Apresentação de trabalho aprovado no processo de submissão para o I SINS - Autores Fernanda Castello Branco Madeu; Walter Wagner Carvalho Sande, Moacyr Alvim Silva e Ana Carolina Wagner Gouveia de Barros. Vídeo Disponível (02:03:00)
People’s ability to influence others’ opinion on matters of taste varies greatly—both offline and in recommender systems. What are the mechanisms underlying these striking differences? Using the weighted k-nearest neighbors algorithm (k-nn) to represent an array of social learning strategies, we show—leveraging methods from network science—how the k-nn algorithm gives rise to net- works of social influence in six real-world domains of taste. We show three novel results that apply both to offline advice taking and online recommender settings. First, influential individuals have mainstream tastes and high dispersion in their taste similarity with others. Second, the fewer people an individual or algorithm consults (i.e., the lower k is) or the larger the weight placed on the opin- ions of more similar others, the smaller the group of people with substantial influence. Third, the influence networks emerging from deploying the k-nn algorithm are hierarchically organized. Our re- sults shed new light on classic empirical findings in communication and network science and can help improve the understanding of social influence offline and online.
The Mathematics of Social Network Analysis: Metrics for Academic Social NetworksEditor IJCATR
Social network analysis plays an important role in analyzing social relations and patterns of interaction among actors in a
social network. Such networks can be casual, like those on social media sites, or formal, like academic social networks. Each of these
networks is characterised by underlying data which defines various features of the network. Keeping in view the size and diversity of
these networks it may not be possible to dissect entire network with conventional means. Social network visualization can be used to
graphically represent these networks in a concise and easy to understand manner. Social network visualization tools rely heavily on
quantitative features to numerically define various attributes of the network. These features also referred to as social network metrics
used everyday mathematics as their foundations. In this paper we provide an overview of various social network analysis metrics that
are commonly used to analyse social networks. Explanation of these metrics and their relevance for academic social networks is also
outlined
People’s ability to influence others’ opinion on matters of taste varies greatly—both offline and in recommender systems. What are the mechanisms underlying these striking differences? Using the weighted k-nearest neighbors algorithm (k-nn) to represent an array of social learning strategies, we show—leveraging methods from network science—how the k-nn algorithm gives rise to net- works of social influence in six real-world domains of taste. We show three novel results that apply both to offline advice taking and online recommender settings. First, influential individuals have mainstream tastes and high dispersion in their taste similarity with others. Second, the fewer people an individual or algorithm consults (i.e., the lower k is) or the larger the weight placed on the opin- ions of more similar others, the smaller the group of people with substantial influence. Third, the influence networks emerging from deploying the k-nn algorithm are hierarchically organized. Our re- sults shed new light on classic empirical findings in communication and network science and can help improve the understanding of social influence offline and online.
The Mathematics of Social Network Analysis: Metrics for Academic Social NetworksEditor IJCATR
Social network analysis plays an important role in analyzing social relations and patterns of interaction among actors in a
social network. Such networks can be casual, like those on social media sites, or formal, like academic social networks. Each of these
networks is characterised by underlying data which defines various features of the network. Keeping in view the size and diversity of
these networks it may not be possible to dissect entire network with conventional means. Social network visualization can be used to
graphically represent these networks in a concise and easy to understand manner. Social network visualization tools rely heavily on
quantitative features to numerically define various attributes of the network. These features also referred to as social network metrics
used everyday mathematics as their foundations. In this paper we provide an overview of various social network analysis metrics that
are commonly used to analyse social networks. Explanation of these metrics and their relevance for academic social networks is also
outlined
A presentation describing application of Node XL into analyzing social networks.
Made as part of project work for ITB course at VGSOM IIT Kharagpur.
By : Mayank Mohan
Anuradha Chakraborty
( Batch of 2012)
User Identity Linkage: Data Collection, DataSet Biases, Method, Control and A...IIIT Hyderabad
Online Social Networks (OSNs) are popular platforms for online users. Users typically register and maintain their accounts (user identities) across different OSNs to share a variety of content and remain connected with their friends. Consequently, linking user identities across OSN platforms, referred to as user identity linkage (UIL) becomes a critical problem. Solving this problem enables us to build a more comprehensive view of user’s activities across OSNs, which is highly beneficial for targeted advertisements, recommendations, and many more applications. In the thesis, we propose approaches for analyzing data collection methods, investigating biases in identity linkage datasets, linkage of user identities across social networks, control-ability of user identity linkage, and application of user identity linkage solutions to solve related problems.
FAST AND ACCURATE MINING THE COMMUNITY STRUCTURE: INTEGRATING CENTER LOCATING...Nexgen Technology
TO GET THIS PROJECT COMPLETE SOURCE ON SUPPORT WITH EXECUTION PLEASE CALL BELOW CONTACT DETAILS
MOBILE: 9791938249, 0413-2211159, WEB: WWW.NEXGENPROJECT.COM,WWW.FINALYEAR-IEEEPROJECTS.COM, EMAIL:Praveen@nexgenproject.com
NEXGEN TECHNOLOGY provides total software solutions to its customers. Apsys works closely with the customers to identify their business processes for computerization and help them implement state-of-the-art solutions. By identifying and enhancing their processes through information technology solutions. NEXGEN TECHNOLOGY help it customers optimally use their resources.
A presentation describing application of Node XL into analyzing social networks.
Made as part of project work for ITB course at VGSOM IIT Kharagpur.
By : Mayank Mohan
Anuradha Chakraborty
( Batch of 2012)
User Identity Linkage: Data Collection, DataSet Biases, Method, Control and A...IIIT Hyderabad
Online Social Networks (OSNs) are popular platforms for online users. Users typically register and maintain their accounts (user identities) across different OSNs to share a variety of content and remain connected with their friends. Consequently, linking user identities across OSN platforms, referred to as user identity linkage (UIL) becomes a critical problem. Solving this problem enables us to build a more comprehensive view of user’s activities across OSNs, which is highly beneficial for targeted advertisements, recommendations, and many more applications. In the thesis, we propose approaches for analyzing data collection methods, investigating biases in identity linkage datasets, linkage of user identities across social networks, control-ability of user identity linkage, and application of user identity linkage solutions to solve related problems.
FAST AND ACCURATE MINING THE COMMUNITY STRUCTURE: INTEGRATING CENTER LOCATING...Nexgen Technology
TO GET THIS PROJECT COMPLETE SOURCE ON SUPPORT WITH EXECUTION PLEASE CALL BELOW CONTACT DETAILS
MOBILE: 9791938249, 0413-2211159, WEB: WWW.NEXGENPROJECT.COM,WWW.FINALYEAR-IEEEPROJECTS.COM, EMAIL:Praveen@nexgenproject.com
NEXGEN TECHNOLOGY provides total software solutions to its customers. Apsys works closely with the customers to identify their business processes for computerization and help them implement state-of-the-art solutions. By identifying and enhancing their processes through information technology solutions. NEXGEN TECHNOLOGY help it customers optimally use their resources.
Network visualization: Fine-tuning layout techniques for different types of n...Nees Jan van Eck
An important issue in network visualization is the problem of obtaining a good layout for a network. For a given network, which may be either weighted or unweighted, the problem is to position the nodes in the network in a two-dimensional space in such a way that an attractive layout is obtained. Many layout techniques have been proposed [1]. In the visualization of bibliometric networks, multidimensional scaling and the layout technique of Kamada and Kawai [2] have for instance been used a lot. More recently, the VOS (visualization of similarities) layout technique [3], implemented in our VOSviewer software (www.vosviewer.com) [4], is often used for bibliometric network visualization.
There is no layout technique that is generally considered to give optimal results. One reason for this is that comparisons between layouts produced by different techniques involve a lot of subjectiveness. Someone may consider one layout to be more attractive than another, but someone else may have an opposite opinion on this. In addition, the attractiveness of a layout may depend on the type of visualization that is needed. For instance, some layouts may be more attractive for interactive visualizations (e.g., in a software tool with zooming functionality), while other layouts may be more attractive for static visualizations. Furthermore, different types of networks may benefit from different layout techniques.
In recent studies [5, 6], the idea of parameterized layout techniques has been introduced. Parameterized layout techniques produce different types of layouts depending on the values chosen for their parameters. In this research, we present a comprehensive study of a parameterized version of our VOS layout technique. Two parameters are included. Like in [5], these are referred to as attraction and repulsion parameters. We compare the layouts obtained for different parameter values. Comparisons are made both subjectively using the VOSviewer software (i.e., which layout do we find most appealing?) and more objectively using so-called meta-criteria [6, 7]. Sensitivity to local optima is taken into account as well. Comparisons are made for all important types of bibliometric networks, in particular co-authorship, citation, co-citation, bibliographic coupling, and co-occurrence networks. Both smaller and larger networks are considered.
For non-grid 3D images like point clouds and meshes, and inherently graph-based data.
Inherently graph-based data include for example brain connectivity analysis, scientific article citation networks, (social) network analysis, etc.
Alternative download link:
https://www.dropbox.com/s/2o3cofcd6d6e2qt/geometricGraph_deepLearning.pdf?dl=0
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...Xiaohan Zeng
The advent of the social networks has completely changed our daily life. The deluge of data collected on Social Network Services (SNS) and recent developments in complex network theory have enabled many marvelous predictive analysis, which tells us many amazing stories.
Why do we often feel that "the world is so small?" Is the six-degree separation purely imagination or based on mathematical insights? Why are there just a few rockstars who enjoy extreme popularity while most of us stay unknown to the world? When science meets coffee shop knowledge, things are bound to be intriguing.
I will first briefly describe what social networks are, in the mathematical sense. Then I will introduce some ways to extract characteristics of networks, and how these analyses can explain many anecdotes in our life. Finally, I'll show an example of what we can learn from social network analysis, based on data from Groupon.
Similar to Analyzing the formation of groups in a network adapting the modularity concept (20)
Participação do sociólogo e cientista político Paulo Baia durante a realização do II Simpósio Internacional de Network Science no dia 07/11/2018 no Rio de Janeiro
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Analyzing the formation of groups in a network adapting the modularity concept
1. Analyzing the formation of groups in a
network adapting the modularity concept
Ana Carolina Wagner Gouveia de Barros
Fernanda Castello Branco Madeu
Moacyr Alvim Silva
Walter Wagner Carvalho Sande
3. MOTIVATION
• The problem of cutting a graph into “useful” subgraphs is
classical in graph theory – relevant research field.
• Graphs representing data are usually directed.
• Different reasons and motivations for dividing graphs into
smaller components:
– they naturally arise as a consequence of simple interactions
among people and do not require complicated mechanisms to
be obtained and maintained (practical);
– they have some useful properties, such as high internal
connectivity, low path length among nodes and high robustness,
which are of the most importance in real applications
(DUGUË and PEREZ, 2015), (GUIMERA and NUNES AMARAL, 2005), (NICOSIA et. al., 2009).
4. MOTIVATION
• A lot of methods to solve this – “clustering
algorithms” to optimize a graph structure –
guarantee certain desired features.
• Latest studies – algorithms not very useful for
explaining partitioning patterns observed in social
networks, such as the arising of “communities”,
“groups” or “clubs”.
(NICOSIA et. al., 2009).
5. MOTIVATION
COMMUNITY (no precise definition):
“a community is a subgraph containing nodes
which are more densely linked to each other than
to the rest of the graph or, equivalently, a graph
has a community structure if the number of links
into any subgraph is higher than the number of
links between those subgraphs”
(NEWMAN and GIRVAN, 2004)
6. MOTIVATION
• Real–life communities -> groups of strongly
connected nodes (people in a football club,
authors in a co–authorship paper, colleagues
studying in the same school, journals that
cites each other).
• Usually nodes in a community know each
other – probability for two nodes to have a
neighbor in common
(NEWMAN and GIRVAN, 2003), (NEWMAN, 2006),(NEWMAN and JUYONG, 2003),( NICOSIA et. al., 2009).
7. SOCIAL NETWORKS
• Growth dynamics – preferential attachment –
more central nodes have a greater power of
attraction for new connections;
• Directional character;
• Links depend on the connection degree of the
nodes;
(SANDE, 2016)
(BARROS, 2016)
8. • Nodes with higher degree have more centrality;
• Centrality gain is measured in degree of entrance
– great challenge for nodes with less centrality
(peripheral nodes);
• Center-periphery structure.
(SANDE, 2016)
SOCIAL NETWORKS
9. STRATEGIC BEHAVIOR
• Creation of new links between peripheral nodes –
contradicting preferential attachment.
• Peripheral nodes starts linking to each other to increase
their centrality and consequently increasing their
importance;
• These nodes continue to be seen by the rest of the
network as ordinary nodes;
• Strategic group - not necessarily form a community;
(inserted in the community as peripheral nodes);
• Modification of the methods for communities’
identification so that it is possible to identify the
emergence of strategic groups.
(SANDE, 2016)
10. MODULARITY
• G(n,m), A=adjacency matrix, kv = degree of vertex v;
• R groups (communities);
• S is the matrix with elements Svr = 1 if v belongs to
group r and zero otherwise;
• 2 groups (strategic and non-strategic) in a DIRECTED network:
(NEWMAN, 2006)
and
11. STOCHASTIC BLOCK MODEL (SBM)
• Takes the following parameters:
– the number n of vertices;
– a partition of the vertex set {1,...,n} into disjoint R
subsets {C1,..., CR}, called communities;
– a symmetric RxR matrix P of edge probabilities.
• The edge set is then sampled at random as
follows: any two vertices are connected by an
edge with probability Pij
(ABBE, 2016)
12. PROPOSED STUDY
• To generate a random graph with two groups (strategic
and non-strategic) through the SBM and calculate the
“submodularity” to confirm the strategic behavior can
not be identified by the modularity concept;
• Also, observe photographs of a social simulated network
at different time intervals to verify the increase and/or
drop of links within and between the groups, analyzing
the communities in pairs, to verify the strategic
behavior.
13. • Two values of “submodularity” are proposed here: Q1
and Q2
– Where Q1 refers to links inside the strategic group, and
– Q2 refers to the links between the two groups (directed from
group 2 to group 1).
PROPOSED STUDY
14. PROPOSED STUDY
• s1 is define as:
– s1v = 1, if node v is starategic (belongs to group 1)
– s1v = 0, if node v is non-strategic
• s2 is define as:
– s2v = 1, if node v is non-strategic (belongs to group 2)
– s2v = 0, if node v is strategic
15. PROPOSED STUDY
• Simulations with: 400 and 2000 nodes;
• 2 groups: strategic and non-strategic;
• Inputs:
– Matrix of probabilities (P);
• Probabilities of nodes to connect inside a group and
between groups (2x2)
– Partition vector (c);
• Indicates if a node is strategic or non strategic (1xn)
• Output: Adjacency Matrix (A).
16. PROPOSED STUDY
• Generate a network through SBM;
• Based on A, calculate the values of Q1 and Q2;
• Calculate other 3 matrices A: random, strategic
group and normal community;
• Calculate the following reasons:
19. METHODOLOGY
1. Network generated with SBM adapted for induction of
strategic behavior.
– Calculate the values of Q1 and Q2.
2. Network comparison: evolution analysis of a network from
aleatory configuration to different situations:
– SBM generating two normal communities;
– SBM adapted to generate two groups – one of them with
strategic behavior.
• Calculate the reasons R1 and R2.
3. Application of step (2) on a network generated by
simulation (e.g. citation network) with strategic behavior1.
1 (SANDE, 2016)
20. METHODOLOGY I
• Matlab code for SBM to generate A;
• Network with n= 400 and n=2000 nodes;
• Results were similar for both networks;
First step:
• Generate partition vector C:
– Inputs: a = percentage of the nodes that are strategic
(a=0:0.1:1);
– C1xn – the first a% of the nodes belongs to strategic group
1 and the others to non-strategic group 2.
21. METHODOLOGY I
Second step:
• Generate A:
– Define matrix P;
– Enter with: C, P, directed(true);
Third step:
• Varies the configuration of the network changing the position
of the elements in the partition vector C;
• Each new vector is calculated with a similarity degree x in
relation to the first vector C proposed (x=0:0.1:1);
• For each new vectors C, calculate the values of Q1 and Q2;
22. Fourth step:
• Generate A aleatory, A with 2 communities and A
with strategic group: A, Acom and Astr
Fifth step:
• Calculate the reasons R1 and R2 for the Acom and
Astr .
METHODOLOGY
23. METHODOLOGY
(SANDE, 2016)
(BARROS, 2016)
• Matlab code for a simulated citation network to generate A;
• Network with n = 400 journals (nodes);
• Strategic behavior: 20% of the nodes (journals).
24. METHODOLOGY
• Plot the graphics of Q1 and Q2 for each value of a
(varying the number of strategic nodes);
• Values of Q1 and Q2 in the same graphic;
• Plot the values of R1 and R2 in same graphic for a
simulated citation network;
IT WAS FOUND THAT…
31. CONCLUSIONS
• The identification of the 2 groups depends only on one value
(Q1 = –Q2);
• It is necessary to plot the behavior of the network at different
time stamps;
• The method shows to be effective to identify 2 groups in a
network, and specifies which one is strategic (if the behavior is
known);
• Application: it was proposed an algorithm for generating a
network with certain premises (such as strategic behavior);
• Future studies: apply this method in some real social networks
to find if the strategic behavior occurs and if the method is
efficient in identifying it (without previously knowing it).
32. REFERENCES
• ABBE, E. Community detection and the stochastic block model. Princeton University, February 20, 2016.
• BARROS, A. C. W. G. Dinâmica da reciprocidade periférica em uma rede de citações acadêmicas. Escola de
Matemática Aplicada (FGV-EMAp), 2016.
• DUGUÉ, N. and PEREZ, A. Directed Louvain : maximizing modularity in directed networks. [Research
Report] Université d’Orléans. 2015.
• NEWMAN, M. E. J. The Structure and Function of Complex Networks. SIAM Review, 45(2):167– 256, 2003.
• NEWMAN, M. E. J. Modularity and community structure in networks. Proceedings of the National Academy of
Sciences of the United States of America. 103 (23): 8577–8696. 2006.
• NEWMAN, M. E. J. and GIRVAN M. Mixing patterns and community structure in networks, pages 66–87. Springer,
Berlin, 2003.
• NEWMAN, M. E. J. and GIRVAN M. Finding and evaluating community structure in networks. Physical Review E,
69:026113, 2004.
• NEWMAN, M. E. J. and JUYONG, P. Why social networks are different from other types of networks. Physical
Review E, 68:036122, 2003.
• NICOSIA, V., MANGIONI, G., CARCHIOLO, V. and MALGERI, M. Extending the definition of modularity to directed
graphs with overlapping communities.
J. Stat. Mech. P03024, 2009.
• SANDE, W. W. C. Reciprocidade periférica como estratégia para aumento de centralidade: estudo de rede de
citações acadêmicas. PhD Thesis – Escola Brasileira de Administração Pública e de Empresas (FGV-EBAPE), 2016.