Modules / Lectures
Module NameDownloadDescriptionDownload Size
Week 1: IntroductionWeek 1:Assignment Question and SolutionWeek 1:Assignment Question and Solution253 kb
Week 1: IntroductionWeek 0 Assignment 1Week 0 Assignment 1194 kb
Week 1: IntroductionWeek 1 Assignment 1Week 1 Assignment 1229 kb
Week 2: Handling Real-world Network DatasetsWeek 2:Assignment Question and SolutionWeek 2:Assignment Question and Solution221 kb
Week 2: Handling Real-world Network DatasetsWeek 2 Assignment 1Week 2 Assignment 1236 kb
Week 3: Strength of Weak TiesWeek 3:Assignment Question and SolutionWeek 3:Assignment Question and Solution190 kb
Week 3: Strength of Weak TiesWeek 3 Assignment 1Week 3 Assignment 1253 kb
Week 4: Strong and Weak Relationships (Continued) & HomophilyWeek 4:Assignment Question and SolutionWeek 4:Assignment Question and Solution762 kb
Week 4: Strong and Weak Relationships (Continued) & HomophilyWeek 4 Assignment 1Week 4 Assignment 1463 kb
Week 5: Homophily Continued and Ve / -Ve RelationshipsWeek 5:Assignment Question and SolutionWeek 5:Assignment Question and Solution338 kb
Week 5: Homophily Continued and Ve / -Ve RelationshipsWeek 5 Assignment 1Week 5 Assignment 1403 kb
Week 6: Link AnalysisWeek 6:Assignment Question and SolutionWeek 6:Assignment Question and Solution175 kb
Week 6: Link AnalysisWeek 6 Assignment 1Week 6 Assignment 1299 kb
Week 7: Cascading Behavior in NetworksWeek 7:Assignment Question and SolutionWeek 7:Assignment Question and Solution183 kb
Week 7: Cascading Behavior in NetworksWeek 7 Assignment 1Week 7 Assignment 1611 kb
Week 8: Link Analysis (Continued)Week 8:Assignment Question and SolutionWeek 8:Assignment Question and Solution230 kb
Week 8: Link Analysis (Continued)Week 8 Assignment 1Week 8 Assignment 1414 kb
Week 09 - Rich Get Richer PhenomenonWeek 9:Assignment Question and SolutionWeek 9:Assignment Question and Solution303 kb
Week 09 - Rich Get Richer PhenomenonWeek 9 Assignment 1Week 9 Assignment 1341 kb
Week 10 - Rich Get Richer Phenomenon - 2Week 10:Assignment question and solutionWeek 10:Assignment Question and Solution190 kb
Week 10 - Rich Get Richer Phenomenon - 2Week 10 Assignment 1Week 10 Assignment 1293 kb
Week 11 - The Small World EffectWeek 11:Assignment Question and SolutionWeek 11:Assignment Question and Solution237 kb
Week 11 - The Small World EffectWeek 11 Assignment 1Week 11 Assignment 1208 kb
Week 12 - How to go Viral on WebWeek 12:Assignment question and solutionWeek 12:Assignment Question and Solution160 kb
Week 12 - How to go Viral on WebWeek 12 Assignment 1Week 12 Assignment 1241 kb


New Assignments
Module NameDownload
Week_01_Assignment_01Week_01_Assignment_01
Week_02_Assignment_02Week_02_Assignment_02
Week_03_Assignment_03Week_03_Assignment_03
Week_04_Assignment_04Week_04_Assignment_04
Week_05_Assignment_05Week_05_Assignment_05
Week_06_Assignment_06Week_06_Assignment_06
Week_07_Assignment_07Week_07_Assignment_07
Week_08_Assignment_08Week_08_Assignment_08
Week_09_Assignment_09Week_09_Assignment_09
Week_10_Assignment_10Week_10_Assignment_10
Week_11_Assignment_11Week_11_Assignment_11
Week_12_Assignment_12Week_12_Assignment_12
noc18_cs56_Assignment1noc18_cs56_Assignment1
noc18_cs56_Assignment10noc18_cs56_Assignment10
noc18_cs56_Assignment11noc18_cs56_Assignment11
noc18_cs56_Assignment12noc18_cs56_Assignment12
noc18_cs56_Assignment13noc18_cs56_Assignment13
noc18_cs56_Assignment2noc18_cs56_Assignment2
noc18_cs56_Assignment3noc18_cs56_Assignment3
noc18_cs56_Assignment4noc18_cs56_Assignment4
noc18_cs56_Assignment5noc18_cs56_Assignment5
noc18_cs56_Assignment6noc18_cs56_Assignment6
noc18_cs56_Assignment7noc18_cs56_Assignment7
noc18_cs56_Assignment8noc18_cs56_Assignment8
noc18_cs56_Assignment9noc18_cs56_Assignment9
noc19_cs30_Assignment1noc19_cs30_Assignment1
noc19_cs30_Assignment10noc19_cs30_Assignment10
noc19_cs30_Assignment11noc19_cs30_Assignment11
noc19_cs30_Assignment12noc19_cs30_Assignment12
noc19_cs30_Assignment13noc19_cs30_Assignment13
noc19_cs30_Assignment2noc19_cs30_Assignment2
noc19_cs30_Assignment3noc19_cs30_Assignment3
noc19_cs30_Assignment4noc19_cs30_Assignment4
noc19_cs30_Assignment5noc19_cs30_Assignment5
noc19_cs30_Assignment6noc19_cs30_Assignment6
noc19_cs30_Assignment7noc19_cs30_Assignment7
noc19_cs30_Assignment8noc19_cs30_Assignment8
noc19_cs30_Assignment9noc19_cs30_Assignment9


Sl.No Chapter Name MP4 Download Transcript Download
1IntroductionDownloadPDF unavailable
2Answer to the puzzleDownloadPDF unavailable
3Introduction to Python-1DownloadPDF unavailable
4Introduction to Python-2DownloadPDF unavailable
5Introduction to Networkx-1DownloadPDF unavailable
6Introduction to Networkx-2DownloadPDF unavailable
7Social Networks: The ChallengeDownloadPDF unavailable
8Google Page RankDownloadPDF unavailable
9Searching in a NetworkDownloadPDF unavailable
10Link PredictionDownloadPDF unavailable
11The ContagionsDownloadPDF unavailable
12Importance of AcquaintancesDownloadPDF unavailable
13Marketing on Social NetworksDownloadPDF unavailable
14Introduction to DatasetsDownloadPDF unavailable
15Ingredients NetworkDownloadPDF unavailable
16Synonymy NetworkDownloadPDF unavailable
17Web GraphDownloadPDF unavailable
18Social Network DatasetsDownloadPDF unavailable
19Datasets: Different Formats DownloadPDF unavailable
20Datasets : How to Download?DownloadPDF unavailable
21Datasets: Analysing Using NetworkxDownloadPDF unavailable
22Datasets: Analysing Using GephiDownloadPDF unavailable
23Introduction : Emergence of ConnectednessDownloadPDF unavailable
24Advanced Material : Emergence of ConnectednessDownloadPDF unavailable
25Programming Illustration : Emergence of ConnectednessDownloadPDF unavailable
26Summary to DatasetsDownloadPDF unavailable
27 Introduction DownloadPDF unavailable
28Granovetter's Strength of weak tiesDownloadPDF unavailable
29Triads, clustering coefficient and neighborhood overlapDownloadPDF unavailable
30Structure of weak ties, bridges, and local bridgesDownloadPDF unavailable
31Validation of Granovetter's experiment using cell phone dataDownloadPDF unavailable
32EmbedednessDownloadPDF unavailable
33Structural HolesDownloadPDF unavailable
34Social CapitalDownloadPDF unavailable
35Finding Communities in a graph (Brute Force Method)DownloadPDF unavailable
36Community Detection Using Girvan Newman AlgorithmDownloadPDF unavailable
37Visualising Communities using GephiDownloadPDF unavailable
38Tie Strength, Social Media and Passive EngagementDownloadPDF unavailable
39Betweenness Measures and Graph PartitioningDownloadPDF unavailable
40Strong and Weak Relationship - Summary DownloadPDF unavailable
41Introduction to Homophily - Should you watch your company ?DownloadPDF unavailable
42Selection and Social InfluenceDownloadPDF unavailable
43Interplay between Selection and Social InfluenceDownloadPDF unavailable
44Homophily - Definition and measurementDownloadPDF unavailable
45Foci Closure and Membership ClosureDownloadPDF unavailable
46Introduction to Fatman Evolutionary model DownloadPDF unavailable
47Fatman Evolutionary Model- The Base Code (Adding people)DownloadPDF unavailable
48Fatman Evolutionary Model- The Base Code (Adding Social Foci)DownloadPDF unavailable
49Fatman Evolutionary Model- Implementing HomophilyDownloadPDF unavailable
50Quantifying the Effect of Triadic Closure DownloadPDF unavailable
51Fatman Evolutionary Model- Implementing ClosuresDownloadPDF unavailable
52Fatman Evolutionary Model- Implementing Social InfluenceDownloadPDF unavailable
53Fatman Evolutionary Model- Storing and analyzing longitudnal dataDownloadPDF unavailable
54Spatial Segregation: An IntroductionDownloadPDF unavailable
55Spatial Segregation: Simulation of the Schelling Model DownloadPDF unavailable
56Spatial Segregation: ConclusionDownloadPDF unavailable
57Schelling Model Implementation-1(Introduction)DownloadPDF unavailable
58Schelling Model Implementation-2 (Base Code)DownloadPDF unavailable
59Schelling Model Implementation-3 (Visualization and Getting a list of boundary and internal nodes)DownloadPDF unavailable
60Schelling Model Implementation-4 (Getting a list of unsatisfied nodes)DownloadPDF unavailable
61Schelling Model Implementation-5 (Shifting the unsatisfied nodes and visualizing the final graph)DownloadPDF unavailable
62CHAPTER - 5 POSITIVE AND NEGATIVE RELATIONSHIPS (INTRODUCTION)DownloadPDF unavailable
63STRUCTURAL BALANCEDownloadPDF unavailable
64ENEMY'S ENEMY IS A FRIENDDownloadPDF unavailable
65Characterizing the structure of balanced networksDownloadPDF unavailable
66BALANCE THEOREMDownloadPDF unavailable
67PROOF OF BALANCE THEOREMDownloadPDF unavailable
68Introduction to positive and negative edgesDownloadPDF unavailable
69Outline of implemantationDownloadPDF unavailable
70Creating graph, displaying it and counting unstable trianglesDownloadPDF unavailable
71Moving a network from an unstable to stable stateDownloadPDF unavailable
72Forming two coalitionsDownloadPDF unavailable
73Forming two coalitions contdDownloadPDF unavailable
74Visualizing coalitions and the evolutionDownloadPDF unavailable
75The Web GraphDownloadPDF unavailable
76Collecting the Web GraphDownloadPDF unavailable
77Equal Coin DistributionDownloadPDF unavailable
78Random Coin DroppingDownloadPDF unavailable
79Google Page Ranking Using Web GraphDownloadPDF unavailable
80Implementing PageRank Using Points Distribution Method-1DownloadPDF unavailable
81Implementing PageRank Using Points Distribution Method-2DownloadPDF unavailable
82Implementing PageRank Using Points Distribution Method-3DownloadPDF unavailable
83Implementing PageRank Using Points Distribution Method-4DownloadPDF unavailable
84Implementing PageRank Using Random Walk Method -1DownloadPDF unavailable
85Implementing PageRank Using Random Walk Method -2DownloadPDF unavailable
86DegreeRank versus PageRankDownloadPDF unavailable
87We FollowDownloadPDF unavailable
88Why do we Follow?DownloadPDF unavailable
89Diffusion in NetworksDownloadPDF unavailable
90Modeling DiffusionDownloadPDF unavailable
91Modeling Diffusion (continued)DownloadPDF unavailable
92Impact of Commmunities on DiffusionDownloadPDF unavailable
93Cascade and ClustersDownloadPDF unavailable
94Knowledge, Thresholds and the Collective ActionDownloadPDF unavailable
95An Introduction to the Programming Screencast (Coding 4 major ideas)DownloadPDF unavailable
96The Base CodeDownloadPDF unavailable
97Coding the First Big Idea - Increasing the PayoffDownloadPDF unavailable
98Coding the Second Big Idea - Key PeopleDownloadPDF unavailable
99Coding the Third Big Idea- Impact of Communities on CascadesDownloadPDF unavailable
100Coding the Fourth Big Idea - Cascades and ClustersDownloadPDF unavailable
101Introduction to Hubs and Authorities (A Story)DownloadPDF unavailable
102Principle of Repeated Improvement (A story)DownloadPDF unavailable
103Principle of Repeated Improvement (An example)DownloadPDF unavailable
104Hubs and AuthoritiesDownloadPDF unavailable
105PageRank Revisited - An exampleDownloadPDF unavailable
106PageRank Revisited - Convergence in the ExampleDownloadPDF unavailable
107PageRank Revisited - Conservation and ConvergenceDownloadPDF unavailable
108PageRank, conservation and convergence - Another exampleDownloadPDF unavailable
109Matrix Multiplication (Pre-requisite 1)DownloadPDF unavailable
110Convergence in Repeated Matrix Multiplication (Pre-requisite 1)DownloadPDF unavailable
111Addition of Two Vectors (Pre-requisite 2)DownloadPDF unavailable
112Convergence in Repeated Matrix Multiplication- The DetailsDownloadPDF unavailable
113PageRank as a Matrix OperationDownloadPDF unavailable
114PageRank ExplainedDownloadPDF unavailable
115Introduction to PowerlawDownloadPDF unavailable
116Why do Normal Distributions Appear?DownloadPDF unavailable
117Power Law emerges in WWW graphsDownloadPDF unavailable
118Detecting the Presence of PowerlawDownloadPDF unavailable
119Rich Get Richer PhenomenonDownloadPDF unavailable
120 Summary So FarDownloadPDF unavailable
121Implementing Rich-getting-richer Phenomenon (Barabasi-Albert Model)-1DownloadPDF unavailable
122Implementing Rich-getting-richer Phenomenon (Barabasi-Albert Model)-2DownloadPDF unavailable
123Implementing a Random Graph (Erdos- Renyi Model)-1DownloadPDF unavailable
124Implementing a Random Graph (Erdos- Renyi Model)-2DownloadPDF unavailable
125Forced Versus Random Removal of Nodes (Attack Survivability)DownloadPDF unavailable
126Rich Get Richer - A Possible ReasonDownloadPDF unavailable
127Rich Get Richer - The Long TailDownloadPDF unavailable
128Epidemics- An IntroductionDownloadPDF unavailable
129Introduction to epidemics (contd..)DownloadPDF unavailable
130Simple Branching Process for Modeling EpidemicsDownloadPDF unavailable
131Simple Branching Process for Modeling Epidemics (contd..)DownloadPDF unavailable
132Basic Reproductive NumberDownloadPDF unavailable
133Modeling epidemics on complex networksDownloadPDF unavailable
134SIR and SIS spreading modelsDownloadPDF unavailable
135Comparison between SIR and SIS spreading modelsDownloadPDF unavailable
136Basic Reproductive Number Revisited for Complex NetworksDownloadPDF unavailable
137Percolation modelDownloadPDF unavailable
138Analysis of basic reproductive number in branching model (The problem statement)DownloadPDF unavailable
139Analyzing basic reproductive number 2DownloadPDF unavailable
140Analyzing basic reproductive number 3DownloadPDF unavailable
141Analyzing basic reproductive number 4DownloadPDF unavailable
142Analyzing basic reproductive number 5DownloadPDF unavailable
143Small World Effect - An IntroductionDownloadPDF unavailable
144Milgram's ExperimentDownloadPDF unavailable
145The ReasonDownloadPDF unavailable
146The Generative ModelDownloadPDF unavailable
147Decentralized Search - IDownloadPDF unavailable
148Decentralized Search - IIDownloadPDF unavailable
149Decentralized Search - IIIDownloadPDF unavailable
150Programming illustration- Small world networks : IntroductionDownloadPDF unavailable
151Base codeDownloadPDF unavailable
152Making homophily based edgesDownloadPDF unavailable
153Adding weak tiesDownloadPDF unavailable
154Plotting change in diameterDownloadPDF unavailable
155Programming illustration- Myopic Search : IntroductionDownloadPDF unavailable
156Myopic SearchDownloadPDF unavailable
157Myopic Search comparision to optimal searchDownloadPDF unavailable
158Time Taken by Myopic SearchDownloadPDF unavailable
159PseudoCores : IntroductionDownloadPDF unavailable
160How to be ViralDownloadPDF unavailable
161Who are the right key nodes?DownloadPDF unavailable
162finding the right key nodes (the core)DownloadPDF unavailable
163Coding K-Shell DecompositionDownloadPDF unavailable
164Coding cascading ModelDownloadPDF unavailable
165Coding the importance of core nodes in cascadingDownloadPDF unavailable
166Pseudo coreDownloadPDF unavailable
167Live Session 1DownloadPDF unavailable
168Live Session 2DownloadPDF unavailable
169Live Session 3DownloadPDF unavailable
170Live Session 4DownloadPDF unavailable
171Live Session 5DownloadPDF unavailable