Design a model to store and manage relationship data

Assignment Help Computer Engineering
Reference no: EM131299513

Assignment: Graph Databases

1. Choose a social network that you use. Say, FaceBook, Twitter, LinkedIn, or anything else.

2. Design a model to store and manage relationship data from these social networks in a graph database.

3. Install neo4j and implement your model.

4. Create some realistic "toy" data and store it in your database. You must design your toy data such that there are at least 10 nodes. The network should be realistic. For example, there must be at least some nodes that have 4-5 friends and some that maybe are new or loners and have 1-2 friends. Etc.

5. Run the following queries;

a. Choose two people at random from your toy data. Run a query to check if they are connected via a path in the graph.
b. Run a query to detect who are the people who have the (i) most "friends" (or neighbors) and, (ii) least "friends".
c. Run a query to find the average number of friends per person in the network.

Your report should contain the following:

1. A brief (but complete) description of the social network and the data you are using.
2. A description and diagram showing your data model.
3. A snapshot of all the queries you ran in neo4j. Use script in Unix and similar tools in Windows. Or, use screenshots.
4. The code used to create the database, insert the data, and query the data.
5. Discuss how long each query took to run. Also, discuss which queries were "easier" to write using a graph database.

Reference no: EM131299513

Questions Cloud

Express the balance sheet data in trend percentages : Express the income statement data in common size percentages. Round percentages to two decimal places - Express the balance sheet data in trend percentages with 20X2 as the base year. Round percentages to the nearest whole number (zero decimal plac..
Construct plots of the amplitude spectra of the capacitor : Construct plots of the amplitude spectra of the capacitor voltage and current. Discuss any differences in spectral content.
Find the rms value of a square wave : Find the rms value of a square wave. Find the fraction of the total average power carried by the first three nonzero ac components in the Fourier series.
Equity investment overseas : Explain and describe one type of business that might be most successful using an export-based strategy, and one type of business that might be most successful using equity investment overseas. Explain why each business would be successful using th..
Design a model to store and manage relationship data : Choose a social network that you use. Say, FaceBook, Twitter, LinkedIn, or anything else. Design a model to store and manage relationship data from these social networks in a graph database.
Find the rms value of a parabolic wave : Find the rms value of a parabolic wave. Find the fraction of the total average power carried by the first three nonzero ac components in the Fourier series. Compare with the results found in Problem 13-40.
Create a perceptual map based on the business : Create a perceptual map based on the business you've been assigned for the course project.- Responses should be in narrative paragraph form and should have a clear, well-formulated thesis.
Keynesian economists explain the performance : Thinking back to the business cycle discussion, how would Keynesian economists explain the performance of the economy during the last few years? Show graphically using the AD/AS model, and explain your reasoning.
Who is more likely to use operating indicator analysis : Between investors and managers, who is more likely to use financial statement analysis? Who is more likely to use operating indicator analysis?

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is the multicast

examine and discuss what the UDP does and its relationship to TCP - - - in what ways is it similar and different, and why (what applications) would we use UDP, and why can't a user program access IP directly.

  What are the most effective ways to filter data

what are the others ways to secure data on a wired or wireless network.

  Suppose a1 b2 c3 determine the value of each boolean

assume a1 b2 c3. what is the value of each boolean expression?true or false show all steps.a. abgtc and bgtcb. notab

  Which is not a method of the keylistener interface

Which of the following is NOT a method of the KeyListener interface? Which of the following statements will correctly set a JFrame named myFrame to be visible?

  Formulate a debugging strategy

Formulate a debugging strategy. What module should be debugged first, what inputs should you use, what outputs should you expect to see? How should you begin to integrate the modules? What should you do on failure?

  Draw a pipeline diagram showing the out-of-order execution

Determine the number of cycles it takes to execute all iterations of the loop for both the scenario - Draw a pipeline diagram showing the out-of-order execution of the MIPS code through the first iteration of the loop, without bypassing.

  Business strategies for implementation

Business strategies for implementation, rationale and scope, What value will the implementation offer, Both technology- and human-based safeguards used for information systems, Information comparing security requirements of out-sourcing and in-sourc..

  Suppose that even parity is used for rows

many techniques (typically referred to as forward error correction) can be used to add redundant bits to a message in order to help a receiver right bits that have been damaged in transmission.

  Wave maker-editor software

Describe what wave maker-editor software can do and what are the sensor and wave can be use. With all details.

  Suppose that x is a vector that allready exists

Which is the right matlab logical expression to check whether the value of x is between -10 and 10 (inclusive).

  Explain the right action to take in a particular situation

According to virtue ethics, the right action to take in a particular situation is the action that a person with a strong moral character would take. If you decide to practice virtue ethics, you require to find a moral role model. How would you cho..

  Create a short main() demonstration program

make two classes. The first holds sales transactions. Its private data members include date, amount of sale, and salesperson's ID number.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd