SlideShare uma empresa Scribd logo
1 de 29
A comparative study of social network analysistools David Combe, Christine Largeron,  Előd Egyed-Zsigmondand Mathias Géry International Workshop on Web Intelligence and Virtual Enterprises 2 (2010)
Outline Context: social networks and analysissoftwareExpected functionalities of network analysis softwareBenchmarkConclusion
Context Definition (Wikipedia) A social network isa social structure made up of individuals called "nodes," which are tied by one or more specific types of interdependency, such as friendship, commoninterest, etc. Sociologic analysis Sociological works (Moreno 1934, Milgram 1967, Cartwright and Harary, 1977) Web 2.0 : Renewed interest from the Web based social networks websites development. Context
Context: Social network in business For the Gartner Institute: “By 2014, social networking services will replace e-mail as the primary vehicle for interpersonal communications for 20 percent of business users.” (Gartner 2008) Social network analysisisgetting mature. Some applications in business: Workflowstudyto adapt management to the real flow in a company; Identifykeyactors, ie. for viral marketing. These applications needadapted software. Context
Context: social networks and analysis software Network analysis software A previousstatisticalanalysisorientedsurvey (Huisman& Van Duijn, 2003) Networks and needs are changing Size Complex graphs Necessity to make a new benchmark Context
ContextExpected functionalities of network analysis softwareBenchmarkConclusion
Expected functionalities of network analysis software Representation Visualization Characterization by indicators Communitydetection Expected functionalities of network analysis software
1. Network representation as graph(Cartwright and Harary, 1977) Link orientation  Undirected links (edges, ex: co-authorship) Directed (arcs, ex: e-mails sent, Enron dataset) Weighton edges Withtypednodes (ex. bipartite network) Expected functionalities of network analysis software 2 1 3 3
1. Network representation as graph Expected functionalities of network analysis software 2 1 *Vertices 5 *Edges 1  2 1  4 2  3 2  4 3  4 3  5 4  5 4 3 Connections 5 Adjacency matrix (.net file format) Edgelist Adjacencylist
Aim: give a visualrepresentation of the graph, withdifferentapproaches: Fish eye Centered on an actor Force drivenvisualizationlayouts FruchtermanReingold (1984) Iterative algorithm Randomlayout F-R convergence 2. Visualization Expected functionalities of network analysis software
3. Characterization by indicators Global indicatorsat network level by: Number of nodes Number of edges Diameter … Local indicatorsatnodelevel: Number of neighboors degree … Distance Length of the shortestpath Expected functionalities of network analysis software 2 1 Density 2 4 3 5 5 4
3. Characterization by indicators : how to decide if an actoris « central »? Many ways to determine central actors. Ex: Betweenness centrality Which node is the most likely to be an intermediary for a random communication? higher betweennesscentrality Selection depends on what they are needed for. Expected functionalities of network analysis software
4. Communitydetection Community: A set of actorshavingstrong connexions. Communitydetectionalgorithms Newman–Girvan (Newman and Girvan, 2002) Walktrap (Latapy & Pons, 2005) Expected functionalities of network analysis software
ContextExpected functionalities of network analysis softwareBenchmarkConclusion
Benchmark methodology Required points: Asocial network analysis point of view Scalability Free for educational purposes A balance between well established software and newer ones, based on recent development standards (ergonomics, modularity and data portability). Datasets: Zachary’skarate-club, DBLP Benchmark
Software comparisoncriteria Input/output formats Custom attribute handling Bipartite graphs specific functions Longitudinal analysis Visualization Indicators Communitydetection Benchmark
Studied software Gephiis an “interactive visualization and exploration platform”. ,[object Object],Tulip can handle over 1 million vertices and 4 millions edges. It has visualization, clustering and extension by plug-ins capabilities. GraphVizis mainly for graph visualization. UCInetis not free. It uses Pajek and Netdraw for visualization. It is specialized in statistical and matricial analysis. It calculates indicators (such as triad census, Freeman betweenness) and performs hierarchical clustering. Pajekis a Windows program for analysis and visualization of large networks. It is freely available, for noncommercial use. igraphis a free software package for creating and manipulating graphs. It also implements algorithms for some recent network analysis methods. NetworkXis a package for the creation, manipulation, and study of the structure, dynamics, and functions of complex networks. JUNG, for Java Universal Network/Graph Framework, is mainly developed for creating interactive graphs in Java GUIs, JUNG has been extended with some SNA metrics. Benchmark
Selected software Stand-alonesoftware Pajekhttp://pajek.imfm.si/doku.php Gephihttp://gephi.org/ Libraries igraphhttp://igraph.sourceforge.net/ NetworkXhttp://networkx.lanl.gov/ Benchmark
Pajek(Vladimir Batagelj and AndrejMrvar) Developmentstarted in 1996 Data miningoriented Many graph operatorsavailable Fast Exports 3D visualization Macro Supports matrices, adjacencylists and arcs listsoriented input files Benchmark
Gephi(Bastian M., Heymann S., Jacomy M.) Benchmark Development started in 2008 Interactive GUI Uses Java Recent scriptability improvements « Photoshop for graphs » with customizable visualization Supports the main file formats for networks Improvable by plugins Community detection still experimental
NetworkX(Brandes U., Erlebach T.) Python Bipartite graphs ready Attribute-friendly 1,000,000 nodeswide networks canbehandled. Lacks in communitydetectionalgorithms Relies on other software for visualization Benchmark >>> importnetworkxasnx >>> G=nx.Graph()  >>> G.add_node("spam")  >>> G.add_edge(1,2)  >>> print(G.nodes())  [1, 2, 'spam']  >>> print(G.edges()) [(1, 2)] >>> G.degree(1)  1
Igraph(Csárdi G., Nepusz T.) For R (a statisticalenvironment) and Python. The lowlevel routines are written in C. GUI available for R. Communitydetectionready. Not custom attributes-friendly Benchmark > g <- graph.ring(10) > degree(g)  [1] 2 2 2 2 2 2 2 2 2 2 > g2 <- erdos.renyi.game(1000, 10/1000) > degree.distribution(g2)  [1] 0.000 0.000 0.002 0.009 0.020 0.039 0.064 0.107 0.111 0.115 0.118… [21] 0.003 0.001
Benchmark How to choose the right tool? ++ Mature functionality - - Not available or weak
Featurecomparison Benchmark Temporality Input / output Visualization Clustering igraph Pajek Indicators Bipartite NetworkX Gephi Attributehandling
ContextExpected functionalities of network analysis softwareBenchmarkConclusion
Conclusion Manydomains, manyapproaches, many software (sociology, computer science, mathematics and physics). ,[object Object],Temporalityawareness Links and nodesattributesanalysis Hierarchicalgraphs Conclusion
Thankyou for your attention.Any questions ?
Bibliography Gartner http://www.gartner.com/it/page.jsp?id=1293114 Gartner Hype Cycle for Social Software, 2008 Fortunato, S. (2009). Community detection in graphs. Physics Reports, 103. Retrieved from http://arxiv.org/abs/0906.0612.Pons, P., & Latapy, M. (2005). Computing communities in large networks using random walks. Computer and Information Sciences-ISCIS 2005. Retrieved from http://www.springerlink.com/index/P312811313637372.pdf. Newman, M., & Girvan, M. (2004). Finding and evaluating community structure in networks. Physical review E. Retrieved from http://link.aps.org/doi/10.1103/PhysRevE.69.026113. Kamada, T., & Kawai, S. (1989). An algorithm for drawing general undirected graphs. Information processing letters, 31(12), 7--15. Retrieved from http://linkinghub.elsevier.com/retrieve/pii/0020019089901026.
Bibliography (2) Brin, S., & Page, L. (1998). The anatomy of a large-scale hypertextual Web search engine* 1. Computer networks and ISDN systems. Retrieved from http://linkinghub.elsevier.com/retrieve/pii/S016975529800110X. Fruchterman, T. M., & Reingold, E. M. (1991). Graph Drawing by Force-directed Placement. Huisman, M., & Van Duijn, M. (2003). Software for social network analysis. In Models and methods in social network analysis (p. 270–316).  Freeman, L. (1979). Centrality in Social Networks Conceptual Clarification. Social Networks.

Mais conteúdo relacionado

Mais procurados

Intent-based networking (IBN): a platform for digital business
Intent-based networking (IBN): a platform for digital businessIntent-based networking (IBN): a platform for digital business
Intent-based networking (IBN): a platform for digital businessNatalie Andrusyk
 
Using Large Language Models in 10 Lines of Code
Using Large Language Models in 10 Lines of CodeUsing Large Language Models in 10 Lines of Code
Using Large Language Models in 10 Lines of CodeGautier Marti
 
Awareness of IoT Platform and Applications
Awareness of IoT Platform and ApplicationsAwareness of IoT Platform and Applications
Awareness of IoT Platform and ApplicationsDr. Mazlan Abbas
 
Generative adversarial networks
Generative adversarial networksGenerative adversarial networks
Generative adversarial networksDing Li
 
Strategy management airtel telecom
Strategy management airtel telecomStrategy management airtel telecom
Strategy management airtel telecomSumit Srivastava
 
Chinese Fireworks Case analysis
Chinese Fireworks Case analysisChinese Fireworks Case analysis
Chinese Fireworks Case analysisangela1111
 
NLU-MAP. IBM Watson NLU with Mind Mapping automation
NLU-MAP. IBM Watson NLU with Mind Mapping automationNLU-MAP. IBM Watson NLU with Mind Mapping automation
NLU-MAP. IBM Watson NLU with Mind Mapping automationJosé M. Guerrero
 
porters five force model with respect to apple inc
porters five force model with respect to apple incporters five force model with respect to apple inc
porters five force model with respect to apple incMunnavar Shaikh
 
A (Very) Gentle Introduction to Generative Adversarial Networks (a.k.a GANs)
 A (Very) Gentle Introduction to Generative Adversarial Networks (a.k.a GANs) A (Very) Gentle Introduction to Generative Adversarial Networks (a.k.a GANs)
A (Very) Gentle Introduction to Generative Adversarial Networks (a.k.a GANs)Thomas da Silva Paula
 
Transfer Learning and Fine Tuning for Cross Domain Image Classification with ...
Transfer Learning and Fine Tuning for Cross Domain Image Classification with ...Transfer Learning and Fine Tuning for Cross Domain Image Classification with ...
Transfer Learning and Fine Tuning for Cross Domain Image Classification with ...Sujit Pal
 
Lenovo case study
Lenovo case studyLenovo case study
Lenovo case studyAnkit Gupta
 
THE STUDY OF FACTORS INFLUENCING THE BUYING OF MOBILE HANDSETS WITH REFERENCE...
THE STUDY OF FACTORS INFLUENCING THE BUYING OF MOBILE HANDSETS WITH REFERENCE...THE STUDY OF FACTORS INFLUENCING THE BUYING OF MOBILE HANDSETS WITH REFERENCE...
THE STUDY OF FACTORS INFLUENCING THE BUYING OF MOBILE HANDSETS WITH REFERENCE...Udit Das
 
ANALYSIS OF MOBILE PHONES
ANALYSIS OF MOBILE PHONESANALYSIS OF MOBILE PHONES
ANALYSIS OF MOBILE PHONESprasad shinde
 
Introduction to Deep Learning
Introduction to Deep LearningIntroduction to Deep Learning
Introduction to Deep LearningOleg Mygryn
 
HML: Historical View and Trends of Deep Learning
HML: Historical View and Trends of Deep LearningHML: Historical View and Trends of Deep Learning
HML: Historical View and Trends of Deep LearningYan Xu
 

Mais procurados (20)

Intent-based networking (IBN): a platform for digital business
Intent-based networking (IBN): a platform for digital businessIntent-based networking (IBN): a platform for digital business
Intent-based networking (IBN): a platform for digital business
 
Using Large Language Models in 10 Lines of Code
Using Large Language Models in 10 Lines of CodeUsing Large Language Models in 10 Lines of Code
Using Large Language Models in 10 Lines of Code
 
Lenovo case presentation
Lenovo case presentationLenovo case presentation
Lenovo case presentation
 
Awareness of IoT Platform and Applications
Awareness of IoT Platform and ApplicationsAwareness of IoT Platform and Applications
Awareness of IoT Platform and Applications
 
vodafone, aritel, jio
vodafone, aritel, jiovodafone, aritel, jio
vodafone, aritel, jio
 
Generative adversarial networks
Generative adversarial networksGenerative adversarial networks
Generative adversarial networks
 
Samsung case study
Samsung case studySamsung case study
Samsung case study
 
Strategy management airtel telecom
Strategy management airtel telecomStrategy management airtel telecom
Strategy management airtel telecom
 
Chinese Fireworks Case analysis
Chinese Fireworks Case analysisChinese Fireworks Case analysis
Chinese Fireworks Case analysis
 
NLU-MAP. IBM Watson NLU with Mind Mapping automation
NLU-MAP. IBM Watson NLU with Mind Mapping automationNLU-MAP. IBM Watson NLU with Mind Mapping automation
NLU-MAP. IBM Watson NLU with Mind Mapping automation
 
porters five force model with respect to apple inc
porters five force model with respect to apple incporters five force model with respect to apple inc
porters five force model with respect to apple inc
 
A (Very) Gentle Introduction to Generative Adversarial Networks (a.k.a GANs)
 A (Very) Gentle Introduction to Generative Adversarial Networks (a.k.a GANs) A (Very) Gentle Introduction to Generative Adversarial Networks (a.k.a GANs)
A (Very) Gentle Introduction to Generative Adversarial Networks (a.k.a GANs)
 
Transfer Learning and Fine Tuning for Cross Domain Image Classification with ...
Transfer Learning and Fine Tuning for Cross Domain Image Classification with ...Transfer Learning and Fine Tuning for Cross Domain Image Classification with ...
Transfer Learning and Fine Tuning for Cross Domain Image Classification with ...
 
Lenovo case study
Lenovo case studyLenovo case study
Lenovo case study
 
Semiconductor industry 2016
Semiconductor industry 2016Semiconductor industry 2016
Semiconductor industry 2016
 
THE STUDY OF FACTORS INFLUENCING THE BUYING OF MOBILE HANDSETS WITH REFERENCE...
THE STUDY OF FACTORS INFLUENCING THE BUYING OF MOBILE HANDSETS WITH REFERENCE...THE STUDY OF FACTORS INFLUENCING THE BUYING OF MOBILE HANDSETS WITH REFERENCE...
THE STUDY OF FACTORS INFLUENCING THE BUYING OF MOBILE HANDSETS WITH REFERENCE...
 
ANALYSIS OF MOBILE PHONES
ANALYSIS OF MOBILE PHONESANALYSIS OF MOBILE PHONES
ANALYSIS OF MOBILE PHONES
 
Deep learning
Deep learningDeep learning
Deep learning
 
Introduction to Deep Learning
Introduction to Deep LearningIntroduction to Deep Learning
Introduction to Deep Learning
 
HML: Historical View and Trends of Deep Learning
HML: Historical View and Trends of Deep LearningHML: Historical View and Trends of Deep Learning
HML: Historical View and Trends of Deep Learning
 

Semelhante a A comparative study of social network analysis tools

Analysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewAnalysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewIJERD Editor
 
IRJET- Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...
IRJET-  	  Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...IRJET-  	  Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...
IRJET- Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...IRJET Journal
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET Journal
 
DN18 | The Evolution and Future of Graph Technology: Intelligent Systems | Ax...
DN18 | The Evolution and Future of Graph Technology: Intelligent Systems | Ax...DN18 | The Evolution and Future of Graph Technology: Intelligent Systems | Ax...
DN18 | The Evolution and Future of Graph Technology: Intelligent Systems | Ax...Dataconomy Media
 
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...AIRCC Publishing Corporation
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...ijcsit
 
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...IRJET Journal
 
12SNORTNameInstitutionCorseTutorDa
12SNORTNameInstitutionCorseTutorDa12SNORTNameInstitutionCorseTutorDa
12SNORTNameInstitutionCorseTutorDaChantellPantoja184
 
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL ScriptNetwork Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL ScriptIRJET Journal
 
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?Cloud Camp Milan 2K9 Telecom Italia: Where P2P?
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?Gabriele Bozzi
 
CloudCamp Milan 2009: Telecom Italia
CloudCamp Milan 2009: Telecom ItaliaCloudCamp Milan 2009: Telecom Italia
CloudCamp Milan 2009: Telecom ItaliaGabriele Bozzi
 
Lecture 1 - Introduction.pptx
Lecture 1 - Introduction.pptxLecture 1 - Introduction.pptx
Lecture 1 - Introduction.pptxaida alsamawi
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...IRJET Journal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Cytoscape plugins - GeneMania and CentiScape
Cytoscape plugins - GeneMania and CentiScapeCytoscape plugins - GeneMania and CentiScape
Cytoscape plugins - GeneMania and CentiScapeNixon Mendez
 
Analysis and Visualization of Network Data Using JUNG
Analysis and Visualization of Network Data Using JUNGAnalysis and Visualization of Network Data Using JUNG
Analysis and Visualization of Network Data Using JUNGIJERA Editor
 
2009-C&T-NodeXL and social queries - a social media network analysis toolkit
2009-C&T-NodeXL and social queries - a social media network analysis toolkit2009-C&T-NodeXL and social queries - a social media network analysis toolkit
2009-C&T-NodeXL and social queries - a social media network analysis toolkitMarc Smith
 
Privacy Preserving Mining in Code Profiling Data
Privacy Preserving Mining in Code Profiling DataPrivacy Preserving Mining in Code Profiling Data
Privacy Preserving Mining in Code Profiling DataDr. Amarjeet Singh
 

Semelhante a A comparative study of social network analysis tools (20)

Analysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewAnalysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
 
IRJET- Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...
IRJET-  	  Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...IRJET-  	  Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...
IRJET- Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
 
DN18 | The Evolution and Future of Graph Technology: Intelligent Systems | Ax...
DN18 | The Evolution and Future of Graph Technology: Intelligent Systems | Ax...DN18 | The Evolution and Future of Graph Technology: Intelligent Systems | Ax...
DN18 | The Evolution and Future of Graph Technology: Intelligent Systems | Ax...
 
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
 
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
 
12SNORTNameInstitutionCorseTutorDa
12SNORTNameInstitutionCorseTutorDa12SNORTNameInstitutionCorseTutorDa
12SNORTNameInstitutionCorseTutorDa
 
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL ScriptNetwork Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
 
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?Cloud Camp Milan 2K9 Telecom Italia: Where P2P?
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?
 
CloudCamp Milan 2009: Telecom Italia
CloudCamp Milan 2009: Telecom ItaliaCloudCamp Milan 2009: Telecom Italia
CloudCamp Milan 2009: Telecom Italia
 
Lecture 1 - Introduction.pptx
Lecture 1 - Introduction.pptxLecture 1 - Introduction.pptx
Lecture 1 - Introduction.pptx
 
CINET: A Cyber-Infrastructure for Network Science Overview
CINET: A Cyber-Infrastructure for Network Science OverviewCINET: A Cyber-Infrastructure for Network Science Overview
CINET: A Cyber-Infrastructure for Network Science Overview
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Cytoscape plugins - GeneMania and CentiScape
Cytoscape plugins - GeneMania and CentiScapeCytoscape plugins - GeneMania and CentiScape
Cytoscape plugins - GeneMania and CentiScape
 
Analysis and Visualization of Network Data Using JUNG
Analysis and Visualization of Network Data Using JUNGAnalysis and Visualization of Network Data Using JUNG
Analysis and Visualization of Network Data Using JUNG
 
2009-C&T-NodeXL and social queries - a social media network analysis toolkit
2009-C&T-NodeXL and social queries - a social media network analysis toolkit2009-C&T-NodeXL and social queries - a social media network analysis toolkit
2009-C&T-NodeXL and social queries - a social media network analysis toolkit
 
Privacy Preserving Mining in Code Profiling Data
Privacy Preserving Mining in Code Profiling DataPrivacy Preserving Mining in Code Profiling Data
Privacy Preserving Mining in Code Profiling Data
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Último (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

A comparative study of social network analysis tools

  • 1. A comparative study of social network analysistools David Combe, Christine Largeron, Előd Egyed-Zsigmondand Mathias Géry International Workshop on Web Intelligence and Virtual Enterprises 2 (2010)
  • 2. Outline Context: social networks and analysissoftwareExpected functionalities of network analysis softwareBenchmarkConclusion
  • 3. Context Definition (Wikipedia) A social network isa social structure made up of individuals called "nodes," which are tied by one or more specific types of interdependency, such as friendship, commoninterest, etc. Sociologic analysis Sociological works (Moreno 1934, Milgram 1967, Cartwright and Harary, 1977) Web 2.0 : Renewed interest from the Web based social networks websites development. Context
  • 4. Context: Social network in business For the Gartner Institute: “By 2014, social networking services will replace e-mail as the primary vehicle for interpersonal communications for 20 percent of business users.” (Gartner 2008) Social network analysisisgetting mature. Some applications in business: Workflowstudyto adapt management to the real flow in a company; Identifykeyactors, ie. for viral marketing. These applications needadapted software. Context
  • 5. Context: social networks and analysis software Network analysis software A previousstatisticalanalysisorientedsurvey (Huisman& Van Duijn, 2003) Networks and needs are changing Size Complex graphs Necessity to make a new benchmark Context
  • 6. ContextExpected functionalities of network analysis softwareBenchmarkConclusion
  • 7. Expected functionalities of network analysis software Representation Visualization Characterization by indicators Communitydetection Expected functionalities of network analysis software
  • 8. 1. Network representation as graph(Cartwright and Harary, 1977) Link orientation Undirected links (edges, ex: co-authorship) Directed (arcs, ex: e-mails sent, Enron dataset) Weighton edges Withtypednodes (ex. bipartite network) Expected functionalities of network analysis software 2 1 3 3
  • 9. 1. Network representation as graph Expected functionalities of network analysis software 2 1 *Vertices 5 *Edges 1 2 1 4 2 3 2 4 3 4 3 5 4 5 4 3 Connections 5 Adjacency matrix (.net file format) Edgelist Adjacencylist
  • 10. Aim: give a visualrepresentation of the graph, withdifferentapproaches: Fish eye Centered on an actor Force drivenvisualizationlayouts FruchtermanReingold (1984) Iterative algorithm Randomlayout F-R convergence 2. Visualization Expected functionalities of network analysis software
  • 11. 3. Characterization by indicators Global indicatorsat network level by: Number of nodes Number of edges Diameter … Local indicatorsatnodelevel: Number of neighboors degree … Distance Length of the shortestpath Expected functionalities of network analysis software 2 1 Density 2 4 3 5 5 4
  • 12. 3. Characterization by indicators : how to decide if an actoris « central »? Many ways to determine central actors. Ex: Betweenness centrality Which node is the most likely to be an intermediary for a random communication? higher betweennesscentrality Selection depends on what they are needed for. Expected functionalities of network analysis software
  • 13. 4. Communitydetection Community: A set of actorshavingstrong connexions. Communitydetectionalgorithms Newman–Girvan (Newman and Girvan, 2002) Walktrap (Latapy & Pons, 2005) Expected functionalities of network analysis software
  • 14. ContextExpected functionalities of network analysis softwareBenchmarkConclusion
  • 15. Benchmark methodology Required points: Asocial network analysis point of view Scalability Free for educational purposes A balance between well established software and newer ones, based on recent development standards (ergonomics, modularity and data portability). Datasets: Zachary’skarate-club, DBLP Benchmark
  • 16. Software comparisoncriteria Input/output formats Custom attribute handling Bipartite graphs specific functions Longitudinal analysis Visualization Indicators Communitydetection Benchmark
  • 17.
  • 18. Selected software Stand-alonesoftware Pajekhttp://pajek.imfm.si/doku.php Gephihttp://gephi.org/ Libraries igraphhttp://igraph.sourceforge.net/ NetworkXhttp://networkx.lanl.gov/ Benchmark
  • 19. Pajek(Vladimir Batagelj and AndrejMrvar) Developmentstarted in 1996 Data miningoriented Many graph operatorsavailable Fast Exports 3D visualization Macro Supports matrices, adjacencylists and arcs listsoriented input files Benchmark
  • 20. Gephi(Bastian M., Heymann S., Jacomy M.) Benchmark Development started in 2008 Interactive GUI Uses Java Recent scriptability improvements « Photoshop for graphs » with customizable visualization Supports the main file formats for networks Improvable by plugins Community detection still experimental
  • 21. NetworkX(Brandes U., Erlebach T.) Python Bipartite graphs ready Attribute-friendly 1,000,000 nodeswide networks canbehandled. Lacks in communitydetectionalgorithms Relies on other software for visualization Benchmark >>> importnetworkxasnx >>> G=nx.Graph() >>> G.add_node("spam") >>> G.add_edge(1,2) >>> print(G.nodes()) [1, 2, 'spam'] >>> print(G.edges()) [(1, 2)] >>> G.degree(1) 1
  • 22. Igraph(Csárdi G., Nepusz T.) For R (a statisticalenvironment) and Python. The lowlevel routines are written in C. GUI available for R. Communitydetectionready. Not custom attributes-friendly Benchmark > g <- graph.ring(10) > degree(g) [1] 2 2 2 2 2 2 2 2 2 2 > g2 <- erdos.renyi.game(1000, 10/1000) > degree.distribution(g2) [1] 0.000 0.000 0.002 0.009 0.020 0.039 0.064 0.107 0.111 0.115 0.118… [21] 0.003 0.001
  • 23. Benchmark How to choose the right tool? ++ Mature functionality - - Not available or weak
  • 24. Featurecomparison Benchmark Temporality Input / output Visualization Clustering igraph Pajek Indicators Bipartite NetworkX Gephi Attributehandling
  • 25. ContextExpected functionalities of network analysis softwareBenchmarkConclusion
  • 26.
  • 27. Thankyou for your attention.Any questions ?
  • 28. Bibliography Gartner http://www.gartner.com/it/page.jsp?id=1293114 Gartner Hype Cycle for Social Software, 2008 Fortunato, S. (2009). Community detection in graphs. Physics Reports, 103. Retrieved from http://arxiv.org/abs/0906.0612.Pons, P., & Latapy, M. (2005). Computing communities in large networks using random walks. Computer and Information Sciences-ISCIS 2005. Retrieved from http://www.springerlink.com/index/P312811313637372.pdf. Newman, M., & Girvan, M. (2004). Finding and evaluating community structure in networks. Physical review E. Retrieved from http://link.aps.org/doi/10.1103/PhysRevE.69.026113. Kamada, T., & Kawai, S. (1989). An algorithm for drawing general undirected graphs. Information processing letters, 31(12), 7--15. Retrieved from http://linkinghub.elsevier.com/retrieve/pii/0020019089901026.
  • 29. Bibliography (2) Brin, S., & Page, L. (1998). The anatomy of a large-scale hypertextual Web search engine* 1. Computer networks and ISDN systems. Retrieved from http://linkinghub.elsevier.com/retrieve/pii/S016975529800110X. Fruchterman, T. M., & Reingold, E. M. (1991). Graph Drawing by Force-directed Placement. Huisman, M., & Van Duijn, M. (2003). Software for social network analysis. In Models and methods in social network analysis (p. 270–316). Freeman, L. (1979). Centrality in Social Networks Conceptual Clarification. Social Networks.

Notas do Editor

  1. 24 minutesGood morning,mynameis DC. I come fromLaHC , University of St-Etienne. The aim of mythesis I amhere to presentyou an article titled « A comparative study of social network analysistools » writtenwith Christine Largeron, Előd Egyed-Zsigmond and Mathias Géry.
  2. (for the Gartner …)Many experts insist about social network new behavioursappearing in the enterprise and necessity to takethemintoaccount.Gartner Institute predicts #CITATION#.It alsoconsidersthat SNA isgetting mature.So progresscanbe made in business use of SNA for workflow study intended to permit adaptation of the management to the real communication flow in a company;And Identify key actors in networks, ie. for viral marketing aware campains
  3. A previoussurvey by Huisman &amp; Van Duijn has been published.Havingpreviousbench, werealizedthatitshouldbeupdated, as networks and needs have changed.Main Changes in networks concerns the sizes (networks are far largerthanbefore) and the type of information (as networks tend to getricher, withcontextual data).
  4. There are 4 main domains of functionalities :the Representations of the network as datafilesVisualizationCharacterization by quantitativeindicatorsCommunitydetectioncapabilities
  5. There are different sorts of indicators, which help discribe the network or just one actor.First, among global indicatorsyoucanfindsomegeneral values such as the number of nodes of the graph, the number of edges, the diameter (longestshortest path, how far at the maximum are two nodes in the graph). You can compose these values and deduce the density of the graph (whichdepends on the maximum number of links youcan put in the graph ie. the complete graph). An highdensity (high links ratio) defines a dense graph. A graph with a lowdensity value issaid to besparse.The second type of indicatorsis local indicators. You cancalculateitwithonly a small part of the graph information. An exampleis the number of neighboors (called the degree of a node).You canalso use distances between 2 nodes (or evenedges). The shortestpathis one of them.
  6. Nowlet’sadress the benchmark itself.
  7. The methodology for the selection of the tools takes into account the following points:First, in our vision blocking criteria for selection are that:The tools must provide the basic metricsused in the Social Network Analysisdomain ;and the networks size can reach tens of thousands of nodes, as well as smallerones.The toolsstudied in depthwerechoosenbecausetheyrepresentlegacy, wellestablished software, or new developments base on recent standards such as modularization and ergonomics.The datasetsused for experimentation are the Zachary’skarate-club dataset and the DBLP database.
  8. Seven areas of functionalities were evaluated:Input/output formatsCustom attribute handlingBipartite graphs specific functionsLongitudinal analysis (ietimestamped events)IndicatorsVisualizationClustering capabilities
  9. Hereis the list of studied software.Several of them are vizualisationoriented: Pajek, Gephi, GraphViz, GUESS, Tulip.Others claim to permit graph manipulation: igraph, NetworkX, and JUNG.Bothapproaches have led for manytools in incorporating SNA metrics.
  10. The retained softwareis split in twocategories: Stand-alone softwares and libraries.The Stand-alone software are Pajek and Gephi.The libraries are igraph and NetworkX.Some of the software are emblematic of an approach (Gephi has somecommonalitieswithTulip for example).Nowlet’sdetailtheseones.
  11. This table summarizes how well each tool performs in the seven areas.Pajek performs quite well at the seven domains.If you need more than a simple visualization of a small network, you should avoid NetworkX.Igraph is very good at providing indicator, visualization and community detection.
  12. Hereis an otherrepresentation of the results of the benchmark.Weseeclearlywiththis radar viewthatNetworkXisvery good at custom attributeshandling and providesmanyindicators.No software performsfairlywellattemporality and bipartite graphs management.
  13. Inorder to concludethispresentation, wecansaythere aredifferentscientificdomainsconcerned by SN, and thisexplainwhythere are somuch approches and toolsavailable.The advancesshould come in short or midtermfrom smart modularisation of user interface, algorithms and data, with the goal of allowing the reuse of methodsbetween software. Contextualanalysisneedtools for longitudinal analysis and attributesstudy.Hierarchical graph visualizationisnow an important subjecttoo for smart manipulation of large graphs.
  14. Thankyou.