Structure analysis
– Motifs, Isomorphisms, etc.
• Visualization/Privacy/etc.
Data Collection / Cleaning
Analysis
Past
Data Collection / Cleaning
Analysis
Small datasets
Pretty explicit connections
Understand the properties
Past
Present
Data Collection / Cleaning
Analysis
Large datasets
Entity resolution
Implicit connections
Understand the properties
Present
Common Tasks
• Measuring “importance”
– Centrality, prestige (incoming links)
• Link prediction
• Diffusion modeling
– Epidemiological
• Clustering
– Blockmodeling, Girvan-Newman
• Structure analysis
– Motifs, Isomorphisms, etc.
• Visualization/Privacy/etc.
Centrality Measures
• Degree centrality
– Edges per node (the more, the more important the node)
• Closeness centrality
– How close the node is to every other node
• Betweenness centrality
– How many shortest paths go through the edge node
(communication metaphor)
• Information centrality
– All paths to other nodes weighted by path length
• Bibliometric + Internet style
– PageRank
Tie Strength
• Strength of Weak Ties (Granovetter)
– Granovetter: How often did you see the contact that helped you find the job prior
to the job search
• 16.7 % often (at least once a week)
• 55.6% occasionally (more than once a year but less than twice a week)
• 27.8% rarely – once a year or less
– Weak ties will tend to have different information than we and our close contacts
do
weak ties will tend to have high
beweenness and low transitivity
Common Tasks
• Measuring “importance”
– Centrality, prestige (incoming links)
• Link prediction
• Diffusion modeling
– Epidemiological
• Clustering
– Blockmodeling, Girvan-Newman
• Structure analysis
– Motifs, Isomorphisms, etc.
• Visualization/Privacy/etc.
Link Prediction
?
Link Prediction in Social Net Data
• We know things about structure
– Homophily = like likes like or bird of a feather flock
together or similar people group together
– Mutuality
– Triad closure
• Various measures that try to use this
Link Prediction
• Simple metrics
– Only take into
account graph
properties
Liben-Nowell, Kleinberg (CIKM’03)
( ) ( )
1
log | ( ) |
z x y z
  

Γ(x) = neighbors of x
Originally: 1 / log(frequency(z))
Link Prediction
• Simple metrics
– Only take into
account graph
properties
Liben-Nowell, Kleinberg (CIKM’03)
,
1
| |
l l
x y
l
paths


 


Paths of length l (generally 1)
from x to y
weighted variant is the number of
times the two collaborated
Link Prediction in Relational Data
• We know things about structure
– Homophily = like likes like or bird of a feather flock
together or similar people group together
– Mutuality
– Triad closure
• Slightly more interesting problem if we have
relational data on actors and ties
– Move beyond structure
Relationship & Link Prediction
advisorOf?
Employee /contractor
Salary
Time at company
…
Link/Label Prediction in Relational Data
• Koller and co.
– Relational Bayesian Networks
– Relational Markov Networks
• Structure (subgraph templates/cliques)
– Similar context
– Transitivity
• Getoor and co.
– Relationship Identification for Social Network Discovery
• Diehl/Namata/Getoor AAAI’07
– Enron data
• Traffic statistics and content to find supervisory relationships?
– Traffic/Text based
– Not really identification, more like ranking
Common Tasks
• Measuring “importance”
– Centrality, prestige (incoming links)
• Link prediction
• Diffusion modeling
– Epidemiological
• Clustering
– Blockmodeling, Girvan-Newman
• Structure analysis
– Motifs, Isomorphisms, etc.
• Visualization/Privacy/etc.
Epidemiological
• Viruses
– Biological, computational
– STDs, needle sharing, etc.
– Mark Handcock at UW
• Blog networks
– Applying SIR models (Info Diffusion Through Blogspace, Gruhl et
al.)
• Induce transmission graph, cascade models, simulation
– Link prediction (Tracking Information Epidemics in Blogspace,
Adar et al.)
• Find repeated “likely” infections
– Outbreak detection (Cost-effective Outbreak Detection in
Networks, Leskovec et al.)
• Submodularity
Common Tasks
• Measuring “importance”
– Centrality, prestige (incoming links)
• Link prediction
• Diffusion modeling
– Epidemiological
• Clustering
– Blockmodeling, Girvan-Newman
• Structure analysis
– Motifs, Isomorphisms, etc.
• Visualization/Privacy/etc.
Domingo
Carlos
Alejandro
Eduardo
Frank
Hal
Karl
Bob
Ike
Gill
Lanny
Mike
John
Xavier
Utrecht
Norm
Russ
Quint
Wendle
Ozzie
Ted
Sam
Vern
Paul
Blockmodels
• Actors are portioned into positions
– Rearrange rows/columns
• The sociomatrix is then reduced to a smaller
image
• Hierarchical clustering
– Various distance metrics
• Euclidean, CONvergence of CORrelation (CONCOR)
• Various “fit” metrics
Cohesion Center-periphery Ranking
Image matrix
Girvan-Newman Algorithm
• Split on shortest paths (“weak ties”)
1. Calculate betweenness on all edges
2. Remove highest betweenness edge
3. Recalculate
4. Goto 1
Other solutions
• Min-cut based
• “Voltage” based
• Hierarchical schemes
Common Tasks
• Measuring “importance”
– Centrality, prestige (incoming links)
• Link prediction
• Diffusion modeling
– Epidemiological
• Clustering
– Blockmodeling, Girvan-Newman
• Structure analysis
– Motifs, Isomorphisms, etc.
• Visualization/Privacy/etc.
Network motif detection
• How many more motifs of a certain type exist
over a random network
• Started in biological networks
– http://www.weizmann.ac.il/mcb/UriAlon/
Basic idea
• construct many random graphs with the same
number of nodes and edges (same node
degree distribution?)
• count the number of motifs in those graphs
• calculate the Z score: the probability that the
given number of motifs in the real world
network could have occurred by chance
Generating random graphs
• Many models don’t preserve the desired
features
• Have to be careful how we generate
Other Structural Analysis
sisterOf
Find all
Common Tasks
• Measuring “importance”
– Centrality, prestige (incoming links)
• Link prediction
• Diffusion modeling
– Epidemiological
• Clustering
– Blockmodeling, Girvan-Newman
• Structure analysis
– Motifs, Isomorphisms, etc.
• Visualization/Privacy/etc.
Privacy
• Emerging interest in anonymizing networks
– Lars Backstrom (WWW’07) demonstrated one of
the first attacks
• How to remove labels while preserving graph
properties?
– While ensuring that labels cannot be reapplied
Network attacks
• Terrorist networks
– How to attack them
– How they might attack us
• Carley at CMU
Software
• Pajek
– http://vlado.fmf.uni-lj.si/pub/networks/pajek/
• UCINET
– http://www.analytictech.com/
• KrackPlot
– http://www.andrew.cmu.edu/user/krack/krackplot.shtml
• GUESS
– http://www.graphexploration.org
• Etc.
Books/Journals/Conferences
• Social Networks/Phs. Rev
• Social Network Analysis (Wasserman + Faust)
• The Development of Social Network Analysis
(Freeman)
• Linked (Barabsi)
• Six Degrees (Watts)
• Sunbelt/ICWSM/KDD/CIKM/NIPS
Questions?
Assortativity
• Social networks are assortative:
– the gregarious people associate with other gregarious people
– the loners associate with other loners
• The Internet is disassorative:
Assortative:
hubs connect to hubs
Random
Disassortative:
hubs are in the periphery

Contenu connexe

Similaire à social.pptx

EgoSystem: Presentation to LITA, American Library Association, Nov 8 2014
EgoSystem: Presentation to LITA, American Library Association, Nov 8 2014EgoSystem: Presentation to LITA, American Library Association, Nov 8 2014
EgoSystem: Presentation to LITA, American Library Association, Nov 8 2014
James Powell
 
Tutorial 6 (web graph attributes)
Tutorial 6 (web graph attributes)Tutorial 6 (web graph attributes)
Tutorial 6 (web graph attributes)
Kira
 
Social network analysis
Social network analysisSocial network analysis
Social network analysis
Caleb Jones
 
Graph Based Machine Learning with Applications to Media Analytics
Graph Based Machine Learning with Applications to Media AnalyticsGraph Based Machine Learning with Applications to Media Analytics
Graph Based Machine Learning with Applications to Media Analytics
NYC Predictive Analytics
 
Social network analysis
Social network analysisSocial network analysis
Social network analysis
FEG
 
Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...
Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...
Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...
Denis Parra Santander
 
Graphical Models 4dummies
Graphical Models 4dummiesGraphical Models 4dummies
Graphical Models 4dummies
xamdam
 
02 Descriptive Statistics (2017)
02 Descriptive Statistics (2017)02 Descriptive Statistics (2017)
02 Descriptive Statistics (2017)
Duke Network Analysis Center
 
Graph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear AlgebraGraph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear Algebra
Jason Riedy
 
Natural Language Processing in R (rNLP)
Natural Language Processing in R (rNLP)Natural Language Processing in R (rNLP)
Natural Language Processing in R (rNLP)
fridolin.wild
 
Data Science and Analytics Brown Bag
Data Science and Analytics Brown BagData Science and Analytics Brown Bag
Data Science and Analytics Brown Bag
DataTactics
 
Data Tactics Data Science Brown Bag (April 2014)
Data Tactics Data Science Brown Bag (April 2014)Data Tactics Data Science Brown Bag (April 2014)
Data Tactics Data Science Brown Bag (April 2014)
Rich Heimann
 
Social Network Analysis - Lecture 4 in Introduction to Computational Social S...
Social Network Analysis - Lecture 4 in Introduction to Computational Social S...Social Network Analysis - Lecture 4 in Introduction to Computational Social S...
Social Network Analysis - Lecture 4 in Introduction to Computational Social S...
Lauri Eloranta
 
Machine Learning Summary for Caltech2
Machine Learning Summary for Caltech2Machine Learning Summary for Caltech2
Machine Learning Summary for Caltech2
Lukas Mandrake
 
KNN
KNNKNN
ESWC 2011 BLOOMS+
ESWC 2011 BLOOMS+ ESWC 2011 BLOOMS+
ESWC 2011 BLOOMS+
Prateek Jain
 
Mining the social web 6
Mining the social web 6Mining the social web 6
Mining the social web 6
HyeonSeok Choi
 
Radcliffe
RadcliffeRadcliffe
data clean.ppt
data clean.pptdata clean.ppt
data clean.ppt
chatbot9
 
Multi-Model Data Query Languages and Processing Paradigms
Multi-Model Data Query Languages and Processing ParadigmsMulti-Model Data Query Languages and Processing Paradigms
Multi-Model Data Query Languages and Processing Paradigms
Jiaheng Lu
 

Similaire à social.pptx (20)

EgoSystem: Presentation to LITA, American Library Association, Nov 8 2014
EgoSystem: Presentation to LITA, American Library Association, Nov 8 2014EgoSystem: Presentation to LITA, American Library Association, Nov 8 2014
EgoSystem: Presentation to LITA, American Library Association, Nov 8 2014
 
Tutorial 6 (web graph attributes)
Tutorial 6 (web graph attributes)Tutorial 6 (web graph attributes)
Tutorial 6 (web graph attributes)
 
Social network analysis
Social network analysisSocial network analysis
Social network analysis
 
Graph Based Machine Learning with Applications to Media Analytics
Graph Based Machine Learning with Applications to Media AnalyticsGraph Based Machine Learning with Applications to Media Analytics
Graph Based Machine Learning with Applications to Media Analytics
 
Social network analysis
Social network analysisSocial network analysis
Social network analysis
 
Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...
Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...
Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...
 
Graphical Models 4dummies
Graphical Models 4dummiesGraphical Models 4dummies
Graphical Models 4dummies
 
02 Descriptive Statistics (2017)
02 Descriptive Statistics (2017)02 Descriptive Statistics (2017)
02 Descriptive Statistics (2017)
 
Graph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear AlgebraGraph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear Algebra
 
Natural Language Processing in R (rNLP)
Natural Language Processing in R (rNLP)Natural Language Processing in R (rNLP)
Natural Language Processing in R (rNLP)
 
Data Science and Analytics Brown Bag
Data Science and Analytics Brown BagData Science and Analytics Brown Bag
Data Science and Analytics Brown Bag
 
Data Tactics Data Science Brown Bag (April 2014)
Data Tactics Data Science Brown Bag (April 2014)Data Tactics Data Science Brown Bag (April 2014)
Data Tactics Data Science Brown Bag (April 2014)
 
Social Network Analysis - Lecture 4 in Introduction to Computational Social S...
Social Network Analysis - Lecture 4 in Introduction to Computational Social S...Social Network Analysis - Lecture 4 in Introduction to Computational Social S...
Social Network Analysis - Lecture 4 in Introduction to Computational Social S...
 
Machine Learning Summary for Caltech2
Machine Learning Summary for Caltech2Machine Learning Summary for Caltech2
Machine Learning Summary for Caltech2
 
KNN
KNNKNN
KNN
 
ESWC 2011 BLOOMS+
ESWC 2011 BLOOMS+ ESWC 2011 BLOOMS+
ESWC 2011 BLOOMS+
 
Mining the social web 6
Mining the social web 6Mining the social web 6
Mining the social web 6
 
Radcliffe
RadcliffeRadcliffe
Radcliffe
 
data clean.ppt
data clean.pptdata clean.ppt
data clean.ppt
 
Multi-Model Data Query Languages and Processing Paradigms
Multi-Model Data Query Languages and Processing ParadigmsMulti-Model Data Query Languages and Processing Paradigms
Multi-Model Data Query Languages and Processing Paradigms
 

Plus de NISHASOMSCS113

Building blocks of Algblocks of Alg.pptx
Building blocks of Algblocks of Alg.pptxBuilding blocks of Algblocks of Alg.pptx
Building blocks of Algblocks of Alg.pptx
NISHASOMSCS113
 
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
NISHASOMSCS113
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
NISHASOMSCS113
 
Exception handling.pptx
Exception handling.pptxException handling.pptx
Exception handling.pptx
NISHASOMSCS113
 
Introduction to Information Storage.pptx
Introduction to Information Storage.pptxIntroduction to Information Storage.pptx
Introduction to Information Storage.pptx
NISHASOMSCS113
 
recursion.ppt
recursion.pptrecursion.ppt
recursion.ppt
NISHASOMSCS113
 
Data Management.pptx
Data Management.pptxData Management.pptx
Data Management.pptx
NISHASOMSCS113
 
intro to sna.ppt
intro to sna.pptintro to sna.ppt
intro to sna.ppt
NISHASOMSCS113
 
intro.ppt
intro.pptintro.ppt
intro.ppt
NISHASOMSCS113
 

Plus de NISHASOMSCS113 (9)

Building blocks of Algblocks of Alg.pptx
Building blocks of Algblocks of Alg.pptxBuilding blocks of Algblocks of Alg.pptx
Building blocks of Algblocks of Alg.pptx
 
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
Exception handling.pptx
Exception handling.pptxException handling.pptx
Exception handling.pptx
 
Introduction to Information Storage.pptx
Introduction to Information Storage.pptxIntroduction to Information Storage.pptx
Introduction to Information Storage.pptx
 
recursion.ppt
recursion.pptrecursion.ppt
recursion.ppt
 
Data Management.pptx
Data Management.pptxData Management.pptx
Data Management.pptx
 
intro to sna.ppt
intro to sna.pptintro to sna.ppt
intro to sna.ppt
 
intro.ppt
intro.pptintro.ppt
intro.ppt
 

Dernier

AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
architagupta876
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
Madan Karki
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
Madan Karki
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 

Dernier (20)

AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 

social.pptx

  • 1. Social Network Analysis Eytan Adar 590AI Some content from Lada Adamic
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Vocabulary Lesson Actor Relational Tie parentOf supervisorOf reallyHates (+/-) … Dyad Person Group Event … Relation: collection of ties of a specific type (every parentOf tie)
  • 7. Vocabulary Lesson Triad If A likes B and B likes C then A likes C (transitivity) If A likes B and C likes B then A likes C …
  • 11. Describing Networks • Graph theoretic – Nodes/edges, what you’d expect • Sociometric – Sociomatrix (2D matrix representation) – Sociogram (the adjacency matrix) • Algebraic – ni  nj – Also what you’d expect • Basically complimentary
  • 13. Describing Networks • Geodesic – shortest_path(n,m) • Diameter – max(geodesic(n,m)) n,m actors in graph • Density – Number of existing edges / All possible edges • Degree distribution
  • 14. Types of Networks/Models • A few quick examples – Erdős–Rényi • G(n,M): randomly draw M edges between n nodes • Does not really model the real world – Average connectivity on nodes conserved
  • 15. Types of Networks/Models • A few quick examples – Erdős–Rényi – Small World • Watts-Strogatz • Kleinberg lattice model
  • 16. NE MA Milgram’s experiment (1960’s): Given a target individual and a particular property, pass the message to a person you correspond with who is “closest” to the target. Small world experiments then
  • 17. Watts-Strogatz Ring Lattice Rewiring • As in many network generating algorithms • Disallow self-edges • Disallow multiple edges Select a fraction p of edges Reposition on of their endpoints Add a fraction p of additional edges leaving underlying lattice intact
  • 19. Kleinberg Lattice Model nodes are placed on a lattice and connect to nearest neighbors additional links placed with puv ~ r uv d Kleinberg, ‘The Small World Phenomenon, An Algorithmic Perspective’ (Nature 2000)
  • 20.
  • 21. A little more on degree distribution • Power-laws, zipf, etc. Distribution of users among web sites CDF of users to sites Sites ranked by popularity
  • 22. A little more on degree distribution • Pareto/Power-law – Pareto: CDF P[X > x] ~ x-k – Power-law: PDF P[X = x] ~ x-(k+1) = x-a – Some recent debate (Aaron Clauset) • http://arxiv.org/abs/0706.1062 • Zipf – Frequency versus rank y ~ r-b (small b) • More info: – Zipf, Power-laws, and Pareto – a ranking tutorial (http://www.hpl.hp.com/research/idl/papers/ranking /ranking.html)
  • 23. Types of Networks/Models • A few quick examples – Erdős–Rényi – Small World • Watts-Strogatz • Kleinberg lattice model – Preferential Attachment • Generally attributed to Barabási & Albert
  • 24. Basic BA-model • Very simple algorithm to implement – start with an initial set of m0 fully connected nodes • e.g. m0 = 3 – now add new vertices one by one, each one with exactly m edges – each new edge connects to an existing vertex in proportion to the number of edges that vertex already has → preferential attachment
  • 25. Properties of the BA graph • The distribution is scale free with exponent a = 3 P(k) = 2 m2/k3 • The graph is connected – Every new vertex is born with a link or several links (depending on whether m = 1 or m > 1) – It then connects to an ‘older’ vertex, which itself connected to another vertex when it was introduced – And we started from a connected core • The older are richer – Nodes accumulate links as time goes on, which gives older nodes an advantage since newer nodes are going to attach preferentially – and older nodes have a higher degree to tempt them with than some new kid on the block
  • 26. Common Tasks • Measuring “importance” – Centrality, prestige • Link prediction • Diffusion modeling – Epidemiological • Clustering – Blockmodeling, Girvan-Newman • Structure analysis – Motifs, Isomorphisms, etc. • Visualization/Privacy/etc.
  • 27. Data Collection / Cleaning Analysis
  • 28. Past
  • 29. Data Collection / Cleaning Analysis Small datasets Pretty explicit connections Understand the properties Past
  • 31. Data Collection / Cleaning Analysis Large datasets Entity resolution Implicit connections Understand the properties Present
  • 32. Common Tasks • Measuring “importance” – Centrality, prestige (incoming links) • Link prediction • Diffusion modeling – Epidemiological • Clustering – Blockmodeling, Girvan-Newman • Structure analysis – Motifs, Isomorphisms, etc. • Visualization/Privacy/etc.
  • 33. Centrality Measures • Degree centrality – Edges per node (the more, the more important the node) • Closeness centrality – How close the node is to every other node • Betweenness centrality – How many shortest paths go through the edge node (communication metaphor) • Information centrality – All paths to other nodes weighted by path length • Bibliometric + Internet style – PageRank
  • 34. Tie Strength • Strength of Weak Ties (Granovetter) – Granovetter: How often did you see the contact that helped you find the job prior to the job search • 16.7 % often (at least once a week) • 55.6% occasionally (more than once a year but less than twice a week) • 27.8% rarely – once a year or less – Weak ties will tend to have different information than we and our close contacts do weak ties will tend to have high beweenness and low transitivity
  • 35. Common Tasks • Measuring “importance” – Centrality, prestige (incoming links) • Link prediction • Diffusion modeling – Epidemiological • Clustering – Blockmodeling, Girvan-Newman • Structure analysis – Motifs, Isomorphisms, etc. • Visualization/Privacy/etc.
  • 37. Link Prediction in Social Net Data • We know things about structure – Homophily = like likes like or bird of a feather flock together or similar people group together – Mutuality – Triad closure • Various measures that try to use this
  • 38. Link Prediction • Simple metrics – Only take into account graph properties Liben-Nowell, Kleinberg (CIKM’03) ( ) ( ) 1 log | ( ) | z x y z     Γ(x) = neighbors of x Originally: 1 / log(frequency(z))
  • 39. Link Prediction • Simple metrics – Only take into account graph properties Liben-Nowell, Kleinberg (CIKM’03) , 1 | | l l x y l paths       Paths of length l (generally 1) from x to y weighted variant is the number of times the two collaborated
  • 40. Link Prediction in Relational Data • We know things about structure – Homophily = like likes like or bird of a feather flock together or similar people group together – Mutuality – Triad closure • Slightly more interesting problem if we have relational data on actors and ties – Move beyond structure
  • 41. Relationship & Link Prediction advisorOf? Employee /contractor Salary Time at company …
  • 42. Link/Label Prediction in Relational Data • Koller and co. – Relational Bayesian Networks – Relational Markov Networks • Structure (subgraph templates/cliques) – Similar context – Transitivity • Getoor and co. – Relationship Identification for Social Network Discovery • Diehl/Namata/Getoor AAAI’07 – Enron data • Traffic statistics and content to find supervisory relationships? – Traffic/Text based – Not really identification, more like ranking
  • 43. Common Tasks • Measuring “importance” – Centrality, prestige (incoming links) • Link prediction • Diffusion modeling – Epidemiological • Clustering – Blockmodeling, Girvan-Newman • Structure analysis – Motifs, Isomorphisms, etc. • Visualization/Privacy/etc.
  • 44. Epidemiological • Viruses – Biological, computational – STDs, needle sharing, etc. – Mark Handcock at UW • Blog networks – Applying SIR models (Info Diffusion Through Blogspace, Gruhl et al.) • Induce transmission graph, cascade models, simulation – Link prediction (Tracking Information Epidemics in Blogspace, Adar et al.) • Find repeated “likely” infections – Outbreak detection (Cost-effective Outbreak Detection in Networks, Leskovec et al.) • Submodularity
  • 45. Common Tasks • Measuring “importance” – Centrality, prestige (incoming links) • Link prediction • Diffusion modeling – Epidemiological • Clustering – Blockmodeling, Girvan-Newman • Structure analysis – Motifs, Isomorphisms, etc. • Visualization/Privacy/etc.
  • 46.
  • 47.
  • 49. Blockmodels • Actors are portioned into positions – Rearrange rows/columns • The sociomatrix is then reduced to a smaller image • Hierarchical clustering – Various distance metrics • Euclidean, CONvergence of CORrelation (CONCOR) • Various “fit” metrics
  • 51. Girvan-Newman Algorithm • Split on shortest paths (“weak ties”) 1. Calculate betweenness on all edges 2. Remove highest betweenness edge 3. Recalculate 4. Goto 1
  • 52. Other solutions • Min-cut based • “Voltage” based • Hierarchical schemes
  • 53. Common Tasks • Measuring “importance” – Centrality, prestige (incoming links) • Link prediction • Diffusion modeling – Epidemiological • Clustering – Blockmodeling, Girvan-Newman • Structure analysis – Motifs, Isomorphisms, etc. • Visualization/Privacy/etc.
  • 54.
  • 55.
  • 56. Network motif detection • How many more motifs of a certain type exist over a random network • Started in biological networks – http://www.weizmann.ac.il/mcb/UriAlon/
  • 57. Basic idea • construct many random graphs with the same number of nodes and edges (same node degree distribution?) • count the number of motifs in those graphs • calculate the Z score: the probability that the given number of motifs in the real world network could have occurred by chance
  • 58.
  • 59. Generating random graphs • Many models don’t preserve the desired features • Have to be careful how we generate
  • 61. Common Tasks • Measuring “importance” – Centrality, prestige (incoming links) • Link prediction • Diffusion modeling – Epidemiological • Clustering – Blockmodeling, Girvan-Newman • Structure analysis – Motifs, Isomorphisms, etc. • Visualization/Privacy/etc.
  • 62. Privacy • Emerging interest in anonymizing networks – Lars Backstrom (WWW’07) demonstrated one of the first attacks • How to remove labels while preserving graph properties? – While ensuring that labels cannot be reapplied
  • 63. Network attacks • Terrorist networks – How to attack them – How they might attack us • Carley at CMU
  • 64. Software • Pajek – http://vlado.fmf.uni-lj.si/pub/networks/pajek/ • UCINET – http://www.analytictech.com/ • KrackPlot – http://www.andrew.cmu.edu/user/krack/krackplot.shtml • GUESS – http://www.graphexploration.org • Etc.
  • 65. Books/Journals/Conferences • Social Networks/Phs. Rev • Social Network Analysis (Wasserman + Faust) • The Development of Social Network Analysis (Freeman) • Linked (Barabsi) • Six Degrees (Watts) • Sunbelt/ICWSM/KDD/CIKM/NIPS
  • 67. Assortativity • Social networks are assortative: – the gregarious people associate with other gregarious people – the loners associate with other loners • The Internet is disassorative: Assortative: hubs connect to hubs Random Disassortative: hubs are in the periphery