SlideShare a Scribd company logo
Royi Itzhack
 Large number of
  “interactomes” are currently
  accumulated.
 These interaction networks
  combine measurements from
  a large number of sources to
  produce a network of
  interactions.
 We here assume that the
  network is only characterized
  by the graph of interactions
  and nothing is known about
  the content of the nodes.
   Interactomes occur in
    biology:
    • protein networks.
    • genetic networks. neural
      networks.
   in social sciences
    • Social networks
   In information
    • Wikipediae
    • Content networks
   Most such networks are
    not validated and contain a
    large amount of
    superfluous data.
 We  are looking for important features in
  the networks.
 These features can be:
1. Important nodes.
2. Information flow.
 We propose algorithms to extract those
   from the network topology and methods
   to validate the results.
 We compared the ratio of scores of two
 neighboring nodes, and define that a node is
 higher in hierarchy than its neighbor and if its
 score is higher and the score ratio is between the
 lower and upper thresholds.
 For many neighboring nodes there is no
 hierarchical relation. Their score ratio can be too
 close to one and thus above the upper threshold
 (e.g. cheese and meat).
 Their ratio could also be too far from one and
 thus below the lower threshold (e.g. Obama and
 myself)
• The Hierarchy score is the centrality normalized to the
indegree and the outdegree.
• We checked whether the nodes participation in
information flow on the network (betweenness) is higher
or lower than what is expected merely from its
connectivity.


                           CB (i)
    H (i)
                   (kin (i) 1)(kout (i) 1)
•The score is proportional only to the local neighberhood
      •Very fast – low CPU and memory cost
      •Average 82%

                           kin                           kout
           H (i)                   kin                           kout
                       (kin kout )                   (kin kout )

Problem : the algorithm is not sensitive to the network structure
for example: for binary tree the algorithm is inefficient
Nin (m)      m           N out (m)     m
H (i)                          /
         m    Nin (m)              m   N out (m)


  Nin (i) number of incoming neighbours of level m
   Nin (i) average number of neighbours of level m
       weighted base
   As we decrease the upper
    threshold, we reduce the
    fraction of node couples for
    which a hierarchical position
    can be obtained
   On the other hand, we
    increase the success rate for
    the remaining node couples.
   Low upper cutoff leads to a
    tight definition of the
    hierarchy, with practically all
    edges in the proper
    direction, but with a low
    number of categorized edges,
   High upper cutoff leads to a
    hierarchy, which is often
    unnatural.
   Microsoft Windows XP Pro operating system.
   Links are directional and that the obtained network is
    practically acyclic,
   Using the attraction basin hierarchy 6869 links out of
    6899 (99.57%) were marked in the proper direction.
    local hierarchy producing 98.57% of properly
    computed links,
   PageRank with 96.13%.
   HITS 90%
   The centrality-based hierarchy 63%
 Isthere a
  meaningful
  information flow
  between nodes in
  networks?
 Specifically, can we
  extract from the
  network the
  meaningful paths of
  information?
 Ifinformation flows, it should be sensitive
  to the precise direction of each edge.
 We thus checked what happens when the
  direction of edges is flipped.
 Strangely nothing changes in the network
  except for two things:
 The distance distribution gets slightly
  shorter.
 The circle distribution length gets
  drastically shorter.
 The  long circles include a well defined
  limited number of essential genes/neurons.
 In the neural network these neurons map
  to the main trajectories from the sensor to
  the interneuron circles to the motor
  neurons.
 In genetic network these trajectories relate
  the most essential genes (genes that their
  deletion leads to organism death).
A simple toy network explains the
 observed results.
 The  spaghetti ball of networks can be
  replaced by clear hierarchies or organized
  information pathways.
 The vast majority of edges can be removed
  while maintaining the important information
  flow.
Network Flow

More Related Content

What's hot

Optimizing
 sentinel
 surveillance 
in
 static
 and 
temporal 
networks
Optimizing
 sentinel
 surveillance 
in
 static
 and 
temporal 
networksOptimizing
 sentinel
 surveillance 
in
 static
 and 
temporal 
networks
Optimizing
 sentinel
 surveillance 
in
 static
 and 
temporal 
networks
Petter Holme
 
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
Java Abs   Peer To Peer Design & Implementation Of A Tuple SpaceJava Abs   Peer To Peer Design & Implementation Of A Tuple Space
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
ncct
 
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet TransmissionBehavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
IOSR Journals
 
Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)
Tin180 VietNam
 
An efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharingAn efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharing
ambitlick
 
An Improved PageRank Algorithm for Multilayer Networks
An Improved PageRank Algorithm for Multilayer NetworksAn Improved PageRank Algorithm for Multilayer Networks
An Improved PageRank Algorithm for Multilayer Networks
Subhajit Sahu
 
Java on exploiting transient social contact patterns for data forwarding in ...
Java  on exploiting transient social contact patterns for data forwarding in ...Java  on exploiting transient social contact patterns for data forwarding in ...
Java on exploiting transient social contact patterns for data forwarding in ...
ecwayerode
 
Classification of Computer Networks
Classification of Computer NetworksClassification of Computer Networks
Classification of Computer Networks
ShohanaakterKakon
 
Exploiting friendship relations for efficient routing in mobile
Exploiting friendship relations for efficient routing in mobileExploiting friendship relations for efficient routing in mobile
Exploiting friendship relations for efficient routing in mobile
ramya1591
 
Turing Talk Slides
Turing Talk SlidesTuring Talk Slides
Turing Talk Slides
Annu Sharma
 
Social Network Analysis and Visualization
Social Network Analysis and VisualizationSocial Network Analysis and Visualization
Social Network Analysis and Visualization
Alberto Ramirez
 
3 Centrality
3 Centrality3 Centrality
3 Centrality
Maksim Tsvetovat
 
27
2727
LocWeb2015 - Reconnecting Digital Publications to the Web Using their Spatial...
LocWeb2015 - Reconnecting Digital Publications to the Web Using their Spatial...LocWeb2015 - Reconnecting Digital Publications to the Web Using their Spatial...
LocWeb2015 - Reconnecting Digital Publications to the Web Using their Spatial...
Ben De Meester
 
P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE
ijp2p
 
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatramanOdsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
venkatramanJ4
 
14 Dynamic Networks
14 Dynamic Networks14 Dynamic Networks
14 Dynamic Networks
Maksim Tsvetovat
 

What's hot (17)

Optimizing
 sentinel
 surveillance 
in
 static
 and 
temporal 
networks
Optimizing
 sentinel
 surveillance 
in
 static
 and 
temporal 
networksOptimizing
 sentinel
 surveillance 
in
 static
 and 
temporal 
networks
Optimizing
 sentinel
 surveillance 
in
 static
 and 
temporal 
networks
 
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
Java Abs   Peer To Peer Design & Implementation Of A Tuple SpaceJava Abs   Peer To Peer Design & Implementation Of A Tuple Space
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
 
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet TransmissionBehavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
 
Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)
 
An efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharingAn efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharing
 
An Improved PageRank Algorithm for Multilayer Networks
An Improved PageRank Algorithm for Multilayer NetworksAn Improved PageRank Algorithm for Multilayer Networks
An Improved PageRank Algorithm for Multilayer Networks
 
Java on exploiting transient social contact patterns for data forwarding in ...
Java  on exploiting transient social contact patterns for data forwarding in ...Java  on exploiting transient social contact patterns for data forwarding in ...
Java on exploiting transient social contact patterns for data forwarding in ...
 
Classification of Computer Networks
Classification of Computer NetworksClassification of Computer Networks
Classification of Computer Networks
 
Exploiting friendship relations for efficient routing in mobile
Exploiting friendship relations for efficient routing in mobileExploiting friendship relations for efficient routing in mobile
Exploiting friendship relations for efficient routing in mobile
 
Turing Talk Slides
Turing Talk SlidesTuring Talk Slides
Turing Talk Slides
 
Social Network Analysis and Visualization
Social Network Analysis and VisualizationSocial Network Analysis and Visualization
Social Network Analysis and Visualization
 
3 Centrality
3 Centrality3 Centrality
3 Centrality
 
27
2727
27
 
LocWeb2015 - Reconnecting Digital Publications to the Web Using their Spatial...
LocWeb2015 - Reconnecting Digital Publications to the Web Using their Spatial...LocWeb2015 - Reconnecting Digital Publications to the Web Using their Spatial...
LocWeb2015 - Reconnecting Digital Publications to the Web Using their Spatial...
 
P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE
 
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatramanOdsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
 
14 Dynamic Networks
14 Dynamic Networks14 Dynamic Networks
14 Dynamic Networks
 

Similar to Network Flow

Higher-order clustering coefficients at Purdue CSoI
Higher-order clustering coefficients at Purdue CSoIHigher-order clustering coefficients at Purdue CSoI
Higher-order clustering coefficients at Purdue CSoI
Austin Benson
 
Topology ppt
Topology pptTopology ppt
Topology ppt
Daksh Bapna
 
Topology ppt
Topology pptTopology ppt
Topology ppt
karan saini
 
Topology ppt
Topology pptTopology ppt
Topology ppt
boocse11
 
TopologyPPT.ppt
TopologyPPT.pptTopologyPPT.ppt
TopologyPPT.ppt
ssuser933685
 
Interpretation of the biological knowledge using networks approach
Interpretation of the biological knowledge using networks approachInterpretation of the biological knowledge using networks approach
Interpretation of the biological knowledge using networks approach
Elena Sügis
 
network mining and representation learning
network mining and representation learningnetwork mining and representation learning
network mining and representation learning
sun peiyuan
 
Clique-based Network Clustering
Clique-based Network ClusteringClique-based Network Clustering
Clique-based Network Clustering
Guang Ouyang
 
Distribution of maximal clique size of the
Distribution of maximal clique size of theDistribution of maximal clique size of the
Distribution of maximal clique size of the
IJCNCJournal
 
Scale-Free Networks to Search in Unstructured Peer-To-Peer Networks
Scale-Free Networks to Search in Unstructured Peer-To-Peer NetworksScale-Free Networks to Search in Unstructured Peer-To-Peer Networks
Scale-Free Networks to Search in Unstructured Peer-To-Peer Networks
IOSR Journals
 
Mining and analyzing social media part 2 - hicss47 tutorial - dave king
Mining and analyzing social media   part 2 - hicss47 tutorial - dave kingMining and analyzing social media   part 2 - hicss47 tutorial - dave king
Mining and analyzing social media part 2 - hicss47 tutorial - dave king
Dave King
 
Community detection in social networks[1]
Community detection in social networks[1]Community detection in social networks[1]
Community detection in social networks[1]
sdnumaygmailcom
 
Lecture 5 - Qunatifying a Network.pdf
Lecture 5 - Qunatifying a Network.pdfLecture 5 - Qunatifying a Network.pdf
Lecture 5 - Qunatifying a Network.pdf
clararoumany1
 
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
csandit
 
Computational Frameworks for Higher-order Network Data Analysis
Computational Frameworks for Higher-order Network Data AnalysisComputational Frameworks for Higher-order Network Data Analysis
Computational Frameworks for Higher-order Network Data Analysis
Austin Benson
 
Simplicial closure and higher-order link prediction (SIAMNS18)
Simplicial closure and higher-order link prediction (SIAMNS18)Simplicial closure and higher-order link prediction (SIAMNS18)
Simplicial closure and higher-order link prediction (SIAMNS18)
Austin Benson
 
Complex Network Analysis
Complex Network Analysis Complex Network Analysis
Complex Network Analysis
Annu Sharma
 
Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018
Arsalan Khan
 
Jürgens diata12-communities
Jürgens diata12-communitiesJürgens diata12-communities
Jürgens diata12-communities
Pascal Juergens
 
OccupyWallStreetNetworkAnalysis.pptx
OccupyWallStreetNetworkAnalysis.pptxOccupyWallStreetNetworkAnalysis.pptx
OccupyWallStreetNetworkAnalysis.pptx
FabrizioLanubile
 

Similar to Network Flow (20)

Higher-order clustering coefficients at Purdue CSoI
Higher-order clustering coefficients at Purdue CSoIHigher-order clustering coefficients at Purdue CSoI
Higher-order clustering coefficients at Purdue CSoI
 
Topology ppt
Topology pptTopology ppt
Topology ppt
 
Topology ppt
Topology pptTopology ppt
Topology ppt
 
Topology ppt
Topology pptTopology ppt
Topology ppt
 
TopologyPPT.ppt
TopologyPPT.pptTopologyPPT.ppt
TopologyPPT.ppt
 
Interpretation of the biological knowledge using networks approach
Interpretation of the biological knowledge using networks approachInterpretation of the biological knowledge using networks approach
Interpretation of the biological knowledge using networks approach
 
network mining and representation learning
network mining and representation learningnetwork mining and representation learning
network mining and representation learning
 
Clique-based Network Clustering
Clique-based Network ClusteringClique-based Network Clustering
Clique-based Network Clustering
 
Distribution of maximal clique size of the
Distribution of maximal clique size of theDistribution of maximal clique size of the
Distribution of maximal clique size of the
 
Scale-Free Networks to Search in Unstructured Peer-To-Peer Networks
Scale-Free Networks to Search in Unstructured Peer-To-Peer NetworksScale-Free Networks to Search in Unstructured Peer-To-Peer Networks
Scale-Free Networks to Search in Unstructured Peer-To-Peer Networks
 
Mining and analyzing social media part 2 - hicss47 tutorial - dave king
Mining and analyzing social media   part 2 - hicss47 tutorial - dave kingMining and analyzing social media   part 2 - hicss47 tutorial - dave king
Mining and analyzing social media part 2 - hicss47 tutorial - dave king
 
Community detection in social networks[1]
Community detection in social networks[1]Community detection in social networks[1]
Community detection in social networks[1]
 
Lecture 5 - Qunatifying a Network.pdf
Lecture 5 - Qunatifying a Network.pdfLecture 5 - Qunatifying a Network.pdf
Lecture 5 - Qunatifying a Network.pdf
 
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
 
Computational Frameworks for Higher-order Network Data Analysis
Computational Frameworks for Higher-order Network Data AnalysisComputational Frameworks for Higher-order Network Data Analysis
Computational Frameworks for Higher-order Network Data Analysis
 
Simplicial closure and higher-order link prediction (SIAMNS18)
Simplicial closure and higher-order link prediction (SIAMNS18)Simplicial closure and higher-order link prediction (SIAMNS18)
Simplicial closure and higher-order link prediction (SIAMNS18)
 
Complex Network Analysis
Complex Network Analysis Complex Network Analysis
Complex Network Analysis
 
Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018
 
Jürgens diata12-communities
Jürgens diata12-communitiesJürgens diata12-communities
Jürgens diata12-communities
 
OccupyWallStreetNetworkAnalysis.pptx
OccupyWallStreetNetworkAnalysis.pptxOccupyWallStreetNetworkAnalysis.pptx
OccupyWallStreetNetworkAnalysis.pptx
 

Recently uploaded

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 

Recently uploaded (20)

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 

Network Flow

  • 2.  Large number of “interactomes” are currently accumulated.  These interaction networks combine measurements from a large number of sources to produce a network of interactions.  We here assume that the network is only characterized by the graph of interactions and nothing is known about the content of the nodes.
  • 3. Interactomes occur in biology: • protein networks. • genetic networks. neural networks.  in social sciences • Social networks  In information • Wikipediae • Content networks  Most such networks are not validated and contain a large amount of superfluous data.
  • 4.  We are looking for important features in the networks.  These features can be: 1. Important nodes. 2. Information flow.  We propose algorithms to extract those from the network topology and methods to validate the results.
  • 5.
  • 6.  We compared the ratio of scores of two neighboring nodes, and define that a node is higher in hierarchy than its neighbor and if its score is higher and the score ratio is between the lower and upper thresholds.  For many neighboring nodes there is no hierarchical relation. Their score ratio can be too close to one and thus above the upper threshold (e.g. cheese and meat).  Their ratio could also be too far from one and thus below the lower threshold (e.g. Obama and myself)
  • 7. • The Hierarchy score is the centrality normalized to the indegree and the outdegree. • We checked whether the nodes participation in information flow on the network (betweenness) is higher or lower than what is expected merely from its connectivity. CB (i) H (i) (kin (i) 1)(kout (i) 1)
  • 8. •The score is proportional only to the local neighberhood •Very fast – low CPU and memory cost •Average 82% kin kout H (i) kin kout (kin kout ) (kin kout ) Problem : the algorithm is not sensitive to the network structure for example: for binary tree the algorithm is inefficient
  • 9. Nin (m) m N out (m) m H (i) / m Nin (m) m N out (m) Nin (i) number of incoming neighbours of level m Nin (i) average number of neighbours of level m weighted base
  • 10.
  • 11. As we decrease the upper threshold, we reduce the fraction of node couples for which a hierarchical position can be obtained  On the other hand, we increase the success rate for the remaining node couples.  Low upper cutoff leads to a tight definition of the hierarchy, with practically all edges in the proper direction, but with a low number of categorized edges,  High upper cutoff leads to a hierarchy, which is often unnatural.
  • 12.
  • 13. Microsoft Windows XP Pro operating system.  Links are directional and that the obtained network is practically acyclic,  Using the attraction basin hierarchy 6869 links out of 6899 (99.57%) were marked in the proper direction.  local hierarchy producing 98.57% of properly computed links,  PageRank with 96.13%.  HITS 90%  The centrality-based hierarchy 63%
  • 14.
  • 15.
  • 16.  Isthere a meaningful information flow between nodes in networks?  Specifically, can we extract from the network the meaningful paths of information?
  • 17.
  • 18.  Ifinformation flows, it should be sensitive to the precise direction of each edge.  We thus checked what happens when the direction of edges is flipped.  Strangely nothing changes in the network except for two things:  The distance distribution gets slightly shorter.  The circle distribution length gets drastically shorter.
  • 19.
  • 20.
  • 21.  The long circles include a well defined limited number of essential genes/neurons.  In the neural network these neurons map to the main trajectories from the sensor to the interneuron circles to the motor neurons.  In genetic network these trajectories relate the most essential genes (genes that their deletion leads to organism death).
  • 22. A simple toy network explains the observed results.
  • 23.  The spaghetti ball of networks can be replaced by clear hierarchies or organized information pathways.  The vast majority of edges can be removed while maintaining the important information flow.