Pseudo-classes are used to define special states of CSS elements. They allow styling elements when a user mouses over, focuses on, visits, or activates them. Common pseudo-classes include :hover, :focus, :visited, and :active. Pseudo-classes can be used with CSS classes and selectors like :first-child to style specific elements, such as styling the first <p> element or changing the color of a link on hover. Pseudo-elements like ::before and ::after allow inserting content before or after elements.
This document provides an introduction to JSON (JavaScript Object Notation). It defines JSON as a text format for storing and transporting data that is easy for humans to read and for machines to parse. The document explains that JSON can represent arbitrary data, can be processed by most programming languages, and is useful for transferring data between computers which may interpret data differently. It provides an example of a JSON string and compares JSON to XML, noting advantages of JSON such as brevity and ease of parsing. The document outlines valid JSON data types and provides examples of JSON variables.
XML stands for Extensible Markup Language and is used to carry and structure data, unlike HTML which is used to display data. XML allows users to define their own tags and is designed to be self-descriptive. XML transports and stores data by focusing on what data is, while HTML displays it by focusing on how it looks. XML does not itself do anything, but rather structures, stores, and transports information.
Sqoop on Spark provides a way to run Sqoop jobs using Apache Spark for parallel data ingestion. It allows Sqoop jobs to leverage Spark's speed and growing community. The key aspects covered are:
- Sqoop jobs can be created and executed on Spark by initializing a Spark context and wrapping Sqoop and Spark initialization.
- Data is partitioned and extracted in parallel using Spark RDDs and map transformations calling Sqoop connector APIs.
- Loading also uses Spark RDDs and map transformations to parallelly load data calling connector load APIs.
- Microbenchmarks show Spark-based ingestion can be significantly faster than traditional MapReduce-based Sqoop for large datasets
GraphFrames: Graph Queries In Spark SQLSpark Summit
GraphFrames provides a unified API for graph queries and algorithms in Apache Spark SQL. It translates graph patterns and algorithms to relational operations optimized by the Spark SQL query optimizer. Materialized views can greatly improve performance of graph queries by enabling efficient join elimination and reordering. An evaluation found GraphFrames outperforms Neo4j for unanchored queries and approaches performance of GraphX for graph algorithms using whole-stage code generation in Spark SQL. Future work includes automatically suggesting optimal views and exploiting data partitioning.
JSON-LD is a set of W3C standards track specifications for representing Linked Data in JSON. It is fully compatible with the RDF data model, but allows developers to work with data entirely within JSON.
More information on JSON-LD can be found at http://json-ld.org/
Neo4j Graph Data Science Training - June 9 & 10 - Slides #6 Graph AlgorithmsNeo4j
This document discusses graph algorithms and how they can be used with Neo4j Graph Data Science (GDS). It provides an overview of common algorithm categories including centrality, community detection, similarity, path finding, and link prediction. For each category, it lists available algorithms in Neo4j GDS and describes their usage and parameters. It also covers algorithm tiers of support, execution modes, and best practices for calling algorithms from Cypher.
This chapter introduces XHTML and covers:
- The transition from HTML to XHTML and XML syntax requirements
- The anatomy of a web page including head, body, and DTD sections
- Common inline and block-level tags for formatting text and elements
- Special characters and how to display them
- Creating hyperlinks within and between pages using absolute and relative linking
The document discusses how property graph databases like Neo4j can model and query relationship data more effectively than relational or other NoSQL databases. It provides examples of modeling user, movie, and product data as graphs and executing queries in Cypher. It also discusses using the Java Core API and Traversal API to navigate graph data and developing recommendation systems and applications for fraud detection by analyzing patterns in user behaviors and connections.
This document defines SGML and discusses its advantages and disadvantages. SGML stands for Standard Generalized Markup Language, which is a system for organizing and tagging elements of a document. It allows authors to markup documents with structural, presentational, and semantic information. Some advantages of SGML include its flexibility, separation of content from appearance, and support of different media types. However, SGML also has disadvantages such as complex DTDs, linking, and software development.
The document describes what an XML Schema is and its key components and purposes. It defines an XML Schema as describing the structure of an XML document, and that it can define elements, attributes, element sequence and number, data types, and default values. It compares XML Schemas to DTDs, noting schemas are more powerful and support namespaces and data types. The document provides examples of using XML Schema to define simple and complex elements, attributes, and restrictions.
XML is a specification for creating custom markup languages. It allows computers to share structured data by defining rules for encoding documents in a format that is both human-readable and machine-readable. XML documents use tags to define the structure and meaning of content. Well-formed XML documents follow syntax rules, while valid documents also conform to semantic rules defined in an external DTD or schema file. This ensures XML documents can be processed and shared reliably across different computers and platforms.
These webinar slides are an introduction to Neo4j and Graph Databases. They discuss the primary use cases for Graph Databases and the properties of Neo4j which make those use cases possible. They also cover the high-level steps of modeling, importing, and querying your data using Cypher and touch on RDBMS to Graph.
Polymorphism refers to a function having the same name but being used in different ways and different scenarios, making programming easier and more intuitive. Polymorphism is a fundamental concept in object-oriented programming that allows one function to display multiple functionalities through inheritance, where a child class inherits all methods from the parent class. In Python, polymorphism can be implemented through classes having different methods with the same name, inheritance where child classes can override parent methods, and by defining functions that can accept different object types.
Spring Data is a high level SpringSource project whose purpose is to unify and ease the access to different kinds of persistence stores, both relational database systems and NoSQL data stores.
Improving Machine Learning using Graph AlgorithmsNeo4j
Graph enhancements to AI and ML are changing the landscape of intelligent applications. In this session, we’ll focus on how using connected features can help improve the accuracy, precision, and recall of machine learning models. You’ll learn how graph algorithms can provide more predictive features as well as aid in feature selection to reduce overfitting. We’ll look at a link prediction example to predict collaboration with measurable improvement when including graph-based features.
This document provides an overview and introduction to analyzing spatial data using Python. It discusses what spatial data is, popular Python libraries for working with spatial data like Fiona, Shapely, GeoPy, and Mapnik, and how to perform spatial analysis tasks in Python such as geocoding, data conversion and visualization. Jupyter notebooks are presented as an interactive environment for exploring spatial data and libraries like Geopandas and PySAL are introduced for performing spatial analysis. Examples analyze Colombian location and point of interest data.
XPath is a language for selecting nodes in an XML document. It uses path expressions that navigate the hierarchical structure of XML. Path expressions select nodes or node-sets using steps, axes, predicates and wildcards. XPath is commonly used with XSLT to transform XML documents into other formats. It contains functions like position(), count(), and last() to retrieve information about nodes.
This document provides a tutorial on how to use various visualization settings in Gephi software. It discusses how to zoom and pan, select nodes, change node and edge colors, toggle 3D view, adjust label sizes and colors, and display node and edge attributes. The tutorial uses a sample airline routes dataset and provides tips on layout and text formatting to improve network visualization.
Using the .gdf file created using the Netvizz Facebook app, these are the steps I took to analyze a friend's Facebook network using Gephi, an open source network visualization software.
Protein functional site prediction using the shotest path graphnew1 2M Beneragama
This document summarizes a presentation on predicting protein functional sites using a shortest-path graph kernel method. The presentation introduces the problem of predicting functional sites on proteins, describes a graph-based approach to represent protein structures, and presents results applying a shortest-path graph kernel and nearest neighbor prediction methods to datasets of catalytic sites and phosphorylation sites. The approach achieved up to 77.1% accuracy on the catalytic site dataset. Future work could include adding more parameters to the graph representations and node labels, improving the method as a web service, and optimizing algorithms for large datasets.
Studying Facebook via Data Extraction: a Netvizz tutorial at the Digital Meth...Digital Methods Initiative
Netvizz is a Facebook application that exports various types of Facebook data in common formats to make it easier for researchers to study Facebook quantitatively. It allows extraction of network and usage data from profiles, pages, and groups. This helps lower the barrier for humanists and social scientists to perform computational analysis of Facebook interactions and structure. Several examples are given analyzing networks of extremist pages and groups to study coordination, broadcasting, expressions of support, and debates around Islam.
SP1: Exploratory Network Analysis with GephiJohn Breslin
ICWSM 2011 Tutorial
Sebastien Heymann and Julian Bilcke
Gephi is an interactive visualization and exploration software for all kinds of networks and relational data: online social networks, emails, communication and financial networks, but also semantic networks, inter-organizational networks and more. Designed to make data navigation and manipulation easy, it aims to fulfill the complete chain from data importing to aesthetics refinements and interaction. Users interact with the visualization and manipulate structures, shapes and colors to reveal hidden properties. The goal is to help data analysts to make hypotheses, intuitively discover patterns or errors in large data collections.
In this tutorial we will provide a hands-on demonstration of the essential functionalities of Gephi, based on a real case scenario: the exploration of student networks from the "Facebook100" dataset (Social Structure of Facebook Networks, Amanda L. Traud et al, 2011). The participants will be guided step by step through the complete chain of representation, manipulation, layout, analysis and aesthetics refinements. Particular focus will be put on filters and metrics for the creation of their first visualizations. They will be incited to compare the hypotheses suggested by their own exploration to the results actually published in the academic paper afterwards. They finally will walk away with the practical knowledge enabling them to use Gephi for their own projects. The tutorial is intended for professionals, researchers and graduates who wish to learn how playing during a network exploration can speed up their studies.
Sébastien Heymann is a Ph.D. Candidate in Computer Science at Université Pierre et Marie Curie, France. His research at the ComplexNetworks team focuses on the dynamics of realworld networks. He leads the Gephi project since 2008, and is the administrator of the Gephi Consortium.
Julian Bilcke is a Software Engineer at ISC-PIF (Complex Systems Institute of Paris, France). He is a founder and a developer for the Gephi project since 2008.
A Fast and Dirty Intro to NetworkX (and D3)Lynn Cherny
Using the python lib NetworkX to calculate stats on a Twitter network, and then display the results in several D3.js visualizations. Links to demos and source files. I'm @arnicas and live at www.ghostweather.com.
This document provides a tutorial on how to use Gephi software to analyze and visualize network graphs. It outlines the basic steps of importing a sample graph file, applying layout algorithms to organize the nodes, calculating metrics, detecting communities, filtering the graph, and exporting/saving the results. The tutorial demonstrates features of Gephi including node ranking, partitioning, and interactive visualization of the graph.
This tutorial document provides instructions for visualizing and analyzing a network dataset in Gephi. It describes the steps to import a network file, perform layout and ranking operations to visualize nodes and edges, calculate metrics about the network, detect communities, filter the network, preview the visualization, and export/save the project file. The tutorial uses a sample network dataset of characters in the novel Les Miserables and guides the user through visualizing and manipulating the network in Gephi.
This document provides an overview of the basics of using Gephi, an open-source software for network visualization and analysis. It describes the main sections and functions of the Gephi interface, including the Overview tab for network setup and measures, the Data Laboratory tab for examining and editing node and edge data, and the Preview tab for configuring and viewing the network visualization. It also explains how to import network data from various file formats, calculate network statistics, manipulate node and edge properties, and save or export the final network project.
Practice discovering biological knowledge using networks approach.Elena Sügis
This practice session gives an overview how to analyze biological data using networks approach. It covers netwokrs topology, data integration, differential expression, network visualization, functional enrichment analysis and retrieving data from external sources. Primarily Cytoscape software is used for this practice session.
Go is an open source programming language designed by Google to be concurrent, garbage collected, and efficient. It has a simple syntax and is used by Google and others to build large distributed systems. Key features include garbage collection, concurrency with goroutines and channels, interfaces without inheritance, and a large standard library.
This document provides a 3-sentence summary of the Wire V9 tutorial:
The tutorial covers the main menu, secondary menu, and other interface elements of Wire V9 such as toolbars, menus, and prompt areas for inputting data. It also describes functions for creating and modifying geometry, transforming objects, and programming wirepaths. Default key bindings are listed to navigate the interface and access common commands.
The document discusses tools for tabletop game design, specifically spreadsheets and two online tools - Playtest and Card Warden. It provides examples of how spreadsheets can be used to track game systems, components, and attributes for balancing purposes. Playtest allows importing a CSV file to generate card layouts while Card Warden facilitates playtesting digitally by shuffling, dealing and manipulating virtual decks. The document demonstrates these tools through examples from the author's games Memory Matters and Ship Deck.
This document provides an overview, features, installation instructions, and tutorials for MONGKIE, an integrated network visualization platform. MONGKIE allows users to analyze interconnected biological data interactively with integrated knowledge and visualization of networks, gene expression, pathways, and more. Key features include importing/exporting networks and gene lists, network exploration, clustering, expression overlay, pathway analysis, and a modular architecture. The document provides instructions for downloading and installing MONGKIE on Windows and Linux, and includes tutorials for importing networks, exploring and clustering networks, and exporting network images.
Swing is a Java GUI widget toolkit that improves upon the older AWT toolkit. It includes common GUI components like JFrame, JPanel, and JLabel. JFrame represents a window, JPanel is used to group and layout components, and JLabel displays text. These components have constructors and methods to create, configure, add, and listen to GUI elements. Layout managers automatically position components and should be used for most applications.
The document provides information about a new team project including contact details for the leads, team structure, expectations, programs and tools used, and Unity basics. It introduces the team members, outlines who to contact for different roles, expects weekly progress on assets, and describes using Google Hangouts, Copy, and Unity fundamentals.
KiCad is an open source electronic design automation software suite that includes schematic design, PCB layout, and 3D viewing tools. It uses standard file formats and has libraries of symbols and footprints that can be edited. The design workflow in KiCad involves using the schematic editor to create circuit diagrams, exporting a netlist, importing it into the PCB layout editor to create PCB artwork and routes, and generating output files for manufacturing. Additional tools allow editing libraries, viewing Gerber files, and performing calculations.
The document describes steps to identify landslide prone areas in Sumedang, Indonesia using GIS. This includes:
1. Importing data like contours, rivers, roads, soil and geology maps.
2. Processing the data by creating a coordinate system, converting vector data to raster, deriving slope from contours, and creating buffers around rivers.
3. Using spatial multi-criteria evaluation to analyze factors like slope, distance to rivers, soil and produce an output map indicating landslide susceptibility, with values from 0-1.
4. Creating a layout map of the results with a legend and exporting it.
Thank you very much for using Quadcept. We are offering the new version 10.3.0 that provides new features, improvements and enhancements for a better development environment and service.
1) The document discusses the basics of GUI programming using Swing in Java, including creating frames, panels, and displaying text, shapes, colors, fonts, and images.
2) It explains how to create a JFrame window, add JPanels, and override the paintComponent method in custom JPanel classes to draw desired graphics.
3) Specific examples are provided for displaying text by drawing strings, using different fonts, colors, and measuring text widths using FontMetrics.
Prepared as part of the IT for Business Intelligence course of MBA @VGSOM, IIT Kharagpur. The tutorial describes how to create an interactive map using the open source software QGIS.
Neo4j + Tableau Visual Analytics - GraphConnect SF 2015 Neo4j
This document discusses integrating Neo4j graph databases with Tableau visualization software. It describes Tableau as a leader in business intelligence and visual analytics and explains that while Tableau typically works with tables, graphs can also be visualized. It then outlines three ways to connect Neo4j to Tableau - using a web data connector, exporting data to a Tableau data extract file, or publishing directly to Tableau Server. Finally, it provides a roadmap for beta releases integrating Neo4j and Tableau by the end of the year and envisions future capabilities to directly represent graph structures in Tableau.
The document is a lesson on Adobe Illustrator prepared by Teacher Wilfred Gile. It introduces vector graphics and Adobe Illustrator, which is a software used to create vector images. It describes how Illustrator allows users to design and edit scalable graphics. The document also outlines how to open Illustrator, create new documents, save and export files in different formats. It explains the advantages of vector graphics such as scalability and smaller file sizes and disadvantages such as difficulty producing photorealistic images.
Creating great Unity games for Windows 10 - Part 1Jiri Danihelka
Unity is a game engine that supports creating 2D and 3D games across many platforms. It uses a scene-based workflow where games are composed of multiple scenes. GameObjects are the basic elements in a scene and have components that define their properties and behaviors. Common components include renderers, audio sources, scripts, and physics components. Unity supports C# and JavaScript for scripting and has an asset store for additional content. It outputs code for multiple platforms through compilation.
COVID-19 and the Level of Cloud Computing Adoption: A Study of Sri Lankan Inf...AimanAthambawa1
The study’s main objective is to analyse the level of cloud computing adoption and usage during COVID-19 in Sri
Lanka, especially in Information Technology (IT) organisations. Using senior IT employees, this study investigates
what extent their organisation adopts with cloud computing, the level of cloud computing usage, current use of
cloud service model, usage of cloud deployment model, preferred cloud service providers and reasons for adopting
and not adopting cloud computing. The study also describes why cloud computing is a solution for new normal
situations and the cloud-enabled services used during and after the COVID-19 pandemic. The finding suggests
that 87.7% of the organisations currently use cloud-enabled services, whereas 12.3% do not and intend to adopt.
Considering the benefits, cloud computing is the solution post COVID-19 pandemic to run the business way
forward.
This PDF delves into the aspects of information security from a forensic perspective, focusing on privacy leaks. It provides insights into the methods and tools used in forensic investigations to uncover and mitigate privacy breaches in mobile and cloud environments.
It's your unstructured data: How to get your GenAI app to production (and spe...Zilliz
So you've successfully built a GenAI app POC for your company -- now comes the hard part: bringing it to production. Aparavi addresses the challenges of AI projects while addressing data privacy and PII. Our Service for RAG helps AI developers and data scientists to scale their app to 1000s to millions of users using corporate unstructured data. Aparavi’s AI Data Loader cleans, prepares and then loads only the relevant unstructured data for each AI project/app, enabling you to operationalize the creation of GenAI apps easily and accurately while giving you the time to focus on what you really want to do - building a great AI application with useful and relevant context. All within your environment and never having to share private corporate data with anyone - not even Aparavi.
LeadMagnet IQ Review: Unlock the Secret to Effortless Traffic and Leads.pdfSelfMade bd
Imagine being able to generate high-quality traffic and leads effortlessly. Sounds like a dream, right? Well, it’s not. It’s called LeadMagnet IQ, and it’s here to revolutionize your marketing efforts.
(Note: Download the paper about this software. After that, click on [Click for Instant Access] inside the paper, and it will take you to the sales page of the product.)
Challenges and Strategies of Digital Transformation.pptxwisdomfishlee
In an era where digital innovation is ubiquitous, executives from various corporations frequently seek insights into the tangible benefits that digital transformation can offer. This document outlines a comprehensive framework that elucidates the concept of digital transformation, highlighting its multifaceted dimensions and the pivotal roles it plays in enhancing business competitiveness.
Develop Secure Enterprise Solutions with iOS Mobile App Development ServicesDamco Solutions
The security of enterprise apps should not be overlooked by organizations. Since these apps handle confidential finance/user data and business operations, ensuring greater security is crucial. That’s why, businesses should hire dedicated iOS mobile application development services providers for creating super-secured enterprise apps. By incorporating sophisticated security mechanisms, these developers make enterprise apps resistant to a range of cyber threats.
Content source - https://www.bizbangboom.com/articles/enterprise-mobile-app-development-with-ios-augmenting-business-security
Read more - https://www.damcogroup.com/ios-application-development-services
Redefining Cybersecurity with AI CapabilitiesPriyanka Aash
In this comprehensive overview of Cisco's latest innovations in cybersecurity, the focus is squarely on resilience and adaptation in the face of evolving threats. The discussion covers the imperative of tackling Mal information, the increasing sophistication of insider attacks, and the expanding attack surfaces in a hybrid work environment. Emphasizing a shift towards integrated platforms over fragmented tools, Cisco introduces its Security Cloud, designed to provide end-to-end visibility and robust protection across user interactions, cloud environments, and breaches. AI emerges as a pivotal tool, from enhancing user experiences to predicting and defending against cyber threats. The blog underscores Cisco's commitment to simplifying security stacks while ensuring efficacy and economic feasibility, making a compelling case for their platform approach in safeguarding digital landscapes.
Uncharted Together- Navigating AI's New Frontiers in LibrariesBrian Pichman
Journey into the heart of innovation where the collaborative spirit between information professionals, technologists, and researchers illuminates the path forward through AI's uncharted territories. This opening keynote celebrates the unique potential of special libraries to spearhead AI-driven transformations. Join Brian Pichman as we saddle up to ride into the history of Artificial Intelligence, how its evolved over the years, and how its transforming today's frontiers. We will explore a variety of tools and strategies that leverage AI including some new ideas that may enhance cataloging, unlock personalized user experiences, or pioneer new ways to access specialized research. As with any frontier exploration, we will confront shared ethical challenges and explore how joint efforts can not only navigate but also shape AI's impact on equitable access and information integrity in special libraries. For the remainder of the conference, we will equip you with a "digital compass" where you can submit ideas and thoughts of what you've learned in sessions for a final reveal in the closing keynote.
Discovery Series - Zero to Hero - Task Mining Session 1DianaGray10
This session is focused on providing you with an introduction to task mining. We will go over different types of task mining and provide you with a real-world demo on each type of task mining in detail.
Mastering OnlyFans Clone App Development: Key Strategies for SuccessDavid Wilson
Dive into the critical elements of OnlyFans clone app development, from understanding user needs and designing engaging platforms to implementing robust monetization strategies and ensuring scalability. Discover how RichestSoft can guide you through the development process, offering expert insights and proven strategies to help you succeed in the competitive market of content monetization.
Finetuning GenAI For Hacking and DefendingPriyanka Aash
Generative AI, particularly through the lens of large language models (LLMs), represents a transformative leap in artificial intelligence. With advancements that have fundamentally altered our approach to AI, understanding and leveraging these technologies is crucial for innovators and practitioners alike. This comprehensive exploration delves into the intricacies of GenAI, from its foundational principles and historical evolution to its practical applications in security and beyond.
The History of Embeddings & Multimodal EmbeddingsZilliz
Frank Liu will walk through the history of embeddings and how we got to the cool embedding models used today. He'll end with a demo on how multimodal RAG is used.
Welcome to Cyberbiosecurity. Because regular cybersecurity wasn't complicated...Snarky Security
How wonderful it is that in our modern age, every bit of our biological data can be digitized, stored, and potentially pilfered by cyber thieves! Isn't it just splendid to think that while scientists are busy pushing the boundaries of biotechnology, hackers could be plotting the next big bio-data heist? This delightful scenario is brought to you by the ever-expanding digital landscape of biology and biotechnology, where the integration of computer science, engineering, and data science transforms our understanding and manipulation of biological systems.
While the fusion of technology and biology offers immense benefits, it also necessitates a careful consideration of the ethical, security, and associated social implications. But let's be honest, in the grand scheme of things, what's a little risk compared to potential scientific achievements? After all, progress in biotechnology waits for no one, and we're just along for the ride in this thrilling, slightly terrifying, adventure.
So, as we continue to navigate this complex landscape, let's not forget the importance of robust data protection measures and collaborative international efforts to safeguard sensitive biological information. After all, what could possibly go wrong?
-------------------------
This document provides a comprehensive analysis of the security implications biological data use. The analysis explores various aspects of biological data security, including the vulnerabilities associated with data access, the potential for misuse by state and non-state actors, and the implications for national and transnational security. Key aspects considered include the impact of technological advancements on data security, the role of international policies in data governance, and the strategies for mitigating risks associated with unauthorized data access.
This view offers valuable insights for security professionals, policymakers, and industry leaders across various sectors, highlighting the importance of robust data protection measures and collaborative international efforts to safeguard sensitive biological information. The analysis serves as a crucial resource for understanding the complex dynamics at the intersection of biotechnology and security, providing actionable recommendations to enhance biosecurity in an digital and interconnected world.
The evolving landscape of biology and biotechnology, significantly influenced by advancements in computer science, engineering, and data science, is reshaping our understanding and manipulation of biological systems. The integration of these disciplines has led to the development of fields such as computational biology and synthetic biology, which utilize computational power and engineering principles to solve complex biological problems and innovate new biotechnological applications. This interdisciplinary approach has not only accelerated research and development but also introduced new capabilities such as gene editing and biomanufact
Choosing the Best Outlook OST to PST Converter: Key Features and Considerationswebbyacad software
When looking for a good software utility to convert Outlook OST files to PST format, it is important to find one that is easy to use and has useful features. WebbyAcad OST to PST Converter Tool is a great choice because it is simple to use for anyone, whether you are tech-savvy or not. It can smoothly change your files to PST while keeping all your data safe and secure. Plus, it can handle large amounts of data and convert multiple files at once, which can save you a lot of time. It even comes with 24*7 technical support assistance and a free trial, so you can try it out before making a decision. Whether you need to recover, move, or back up your data, Webbyacad OST to PST Converter is a reliable option that gives you all the support you need to manage your Outlook data effectively.
Cracking AI Black Box - Strategies for Customer-centric Enterprise ExcellenceQuentin Reul
The democratization of Generative AI is ushering in a new era of innovation for enterprises. Discover how you can harness this powerful technology to deliver unparalleled customer value and securing a formidable competitive advantage in today's competitive market. In this session, you will learn how to:
- Identify high-impact customer needs with precision
- Harness the power of large language models to address specific customer needs effectively
- Implement AI responsibly to build trust and foster strong customer relationships
Whether you're at the early stages of your AI journey or looking to optimize existing initiatives, this session will provide you with actionable insights and strategies needed to leverage AI as a powerful catalyst for customer-driven enterprise success.
Cracking AI Black Box - Strategies for Customer-centric Enterprise Excellence
Gephi Quick Start
1. Tutorial
Quick Start
* Introduction
Gephi Tutorial
*
*
*
Import file
Visualization
Layout
Quick Start
* Ranking (color)
* Metrics
Welcome to this introduction tutorial. It will guide you to the basic steps of network
* Ranking (size) visualization and manipulation in Gephi.
* Layout again
* Show labels Gephi version 0.7alpha2 was used to do this tutorial.
* Community-detection
* Partition Get Gephi
* Filter
* Preview
* Export
* Save
* Conclusion
Last updated March 05th, 2010
2. Tutorial
Quick Start Open Graph File
* Introduction • Download the file LesMiserables.gexf
* Import file
* Visualization • In the menubar, go to File Menu and Open...
* Layout
* Ranking (color)
* Metrics
* Ranking (size)
* Layout again
* Show labels
* Community-detection
* Partition
* Filter
* Preview
* Export
Graph Format
* Save
* Conclusion
- GEXF - Tulip TLP
- GraphML - CSV
- Pajek NET - Compressed ZIP
- GDF
- GML
3. Tutorial
Quick Start Import Report
* Introduction • When your filed is opened, the report sum up data found and issues.
* Import file - Number of nodes
* Visualization - Number of edges
* Layout - Type of graph
* Ranking (color)
* Metrics
* Ranking (size)
* Layout again
* Show labels
* Community-detection
* Partition
* Filter
* Preview
* Export
* Save
* Conclusion
• Click on OK to validate and see the graph
4. Tutorial
Quick Start You should now see a graph
* Introduction We imported “Les Miserables” dataset1. Coappearance weighted network of
* Import file characters in the novel “Les Miserables” from Victor Hugo.
* Visualization
* Layout
* Ranking (color)
* Metrics
* Ranking (size)
* Layout again
* Show labels
* Community-detection
* Partition
* Filter
* Preview
* Export
* Save Nodes position is random at first, so you may see a slighty different representation.
* Conclusion
1
D. E. Knuth, The Stanford GraphBase: A Platform for Combinatorial Computing, Addison-Wesley,
Reading, MA (1993).
5. Tutorial
Quick Start Graph Visualization
* Introduction • Use your mouse to move and scale the visualization
* Import file - Zoom: Mouse Wheel
* Visualization - Pan: Right Mouse Drag
* Layout Zoom
* Ranking (color)
• Locate the “Edge Thickness” slider on the bottom
* Metrics
* Ranking (size)
* Layout again
* Show labels
* Community-detection
Drag
* Partition • If you loose your graph, reset the position
* Filter
* Preview
* Export
* Save
* Conclusion
6. Tutorial
Quick Start Layout the graph
* Introduction Layout algorithms sets the graph shape, it is the most essential action.
* Import file
* Visualization • Locate the Layout module, on the left panel.
* Layout
* Ranking (color) • Choose “Force Atlas”
* Metrics
* Ranking (size) You can see the layout properties below, leave default
values.
* Layout again
* Show labels
* Community-detection • Click on to launch the algorithm
* Partition
* Filter
* Preview
* Export
* Save
* Conclusion
Layout algorithms
Graphs are usually layouted with “Force-based” algorithms. Their principle is easy, linked nodes
attract each other and non-linked nodes are pushed apart.
7. Tutorial
Quick Start Control the layout
* Introduction The purpose of Layout Properties is to let you control the algorithm in order to make a
* Import file aesthetically pleasing representation.
* Visualization
* Layout • Set the “Repulsion strengh” at 10 000 to expand
* Ranking (color) the graph.
* Metrics
* Ranking (size) • Type “Enter” to validate the changed value.
* Layout again
* Show labels
* Community-detection
* Partition
* Filter
* Preview • And now the algorithm.
* Export
* Save
* Conclusion
8. Tutorial
Quick Start You should now see a layouted graph
* Introduction
* Import file
* Visualization
* Layout
* Ranking (color)
* Metrics
* Ranking (size)
* Layout again
* Show labels
* Community-detection
* Partition
* Filter
* Preview
* Export
* Save
* Conclusion
9. Tutorial
Quick Start Ranking (color)
* Introduction Ranking module lets you configure node’s color and size.
* Import file
* Visualization • Locate Ranking module, in the top left.
* Layout
* Ranking (color) • Choose “Degree” as a rank parameter.
* Metrics
* Ranking (size)
* Layout again
* Show labels You should obtain the configuration panel below:
* Community-detection
* Partition
* Filter • Click on to see the result.
* Preview
* Export
* Save
* Conclusion
10. Tutorial
Quick Start Let’s configure colors
* Introduction
* Import file • Move your mouse over the gradient component.
* Visualization
* Layout
* Ranking (color)
* Metrics • Double-click on triangles to configure the color
* Ranking (size)
* Layout again
* Show labels
* Community-detection
* Partition
* Filter
* Preview
* Export
* Save
Palette
* Conclusion
Use palette by right-clicking on the panel.
11. Tutorial
Quick Start Ranking result table
* Introduction You can see rank values by enabling the result table. Valjean has 36 links and is the most
* Import file connected node in the network.
* Visualization
* Layout • Enable table result view at the bottom toolbar
* Ranking (color)
* Metrics
* Ranking (size) • Click again on
* Layout again
* Show labels
* Community-detection
* Partition
* Filter
* Preview
* Export
* Save
* Conclusion
12. Tutorial
Quick Start Metrics
* Introduction We will calculate the average path length for the network. It computes the path length for
* Import file all possibles pairs of nodes and give information about how nodes are close from each other.
* Visualization
* Layout
* Ranking (color)
• Locate the Statistics module on the right panel.
* Metrics
* Ranking (size)
* Layout again
* Show labels • Click on near “Average Path Length”.
* Community-detection
* Partition
* Filter
* Preview
* Export
* Save
Metrics available
* Conclusion
- Diameter - Betweeness Centrality
- Average Path Length - Closeness Centrality
- Clustering Coefficient - Eccentricity
- PageRank - Community Detection
- HITS (Modularity)
13. Tutorial
Quick Start Metric settings
* Introduction The settings panel immediately appears.
* Import file
* Visualization
* Layout
* Ranking (color)
* Metrics
* Ranking (size)
* Layout again
* Show labels
* Community-detection
* Partition
* Filter
* Preview
* Export
* Save
* Conclusion
• Select “Directed” and click on OK to compute the metric.
14. Tutorial
Quick Start Metric result
* Introduction When finished,
* Import file the metric dis-
* Visualization plays its result in
* Layout a report
* Ranking (color)
* Metrics
* Ranking (size)
* Layout again
* Show labels
* Community-detection
* Partition
* Filter
* Preview
* Export
* Save
* Conclusion
15. Tutorial
Quick Start Ranking (size)
* Introduction Metrics generates general reports but also results for each node. Thus three new values
* Import file have been created by the “Average Path Length” algorithm we ran.
* Visualization - Betweeness Centrality
* Layout - Closeness Centrality
* Ranking (color) - Eccentricity
* Metrics
* Ranking (size)
* Layout again
* Show labels • Go back to Ranking
* Community-detection
* Partition • Select “Betweeness Centrality” in the list.
* Filter
This metrics indicates influencial nodes for highest
* Preview
value.
* Export
* Save
* Conclusion
16. Tutorial
Quick Start Ranking (size)
* Introduction The node’s size will be set now. Colors remain the “Degree” indicator.
* Import file
* Visualization • Select the diamond icon in the toolbar for size.
* Layout
* Ranking (color)
• Set a min size at 10 and a max size at 50.
* Metrics
* Ranking (size)
* Layout again
* Show labels
* Community-detection
* Partition
* Filter
* Preview • And click on to see the result.
* Export
* Save
* Conclusion
17. Tutorial
Quick Start You should see a colored and sized graph
* Introduction
* Import file
* Visualization
* Layout
* Ranking (color)
* Metrics
* Ranking (size)
* Layout again
* Show labels
* Community-detection
* Partition
* Filter
* Preview
* Export
* Save
* Conclusion
Color: Degree
Size: Betweeness Centrality metric
18. Tutorial
Quick Start Layout again
* Introduction The layout is not completely satisfying, as big nodes can overlap smaller.
* Import file
* Visualization The “Force Atlas” algorithm has an option to take node size in account when layouting.
* Layout
* Ranking (color)
* Metrics • Go Back to the Layout panel.
* Ranking (size)
* Layout again • Check the “Adjust by Sizes” option and run again the
* Show labels algorithm for short moment.
* Community-detection
* Partition
• You can see nodes are not overlapping anymore.
* Filter
* Preview
* Export
* Save
* Conclusion
19. Tutorial
Quick Start Show labels
* Introduction Let’s explore the network more in details now that colors and size indicates central
* Import file nodes.
* Visualization
* Layout • Display node labels
* Ranking (color)
* Metrics
* Ranking (size)
* Layout again
* Show labels • Set label size proportional to node size
* Community-detection
* Partition
* Filter
* Preview
* Export
* Save • Set label size with the scale slider
* Conclusion
20. Tutorial
Quick Start Community detection
* Introduction The ability to detect and study communities is central in network analysis. We would like
* Import file to colorize clusters in our example.
* Visualization
* Layout Gephi implements the Louvain method1, available from the Statistics panel.
* Ranking (color)
Click on near the “Modularity” line
* Metrics
* Ranking (size)
* Layout again
• Select “Randomize” on the panel.
* Show labels
* Community-detection
* Partition
* Filter • Click on OK to launch the detection.
* Preview
* Export
* Save
* Conclusion
1
Blondel V, Guillaume J, Lambiotte R, Mech E (2008) Fast unfolding of communities in large net-
works. J Stat Mech: Theory Exp 2008:P10008. (http://findcommunities.googlepages.com)
21. Tutorial
Quick Start Partition
* Introduction The community detection algorithm created a “Modularity Class” value for each node.
* Import file
* Visualization The partition module can use this new data to colorize communities.
* Layout
* Ranking (color) • Locate the Partition module on the left panel.
* Metrics
• Immediately click on the “Refresh” button to pop-
* Ranking (size)
ulate the partition list.
* Layout again
* Show labels
* Community-detection
* Partition
* Filter
* Preview
* Export
* Save
How to visualize nodes & edges columns?
* Conclusion
See columns and values for nodes and edges by looking at the Data Table view.
Select Data Laboratory tab and click on “Nodes” to refresh the table.
22. Tutorial
Quick Start Partition
* Introduction • Select “Modularity Class” in the partition list.
* Import file
* Visualization You can see that 9 communities were found, could
* Layout be different for you. A random color has been set for
each community identifier.
* Ranking (color)
* Metrics
* Ranking (size) • Click on to colorize nodes.
* Layout again
* Show labels
* Community-detection
* Partition
* Filter
* Preview
* Export Right-click on the panel to access the Randomize colors action.
* Save
* Conclusion
23. Tutorial
Quick Start What the network looks like now
* Introduction
* Import file
* Visualization
* Layout
* Ranking (color)
* Metrics
* Ranking (size)
* Layout again
* Show labels
* Community-detection
* Partition
* Filter
* Preview
* Export
* Save
* Conclusion
24. Tutorial
Quick Start Filter
* Introduction The last manipulation step is filtering. You create filters that can hide nodes and egdes
* Import file on the network. We will create a filter to remove leaves, i.e. nodes with a single edge.
* Visualization
* Layout • Locate the Filters module on the right panel.
* Ranking (color)
* Metrics • Select “Degree Range” in the “Topology” category.
* Ranking (size)
* Layout again
* Show labels
* Community-detection
* Partition
* Filter • Drag it to the Queries, drop it to “Drag filter here”.
* Preview
* Export
* Save
* Conclusion Drag
25. Tutorial
Quick Start Filter
* Introduction • Click on “Degree Range” to activate the filter. The parameters panel appears.
* Import file
* Visualization
* Layout
* Ranking (color)
It shows a range slider and the chart that represents the data, the degree distribution
* Metrics here.
* Ranking (size)
* Layout again • Move the slider to sets its lower bound to 2.
* Show labels
* Community-detection
* Partition • Enable filtering by pushing the button.
* Filter
* Preview
* Export Nodes with a degree inferior to 2 are now hidden.
* Save
* Conclusion
Tip
You can edit bounds manually by double-clicking on values.
26. Tutorial
Quick Start The filtered network
* Introduction
* Import file
* Visualization
* Layout
* Ranking (color)
* Metrics
* Ranking (size)
* Layout again
* Show labels
* Community-detection
* Partition
* Filter
* Preview
* Export
* Save
* Conclusion
That ends the manipulation. We will now preview the rendering and prepare to export.
27. Tutorial
Quick Start Preview
* Introduction • Before exporting your graph as a SVG or PDF file, go to the Preview to:
* Import file - See exactly how the graph will look like
* Visualization - Put the last touch
* Layout
* Ranking (color)
• Select the “Preview” tab in the banner:
* Metrics
* Ranking (size)
* Layout again
* Show labels
* Community-detection • Click on Refresh to see the preview
* Partition
* Filter
* Preview
* Export
* Save
* Conclusion
Tip
If the graph is big, reduce the “Preview ratio” slider to 50% or 25% to display a partial graph.
28. Tutorial
Quick Start Preview
* Introduction • In the Node properties, find “Show Labels” and
* Import file enable the option.
* Visualization
* Layout • Click on
* Ranking (color)
* Metrics
* Ranking (size)
* Layout again Preview Settings supports Presets, click on the
* Show labels presets list and try different configurations.
* Community-detection
* Partition
* Filter
* Preview
* Export
* Save
* Conclusion
30. Tutorial
Quick Start Export as SVG
* Introduction From Preview, click on SVG near Export.
* Import file
* Visualization
* Layout
* Ranking (color)
* Metrics SVG Files are vectorial graphics, like PDF. Images scale smoothly to different sizes and
* Ranking (size) can therefore be printed or integrated in high-res presentation.
* Layout again
* Show labels Transform and manipulate SVG files in Inkscape or Adobe Illustrator.
* Community-detection
* Partition
* Filter
* Preview
* Export
* Save
* Conclusion
High-resolution screenshots
If you prefer hi-resolution PNG screenshots only, look at the icon in the visualization properties
bar, located at the bottom of the visualization.
31. Tutorial
Quick Start Save your project
* Introduction Saving your project encapsulates all data and results in a single
* Import file session file.
* Visualization
* Layout
* Ranking (color)
* Metrics
* Ranking (size) If you missed some steps, you can download the session:
* Layout again
* Show labels LesMiserables.gephi
* Community-detection
* Partition
* Filter
* Preview
* Export
* Save
* Conclusion
32. Tutorial
Quick Start Conclusion
* Introduction In this tutorial you learned the basic process to open, visualize, manipulate and render
* Import file a network file with Gephi.
* Visualization
* Layout
* Ranking (color)
* Metrics
* Ranking (size)
* Layout again
* Show labels
* Community-detection
* Partition
* Filter
* Preview Go further:
* Export • Gephi Website
* Save • Gephi Wiki
• Gephi forum
* Conclusion