What are the big clusters and what does each represent

Assignment Help Computer Networking
Reference no: EM131644619

Assignment

Data source

Download the New Zealand's knowledge network data from the class moodle. It represents a sample of New Zealand's publication network that I constructed based on 3,385 computer science related publications (from 1972-2016); where nodes represent authors and links represents co-authorship relations. This is a network file (.net) and opened/read by either NodeXL or Gephi (or any other tool of your choice listed below) to construct and analyze the network.

Your Task

Your goal is to analyse construct the network and then write a short report about this network. Describe interesting features, important institutions, relationships, etc. This is not something you can do just by looking at the structure - you will need to analyze network property (both node level and network level properties). You should provide a deep investigation into this network. Who are the central institutions/universities? What is their role in the network (e.g., their Degree, Betweenness, and Eigenvector Centrality)? What are the big clusters? What does each represent? How did you find that out? I want a thorough analysis of all the major features of the network. Figure 1 below is an example of the network that I constructed from the same data using NodeXL. Where nodes represent institutions and links represent collaboration ties. In this instance, Node size represents betweenness centrality and link width represents intensity of collaboration.

Figure 1 New Zealand's Knowledge Network (Computer Science Field 1972-2016)

Your Final Report & Grading

It is important that in your final report to be analytical rather than descriptive and should include following analysis:

1. The report includes a meaningful visualization of the network. Try to replicate figure 1 with different colours (I will not accept similar colours). You should filter the network, for example, highlighting the important nodes, showing intensity of collaboration (e.g., with links width and colours) (5 marks).

2. The report includes network level statistics (such as, total number nodes, clustering co- efficient, average degree, density, and diameter) with brief explanation of results. What does it say about the network? (5 marks).

3. The report includes a list of top 10 nodes (institutions) in terms of degree, betweennes, and eigenvector centralise accompanied by with brief explanation the results. Instead, give a meaningful description of who the institutions are, what their role is in the network, and how their research activities relate to that role, etc. (5 marks).

4. In terms of Eigenvector Centrality, what is the position of Waikato University as compared to others and what does it mean? (5 marks).

Formatting Guidelines

1. Final report should be no more than 1000 words (excluding tables and references), 12-point font, and one-inch margins.
2. Include page numbers to facilitate review.
3. The first page should provide the student name and ID.
4. Use headings and subheadings to facility the review.

Attachment:- Network-Analysis.rar

Reference no: EM131644619

Questions Cloud

Consideration of the unique characteristics : If you are unable to view the policy, draft a policy proposal that especially addresses workplace violence in consideration of the unique characteristics.
How the expected profit earned from a customer : Suppose that GLC earns a $2000 profit each time a person buys a car. We want to determine how the expected profit earned from a customer depends on the quality.
Find out about male health status : Lena would like to protect her sister from harm and begins to consider how her sister can find out about her boyfriend's health status
Formulate a linear program model to maximize : Formulate a linear program model to maximize the profit during the next production period. (Define decision variables and write the objective function constrain
What are the big clusters and what does each represent : What is their role in the network (e.g., their Degree, Betweenness, and Eigenvector Centrality)? What are the big clusters? What does each represent?
Give some examples of key customer and operating performance : Give some examples of key customer and operating performance indicators (no computations needed) that could be part of a balanced scorecard for IAA
Find npv for the next ten years from the drug : The Mutron Company is thinking of marketing a new drug used to make pigs healthier. At the beginning of the current year, there are 1,000,000 pigs.
Discuss the cause of down syndrome : Discuss the cause of Down syndrome and What risks factors exist in the family history
Operating system and applications : Network from personally-owned mobile devices - operating system and applications

Reviews

Write a Review

Computer Networking Questions & Answers

  Telecommunications-networking routing algorithms

Complex routing algorithms are used to maintain routing tables. What algorithms are used, and how do they work? What are the advantages and disadvantages of each?

  How recommendations at cfo site help efforts

How could the articles or recommendations at the CFO site help your efforts? Are these subjects where we should be looking to for future investments?

  What kind of security issues require to be considered when

q1. what are some of the reasons an organization might consider using a wireless lan?q2. what type of security issues

  List the two router commands

List the two router commands for specifying the tunnel destination and source IP address. Include the router prompt.

  What is the sequence number of the tcp syn segment

What is the sequence number of the TCP SYN segment that is used to initiate the TCP connection between the client computer

  Describe the company network and interconnection

Describe the company network, interconnection, and communication environment. Assess risk based on the Global Finance, Inc. Network Diagram scenario. Note: Your risk assessment should cover all the necessary details for your client, GFI Inc., t..

  Show an acl with multiples access-list commands what order

a small company is using the topology shown below. minimal security measures have been implemented. assume that the

  What is a rollover cable

The IP address for computer C2 is 10.10.1.2. The IP address for computer B1 is 10.10.10.1. A subnet mask of 255.255.0.0 is being used.

  Internetworking design for the business in netsim

Analyse and discuss the significance of internetworking for contemporary organisations - Explain the role of internetworking

  What is shown when you test the connectivity to yahoo

What command can you use to test connectivity between two hosts? What is shown when you test the connectivity to yahoo?

  Analyze the seven security domains of a it infrastrure

Analyze the seven security domains of a typical IT infrastructure and determine which two of the seven you would implement first for a nationwide bank. Explain your rationale for your choice.

  Develop an incident-response policy which covers the

gem infosys a small software company has decided to better secure its computer systems after a malware attack shut down

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd