Module Name | Download |
---|---|
noc20_cs32_assigment_1 | noc20_cs32_assigment_1 |
noc20_cs32_assigment_10 | noc20_cs32_assigment_10 |
noc20_cs32_assigment_11 | noc20_cs32_assigment_11 |
noc20_cs32_assigment_12 | noc20_cs32_assigment_12 |
noc20_cs32_assigment_13 | noc20_cs32_assigment_13 |
noc20_cs32_assigment_2 | noc20_cs32_assigment_2 |
noc20_cs32_assigment_3 | noc20_cs32_assigment_3 |
noc20_cs32_assigment_4 | noc20_cs32_assigment_4 |
noc20_cs32_assigment_5 | noc20_cs32_assigment_5 |
noc20_cs32_assigment_6 | noc20_cs32_assigment_6 |
noc20_cs32_assigment_7 | noc20_cs32_assigment_7 |
noc20_cs32_assigment_8 | noc20_cs32_assigment_8 |
noc20_cs32_assigment_9 | noc20_cs32_assigment_9 |
Sl.No | Chapter Name | MP4 Download |
---|---|---|
1 | Introduction | Download |
2 | Answer to the puzzle | Download |
3 | Introduction to Python-1 | Download |
4 | Introduction to Python-2 | Download |
5 | Introduction to Networkx-1 | Download |
6 | Introduction to Networkx-2 | Download |
7 | Social Networks: The Challenge | Download |
8 | Google Page Rank | Download |
9 | Searching in a Network | Download |
10 | Link Prediction | Download |
11 | The Contagions | Download |
12 | Importance of Acquaintances | Download |
13 | Marketing on Social Networks | Download |
14 | Introduction to Datasets | Download |
15 | Ingredients Network | Download |
16 | Synonymy Network | Download |
17 | Web Graph | Download |
18 | Social Network Datasets | Download |
19 | Datasets: Different Formats | Download |
20 | Datasets : How to Download? | Download |
21 | Datasets: Analysing Using Networkx | Download |
22 | Datasets: Analysing Using Gephi | Download |
23 | Introduction : Emergence of Connectedness | Download |
24 | Advanced Material : Emergence of Connectedness | Download |
25 | Programming Illustration : Emergence of Connectedness | Download |
26 | Summary to Datasets | Download |
27 | Introduction | Download |
28 | Granovetter's Strength of weak ties | Download |
29 | Triads, clustering coefficient and neighborhood overlap | Download |
30 | Structure of weak ties, bridges, and local bridges | Download |
31 | Validation of Granovetter's experiment using cell phone data | Download |
32 | Embededness | Download |
33 | Structural Holes | Download |
34 | Social Capital | Download |
35 | Finding Communities in a graph (Brute Force Method) | Download |
36 | Community Detection Using Girvan Newman Algorithm | Download |
37 | Visualising Communities using Gephi | Download |
38 | Tie Strength, Social Media and Passive Engagement | Download |
39 | Betweenness Measures and Graph Partitioning | Download |
40 | Strong and Weak Relationship - Summary | Download |
41 | Introduction to Homophily - Should you watch your company ? | Download |
42 | Selection and Social Influence | Download |
43 | Interplay between Selection and Social Influence | Download |
44 | Homophily - Definition and measurement | Download |
45 | Foci Closure and Membership Closure | Download |
46 | Introduction to Fatman Evolutionary model | Download |
47 | Fatman Evolutionary Model- The Base Code (Adding people) | Download |
48 | Fatman Evolutionary Model- The Base Code (Adding Social Foci) | Download |
49 | Fatman Evolutionary Model- Implementing Homophily | Download |
50 | Quantifying the Effect of Triadic Closure | Download |
51 | Fatman Evolutionary Model- Implementing Closures | Download |
52 | Fatman Evolutionary Model- Implementing Social Influence | Download |
53 | Fatman Evolutionary Model- Storing and analyzing longitudnal data | Download |
54 | Spatial Segregation: An Introduction | Download |
55 | Spatial Segregation: Simulation of the Schelling Model | Download |
56 | Spatial Segregation: Conclusion | Download |
57 | Schelling Model Implementation-1(Introduction) | Download |
58 | Schelling Model Implementation-2 (Base Code) | Download |
59 | Schelling Model Implementation-3 (Visualization and Getting a list of boundary and internal nodes) | Download |
60 | Schelling Model Implementation-4 (Getting a list of unsatisfied nodes) | Download |
61 | Schelling Model Implementation-5 (Shifting the unsatisfied nodes and visualizing the final graph) | Download |
62 | CHAPTER - 5 POSITIVE AND NEGATIVE RELATIONSHIPS (INTRODUCTION) | Download |
63 | STRUCTURAL BALANCE | Download |
64 | ENEMY'S ENEMY IS A FRIEND | Download |
65 | Characterizing the structure of balanced networks | Download |
66 | BALANCE THEOREM | Download |
67 | PROOF OF BALANCE THEOREM | Download |
68 | Introduction to positive and negative edges | Download |
69 | Outline of implemantation | Download |
70 | Creating graph, displaying it and counting unstable triangles | Download |
71 | Moving a network from an unstable to stable state | Download |
72 | Forming two coalitions | Download |
73 | Forming two coalitions contd | Download |
74 | Visualizing coalitions and the evolution | Download |
75 | The Web Graph | Download |
76 | Collecting the Web Graph | Download |
77 | Equal Coin Distribution | Download |
78 | Random Coin Dropping | Download |
79 | Google Page Ranking Using Web Graph | Download |
80 | Implementing PageRank Using Points Distribution Method-1 | Download |
81 | Implementing PageRank Using Points Distribution Method-2 | Download |
82 | Implementing PageRank Using Points Distribution Method-3 | Download |
83 | Implementing PageRank Using Points Distribution Method-4 | Download |
84 | Implementing PageRank Using Random Walk Method -1 | Download |
85 | Implementing PageRank Using Random Walk Method -2 | Download |
86 | DegreeRank versus PageRank | Download |
87 | We Follow | Download |
88 | Why do we Follow? | Download |
89 | Diffusion in Networks | Download |
90 | Modeling Diffusion | Download |
91 | Modeling Diffusion (continued) | Download |
92 | Impact of Commmunities on Diffusion | Download |
93 | Cascade and Clusters | Download |
94 | Knowledge, Thresholds and the Collective Action | Download |
95 | An Introduction to the Programming Screencast (Coding 4 major ideas) | Download |
96 | The Base Code | Download |
97 | Coding the First Big Idea - Increasing the Payoff | Download |
98 | Coding the Second Big Idea - Key People | Download |
99 | Coding the Third Big Idea- Impact of Communities on Cascades | Download |
100 | Coding the Fourth Big Idea - Cascades and Clusters | Download |
101 | Introduction to Hubs and Authorities (A Story) | Download |
102 | Principle of Repeated Improvement (A story) | Download |
103 | Principle of Repeated Improvement (An example) | Download |
104 | Hubs and Authorities | Download |
105 | PageRank Revisited - An example | Download |
106 | PageRank Revisited - Convergence in the Example | Download |
107 | PageRank Revisited - Conservation and Convergence | Download |
108 | PageRank, conservation and convergence - Another example | Download |
109 | Matrix Multiplication (Pre-requisite 1) | Download |
110 | Convergence in Repeated Matrix Multiplication (Pre-requisite 1) | Download |
111 | Addition of Two Vectors (Pre-requisite 2) | Download |
112 | Convergence in Repeated Matrix Multiplication- The Details | Download |
113 | PageRank as a Matrix Operation | Download |
114 | PageRank Explained | Download |
115 | Introduction to Powerlaw | Download |
116 | Why do Normal Distributions Appear? | Download |
117 | Power Law emerges in WWW graphs | Download |
118 | Detecting the Presence of Powerlaw | Download |
119 | Rich Get Richer Phenomenon | Download |
120 | Summary So Far | Download |
121 | Implementing Rich-getting-richer Phenomenon (Barabasi-Albert Model)-1 | Download |
122 | Implementing Rich-getting-richer Phenomenon (Barabasi-Albert Model)-2 | Download |
123 | Implementing a Random Graph (Erdos- Renyi Model)-1 | Download |
124 | Implementing a Random Graph (Erdos- Renyi Model)-2 | Download |
125 | Forced Versus Random Removal of Nodes (Attack Survivability) | Download |
126 | Rich Get Richer - A Possible Reason | Download |
127 | Rich Get Richer - The Long Tail | Download |
128 | Epidemics- An Introduction | Download |
129 | Introduction to epidemics (contd..) | Download |
130 | Simple Branching Process for Modeling Epidemics | Download |
131 | Simple Branching Process for Modeling Epidemics (contd..) | Download |
132 | Basic Reproductive Number | Download |
133 | Modeling epidemics on complex networks | Download |
134 | SIR and SIS spreading models | Download |
135 | Comparison between SIR and SIS spreading models | Download |
136 | Basic Reproductive Number Revisited for Complex Networks | Download |
137 | Percolation model | Download |
138 | Analysis of basic reproductive number in branching model (The problem statement) | Download |
139 | Analyzing basic reproductive number 2 | Download |
140 | Analyzing basic reproductive number 3 | Download |
141 | Analyzing basic reproductive number 4 | Download |
142 | Analyzing basic reproductive number 5 | Download |
143 | Small World Effect - An Introduction | Download |
144 | Milgram's Experiment | Download |
145 | The Reason | Download |
146 | The Generative Model | Download |
147 | Decentralized Search - I | Download |
148 | Decentralized Search - II | Download |
149 | Decentralized Search - III | Download |
150 | Programming illustration- Small world networks : Introduction | Download |
151 | Base code | Download |
152 | Making homophily based edges | Download |
153 | Adding weak ties | Download |
154 | Plotting change in diameter | Download |
155 | Programming illustration- Myopic Search : Introduction | Download |
156 | Myopic Search | Download |
157 | Myopic Search comparision to optimal search | Download |
158 | Time Taken by Myopic Search | Download |
159 | PseudoCores : Introduction | Download |
160 | How to be Viral | Download |
161 | Who are the right key nodes? | Download |
162 | finding the right key nodes (the core) | Download |
163 | Coding K-Shell Decomposition | Download |
164 | Coding cascading Model | Download |
165 | Coding the importance of core nodes in cascading | Download |
166 | Pseudo core | Download |
Sl.No | Chapter Name | English |
---|---|---|
1 | Introduction | Download Verified |
2 | Answer to the puzzle | Download Verified |
3 | Introduction to Python-1 | Download Verified |
4 | Introduction to Python-2 | Download Verified |
5 | Introduction to Networkx-1 | Download Verified |
6 | Introduction to Networkx-2 | Download Verified |
7 | Social Networks: The Challenge | Download Verified |
8 | Google Page Rank | Download Verified |
9 | Searching in a Network | Download Verified |
10 | Link Prediction | Download Verified |
11 | The Contagions | Download Verified |
12 | Importance of Acquaintances | Download Verified |
13 | Marketing on Social Networks | Download Verified |
14 | Introduction to Datasets | Download Verified |
15 | Ingredients Network | Download Verified |
16 | Synonymy Network | Download Verified |
17 | Web Graph | Download Verified |
18 | Social Network Datasets | Download Verified |
19 | Datasets: Different Formats | Download Verified |
20 | Datasets : How to Download? | Download Verified |
21 | Datasets: Analysing Using Networkx | Download Verified |
22 | Datasets: Analysing Using Gephi | Download Verified |
23 | Introduction : Emergence of Connectedness | Download Verified |
24 | Advanced Material : Emergence of Connectedness | Download Verified |
25 | Programming Illustration : Emergence of Connectedness | Download Verified |
26 | Summary to Datasets | Download Verified |
27 | Introduction | Download Verified |
28 | Granovetter's Strength of weak ties | Download Verified |
29 | Triads, clustering coefficient and neighborhood overlap | Download Verified |
30 | Structure of weak ties, bridges, and local bridges | Download Verified |
31 | Validation of Granovetter's experiment using cell phone data | Download Verified |
32 | Embededness | Download Verified |
33 | Structural Holes | Download Verified |
34 | Social Capital | Download Verified |
35 | Finding Communities in a graph (Brute Force Method) | Download Verified |
36 | Community Detection Using Girvan Newman Algorithm | Download Verified |
37 | Visualising Communities using Gephi | Download Verified |
38 | Tie Strength, Social Media and Passive Engagement | Download Verified |
39 | Betweenness Measures and Graph Partitioning | Download Verified |
40 | Strong and Weak Relationship - Summary | Download Verified |
41 | Introduction to Homophily - Should you watch your company ? | Download Verified |
42 | Selection and Social Influence | Download Verified |
43 | Interplay between Selection and Social Influence | Download Verified |
44 | Homophily - Definition and measurement | Download Verified |
45 | Foci Closure and Membership Closure | Download Verified |
46 | Introduction to Fatman Evolutionary model | Download Verified |
47 | Fatman Evolutionary Model- The Base Code (Adding people) | Download Verified |
48 | Fatman Evolutionary Model- The Base Code (Adding Social Foci) | Download Verified |
49 | Fatman Evolutionary Model- Implementing Homophily | Download Verified |
50 | Quantifying the Effect of Triadic Closure | Download Verified |
51 | Fatman Evolutionary Model- Implementing Closures | Download Verified |
52 | Fatman Evolutionary Model- Implementing Social Influence | Download Verified |
53 | Fatman Evolutionary Model- Storing and analyzing longitudnal data | Download Verified |
54 | Spatial Segregation: An Introduction | Download Verified |
55 | Spatial Segregation: Simulation of the Schelling Model | Download Verified |
56 | Spatial Segregation: Conclusion | Download Verified |
57 | Schelling Model Implementation-1(Introduction) | Download Verified |
58 | Schelling Model Implementation-2 (Base Code) | Download Verified |
59 | Schelling Model Implementation-3 (Visualization and Getting a list of boundary and internal nodes) | Download Verified |
60 | Schelling Model Implementation-4 (Getting a list of unsatisfied nodes) | Download Verified |
61 | Schelling Model Implementation-5 (Shifting the unsatisfied nodes and visualizing the final graph) | Download Verified |
62 | CHAPTER - 5 POSITIVE AND NEGATIVE RELATIONSHIPS (INTRODUCTION) | Download Verified |
63 | STRUCTURAL BALANCE | Download Verified |
64 | ENEMY'S ENEMY IS A FRIEND | Download Verified |
65 | Characterizing the structure of balanced networks | Download Verified |
66 | BALANCE THEOREM | Download Verified |
67 | PROOF OF BALANCE THEOREM | Download Verified |
68 | Introduction to positive and negative edges | Download Verified |
69 | Outline of implemantation | Download Verified |
70 | Creating graph, displaying it and counting unstable triangles | Download Verified |
71 | Moving a network from an unstable to stable state | Download Verified |
72 | Forming two coalitions | Download Verified |
73 | Forming two coalitions contd | Download Verified |
74 | Visualizing coalitions and the evolution | Download Verified |
75 | The Web Graph | Download Verified |
76 | Collecting the Web Graph | Download Verified |
77 | Equal Coin Distribution | Download Verified |
78 | Random Coin Dropping | Download Verified |
79 | Google Page Ranking Using Web Graph | Download Verified |
80 | Implementing PageRank Using Points Distribution Method-1 | Download Verified |
81 | Implementing PageRank Using Points Distribution Method-2 | Download Verified |
82 | Implementing PageRank Using Points Distribution Method-3 | Download Verified |
83 | Implementing PageRank Using Points Distribution Method-4 | Download Verified |
84 | Implementing PageRank Using Random Walk Method -1 | Download Verified |
85 | Implementing PageRank Using Random Walk Method -2 | Download Verified |
86 | DegreeRank versus PageRank | Download Verified |
87 | We Follow | Download Verified |
88 | Why do we Follow? | Download Verified |
89 | Diffusion in Networks | Download Verified |
90 | Modeling Diffusion | Download Verified |
91 | Modeling Diffusion (continued) | Download Verified |
92 | Impact of Commmunities on Diffusion | Download Verified |
93 | Cascade and Clusters | Download Verified |
94 | Knowledge, Thresholds and the Collective Action | Download Verified |
95 | An Introduction to the Programming Screencast (Coding 4 major ideas) | Download Verified |
96 | The Base Code | Download Verified |
97 | Coding the First Big Idea - Increasing the Payoff | Download Verified |
98 | Coding the Second Big Idea - Key People | Download Verified |
99 | Coding the Third Big Idea- Impact of Communities on Cascades | Download Verified |
100 | Coding the Fourth Big Idea - Cascades and Clusters | Download Verified |
101 | Introduction to Hubs and Authorities (A Story) | Download Verified |
102 | Principle of Repeated Improvement (A story) | Download Verified |
103 | Principle of Repeated Improvement (An example) | Download Verified |
104 | Hubs and Authorities | Download Verified |
105 | PageRank Revisited - An example | Download Verified |
106 | PageRank Revisited - Convergence in the Example | Download Verified |
107 | PageRank Revisited - Conservation and Convergence | Download Verified |
108 | PageRank, conservation and convergence - Another example | Download Verified |
109 | Matrix Multiplication (Pre-requisite 1) | Download Verified |
110 | Convergence in Repeated Matrix Multiplication (Pre-requisite 1) | Download Verified |
111 | Addition of Two Vectors (Pre-requisite 2) | Download Verified |
112 | Convergence in Repeated Matrix Multiplication- The Details | Download Verified |
113 | PageRank as a Matrix Operation | Download Verified |
114 | PageRank Explained | Download Verified |
115 | Introduction to Powerlaw | Download Verified |
116 | Why do Normal Distributions Appear? | Download Verified |
117 | Power Law emerges in WWW graphs | Download Verified |
118 | Detecting the Presence of Powerlaw | Download Verified |
119 | Rich Get Richer Phenomenon | Download Verified |
120 | Summary So Far | Download Verified |
121 | Implementing Rich-getting-richer Phenomenon (Barabasi-Albert Model)-1 | Download Verified |
122 | Implementing Rich-getting-richer Phenomenon (Barabasi-Albert Model)-2 | Download Verified |
123 | Implementing a Random Graph (Erdos- Renyi Model)-1 | Download Verified |
124 | Implementing a Random Graph (Erdos- Renyi Model)-2 | Download Verified |
125 | Forced Versus Random Removal of Nodes (Attack Survivability) | Download Verified |
126 | Rich Get Richer - A Possible Reason | Download Verified |
127 | Rich Get Richer - The Long Tail | Download Verified |
128 | Epidemics- An Introduction | Download Verified |
129 | Introduction to epidemics (contd..) | Download Verified |
130 | Simple Branching Process for Modeling Epidemics | Download Verified |
131 | Simple Branching Process for Modeling Epidemics (contd..) | Download Verified |
132 | Basic Reproductive Number | Download Verified |
133 | Modeling epidemics on complex networks | Download Verified |
134 | SIR and SIS spreading models | Download Verified |
135 | Comparison between SIR and SIS spreading models | Download Verified |
136 | Basic Reproductive Number Revisited for Complex Networks | Download Verified |
137 | Percolation model | Download Verified |
138 | Analysis of basic reproductive number in branching model (The problem statement) | Download Verified |
139 | Analyzing basic reproductive number 2 | Download Verified |
140 | Analyzing basic reproductive number 3 | Download Verified |
141 | Analyzing basic reproductive number 4 | Download Verified |
142 | Analyzing basic reproductive number 5 | Download Verified |
143 | Small World Effect - An Introduction | Download Verified |
144 | Milgram's Experiment | Download Verified |
145 | The Reason | Download Verified |
146 | The Generative Model | Download Verified |
147 | Decentralized Search - I | Download Verified |
148 | Decentralized Search - II | Download Verified |
149 | Decentralized Search - III | Download Verified |
150 | Programming illustration- Small world networks : Introduction | Download Verified |
151 | Base code | Download Verified |
152 | Making homophily based edges | Download Verified |
153 | Adding weak ties | Download Verified |
154 | Plotting change in diameter | Download Verified |
155 | Programming illustration- Myopic Search : Introduction | Download Verified |
156 | Myopic Search | Download Verified |
157 | Myopic Search comparision to optimal search | Download Verified |
158 | Time Taken by Myopic Search | Download Verified |
159 | PseudoCores : Introduction | Download Verified |
160 | How to be Viral | Download Verified |
161 | Who are the right key nodes? | Download Verified |
162 | finding the right key nodes (the core) | Download Verified |
163 | Coding K-Shell Decomposition | Download Verified |
164 | Coding cascading Model | Download Verified |
165 | Coding the importance of core nodes in cascading | Download Verified |
166 | Pseudo core | Download Verified |
Sl.No | Language | Book link |
---|---|---|
1 | English | Download |
2 | Bengali | Not Available |
3 | Gujarati | Not Available |
4 | Hindi | Not Available |
5 | Kannada | Not Available |
6 | Malayalam | Not Available |
7 | Marathi | Not Available |
8 | Tamil | Not Available |
9 | Telugu | Not Available |