Program to finds central individuals in arbitrary networks, Programming Languages

Assignment Help:

Identifying the Central Individual in a Social Network

1. Introduction

You have just been hired by a social networking company! The division you are working in is particularly interested in identifying "central" individuals in the network. Unfortunately, they do not have a formal definition of what makes an individual central. The only resource they currently have is a set of sample networks which have the central individual(s) identified.

2. Assignment

Your task is to do the following:

1.) Create a mathematical definition to define who is(are) the central individual(s) in a network. This definition should:

a. Successfully identify the central individuals in the sample networks provided. (See Sample network files, Central individual is identified in the Appendix of this file)

b. Be applicable to an arbitrary network of arbitrary size.

2.) Implement a program that successfully finds central individuals in arbitrary networks.

a. Input - A file name submitted via the command-line.

The file will have a number of lines of input. Each line will have information about a single connection between friends in a social network, in the following format:

X friends with Y

Where X and Y are integer values (note X will never equal Y). Each integer represents the id of an individual in the network. Each line represents a connection between the two individuals.

b. Output - The ids corresponding to the central individuals (there may be more than one).

c. You can use the programming language of your choice, but your program must be able to compile and run on one of the department linux computers (i.e. linux-1.ece.iastate.edu, linux-2.ece.iastate.edu, etc.)

4. Handing In and Grading

The assignment should be submitted via BlackBoard in a zip file with your NetID as the name of the file.

Your submission should include a short project report which:

1.) Gives your formal definition of a central individual.

Note - even if you are unable to come up with a definition that satisfies all the test networks, be sure to include definitions you tried and explored. We will give partial credit.

2.) Gives a high level overview of the algorithm your program uses to locate the central individual.

3.) Gives clear instructions on how to compile and run your program.


Related Discussions:- Program to finds central individuals in arbitrary networks

Example of arithmetic involving matrices, Example- Arithmetic :  Given th...

Example- Arithmetic :  Given the subsequent two matrices, So calculate A-5B. Solution There isn't much to do now other than the work. We first multiplied

To execute other program from already executing shell script, Normal 0 ...

Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4

Shell script to print right traingle, Normal 0 false false ...

Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4

Pseudo-code to illustrate the breakpoint in a program, The standard way for...

The standard way for debuggers to plant interactive breakpoints in a program in RAM (whatever the processor instruction set) is to save the break pointed instruction and replace it

Store an url in a dartabase, how to store an url in a dartabase(sql server ...

how to store an url in a dartabase(sql server 2005)? (or) create table b(url what is the datatype for url?

Risk - controls and audit tests, Internal Audit has been asked by the State...

Internal Audit has been asked by the State to review the activities of  The Commission on Workforce Development. The Commission was established several years ago by the state legis

Write a program to create map function, Given a list of numbers, say my ...

Given a list of numbers, say my @input_numbers = (1, 1, 3, 5, 8, 13, 21, 34, 55, 89, 144); write a program map1.pl that will use the function map (a) to produce a list of

Service oriented architectures in xml, question 1: In the opening lecture I...

question 1: In the opening lecture I spoke about general changes in business - flatter organizations, process orientation as opposed to functional silos, focus on supply chains, gr

Differences between user and kernel level threads, Question : (a) Many ...

Question : (a) Many systems provide support for both user threads and kernel threads, resulting in different multithreading models. What are the two differences between user

Network management configuratio, You will create a simple network managemen...

You will create a simple network management configuration which checks that certain programs are running on your network and are performing as expected, and that certain system det

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd