Display the color graph of the monastery liking network

Assignment Help Computer Networking
Reference no: EM131015160

Social Networking Assignment - Subgroups and Block Models

The purpose of this exercise is to learn how to use UCINET to identify cliques and conduct a structural equivalence blockmodel.

Monastery network: In 1968, Samuel Sampson wrote a doctoral dissertation about 18 men living in a New England monastery who were training to become monks. The network data for this assignment come from the fourth time that Sampson asked the men to choose three others whom they liked most. (Two men decided to name four others; even monks don't always follow instructions!)

Sampson identified four factions, that is, subgroups of novice monks: (1) The Loyal Opposition, a group of five conservatives who had entered the monastery earlier; (2) the Young Turks, a group of seven who entered later and questioned many monastery practices, which the Loyal Opposition defended; (3) three Interstitials, who wavered between the two sides of the conflict; and (4) three Outcasts, who were not accepted by anyone else. The names of the men and the factions to which they belong are listed on the next page.

Near the end of Sampson's research, a "crisis in the cloister" erupted, resulting in the expulsion of four monks (Ambrose, Bonaven, Elias, Simp), because they were "not in conformity with the spirit of the order." Five others almost immediately left voluntarily (Albert, Amand, Basil, Romul, Victor). In the end, only Hugh, John, Louis, and Peter remained at the monastery. Could a graph of the liking network, also using the monks' betweenness centralities, a clique analysis, and a blockmodel give insights into those occurrences?

Datasets:

Monastery_Like4 is an undirected UCINET data file that was symmetrized using the maximum criterion (i.e., if one monk named a second monk, they are assumed to like one another).

Monastery_Attr is a UCINET attribute file with each monk classified into one of the four factions identified by Sampson: (1) Loyal Opposition; (2) Young Turks; (3) Interstitials; (4) Outcasts; and their normalized betweenness centrality scores. The table on the next page displays the contents of the attribute file.

No.

Name

Faction

nBetween

1

Romul

2

4.8

2

Bonaven

2

12.9

3

Ambrose

4

4.6

4

Berth

1

2.5

5

Peter

1

12.2

6

Louis

1

0.9

7

Victor

2

7.5

8

Winf

3

1.2

9

John

1

14.4

10

Greg

3

4.1

11

Hugh

1

7.5

12

Boni

2

17.7

13

Mark

3

20.9

14

Albert

2

9.0

15

Amand

2

4.6

16

Basil

2

0.0

17

Elias

4

0.6

18

Simp

4

3.4

Perform these Steps with UCINET and NetDraw:

1. In UCINET, use "Match Multiple Datasets" to match the Monastery_Like4 and the Monastery_Attr files, putting the default suffix -Matched at the end of both output files.

In NetDraw, create the graph of Monastery_Like4-Matched. You may need to move a few points slightly so some lines and labels don't squash together. Remove the arrowheads from the graph. Open the Monastery_Attr-Matched file. Change the colors of the nodes to represent Sampson's four factions. Change the sizes of the nodes to represent the actors' betweenness centrality scores. Save this color graph, as a screen capture or as a .jpg file, for your report.

2. In UCINET, use "Network/Subgroups/Cliques" to find all cliques with three or more members in the Monastery_Like4 network. Instruct UCINET to save the "(Output) Co- membership matrix:" (with the default name "CliqueOverlap") for further analysis. From the log output, copy and save for your report (a) the list of cliques found; (b); the Actor- by-Actor Clique Co-membership Matrix; and (c) the Hierarchical Clustering of Overlap Matrix.

In UCINET, match the CliqueOverlap network with the Monastery_Attr file, putting the default suffix -Matched at the end of both output files.

In NetDraw, open CliqueOverlap-Matched to graph the ties among monks who belonged to the same cliques (this dataset is identical to the "Actor-by- Actor Clique Co- membership Matrix" in the output log). You may need to move a few points slightly so some lines and labels don't squash together. Remove the arrowheads from the graph. Open the Monastery_Attr-Matched file. As in Step #1, change the colors of the nodes to represent Sampson's four factions (use the same colors you used in Step #1).

Change the sizes of the nodes to represent the actors' betweenness centrality scores. Save this color graph, as a screen capture or as a .jpg file, for your report.

3. In UCINET, conduct a blockmodel analysis of Monastery_Like4, using "Network/Roles & Positions/Structural/Concor/Standard" and specifying "Max depth of splits (not blocks):

= 2" to obtain a four-block solution. From the output log, copy and save the Blocked Matrix and the Density Matrix for your report. Use "Network/Cohesion/Density/Density Overall" to find the mean density of Monastery_Like4 for your report.

Write a brief report (print color graphs and tables, with single-spaced text) describing the main findings of your analyses; include the following:

1. Display the color graph of the monastery liking network in which you modified the nodes to indicate the novice monks' attributes. Describe what you observe. In particular, comment on the locations of members of the Loyal Opposition, the Young Turks, and others in the graph, the connections within and between faction members, and any other noteworthy features such as the actors' betweenness centralities. To what extent does this graph reveal the opposing political factions identified by Sampson?

2. Display the list of cliques found, the Actor-by-Actor Clique Co-membership Matrix, the Hierarchical Clustering of Overlap Matrix, and the color graph of the CliqueOverlap network. (You may cut-and-past from UCINET output, but use Courier font to keep columns aligned!) Describe the major findings of this analysis, commenting on whether your subgroup analysis identifies the monastery's opposing political factions as described by Sampson. (Suggestion: Color-code the members' names in the list of cliques, using the same four colors you use in the graph.)

3. From the blockmodel analysis, display the 4-block matrix and the density matrix. Using the mean network density, manually create the image matrix for the network, where 1 means block density is ≥ network mean and 0 means block density < network mean. Describe the blockmodel's major features, such as the within- and between-block ties and whether the monks' block memberships are consistent with Sampson's factions.

4. How well or poorly do the network color graph, clique analysis, and blockmodel analysis together help to explain and understand the expulsions and departures of the novice monks during the "crisis in the cloister?"

Attachment:- Assignment.rar

Reference no: EM131015160

Questions Cloud

Expected number of defects per windshield : 1. Suppose that the number of major defects on a windshield from a particular production line follows a Poisson distribution with >. = 0.01/windshield. (a) What is the probability that a windshield will be defect free? (b) What is the expected numb..
Calculate the internal rate of return and profitability : Calculate the internal rate of return and profitability index for the proposed investment. What do these two measures tell you about the project's viability?
Express given integral as an iterated integral in variable u : Using the transformation of coordinates x = (3/8)u - (1/8)v and y =-(1/8)u + (3/8)v, express the integral ∫∫D(24x + 8y )dx dy as an iterated integral in the variables u and v. Do not evaluate the integral.
Conduct an internal and external environmental analysis : Create a SWOT table summarizing your findings. Your environmental analysis should consider, at a minimum, the following factors.
Display the color graph of the monastery liking network : Display the color graph of the monastery liking network in which you modified the nodes to indicate the novice monks' attributes. Describe what you observe
Should the company take this special order : If a computer manufacturer offers to buy 200,000 units of Blue-Ray drive for $2 million on a one-time special order. Assume that ABC  Electronics has enough manufacturing capacity for the order and there will be no selling and administrative cost ..
Approximate the distribution of the data : The data here are counts, so they are discrete, however, one might try to approximate the distribution with a continuous distribution. What distribution(s) might approximate the distribution of the data? What distribution(s) would not approximate..
What conclusions are evident from your trend analysis : What conclusions are evident from your trend analysis? Justify your answers and explain how these findings might be relevant to the investor and the management of the company.
Practical information regarding the vendors : Is a sample of size 10 large enough to provide any practical information regarding the vendors supposed process improvement?

Reviews

Write a Review

Computer Networking Questions & Answers

  Application at work transmits data records

Contrast synchronous and asynchronous connection. Is it more efficient to use synchronous connection or an asynchronous connection? What speed transmission line is necessary to support either type of connection? Show all your work.

  Define the overall network architecture

Define the overall network architecture

  Define a computer virus

Anti-virus software is used to keep your computer free from viruses. Define a computer virus.

  How many times is the swag function

How many times is the swag function called if there are five items in the array.

  How do you know that the information is secure from phishing

Computer system provides protection using the Bell-La Padula policy. How would a virus spread and how do you know that the information you type in is secure from phishing?

  Describe the tcp three-way handshake

Describe the TCP three-way handshake - What is the handshake used for? Which two of the six TCP flags were set in the packets used to cause the TCP session to be closed or terminated?

  Discuss at least three major evolutionary steps

A. How does Donn Parker's model compare with the X.805 framework? B. If an organization consulted you about its decision on an enterprise security framework, which would you recommend and why?

  How security testing differs fromordinary functionality test

how security testing differs from ordinary functionality testing

  Features of ms excel

Write a two-page paper explaining the features of MS Excel 2013-be sure to address the items in the rubric below.

  Divide the network whose cidr address

Divide the network whose CIDR address is 165.221.204.0/25 into three subnets, with one subnet having half the addresses and the other two subnets having a quarter of the addresses each. Give the CIDR address of each subnet. How many addresses are ..

  Design and document an ip addressing scheme

Design and document an IP addressing scheme to meet ElectroMyCycle's needs. Specify which IP address blocks will be assigned to different modules of your network design.

  Why are protocols important for networking

Why are protocols important for networking. How does SSH differ from Telnet? How does HTTPS differ from HTTP

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd