An Algorithm for Measuring Optimal Connections in Large Valued Networks Song Yang Henry Hexmoor Sociology Computer Science University of Arkansas Preparation.

Slides:



Advertisements
Similar presentations
Testing Relational Database
Advertisements

Association Analysis (Data Engineering). Type of attributes in assoc. analysis Association rule mining assumes the input data consists of binary attributes.
Network Matrix and Graph. Network Size Network size – a number of actors (nodes) in a network, usually denoted as k or n Size is critical for the structure.
IP Fast Reroute Using Tunnel-AT draft-xu-ipfrr-tunnelat-00 Mingwei Xu, Lingtao Pan, Qing Li Tsinghua University, China 75 th IETF Meeting, Stockholm July.
Midwestern State University Department of Computer Science Dr. Ranette Halverson CMPS 2433 – CHAPTER 4 GRAPHS 1.
Introduction to Graph “theory”
Chapter 5 Fundamental Algorithm Design Techniques.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
1 Machine Learning: Lecture 10 Unsupervised Learning (Based on Chapter 9 of Nilsson, N., Introduction to Machine Learning, 1996)
PCA + SVD.
Merge Sort 4/15/2017 6:09 PM The Greedy Method The Greedy Method.
Author: Jie chen and Yousef Saad IEEE transactions of knowledge and data engineering.
Computability and Complexity 23-1 Computability and Complexity Andrei Bulatov Search and Optimization.
Complexity 15-1 Complexity Andrei Bulatov Hierarchy Theorem.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Centrality and Prestige HCC Spring 2005 Wednesday, April 13, 2005 Aliseya Wright.
3 -1 Chapter 3 The Greedy Method 3 -2 The greedy method Suppose that a problem can be solved by a sequence of decisions. The greedy method has that each.
CSE 222 Systems Programming Graph Theory Basics Dr. Jim Holten.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Delivery, Forwarding, and Routing
Lecture 11. Matching A set of edges which do not share a vertex is a matching. Application: Wireless Networks may consist of nodes with single radios,
1 The Greedy Method CSC401 – Analysis of Algorithms Lecture Notes 10 The Greedy Method Objectives Introduce the Greedy Method Use the greedy method to.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
The Shortest Path Problem
1 1 Slide © 2000 South-Western College Publishing/ITP Slides Prepared by JOHN LOUCKS.
1 Shortest Path Calculations in Graphs Prof. S. M. Lee Department of Computer Science.
Chapter 4 How Businesses Work McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
CSE554AlignmentSlide 1 CSE 554 Lecture 8: Alignment Fall 2014.
V. V. Vazirani. Approximation Algorithms Chapters 3 & 22
Copyright © Cengage Learning. All rights reserved.
© The McGraw-Hill Companies, Inc., Chapter 3 The Greedy Method.
CSE554AlignmentSlide 1 CSE 554 Lecture 5: Alignment Fall 2011.
Interaction Modeling. Introduction (1) Third leg of the modeling tripod. It describes interaction within a system. The class model describes the objects.
CSCE350 Algorithms and Data Structure Lecture 17 Jianjun Hu Department of Computer Science and Engineering University of South Carolina
Wireless Sensor Networks COE 499 Energy Aware Routing
Unit Unit 04 Relations IT DisiciplineITD1111 Discrete Mathematics & Statistics STDTLP1 Unit 4 Relations.
COM1721: Freshman Honors Seminar A Random Walk Through Computing Lecture 2: Structure of the Web October 1, 2002.
A Graph-based Friend Recommendation System Using Genetic Algorithm
Improved Approximation Algorithms for the Quality of Service Steiner Tree Problem M. Karpinski Bonn University I. Măndoiu UC San Diego A. Olshevsky GaTech.
COMMUNICATION NETWORK. NOISE CHARACTERISTICS OF A CHANNEL 1.
Efficient Backbone Construction Methods in MANETs Using Directional Antennas 1 Shuhui Yang, 1 Jie Wu, 2 Fei Dai 1 Department of Computer Science and Engineering.
The Fundamentals: Algorithms, the Integers & Matrices.
2007/03/26OPLAB, NTUIM1 A Proactive Tree Recovery Mechanism for Resilient Overlay Network Networking, IEEE/ACM Transactions on Volume 15, Issue 1, Feb.
1 1 © 2003 Thomson  /South-Western Slide Slides Prepared by JOHN S. LOUCKS St. Edward’s University.
CSE554AlignmentSlide 1 CSE 554 Lecture 8: Alignment Fall 2013.
The Greedy Method. The Greedy Method Technique The greedy method is a general algorithm design paradigm, built on the following elements: configurations:
NOTATION FOR SOCIAL NETWORK DATA Three network schemas to represent a wide range of network data Graph theoretic Sociometric Algebraic A graph consists.
Hierarchy Overview Background: Hierarchy surrounds us: what is it? Micro foundations of social stratification Ivan Chase: Structure from process Action.
Graphs & Matrices Todd Cromedy & Bruce Nicometo March 30, 2004.
Networks. Ethernet  Invented by Dr. Robert Metcalfe in 1970 at Xerox Palo Alto Research Center  Allows group of computers to communicate in a Local.
UNIT 2 LESSON 6 CS PRINCIPLES. UNIT 2 LESSON 6 OBJECTIVES Students will be able to: Write an algorithm for solving the minimum spanning tree (MST) problem.
Chapter 9 Finding the Optimum 9.1 Finding the Best Tree.
Vector Quantization CAP5015 Fall 2005.
OPTIMAL CONNECTIONS: STRENGTH AND DISTANCE IN VALUED GRAPHS Yang, Song and David Knoke RESEARCH QUESTION: How to identify optimal connections, that is,
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
Spring 2008The Greedy Method1. Spring 2008The Greedy Method2 Outline and Reading The Greedy Method Technique (§5.1) Fractional Knapsack Problem (§5.1.1)
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
Construction of Optimal Data Aggregation Trees for Wireless Sensor Networks Deying Li, Jiannong Cao, Ming Liu, and Yuan Zheng Computer Communications and.
CSE 554 Lecture 8: Alignment
Mathematical Structures for Computer Science Chapter 6
Network analysis.
Shortest Path Problems
Enumerating Distances Using Spanners of Bounded Degree
Spanning Trees.
MATS Quantitative Methods Dr Huw Owens
Performance Comparison of Tarry and Awerbuch Algorithms
Effective Replica Allocation
Shortest Path Problems
Algorithms (2IL15) – Lecture 7
Algorithm Design Techniques Greedy Approach vs Dynamic Programming
Presentation transcript:

An Algorithm for Measuring Optimal Connections in Large Valued Networks Song Yang Henry Hexmoor Sociology Computer Science University of Arkansas Preparation of this presentation benefits from cogent comments from Jim Hollander

Binary Distance In binary graphs, path distance is normally used to indicate the optimal connections between a pair of nodes. This solution assumes that intermediaries are costly.

Binary Distance If more intermediaries are necessary to connect a pair of actors, they may extract higher commissions for their services, distort the information content exchanged, and increase the time required to complete a transaction.

VALUED GRAPHS Valued graph is defined as a graph whose lines carry numerical values indicating the intensities of the relationships between all dyads. For example, volumes of communications, levels of friendship and trust, or dollar amounts of economic transactions.

Optimal Connections in Valued Graphs Previous researchers propose a solution to measure optimal connections in valued graphs. Peay (1980) states that path value, defined as the smallest value attached to any line in a path, indicates the optimal path between a pair of nodes.

Problems The problems of Peay’s path value solutions How to determine the path value/optimal connection when multiple paths/path values present between two nodes? How to account for the transaction costs of exchanges involving many go- betweens?

Our Solution We argue that including binary distance is especially crucial for measuring path strength in a valued graph Because it takes into account the costs (in time, energy, or decay of information) required for indirectly connected dyads to reach one another through varying numbers of intermediaries.

APV A measure of Average Path Value (APV) between nodes ni and nj is the ratio of path value to distance, indicated by

APV Note that a pair of nodes may have multiple paths, thus containing multiple APVs. We suggest that the highest APV indicates the optimal connection between the pair of nodes.

APV So optimal connection permits the highest volume of things such as transactions, messages, contracts, treaties or friendships after controlling for the binary distance between the two nodes.

Applications of APV Full Network Data Strategic Alliance Network among a set of firms under focus

The Algorithm Step 1 involves identifying different connected components in a graph with Union Find Algorithm. A connected component consists of a set of nodes, in which each node can reach every other node in the set. Step 2 involves calling of a subroutine called MAPVC to process optimal connections in each connected components Step 3 ensures all the connected components are processed and results organized into a matrix for further analyses

MAPVC MAPVC considers each node v one at a time and incrementally constructs a path from that node to all other nodes. MAPVC calls a subroutine Maximum APV (MAPV) to process each node

MAPV Let us start with v (i) First a node v (j) is picked so it has a maximum APV (path values/number of lines) with v (i). The path linking v (i) and v (j) becomes the path for subsequent extension. Suppose a node v (k) is picked extending the v (i) – v (j) path.

MAPV If the path value of v (j) – v (k) path is smaller than the v (i) – v (j) path, the v (j) – v (k) path value will replace the original v (i) – v (j) path value to compute the APV for v (i) – v (k) path For every extension, the algorithm picks up path with the largest APV and NEVER extended before.

MAPV The process continues until every path in the connected component matrix was either extended or was a terminal path, which was because either no other nodes is reachable or circular path occurs (the path connects back to the beginning node) In the end, the algorithm compares different APVs during each stage of path extension and picks up the largest APV to indicate the optimal connection between the node v (i) and node v (k)

MAPV-MAPVC-Union Find MAPV for single node in a connected component MAPVC calls on MAPV to process all the nodes in a connected components Union Find calls on MAPVC to process all the connected components in a graph

Example A DC E B

Application and Limitation Data have to be full network, instead of ego-centered network data Does not account for signs of links, always assume positive relations Does not account for directions, only for non-directional graphs. In other words, input and output matrices are symmetrical

Data Data matrix are strategic alliances among 38 companies in the Informational Technology in 1998 This dataset comes from a large database focusing on 145 IT companies from 1989 to 2002, collected by David Knoke and his associates.