Optimisation of Clustering Algorithms for the Identification of Customer

Total Page:16

File Type:pdf, Size:1020Kb

Optimisation of Clustering Algorithms for the Identification of Customer FAKULTAT¨ FUR¨ MATHEMATIK UNIVERSITAT¨ KARLSRUHE Optimisation of Clustering Algorithms for the Identification of Customer Profiles from Shopping Cart Data Optimierung von Clusterverfahren zur Identifikation von K¨auferprofilen aus Warenkorbdaten Diplomarbeit von: Stefanie Nagel Matrikel Nummer: 1190189 Karlsruhe, October 17, 2008 Ausgef¨uhrtunter der Leitung von Referentin/Betreuerin: Koreferent: Prof. Dr. Dorothea Wagner Prof. Dr. Willy D¨orfler Fakult¨atf¨urInformatik Fakult¨at f¨urMathematik Universit¨at Karlsruhe Universit¨at Karlsruhe betreuender Mitarbeiter: Robert G¨orke Fakult¨atf¨urInformatik Universit¨at Karlsruhe I Eidesstattliche Erkl¨arung Hiermit versichere ich, dass ich die vorliegende Diplomarbeit ohne Hilfe Dritter und nur mit den angegebenen Quellen und Hilfsmitteln angefertigt habe. Diese Arbeit hat in gleicher oder ¨ahnlicher Form noch keiner Pr¨ufungsbeh¨ordevorgelegen. Karlsruhe, February 25, 2009 Stefanie Nagel I Contents Eidesstattliche Erkl¨arung I Contents III List of Figures VII List of Tables IX 1 Introduction 1 2 Motivation 3 2.1 Finding Frequent Itemsets with FP-Growth . 4 2.2 Generating Association Rules . 10 2.3 Improving Association Rules . 10 2.4 Possibilities for Improving This Procedure . 11 3 Graph Modelling 13 3.1 Building the Weights . 13 3.2 Community . 14 3.3 The Number of Clusterings . 17 4 Quality Indices 19 4.1 Coverage . 19 4.2 Performance . 20 4.3 Modularity . 20 4.4 Extending Coverage . 21 4.5 Extending Performance . 21 4.6 Extending Modularity . 22 4.7 An Example . 26 5 Network Analysis 31 5.1 Visualisation of the Graph . 31 5.2 Degree Distribution . 32 5.3 Betweenness Centrality . 32 5.4 Clustering Coefficients . 34 5.5 k-Core Analysis . 36 III IV CONTENTS 6 Clustering Algorithms 41 6.1 CPM............................................. 41 6.1.1 The Idea . 41 6.1.2 Real-World Examples . 43 6.1.3 Algorithmic Implementation . 43 6.1.4 Existence of k-cliques . 45 6.1.5 The Realisation . 45 6.1.6 The Result . 45 6.1.7 Advantages and Disadvantages of the CPM . 48 6.2 CPMw............................................ 49 6.2.1 The Idea . 49 6.2.2 Clique Size and Intensity Threshold . 49 6.2.3 The Result . 50 6.2.4 Advantages and Disadvantages of the CPMw . 51 6.2.5 Comparison of CPM and CPMw . 51 6.3 CNM............................................. 52 6.3.1 The Idea . 52 6.3.2 Real-World Examples . 53 6.3.3 The Realisation . 54 6.3.4 Tuning the Efficiency . 55 6.3.5 The Result . 56 6.3.6 Advantages and Disadvantages of the CNM Algorithm . 56 6.4 Guillaume . 58 6.4.1 The Idea . 58 6.4.2 Real-World Examples . 58 6.4.3 The Realisation . 61 6.4.4 The Result . 61 6.4.5 Advantages and Disadvantages of Guillaume . 61 6.5 Fortunato . 63 6.5.1 The Idea . 63 6.5.2 Real-World Examples . 63 6.5.3 Improving the Effectiveness . 64 6.5.4 The Right Choice of α ............................... 65 6.5.5 The Computational Complexity . 67 6.5.6 The Realisation . 68 6.5.7 The Result . 68 6.5.8 Advantages and Disadvantages of Fortunato . 69 7 Comparison of the Results 71 7.1 Quality Indices Discussion . 72 7.1.1 Modularity . 72 7.1.2 Coverage . 73 7.1.3 Performance . 73 7.2 CPM and CPMw . 75 7.3 CNM............................................. 76 7.4 Guillaume . 77 7.5 Fortunato . 77 7.6 Visualisations for Gbuy ................................... 78 IV CONTENTS V 8 Transfer to Another Graph 81 8.1 Network Analysis . 81 8.1.1 Visualisation . 81 8.1.2 Degree Distribution . 81 8.1.3 Betweenness Centrality . 81 8.1.4 Clustering Coefficients . 81 8.1.5 Edge Weight Distribution . 83 8.1.6 k-Core Analysis . 83 8.2 Results . 84 8.3 Conclusion . 88 8.3.1 Using the Results . 88 8.3.2 Semantics in the Detected Clusters . 88 8.3.3 Next Steps . 88 9 Implementation Chapter 89 Appendix 93 A Visualisation of Gbuy 93 B Weight Threshold and Community Size of the CPM for Gbuy 95 C Distribution of the Community Sizes for Gbuy 97 D Distribution of the Community Sizes for Gbuy (Threshold = 0.1) 99 E Distribution of the Community Sizes for Gbuy (Threshold = 0.02) 101 F Modularity During the Application of the CNM Algorithm (Gbuy) 103 G Comment Concerning Guillaume’s Software 105 H Statistics of Fortunato’s Algorithm (Applied to Gbuy) 107 anotherShop I Visualisation of Gbuy 111 Bibliography 113 V List of Figures 2.1 Primitives for specifying a data mining task . 5 2.2 Mining an FP-tree with a single prefix path . 8 2.3 The FP-tree of the example in Table 2.1 . 9 2.4 The conditional FP-tree of vertex p in the example of Table 2.1 . 9 3.1 C1 and C3 are weak communities, C2 is not a weak community . 15 3.2 Example of an LS set . 16 4.1 Different clusterings of an example graph . 27 5.1 Degree distribution in Gbuy ................................. 33 5.2 Betweenness centrality in Gbuy ............................... 34 5.3 Clustering coefficients in Gbuy ............................... 35 5.4 Example of 0, 1, 2 and 3 core . 36 5.5 k-cores of Gbuy (LaNet-vi) . 37 5.6 k-cores of Gbuy (LunarVis) . 38 6.1 Rolling a 3-clique through a graph . 42 6.2 Local community structure in the neighbourhood of a randomly chosen vertex (CPM) 43 6.3 Edge weight distribution of Gbuy .............................. 45 6.4 Resulting community sizes of the CPM . 47 6.5 Comparison of the CPM and the CPMw . 51 6.6 Translation of a weighted network into a multigraph . 52 6.7 Dendrogram of the communities in the ”karate club” network (CNM) . 53 6.8 Dendrogram of the communities in the network of ”American college football teams” (CNM) . 54 6.9 Modularity during the application of the CNM algorithm in case of Gbuy ....... 56 6.10 Communities in the ”Belgian mobile phone” network (Guillaume) ..
Recommended publications
  • The Hitchhiker's Guide to Graph Exchange Formats
    The Hitchhiker’s Guide to Graph Exchange Formats Prof. Matthew Roughan [email protected] http://www.maths.adelaide.edu.au/matthew.roughan/ Work with Jono Tuke UoA June 4, 2015 M.Roughan (UoA) Hitch Hikers Guide June 4, 2015 1 / 31 Graphs Graph: G(N; E) I N = set of nodes (vertices) I E = set of edges (links) Often we have additional information, e.g., I link distance I node type I graph name M.Roughan (UoA) Hitch Hikers Guide June 4, 2015 2 / 31 Why? To represent data where “connections” are 1st class objects in their own right I storing the data in the right format improves access, processing, ... I it’s natural, elegant, efficient, ... Many, many datasets M.Roughan (UoA) Hitch Hikers Guide June 4, 2015 3 / 31 ISPs: Internode: layer 3 http: //www.internode.on.net/pdf/network/internode-domestic-ip-network.pdf M.Roughan (UoA) Hitch Hikers Guide June 4, 2015 4 / 31 ISPs: Level 3 (NA) http://www.fiberco.org/images/Level3-Metro-Fiber-Map4.jpg M.Roughan (UoA) Hitch Hikers Guide June 4, 2015 5 / 31 Telegraph submarine cables http://en.wikipedia.org/wiki/File:1901_Eastern_Telegraph_cables.png M.Roughan (UoA) Hitch Hikers Guide June 4, 2015 6 / 31 Electricity grid M.Roughan (UoA) Hitch Hikers Guide June 4, 2015 7 / 31 Bus network (Adelaide CBD) M.Roughan (UoA) Hitch Hikers Guide June 4, 2015 8 / 31 French Rail http://www.alleuroperail.com/europe-map-railways.htm M.Roughan (UoA) Hitch Hikers Guide June 4, 2015 9 / 31 Protocol relationships M.Roughan (UoA) Hitch Hikers Guide June 4, 2015 10 / 31 Food web M.Roughan (UoA) Hitch Hikers
    [Show full text]
  • A DSL for Defining Instance Templates for the ASMIG System
    A DSL for defining instance templates for the ASMIG system Andrii Kovalov Dissertation 2014 Erasmus Mundus MSc in Dependable Software Systems Department of Computer Science National University of Ireland, Maynooth Co. Kildare, Ireland A dissertation submitted in partial fulfilment of the requirements for the Erasmus Mundus MSc Dependable Software Systems Head of Department : Dr Adam Winstanley Supervisor : Dr James Power Date: June 2014 Abstract The area of our work is test data generation via automatic instantiation of software models. Model instantiation or model finding is a process of find- ing instances of software models. For example, if a model is represented as a UML class diagram, the instances of this model are UML object diagrams. Model instantiation has several applications: finding solutions to problems expressed as models, model testing and test data generation. There are sys- tems that automatically generate model instances, one of them is ASMIG (A Small Metamodel Instance Generator). This system is focused on a `problem solving' use case. The motivation of our work is to adapt ASMIG system for use as a test data generator and make the instance generation process more transparent for the user. In order to achieve this we provided a way for the user to interact with ASMIG internal data structure, the instance template graph via a specially designed graph definition domain-specific language. As a result, the user is able to configure the instance template in order to get plausible instances, which can be then used as test data. Although model finding is only suitable for obtaining test inputs, but not the expected test outputs, it can be applied effectively for smoke testing of systems that process complex hierarchic data structures such as programming language parsers.
    [Show full text]
  • Bioinformatics Methods for the Genetic and Molecular Characterisation Of
    BIOINFORMATICS METHODSFORTHE GENETICAND MOLECULAR CHARACTERISATION OFCANCER Dissertation zur Erlangung des Grades des Doktors der Naturwissenschaften der Naturwissenschaftlich-Technischen Fakultäten der Universität des Saarlandes vo n DANIELSTÖCKEL Universität des Saarlandes, MI – Fakultät für Mathematik und Informatik, Informatik b e t r e u e r PROF.DR.HANS-PETERLENHOF 6. dezember 2016 Daten der Verteidigung Datum 25.11.2016, 15 Uhr ct. Vorsitzender Prof. Dr. Volkhard Helms Erstgutachter Prof. Dr. Hans-Peter Lenhof Zweitgutachter Prof. Dr. Andreas Keller Beisitzerin Dr. Christina Backes Dekan Prof. Dr. Frank-Olaf Schreyer This thesis is also available online at: https://somweyr.de/~daniel/ dissertation.zip ii a b s t r ac t Cancer is a class of complex, heterogeneous diseases of which many types have proven to be difficult to treat due to the high ge- netic variability between and within tumours. To improve ther- apy, some cases require a thorough genetic and molecular charac- terisation that allows to identify mutations and pathogenic pro- cesses playing a central role for the development of the disease. Data obtained from modern, biological high-throughput exper- iments can offer valuable insights in this regard. Therefore, we developed a range of interoperable approaches that support the analysis of high-throughput datasets on multiple levels of detail. Mutations are a main driving force behind the development of cancer. To assess their impact on an affected protein, we de- signed BALL-SNP which allows to visualise and analyse single nucleotide variants in a structure context. For modelling the ef- fect of mutations on biological processes we created CausalTrail which is based on causal Bayesian networks and the do-calculus.
    [Show full text]
  • Compiler Support for Operator Overloading and Algorithmic Differentiation in C++
    Compiler Support for Operator Overloading and Algorithmic Differentiation in C++ Zur Erlangung des Grades eines Doktors der Naturwissenschaften (Dr.rer.nat.) genehmigte Dissertation von Alexander Hück, M.Sc. aus Wiesbaden Tag der Einreichung: 16.01.2020, Tag der Prüfung: 28.02.2020 1. Gutachten: Prof. Dr. Christian Bischof 2. Gutachten: Prof. Dr. Martin Bücker Darmstadt – D 17 Computer Science Department Scientific Computing Compiler Support for Operator Overloading and Algorithmic Differentiation in C++ Doctoral thesis by Alexander Hück, M.Sc. 1. Review: Prof. Dr. Christian Bischof 2. Review: Prof. Dr. Martin Bücker Date of submission: 16.01.2020 Date of thesis defense: 28.02.2020 Darmstadt – D 17 Bitte zitieren Sie dieses Dokument als: URN: urn:nbn:de:tuda-tuprints-115226 URL: http://tuprints.ulb.tu-darmstadt.de/11522 Dieses Dokument wird bereitgestellt von tuprints, E-Publishing-Service der TU Darmstadt http://tuprints.ulb.tu-darmstadt.de [email protected] Die Veröffentlichung steht unter folgender Creative Commons Lizenz: Namensnennung – Keine Bearbeitungen 4.0 International (CC BY–ND 4.0) The publication is under the following Creative Commons license: Attribution – NoDerivatives 4.0 International (CC BY–ND 4.0) Erklärungen laut Promotionsordnung §8 Abs. 1 lit. c PromO Ich versichere hiermit, dass die elektronische Version meiner Dissertation mit der schriftli- chen Version übereinstimmt. §8 Abs. 1 lit. d PromO Ich versichere hiermit, dass zu einem vorherigen Zeitpunkt noch keine Promotion versucht wurde. In diesem Fall sind nähere Angaben über Zeitpunkt, Hochschule, Dissertationsthe- ma und Ergebnis dieses Versuchs mitzuteilen. §9 Abs. 1 PromO Ich versichere hiermit, dass die vorliegende Dissertation selbstständig und nur unter Verwendung der angegebenen Quellen verfasst wurde.
    [Show full text]
  • Lesson 8 Graph Visual Analytics: Visualising and Analysing Network Data
    ISSS608 Visual Analytics and Applications 10/14/2016 Lesson 8: Visualising and Analysing Network Data Lesson 8 Graph Visual Analytics: Visualising and Analysing Network Data Mentor: Dr. Kam Tin Seong Associate Professor of Information Systems (Practice) School of Information Systems, Singapore Management University Content • Introduction to Graph Visual Analytics • Graph Visualisation in Actions • Basic Principles of Graph – Network data sets – Graph data format • Network Visualisation and Analysis – Network visualisation and analysis process model – Graph layouts and visual attributes – Network metrics • Network visualisation and analysis tools – NodeXL – Gephi 2 8-1 ISSS608 Visual Analytics and Applications 10/14/2016 Lesson 8: Visualising and Analysing Network Data Network in real World • Physical – Transportation (i.e. road, port, rail, etc) – Utility (electricity, water, gas, network cable, etc) – Natural (river, etc) • Abstract – Social media (i.e. e-mail, Facebook, Twitter, Wikipedia, etc) – Organisation (i.e. NGO, politics, customer-company, staff-to-staff, criminal, terrorist, disease, etc) 3 Classical Graph Theory • The Seven Bridges of Königsberg is a historically notable problem in mathematics. Its negative resolution by Leonhard Euler in 1735 laid the foundations of graph theory and prefigured the idea of topology. Source: http://en.wikipedia.org/wiki/Seven_Bridges_of_K%C3%B6nigsberg 4 8-2 ISSS608 Visual Analytics and Applications 10/14/2016 Lesson 8: Visualising and Analysing Network Data Classical Graph Visualisation and
    [Show full text]
  • Lesson 8 Graph Visualisation and Analysis: Methods and Applications
    IS428 Visual Analytics for Business Intelligence 10/8/2016 Lesson 8: Graph Visualisation and Analysis Lesson 8 Graph Visualisation and Analysis: Methods and Applications Mentor: Dr. Kam Tin Seong Associate Professor of Information Systems (Practice) School of Information Systems, Singapore Management University Content • Motivation of graph visualisation • Graph Visualisation in Actions • Typology of network data • Graph data file formats • Graph Layout Techniques • Network visualisation and analysis process model • Network Metrics • Network visualisation and analysis tools – Gephi – NodeXL 8-1 IS428 Visual Analytics for Business Intelligence 10/8/2016 Lesson 8: Graph Visualisation and Analysis Network in real World • Physical – Transportation (i.e. road, port, rail, etc) – Utility (electricity, water, gas, network cable, etc) – Natural (river, etc) • Abstract – Social media (i.e. e-mail, Facebook, Twitter, Wikipedia, etc) – Organisation (i.e. NGO, politics, customer-company, staff-to-staff, criminal, terrorist, disease, etc) 3 Classical Graph Theory • The Seven Bridges of Königsberg is a historically notable problem in mathematics. Its negative resolution by Leonhard Euler in 1735 laid the foundations of graph theory and prefigured the idea of topology. Source: http://en.wikipedia.org/wiki/Seven_Bridges_of_K%C3%B6nigsberg 4 8-2 IS428 Visual Analytics for Business Intelligence 10/8/2016 Lesson 8: Graph Visualisation and Analysis Classical Graph Visualisation and Analysis • Using sociogram, also know as network graph Early 20th-century
    [Show full text]
  • WEB-BASED DRAWING SOFTWARE for GRAPHS in 3D and TWO LAYOUT ALGORITHMS FARSHAD BARAHIMI Bachelor of Science, Shahid Bahonar Unive
    WEB-BASED DRAWING SOFTWARE FOR GRAPHS IN 3D AND TWO LAYOUT ALGORITHMS FARSHAD BARAHIMI Bachelor of Science, Shahid Bahonar University of Kerman, 2010 A Thesis Submitted to the School of Graduate Studies of the University of Lethbridge in Partial Fulfillment of the Requirements for the Degree MASTER OF SCIENCE Department of Mathematics and Computer Science University of Lethbridge LETHBRIDGE, ALBERTA, CANADA c Farshad Barahimi, 2015 WEB-BASED DRAWING SOFTWARE FOR GRAPHS IN 3D AND TWO LAYOUT ALGORITHMS FARSHAD BARAHIMI Date of Defense: April 20, 2015 Dr. Stephen Wismath Supervisor Professor Ph.D. Dr. Robert Benkoczi Thesis Examination Assistant Professor Ph.D. Committee Member Dr. Joy Morris Thesis Examination Associate Professor Ph.D. Committee Member Dr. Howard Cheng Chair, Associate Professor Ph.D. Thesis Examination Committee Dedication Dedicated to my family whose value for me can not be expressed in words. iii Abstract A new web-based software system for visualization and manipulation of graphs in 3D, named We3Graph is presented with a focus on accessibility, customizability for applica- tions of graph drawing, usability and extendibility. The software system allows multiple users to work on the same graph at the same time and is accessible through web browsers. The software can be extended using plugins written in any programming language and custom render engines written in the Javascript language. Also two new algorithms are proposed to answer the following question, previously raised in [53]: Given a graph G with n vertices, V = fv1;v2;:::;vng, and given a set of n distinct points P = fp1; p2;:::; png each with integer coordinates in three di- mensions, can G be drawn crossing-free on P with vi at pi and with a number of bends polynomial in n and in a volume polynomial in n and the dimension of P? iv Acknowledgments I want to express my gratitude to Dr.
    [Show full text]
  • Unravelling Graph Exchange File Formats
    1 Unravelling Graph-Exchange File Formats Matthew Roughan and Jonathan Tuke Abstract—A graph is used to represent data in which the this context is not purely about syntax. Exchange also requires relationships between the objects in the data are at least as common definitions of the meaning of the attributes. important as the objects themselves. Over the last two decades nearly a hundred file formats have been proposed or used On the other hand, file size is not a primary consideration. to provide portable access to such data. This paper seeks to Hence many exchange formats pay little attention to this and review these formats, and provide some insight to both reduce related details (e.g., read/write performance). the ongoing creation of unnecessary formats, and guide the We concentrate on exchange formats, but some of the development of new formats where needed. formats considered here were not originally developed with exchange in mind, but have become de facto exchange formats I. INTRODUCTION through use. In these cases we see reversals of objectives XCHANGE of data is a basic requirement of scientific compared to some purpose-built exchange formats. We shall E research. Accurate exchange requires portable file for- therefore consider a large range of such features for compari- mats, where portability means the ability to transfer (without son, noting as we do so that as exchange of very large datasets extraordinary efforts) the data both between computers (hard- becomes important, the requirements will change. ware and operating system), and between software (different Many of the formats presented may seem obsolete.
    [Show full text]
  • XML-Entscheidungsbäume Für Applikationen Jan Oevermann (46594)
    XML-Entscheidungsbäume für Applikationen Jan Oevermann (46594) Projektarbeit an der Hochschule Karlsruhe WS 2013/14 2 Inhaltsverzeichnis Einführung ................................................................................................ 5 Abstract ................................................................................................................................ 5 Begriffe ................................................................................................................................. 6 UseCases ................................................................................................. 7 Entscheidungsbäume .............................................................................. 8 Darstellung ........................................................................................................................... 8 Anwendungen ...................................................................................................................... 8 Herausforderungen .................................................................................. 9 Trennung von Logik und Inhalt ............................................................................................ 9 Freigabeprozess ................................................................................................................... 9 Wiederverwendung .............................................................................................................. 9 Workflow ...............................................................................................
    [Show full text]
  • The Rocs Handbook
    The Rocs Handbook Tomaz Canabrava Andreas Cord-Landwehr The Rocs Handbook 2 Contents 1 Introduction 6 1.1 Goals, Target Audience, and Workflows . .6 1.2 Rocs in a Nutshell . .7 1.2.1 Graph Documents . .7 1.2.2 Edge Types . .7 1.2.3 Node Types . .7 1.2.4 Properties . .8 1.3 Tutorial . .8 1.3.1 Generating the Graph . .8 1.3.2 Creating the Element Types . .8 1.3.3 The Algorithm . .8 1.3.4 Execute the Algorithm . .9 2 The Rocs User Interface 10 2.1 Main Elements of the User Interface . 10 2.2 Graph Editor Toolbar . 11 3 Scripting 12 3.1 Executing Algorithms in Rocs . 12 3.1.1 Control Script Execution . 12 3.1.2 Script Output . 12 3.1.3 Scripting Engine API . 13 4 Import and Export 14 4.1 Exchange Rocs Projects . 14 4.1.1 Import and Export of Graph Documents . 14 4.1.1.1 Trivial Graph File Format . 14 4.1.1.1.1 Format Specification . 14 4.1.1.1.2 Example . 15 4.1.1.2 DOT Language / Graphviz Graph File Format . 15 4.1.1.2.1 Unsupported Features . 15 4.1.1.2.2 Example . 15 The Rocs Handbook 5 Graph Layout 16 5.1 Laying out graphs automatically in Rocs . 16 5.1.1 Force Based Layout . 16 5.1.1.1 Radial Tree Layout . 17 6 Credits and License 18 4 Abstract Rocs is a graph theory tool by KDE. The Rocs Handbook Chapter 1 Introduction This chapter provides an overview of the core features and the typical workflows.
    [Show full text]
  • Overview of Existing Software Tools for Graph Matching
    Technical Report Pattern Recognition and Image Processing Group Institute of Computer Aided Automation Vienna University of Technology Favoritenstr. 9/183-2 A-1040 Vienna AUSTRIA Phone: +43 (1) 58801-18351 Fax: +43 (1) 58801-18392 E-mail: [email protected] URL: http://www.prip.tuwien.ac.at/ PRIP-TR-130 September 21, 2013 Overview of Existing Software Tools for Graph Matching Katrin Lasinger Abstract This report was created in the course of the seminar \Selected Chapters in Image Process- ing" at the Vienna University of Technology under the supervision of Walter Kropatsch. The report aims to give an overview of publicly available software toolkits for graph match- ing. Existing graph datasets for graph matching benchmarking as well as common data structures to store graphs are presented. Libraries and toolkits for exact and inexact match- ing are covered in the report and their implemented algorithms are stated. 1 Introduction Graph matching algorithms have been used for pattern recognition tasks since the early seventies. The paper "Thirty years of graph matching in Pattern Recognition" by Conte et al. [2] gives a survey of the literature in graph matching algorithms and types of applications of graph-based tech- niques up to the early 2000's. Algorithms can be divided into exact and inexact matching approaches. The first group covers approaches like graph and subgraph isomorphism that require strict correspondences between two graphs or at least their subgraphs. Inexact matching algorithms have less strict constraints and tolerate some differences between the graphs. Some reasons why this might be necessary are noisy data or intrinsic variability of the patterns.
    [Show full text]
  • Lesson 10 Visualising and Analysing Network Data
    ISSS608 Visual Analytics and Applications 11/18/2015 Lesson 10: Visualising and Analysing Network Data Lesson 10 Visualising and Analysing Network Data Mentor: Dr. Kam Tin Seong Associate Professor of Information Systems (Practice) School of Information Systems, Singapore Management University Content • Introduction to Graph Visual Analytics • Graph Visualisation in Actions • Basic Principles of Graph – Network data sets – Graph data format • Network Visualisation and Analysis – Network visualisation and analysis process model – Graph layouts and visual attributes – Network metrics • Network visualisation and analysis tools – NodeXL – Gephi 2 10-1 ISSS608 Visual Analytics and Applications 11/18/2015 Lesson 10: Visualising and Analysing Network Data Network in real World • Physical – Transportation (i.e. road, port, rail, etc) – Utility (electricity, water, gas, network cable, etc) – Natural (river, etc) • Abstract – Social media (i.e. e-mail, Facebook, Twitter, Wikipedia, etc) – Organisation (i.e. NGO, politics, customer-company, staff-to-staff, criminal, terrorist, disease, etc) 3 Classical Graph Theory • The Seven Bridges of Königsberg is a historically notable problem in mathematics. Its negative resolution by Leonhard Euler in 1735 laid the foundations of graph theory and prefigured the idea of topology. Source: http://en.wikipedia.org/wiki/Seven_Bridges_of_K%C3%B6nigsberg 4 10-2 ISSS608 Visual Analytics and Applications 11/18/2015 Lesson 10: Visualising and Analysing Network Data Classical Graph Visualisation and Analysis • Using
    [Show full text]