Preview

Analysis of Social Networks Using NodeXL

Better Essays
Open Document
Open Document
1080 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Analysis of Social Networks Using NodeXL
Analyzing Social Networks using NodeXL
Abstract:
Analyzing the social networks by finding page rank, betweenness and closeness centrality, degree, etc through programming requires a lot of coding (time consuming) and graphical representation of such large datasets is a challenge. Generating network statistics and metrics and creating visualizations of network graphs is made easy by using the tool NodeXL provided by the Microsoft in the familiar network of Microsoft Excel as a small add-in. In this part of the project we found the node with the highest pagerank, form communities by k-degree algorithm, reducing the graph size using degree values of each node by exploring the features provided by the NodeXL.
Wiki-Vote Dataset:
This dataset has 1036398 edges and 7115 vertices. The graphical representation of the dataset using NodeXL is:

The visual graph shows that there are a lot of unconnected edges with the other nodes. Our first objective is to reduce the graph. The reduced graph has edges and vertices with degree higher than 2 and in-degree and out-degree for each vertex>=1.This increased the connectivity between the vertices in the graph.

Reducing the graph:
As this is a directed graph, some nodes might not have edges directed to it(in-degree) or directed from it(out-degree).Here in-degree means the number of votes the node received and out-degree is the number he voted for other node. Through NodeXL, we found the nodes with zero in-degree and zero out-degree. This can be done by NodeXL. In the excel sheet NodeXL menu , * Select type of graph as directed from the drop down menu. * Select Graph metrics in the graph menu. * Select in-degree, out-degree, etc in the menu to calculate overall graph metrics which can be used later for future analyzation or just the in-degree and out-degree.

* After calculating in-degree and out-degree, using the excel formula we make the visibility of the nodes with zero in-degree or zero out-degree to

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Network Topology – A drawing of a series of connected nodes via links, including descriptions.…

    • 503 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Step 1: Construct a network diagram for the project. (NOTE: EF for activity H should be 19)…

    • 552 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    IT299 Unit 8 Project

    • 2529 Words
    • 7 Pages

    Network topology refers to the physical layout of a network. The chosen layout directly impacts how each node on a given network communicates with another. There are multiple types of topologies that can be used based on the need of the project. The ultimate goal is to provide multiple lines of data communication which will increase fault tolerance on the network and reduce or eliminate a complete disruption of service.…

    • 2529 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    AP Bio photosynthesis

    • 1029 Words
    • 5 Pages

    ●The reactants in light reactions are light and water. The product is oxygen. The Calvin cycle takes in carbon dioxide to make sugar.…

    • 1029 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Where 〖 N〗^l (v) is the set of neighbors of node v that have the label l, and |(X)| is the cardinality of set X.Below are the main steps of LPA [14]:…

    • 480 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    6. This graph is an Euler circuit. Each edge has been covered once and only once and all edges have been covered.…

    • 473 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    7. The values for your graph many differ slightly, but overall they should be about the same as those pictured. If not, you must check your configurations before continuing, because we are going to duplicate this scenario and if you have errors in the current configurations, they will be copied over to the duplicate simulation.…

    • 1775 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Graphology can be considered scientific research. In order for scientific research to have successful results, the research must have either five or seven steps. The steps begin with the formation of a problem. Graphology must have a defined reason before the process is used for any reason. The scientific research will ask a question, gather information, form a theory, collect and sort data, analyze the date, interpret the data and present the final results. The graphology methods, as a serious procedure, must conclude with information that has reasonable rationale and solid validity. Validity refers to the degree to which evidence and theory support the understanding of…

    • 1354 Words
    • 39 Pages
    Better Essays
  • Best Essays

    50–57. ACM, New York (1999) 11. Kawamae, N., Sakano, H., Yamada, T.: Personalized recommendation based on the personal innovator degree. In: Proceedings of the Third ACM Conference on Recommender Systems, RecSys 2009, pp. 329–332. ACM, New York (2009) 12. Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2003, pp. 137–146. ACM, New York (2003) 13. Kim, H., Park, H.: Sparse non-negative matrix factorizations via alternating nonnegativity-constrained least squares for microarray data analysis. Bioinformatics 23(12), 1495–1502 (2007) 14. Kimura, M., Saito, K., Nakano, R.: Extracting influential nodes for information diffusion on a social network. In: Proceedings of the 22nd National Conference on Artificial Intelligence, AAAI 2007, vol. 2, pp. 1371–1376. AAAI Press, Vancouver (2007) 15. Koren, Y., Bell, R., Volinsky, C.: Matrix factorization techniques for recommender systems. Computer 42(9), 30–37 (2009) 16. Lee, D.D., Seung, H.S.: Learning the parts of objects by non-negative matrix factorization. Nature 401(6755), 788–791 (1999) 17. Lee, D.D., Seung, H.S.: Algorithms for Non-negative Matrix Factorization. In: Leen, T.K., Dietterich, T.G., Tresp, V. (eds.) Advances in Neural Information Processing Systems, vol. 13, pp. 556–562. MIT Press, Cambridge (2001) 18. Pascual-Montano, A., Carazo, J., Kochi, K., Lehmann, D., Pascual-Marqui, R.D.: Nonsmooth nonnegative matrix factorization (nsnmf). IEEE Transactions on Pattern Analysis and Machine Intelligence 28, 403–415 (2006)…

    • 3900 Words
    • 16 Pages
    Best Essays
  • Good Essays

    Prim's Algorithm

    • 625 Words
    • 3 Pages

    Consider the Philadelphia as the starting node. As this node is connected with only one node Pittsburgh with a distance of 320. So, a connection should be made between both nodes. Set S will have { Philadelphia, Pittsburgh } and Set V-S will have { Toledo, Detroit, Ann Arbor, Chicago, Ft. Wayne, Indianapolis, Cleveland, Columbus }. This can be shown as:…

    • 625 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Getting and Processing data from Twitter: Firstly, by “import tool” in NodeXL plug-in for Microsoft Excel, I searched for people whose tweets contains the key word “Julian Assange”, and ticked to all of three boxes “Follows”, “Replies-to”, and “Mentions relation” with the 100 people limitation so that I could get a stronger-connected graph. However, in some first searches, I could not get a reasonable graph as I expected due to 2 reasons. The first one is the limitation number was small, and I chose the box “I don’t have a twitter account” was another reason. And the graph was really weak-connected because there were only 4 or 5 edges and about over 90 single points. So I was not able to apply the “graph metrics” contents to consider these graphs. Then I registered to use twitter account to import more than 100 people data. This time I also used the key word “Julian Assange” but with the limitation up to 300 people. After that, I got 300 people whose tweets contain “Julian Assange”, and the graph was stronger-connected. Then I calculated all numbers by “Graph Metrics” tool, and removed some points which have zero degree in both of “in-degree” and “out-degree” in order that we can examine and deduce information more easily from the graph.…

    • 1246 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    The dynamic threshold is also visualized in the line chart. Then, it is used for anomaly detector. Finally, the line chart with dynamic threshold is going to be analyze in the next stage. After the dynamic threshold is calculated, implemented, and visualized, the statistical data is analyzed and evaluated in NetFlow against DNS statistic.…

    • 958 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    How to use Rcmdr

    • 445 Words
    • 2 Pages

    R-301 → etc → R Console→ Ctrl + F → write: Language →Click Enter →…

    • 445 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Assume the fuzzy membership function of TV(t) or TV(t + 1) consists of four fuzzy sets: VeryLow(VL-Malicious node), Low(LSuspect node), Medial(M-Normal trustworthy node) and High(HAbsolute trustworthy node), and the fuzzy member function of C(t + 1) consists of three fuzzy sets: Low(L-Low capability…

    • 1636 Words
    • 7 Pages
    Powerful Essays

Related Topics