Introduction to Social Network and Link Analysis

Total Page:16

File Type:pdf, Size:1020Kb

Introduction to Social Network and Link Analysis Introduction to Social Network and Link Analysis David Loshin Knowledge Integrity, Inc. TDWI 2007 Spring Conference Boston, MA 1 1 © 2006 Knowledge Integrity Incorporated 2 www.knowledge-integrity.com (301) 754-6350 2 Half-Day Agenda Introduction to Networks, social and otherwise Network Connectivity Basics Link and Network Analysis Issues and Considerations for BI © 2006 Knowledge Integrity Incorporated 3 www.knowledge-integrity.com (301) 754-6350 In this talk, we will discuss the notion of connectivity, and why models for analyzing connections can add value to a business intelligence initiative. By reviewing the ways that objects interact through networks, we will explore whether the results of this analysis can enhance profiles, predictive analytics, and general business intelligence Objectives: •Understand network connectivity basics •Explore ways to represent networks •Understand the types of analysis that can be performed •Envisioning network analytics, data extraction and preparation 3 Introduction to Networks, Social and Otherwise © 2006 Knowledge Integrity Incorporated 4 www.knowledge-integrity.com (301) 754-6350 4 Networks, Links, and Coincidences? How many people do you know? Family, friends, co-workers, conference attendees Dozens? Hundreds? Thousands? How well do you know them? Very close, know them well, acquaintances, “just met” Concepts of Connectivity? You know 1,000 people They each know 1,000 people Therefore, you are potentially connected to 1,000,000 people through just 1 link By 2 links, the network could potentially extend to 1,000,000,000 people! “Small World Theory” – we are all connected through a very small number of links (See Milgram, Bacon) © 2006 Knowledge Integrity Incorporated 5 www.knowledge-integrity.com (301) 754-6350 The notion of connectivity is intriguing, especially when considering individuals, other types of parties, and the knowledge that can be derived through the analysis of connections. For example, think about the example in this slide. Let’s assume that we all know about 1000 people. But is it really true that each individual is therefore linked to 1,000,000 people? Conceptually, that would be true as long as none of the 1000 people I know are completely different than the 1000 people that you know. But in reality, we all seem to run around in similar circles, and so there is a great likelihood that many of the people that I know are the same people that you know. The consequences of this is the effective “self-organization” of communities ( as well as sub-communities, and sub-sub-communities). By examining the relationships that exist among groups of people, we can learn who are the influencers, who are the influenced, who spans critical communication boundaries, and how information (or commerce, or viruses, etc.) flow through the selected community. 5 Euler’s Insight Bridges of Konigsberg © 2006 Knowledge Integrity Incorporated 6 www.knowledge-integrity.com (301) 754-6350 One pastime of the residents of Konigsberg was to walk around town over the bridges between the different land areas of town. One game was to see if one could start at one location, walk over every bridge just once, and end up at the starting point. Mathematician Leonhard Euler abstracted the problem into a “graph” – acollection of nodes and links between them. By examining the graph, he was able to determine that based on the degrees of the links between nodes, the challenge of the bridges of Konigsberg was actually impossible. However, this insight created the branch of mathematics referred to as graph theory, which is the fundamental basis of network (and consequently, social network) analysis. 6 Network and Link Analysis Linkages exist everywhere Between individuals (“MCI Friends and Family”) Between locations (“Bridges of Konigsberg”) Between other types of objects (“Telephone network”) Between individuals and other kinds of objects (“Purchasing Preferences”) Between businesses (“D&B corporate hierarchies”) There are different kinds of links Each link has some sort of attribution Analyzing networks can provide insight for evaluating behavior patterns for different intelligence activities © 2006 Knowledge Integrity Incorporated 7 www.knowledge-integrity.com (301) 754-6350 There are many applications that rely on the power of the network. Each of these networks represents some attempt to exploit the different kinds of connections that exist among small groups of individuals, larger groups of individuals as well as how the groups themselves interact. Applications may be designed to seek out some interesting pattern within the network or to exploit the communication and information exchanges provided by the network. Every node and their each of their corresponding links carries certain characteristics. Each node represents an entity, while each link carries attributes that describe the nature of the relationship. 7 Applications of Network/Link Analysis Enforcement: Criminal analysis, money laundering Fraud detection: spambot detection, call pattern analysis Marketing: Customer Behavior analysis, Segmentation, collaborative filtering Community analyses: Account proxy (account used by more than one individual, many accounts used by one individual), research collaboration, communities of interest © 2006 Knowledge Integrity Incorporated 8 www.knowledge-integrity.com (301) 754-6350 8 More Applications… Health care: Contagion, disease control Physical: Supply chain analysis Transfer/Communications: Spheres of Influence, Information flows, business partnerships Formal Relationships: Working relationships, Influential individuals, ownership, accountability, corporate structure Informal Relationships: Friendship networks, extended families, social interactions, insider networks © 2006 Knowledge Integrity Incorporated 9 www.knowledge-integrity.com (301) 754-6350 9 Evidence is All Around… Databases Transaction systems, logs, data warehouses Semi-structured data Email, web pages, public records, filings Unstructured data News items, prospectuses, filings © 2006 Knowledge Integrity Incorporated 10 www.knowledge-integrity.com (301) 754-6350 Typical business intelligence applications focus on the ability to organize information for reporting and analysis across one or more dimensions, but are not usually configured to enable network analysis. Yet data warehouses contain significant amounts of connectivity information that is suitable to network and link analysis. Other sources of information provide connectivity data – transaction systems, database logs, software activity logs, as well as less structured systems such as emails, web logs, electronic public data filings, other public records (e.g., real estate transactions, Uniform Commercial Code, etc.). In addition, text analysis applications can extract individual data out of unstructured data to establish connections. 10 Example: Death Notice Richard J. Palaima, Of Mattapan, Suddenly, Nov. 18, 2002. Beloved husband of Jonadee (Badayos) Palaima. Devoted son of Madelyn L. (George) Palaima of Braintree, and the late Richard A. Palaima. Devoted brother of John A. Palaima of Braintree, nephew of Catherine Cunningham of Rockland, Cousin & Godson of Robert Cunningham of Rockland. Funeral from the Mortimer N. Peck-Russell Peck Funeral Home, 516 Washington St., BRAINTREE, on Saturday at 9 a.m. Funeral Mass in St. Gregory's Church, Dorchester, at 10 a.m. Relatives and friends invited. Visiting hours Friday 2-4 & 7-9 p.m. Memorial donations may be sent to St. Gregory's Church, 2215 Dorchester Ave., Dorchester 02124. © 2006 Knowledge Integrity Incorporated 11 www.knowledge-integrity.com (301) 754-6350 This example was taken from the Boston Globe, and was available on line from 11/20/2002 - 11/21/2002. Death, birth, engagement, and wedding notices are good examples of publicly available information (published in the newspaper) configured in semi-structured form that provide a lot of data about connections. In this example, we have a description of one individual and his immediate family, his location, and his religious affiliation. 11 Example: Extracted Entities and Their Links lives in Richard A Plaima married to Braintree, MA lives in Madelyn L. (George) Palaima has living state of sister of Deceased Catherine Cunningham father of Mattapan, MA mother of has living state of mother of John A Palaima lives in St. Gregory's Church brother of Robert Cunningham lives in located in is religiously affiliated with lives in Richard J Paliama married to Jondalee (Badayos) Palaima Dorchester, MA is godson/godfather of Rockland, MA is cousin of © 2006 Knowledge Integrity Incorporated 12 www.knowledge-integrity.com (301) 754-6350 12 Good SNA Resource Many examples taken from Robert A. Hanneman and Mark Riddle’s online text Introduction to social network methods http://faculty.ucr.edu/~hanneman/nettext/ © 2006 Knowledge Integrity Incorporated 13 www.knowledge-integrity.com (301) 754-6350 13 Integrating Network/Link Analysis with BI Network information may be embedded within data warehouse However: Representations may not be appropriate for analysis Data may need to be transformed and managed using non- relational data structures Analysis lends itself to visual representation Must understand concepts associated with networks, connectivity, and qualification of linkage Objective: Gain a conceptual understanding of Network data and its representation Characteristics of network relationships Types of analysis performed © 2006 Knowledge Integrity
Recommended publications
  • Discover the Golden Paths, Unique Sequences and Marvelous Associations out of Your Big Data Using Link Analysis in SAS® Enterprise Miner TM
    MWSUG 2016 – Paper AA04 Discover the golden paths, unique sequences and marvelous associations out of your big data using Link Analysis in SAS® Enterprise Miner TM Delali Agbenyegah, Alliance Data Systems, Columbus, OH Candice Zhang, Alliance Data Systems, Columbus, OH ABSTRACT The need to extract useful information from large amount of data to positively influence business decisions is on the rise especially with the hyper expansion of retail data collection and storage and the advancement in computing capabilities. Many enterprises now have well established databases to capture Omni channel customer transactional behavior at the product or Store Keeping Unit (SKU) level. Crafting a robust analytical solution that utilizes these rich transactional data sources to create customized marketing incentives and product recommendations in a timely fashion to meet the expectations of the sophisticated shopper in our current generation can be daunting. Fortunately, the Link Analysis node in SAS® Enterprise Miner TM provides a simple but yet powerful analytical tool to extract, analyze, discover and visualize the relationships or associations (links) and sequences between items in a transactional data set up and develop item-cluster induced segmentation of customers as well as next-best offer recommendations. In this paper, we discuss the basic elements of Link Analysis from a statistical perspective and provide a real life example that leverages Link Analysis within SAS Enterprise Miner to discover amazing transactional paths, sequences and links. INTRODUCTION A financial fraud investigator may be interested in exploring the relationship between the financial transactions of suspicious customers, the BNI may want to analyze the social network of individuals identified as terrorists to conduct further investigation or a medical doctor may be interested in understanding the association between different medical treatments on patients and their corresponding results.
    [Show full text]
  • Link Analysis Using SAS Enterprise Miner
    Link Analysis Using SAS® Enterprise Miner™ Ye Liu, Taiyeong Lee, Ruiwen Zhang, and Jared Dean SAS Institute Inc. ABSTRACT The newly added Link Analysis node in SAS® Enterprise MinerTM visualizes a network of items or effects by detecting the linkages among items in transactional data or the linkages among levels of different variables in training data or raw data. This node also provides multiple centrality measures and cluster information among items so that you can better understand the linkage structure. In addition to the typical linkage analysis, the node also provides segmentation that is induced by the item clusters, and uses weighted confidence statistics to provide next-best-offer lists for customers. Examples that include real data sets show how to use the SAS Enterprise Miner Link Analysis node. INTRODUCTION Link analysis is a popular network analysis technique that is used to identify and visualize relationships (links) between different objects. The following questions could be nontrivial: Which websites link to which other ones? What linkage of items can be observed from consumers’ market baskets? How is one movie related to another based on user ratings? How are different petal lengths, width, and color linked by different, but related, species of flowers? How are specific variable levels related to each other? These relationships are all visible in data, and they all contain a wealth of information that most data mining techniques cannot take direct advantage of. In today’s ever-more-connected world, understanding relationships and connections is critical. Link analysis is the data mining technique that addresses this need. In SAS Enterprise Miner, the new Link Analysis node can take two kinds of input data: transactional data and non- transactional data (training data or raw data).
    [Show full text]
  • Evolving Networks and Social Network Analysis Methods And
    DOI: 10.5772/intechopen.79041 ProvisionalChapter chapter 7 Evolving Networks andand SocialSocial NetworkNetwork AnalysisAnalysis Methods and Techniques Mário Cordeiro, Rui P. Sarmento,Sarmento, PavelPavel BrazdilBrazdil andand João Gama Additional information isis available atat thethe endend ofof thethe chapterchapter http://dx.doi.org/10.5772/intechopen.79041 Abstract Evolving networks by definition are networks that change as a function of time. They are a natural extension of network science since almost all real-world networks evolve over time, either by adding or by removing nodes or links over time: elementary actor-level network measures like network centrality change as a function of time, popularity and influence of individuals grow or fade depending on processes, and events occur in net- works during time intervals. Other problems such as network-level statistics computation, link prediction, community detection, and visualization gain additional research impor- tance when applied to dynamic online social networks (OSNs). Due to their temporal dimension, rapid growth of users, velocity of changes in networks, and amount of data that these OSNs generate, effective and efficient methods and techniques for small static networks are now required to scale and deal with the temporal dimension in case of streaming settings. This chapter reviews the state of the art in selected aspects of evolving social networks presenting open research challenges related to OSNs. The challenges suggest that significant further research is required in evolving social networks, i.e., existent methods, techniques, and algorithms must be rethought and designed toward incremental and dynamic versions that allow the efficient analysis of evolving networks. Keywords: evolving networks, social network analysis 1.
    [Show full text]
  • On Some Aspects of Link Analysis and Informal Network in Social Network Platform
    Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320–088X IJCSMC, Vol. 2, Issue. 7, July 2013, pg.371 – 377 RESEARCH ARTICLE On Some Aspects of Link Analysis and Informal Network in Social Network Platform Subrata Paul Department of Computer Science and Engineering, M.I.T.S. Rayagada, Odisha 765017, INDIA [email protected] Abstract— This paper presents a review on the two important aspects of Social Network, namely Link Analysis and Informal Network. Both of these characteristic plays a vital role in analysis of direction of information flow and reliability of the information passed or received. They can be easily visualized or can be studied using the concepts of graph theory. We have deliberately omitted discussing about general definitions of social network and representing the relationship between actors as a graph with nodes and edges. This paper starts with a formal definition of Informal Network and continues with some of its major aspects. Moreover its application is explained with a real life example of a college scenario. In the later part of the paper, some aspects of Informal Network have been presented. The similar kind of real life scenario is also being drawn out here to represent application of informal network. Lastly, this paper ends with a general conclusion on these two topics. Key Terms: - Social Network; Link Analysis; Information Overload; Formal Network; Informal Network I. INTRODUCTION Link analysis is a data-analysis technique used to evaluate relationships (connections) between nodes. Relationships may be identified among various types of nodes (objects), including organizations, people and transactions.
    [Show full text]
  • Link Analysis
    Link Analysis from Bing Liu. “Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data”, Springer and other material. Data and Web Mining - S. Orlando 1 Contents § Introduction § Network properties § Social network analysis § Co-citation and bibliographic coupling § PageRank § HITS § Summary Data and Web Mining - S. Orlando 2 Introduction § Early search engines mainly compare content similarity of the query and the indexed pages, i.e., – they use information retrieval methods, cosine, TF- IDF, ... § From 1996, it became clear that content similarity alone was no longer sufficient. – The number of pages grew rapidly in the mid-late 1990’s. • Try the query “Barack Obama”. Google estimates about 140,000,000 relevant pages. • How to choose only 30-40 pages and rank them suitably to present to the user? – Content similarity is easily spammed. • A page owner can repeat some words (TF component of ranking) and add many related words to boost the rankings of his pages and/or to make the pages relevant to a large number of queries. Data and Web Mining - S. Orlando 3 Introduction (cont …) § Starting around 1996, researchers began to work on the problem. They resort to hyperlinks. – In Feb, 1997, Yanhong Li (Scotch Plains, NJ) filed a hyperlink based search patent. The method uses words in anchor text of hyperlinks. § Web pages on the other hand are connected through hyperlinks, which carry important information. – Some hyperlinks: organize information at the same site. – Other hyperlinks: point to pages from other Web sites. Such out-going hyperlinks often indicate an implicit conveyance of authority to the pages being pointed to.
    [Show full text]
  • Pdf/38/1/219/1810360/Coli R 00089.Pdf by Guest on 02 October 2021 Technische Universit¨At Darmstadt
    Book Reviews Graph-Based Natural Language Processing and Information Retrieval Rada Mihalcea and Dragomir Radev (University of North Texas and University of Michigan) Cambridge, UK: Cambridge University Press, 2011, viii+192 pp; hardbound, ISBN 978-0-521-89613-9, $65.00 Reviewed by Chris Biemann Downloaded from http://direct.mit.edu/coli/article-pdf/38/1/219/1810360/coli_r_00089.pdf by guest on 02 October 2021 Technische Universit¨at Darmstadt Graphs are ubiquitous. There is hardly any domain in which objects and their relations cannot be intuitively represented as nodes and edges in a graph. Graph theory is a well-studied sub-discipline of mathematics, with a large body of results and a large number of efficient algorithms that operate on graphs. Like many other disciplines, the fields of natural language processing (NLP) and information retrieval (IR) also deal with data that can be represented as a graph. In this light, it is somewhat surprising that only in recent years the applicability of graph-theoretical frameworks to language technology became apparent and increasingly found its way into publications in the field of computational linguistics. Using algorithms that take the overall graph structure of a problem into account, rather than characteristics of single objects or (unstructured) sets of objects, graph-based methods have been shown to improve a wide range of NLP tasks. In a short but comprehensive overview of the field of graph-based methods for NLP and IR, Rada Mihalcea and Dragomir Radev list an extensive number of techniques and examples from a wide range of research papers by a large number of authors.
    [Show full text]
  • Multiscale Mixing Patterns in Networks
    Multiscale mixing patterns in networks Leto Peela,b,1, Jean-Charles Delvennea,c,1, and Renaud Lambiotted,1 aInstitute of Information and Communication Technologies, Electronics and Applied Mathematics (ICTEAM), Universite´ Catholique de Louvain, Louvain-la-Neuve B-1348, Belgium; bNamur Institute for Complex Systems (naXys), Universite´ de Namur, Namur B-5000, Belgium; cCenter for Operations Research and Econometrics (CORE), Universite´ Catholique de Louvain, Louvain-la-Neuve B-1348, Belgium; and dMathematical Institute, University of Oxford, Oxford OX2 6GG, United Kingdom Edited by Kenneth W. Wachter, University of California, Berkeley, CA, and approved March 1, 2018 (received for review July 21, 2017) Assortative mixing in networks is the tendency for nodes with the networks are heterogeneous and contain diverse mixing patterns, same attributes, or metadata, to link to each other. It is a property a single global measure may not present an accurate descrip- often found in social networks, manifesting as a higher tendency tion. Furthermore, it does not provide a means for quantify- of links occurring between people of the same age, race, or politi- ing the diversity or identifying anomalous or outlier patterns of cal belief. Quantifying the level of assortativity or disassortativity interaction. (the preference of linking to nodes with different attributes) can Quantifying diversity and measuring how mixing may vary shed light on the organization of complex networks. It is com- across a network becomes a particularly pertinent issue with mon practice to measure the level of assortativity according to modern advances in technology that have enabled us to capture, the assortativity coefficient, or modularity in the case of categori- store, and process massive-scale networks.
    [Show full text]
  • Link Mining Applications: Progress and Challenges
    Link Mining Applications: Progress and Challenges Ted E. Senator* DARPA/IPTO 3701 N. Fairfax Drive Arlington, VA 22203 [email protected] ABSTRACT This article is organized as follows. After this introduction, This article reviews a decade of progress in the area of link section 2 describes characteristics of domains and the associated mining, focusing on application requirements and how they have tasks that require link mining techniques. Section 3 reviews the and have not yet been addressed, especially in the area of complex state of techniques for analyzing linked data as of about 10 years event detection. It discusses some ongoing challenges and ago. Section 4 overviews progress in the past decade. Section 5 suggests ideas that could be opportunities for solutions. The most discusses some unmet needs and suggests some possible important conclusion of this article is that while there are many approaches for research to address them. Section 6 concludes. link mining techniques that work well for individual link mining 2. PROBLEM DOMAIN & TASK tasks, there is not yet a comprehensive framework that can support a combination of link mining tasks as needed for many real CHARACTERISTICS applications. Many domains of interest are inherently relational. In fact, they are not just relational, but highly structured. By highly structured, Keywords we mean not only that there are semantically meaningful Link mining, link analysis, link discovery, pattern discovery, connections† between entities of the same and different types, but pattern analysis, pattern matching, structured data, complex event also 1) that there are grouped entities that have as members other detection, data mining applications.
    [Show full text]
  • Guide to Tools for Social Media & Web Analytics and Insights
    This is a repository copy of Guide to tools for social media & web analytics and insights. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/114759/ Article: Kennedy, H., Moss, G., Birchall, C. et al. (1 more author) (2013) Guide to tools for social media & web analytics and insights. Working Papers of the Communities & Culture Network+, 2. ISSN 2052-7268 Reuse Unless indicated otherwise, fulltext items are protected by copyright with all rights reserved. The copyright exception in section 29 of the Copyright, Designs and Patents Act 1988 allows the making of a single copy solely for the purpose of non-commercial research or private study within the limits of fair dealing. The publisher or other rights-holder may allow further reproduction and re-use of this version - refer to the White Rose Research Online record for this item. Where records identify the publisher as the copyright holder, users can verify any specific terms of use on the publisher’s website. Takedown If you consider content in White Rose Research Online to be in breach of UK law, please notify us by emailing [email protected] including the URL of the record and the reason for the withdrawal request. [email protected] https://eprints.whiterose.ac.uk/ Digital Data Analysis: Guide to tools for social media & web analytics and insights July 2013 From the research project Digital Data Analysis, Public Engagement and the Social Life of Methods Helen Kennedy, Giles Moss, Chris Birchall, Stylianos Moshonas, Institute of Communications Studies, University of Leeds Funded by the EPSRC/Digital Economy Communities & Culture Network + (http://www.communitiesandculture.org/) Contents Digital Data Analysis: ..............................................................................................
    [Show full text]
  • Social Network Link Prediction Using Semantics Deep Learning
    (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 9, No. 1, 2018 Social Network Link Prediction using Semantics Deep Learning Maria Ijaz, Javed Ferzund, Muhammad Asif Suryani, Anam Sardar Department of Computer Science COMSATS Institute of Information Technology Sahiwal, Pakistan Abstract—Currently, social networks have brought about an and lately Computer Scientists contributed a lot. SNA is now enormous number of users connecting to such systems over a use for different research purposes as the hidden conceptual couple of years, whereas the link mining is a key research track model [2]. in this area. It has pulled the consideration of several analysts as a powerful system to be utilized as a part of social networks study In order to show relationship in the network between the to understand the relations between nodes in social circles. links nodes and edges are used where nodes represent persons Numerous data sets of today’s interest are most appropriately and edge shows a relation between nodes. Edge data can be called as a collection of interrelated linked objects. The main lost due to many reasons i.e. partial information gathering challenge faced by analysts is to tackle the problem of structured methods or ambiguity of links or source restrictions [3]. The data sets among the objects. For this purpose, we design a new variations in short period cause many problems and generate comprehensive model that involves link mining techniques with many challenging questions like: semantics to perform link mining on structured data sets. The past work, to our knowledge, has investigated on these structured Two heads will be linked together for how much time? datasets using this technique.
    [Show full text]
  • A Network Analysis of Money Laundering in the United Kingdom
    Mapping the laundromat: A network analysis of money laundering in the United Kingdom By Ian Goodrich Submitted to Central European University School of Public Policy In partial fulfilment of the requirements for the degree of Master of Arts in Public Policy (one year) Supervisor: Mihály Fazekas CEU eTD Collection Budapest, Hungary 2019 Authorship Declaration I, Ian Goodrich, hereby declare that I am the sole author of this thesis. To the best of my knowledge this thesis contains no material previously published by any other person except where due acknowledgement has been made. This thesis contains no material which has been accepted as part of the requirements of any other academic degree or non-degree program, in English or in any other language. This is a true copy of the thesis, including final revisions. March 4, 2019 CEU eTD Collection i Acknowledgements I’m writing this having returned to university after over a decade out in the wilderness of work. It’s been a life-changing experience, and one that I’ve thoroughly enjoyed, but there’s no chance I’d have done it without the faith others have shown in me. First and foremost, I must thank my beautiful and brilliant wife and partner, Dion. For many years, she has provided the love, support and encouragement which has enabled everything I’ve done. She was the first to suggest I return to university, she packed up her life to be with me in Budapest, and she has been consistently kind, caring and patient as I’ve completed my studies. Thank you, baby, I love you.
    [Show full text]
  • Link Analysis Algorithm for Web Structure Mining
    ISSN (Print) : 2319-5940 ISSN (Online) : 2278-1021 International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 8, August 2013 Link Analysis Algorithm for Web Structure Mining T.Nithya Assistant Professor, Department of Computer Science, Dr. N G P Arts and Science College, Coimbatore, India Abstract: As the web is growing rapidly, the users get easily lost in the web’s rich hyper structure. The primary goal of the web site owner is to provide the relevant information to the users to fulfill their needs. Web mining technique is used to categorize users and pages by analyzing users behavior, the content of pages and order of URLs accessed. Web Structure Mining plays an important role in this approach. In this paper gives an introduction to Web mining, then describes Web Structure mining in detail, and explores the data structure used by the Web. This paper also explores different algorithms and compares those algorithms used for Information Retrieval. Keywords: Web Mining, Web Structure, PageRank, Weighted PageRank and Hyper-link Induced Topic Search. I. INTRODUCTION The World Wide Web is a rich source of information and A. Web Mining Process continues to expand in size and complexity. Retrieving of The complete process of extracting knowledge from Web the required web page on the web, efficiently and data is follows in Fig.1: effectively, is becoming a Challenge. Whenever a user wants to search the relevant pages, he/she prefers those relevant pages to be at hand. The bulk amount of Raw Mining Patterns Representation Knowle information becomes very difficult for the users to find, data Tools dge extract, filter or evaluate the relevant information.
    [Show full text]