Modules / Lectures
Module NameDownloadDescriptionDownload Size
Week 1: IntroductionWeek 1:Assignment Question and SolutionWeek 1:Assignment Question and Solution253 kb
Week 1: IntroductionWeek 0 Assignment 1Week 0 Assignment 1194 kb
Week 1: IntroductionWeek 1 Assignment 1Week 1 Assignment 1229 kb
Week 2: Handling Real-world Network DatasetsWeek 2:Assignment Question and SolutionWeek 2:Assignment Question and Solution221 kb
Week 2: Handling Real-world Network DatasetsWeek 2 Assignment 1Week 2 Assignment 1236 kb
Week 3: Strength of Weak TiesWeek 3:Assignment Question and SolutionWeek 3:Assignment Question and Solution190 kb
Week 3: Strength of Weak TiesWeek 3 Assignment 1Week 3 Assignment 1253 kb
Week 4: Strong and Weak Relationships (Continued) & HomophilyWeek 4:Assignment Question and SolutionWeek 4:Assignment Question and Solution762 kb
Week 4: Strong and Weak Relationships (Continued) & HomophilyWeek 4 Assignment 1Week 4 Assignment 1463 kb
Week 5: Homophily Continued and Ve / -Ve RelationshipsWeek 5:Assignment Question and SolutionWeek 5:Assignment Question and Solution338 kb
Week 5: Homophily Continued and Ve / -Ve RelationshipsWeek 5 Assignment 1Week 5 Assignment 1403 kb
Week 6: Link AnalysisWeek 6:Assignment Question and SolutionWeek 6:Assignment Question and Solution175 kb
Week 6: Link AnalysisWeek 6 Assignment 1Week 6 Assignment 1299 kb
Week 7: Cascading Behavior in NetworksWeek 7:Assignment Question and SolutionWeek 7:Assignment Question and Solution183 kb
Week 7: Cascading Behavior in NetworksWeek 7 Assignment 1Week 7 Assignment 1611 kb
Week 8: Link Analysis (Continued)Week 8:Assignment Question and SolutionWeek 8:Assignment Question and Solution230 kb
Week 8: Link Analysis (Continued)Week 8 Assignment 1Week 8 Assignment 1414 kb
Week 09 - Rich Get Richer PhenomenonWeek 9:Assignment Question and SolutionWeek 9:Assignment Question and Solution303 kb
Week 09 - Rich Get Richer PhenomenonWeek 9 Assignment 1Week 9 Assignment 1341 kb
Week 10 - Rich Get Richer Phenomenon - 2Week 10:Assignment question and solutionWeek 10:Assignment Question and Solution190 kb
Week 10 - Rich Get Richer Phenomenon - 2Week 10 Assignment 1Week 10 Assignment 1293 kb
Week 11 - The Small World EffectWeek 11:Assignment Question and SolutionWeek 11:Assignment Question and Solution237 kb
Week 11 - The Small World EffectWeek 11 Assignment 1Week 11 Assignment 1208 kb
Week 12 - How to go Viral on WebWeek 12:Assignment question and solutionWeek 12:Assignment Question and Solution160 kb
Week 12 - How to go Viral on WebWeek 12 Assignment 1Week 12 Assignment 1241 kb


New Assignments
Module NameDownload
Week_01_Assignment_01Week_01_Assignment_01
Week_02_Assignment_02Week_02_Assignment_02
Week_03_Assignment_03Week_03_Assignment_03
Week_04_Assignment_04Week_04_Assignment_04
Week_05_Assignment_05Week_05_Assignment_05
Week_06_Assignment_06Week_06_Assignment_06
Week_07_Assignment_07Week_07_Assignment_07
Week_08_Assignment_08Week_08_Assignment_08
Week_09_Assignment_09Week_09_Assignment_09
Week_10_Assignment_10Week_10_Assignment_10
Week_11_Assignment_11Week_11_Assignment_11
Week_12_Assignment_12Week_12_Assignment_12
noc18_cs56_Assignment1noc18_cs56_Assignment1
noc18_cs56_Assignment10noc18_cs56_Assignment10
noc18_cs56_Assignment11noc18_cs56_Assignment11
noc18_cs56_Assignment12noc18_cs56_Assignment12
noc18_cs56_Assignment13noc18_cs56_Assignment13
noc18_cs56_Assignment2noc18_cs56_Assignment2
noc18_cs56_Assignment3noc18_cs56_Assignment3
noc18_cs56_Assignment4noc18_cs56_Assignment4
noc18_cs56_Assignment5noc18_cs56_Assignment5
noc18_cs56_Assignment6noc18_cs56_Assignment6
noc18_cs56_Assignment7noc18_cs56_Assignment7
noc18_cs56_Assignment8noc18_cs56_Assignment8
noc18_cs56_Assignment9noc18_cs56_Assignment9
noc19_cs30_Assignment1noc19_cs30_Assignment1
noc19_cs30_Assignment10noc19_cs30_Assignment10
noc19_cs30_Assignment11noc19_cs30_Assignment11
noc19_cs30_Assignment12noc19_cs30_Assignment12
noc19_cs30_Assignment13noc19_cs30_Assignment13
noc19_cs30_Assignment2noc19_cs30_Assignment2
noc19_cs30_Assignment3noc19_cs30_Assignment3
noc19_cs30_Assignment4noc19_cs30_Assignment4
noc19_cs30_Assignment5noc19_cs30_Assignment5
noc19_cs30_Assignment6noc19_cs30_Assignment6
noc19_cs30_Assignment7noc19_cs30_Assignment7
noc19_cs30_Assignment8noc19_cs30_Assignment8
noc19_cs30_Assignment9noc19_cs30_Assignment9


Sl.No Chapter Name MP4 Download
1IntroductionDownload
2Answer to the puzzleDownload
3Introduction to Python-1Download
4Introduction to Python-2Download
5Introduction to Networkx-1Download
6Introduction to Networkx-2Download
7Social Networks: The ChallengeDownload
8Google Page RankDownload
9Searching in a NetworkDownload
10Link PredictionDownload
11The ContagionsDownload
12Importance of AcquaintancesDownload
13Marketing on Social NetworksDownload
14Introduction to DatasetsDownload
15Ingredients NetworkDownload
16Synonymy NetworkDownload
17Web GraphDownload
18Social Network DatasetsDownload
19Datasets: Different Formats Download
20Datasets : How to Download?Download
21Datasets: Analysing Using NetworkxDownload
22Datasets: Analysing Using GephiDownload
23Introduction : Emergence of ConnectednessDownload
24Advanced Material : Emergence of ConnectednessDownload
25Programming Illustration : Emergence of ConnectednessDownload
26Summary to DatasetsDownload
27 Introduction Download
28Granovetter's Strength of weak tiesDownload
29Triads, clustering coefficient and neighborhood overlapDownload
30Structure of weak ties, bridges, and local bridgesDownload
31Validation of Granovetter's experiment using cell phone dataDownload
32EmbedednessDownload
33Structural HolesDownload
34Social CapitalDownload
35Finding Communities in a graph (Brute Force Method)Download
36Community Detection Using Girvan Newman AlgorithmDownload
37Visualising Communities using GephiDownload
38Tie Strength, Social Media and Passive EngagementDownload
39Betweenness Measures and Graph PartitioningDownload
40Strong and Weak Relationship - Summary Download
41Introduction to Homophily - Should you watch your company ?Download
42Selection and Social InfluenceDownload
43Interplay between Selection and Social InfluenceDownload
44Homophily - Definition and measurementDownload
45Foci Closure and Membership ClosureDownload
46Introduction to Fatman Evolutionary model Download
47Fatman Evolutionary Model- The Base Code (Adding people)Download
48Fatman Evolutionary Model- The Base Code (Adding Social Foci)Download
49Fatman Evolutionary Model- Implementing HomophilyDownload
50Quantifying the Effect of Triadic Closure Download
51Fatman Evolutionary Model- Implementing ClosuresDownload
52Fatman Evolutionary Model- Implementing Social InfluenceDownload
53Fatman Evolutionary Model- Storing and analyzing longitudnal dataDownload
54Spatial Segregation: An IntroductionDownload
55Spatial Segregation: Simulation of the Schelling Model Download
56Spatial Segregation: ConclusionDownload
57Schelling Model Implementation-1(Introduction)Download
58Schelling Model Implementation-2 (Base Code)Download
59Schelling Model Implementation-3 (Visualization and Getting a list of boundary and internal nodes)Download
60Schelling Model Implementation-4 (Getting a list of unsatisfied nodes)Download
61Schelling Model Implementation-5 (Shifting the unsatisfied nodes and visualizing the final graph)Download
62CHAPTER - 5 POSITIVE AND NEGATIVE RELATIONSHIPS (INTRODUCTION)Download
63STRUCTURAL BALANCEDownload
64ENEMY'S ENEMY IS A FRIENDDownload
65Characterizing the structure of balanced networksDownload
66BALANCE THEOREMDownload
67PROOF OF BALANCE THEOREMDownload
68Introduction to positive and negative edgesDownload
69Outline of implemantationDownload
70Creating graph, displaying it and counting unstable trianglesDownload
71Moving a network from an unstable to stable stateDownload
72Forming two coalitionsDownload
73Forming two coalitions contdDownload
74Visualizing coalitions and the evolutionDownload
75The Web GraphDownload
76Collecting the Web GraphDownload
77Equal Coin DistributionDownload
78Random Coin DroppingDownload
79Google Page Ranking Using Web GraphDownload
80Implementing PageRank Using Points Distribution Method-1Download
81Implementing PageRank Using Points Distribution Method-2Download
82Implementing PageRank Using Points Distribution Method-3Download
83Implementing PageRank Using Points Distribution Method-4Download
84Implementing PageRank Using Random Walk Method -1Download
85Implementing PageRank Using Random Walk Method -2Download
86DegreeRank versus PageRankDownload
87We FollowDownload
88Why do we Follow?Download
89Diffusion in NetworksDownload
90Modeling DiffusionDownload
91Modeling Diffusion (continued)Download
92Impact of Commmunities on DiffusionDownload
93Cascade and ClustersDownload
94Knowledge, Thresholds and the Collective ActionDownload
95An Introduction to the Programming Screencast (Coding 4 major ideas)Download
96The Base CodeDownload
97Coding the First Big Idea - Increasing the PayoffDownload
98Coding the Second Big Idea - Key PeopleDownload
99Coding the Third Big Idea- Impact of Communities on CascadesDownload
100Coding the Fourth Big Idea - Cascades and ClustersDownload
101Introduction to Hubs and Authorities (A Story)Download
102Principle of Repeated Improvement (A story)Download
103Principle of Repeated Improvement (An example)Download
104Hubs and AuthoritiesDownload
105PageRank Revisited - An exampleDownload
106PageRank Revisited - Convergence in the ExampleDownload
107PageRank Revisited - Conservation and ConvergenceDownload
108PageRank, conservation and convergence - Another exampleDownload
109Matrix Multiplication (Pre-requisite 1)Download
110Convergence in Repeated Matrix Multiplication (Pre-requisite 1)Download
111Addition of Two Vectors (Pre-requisite 2)Download
112Convergence in Repeated Matrix Multiplication- The DetailsDownload
113PageRank as a Matrix OperationDownload
114PageRank ExplainedDownload
115Introduction to PowerlawDownload
116Why do Normal Distributions Appear?Download
117Power Law emerges in WWW graphsDownload
118Detecting the Presence of PowerlawDownload
119Rich Get Richer PhenomenonDownload
120 Summary So FarDownload
121Implementing Rich-getting-richer Phenomenon (Barabasi-Albert Model)-1Download
122Implementing Rich-getting-richer Phenomenon (Barabasi-Albert Model)-2Download
123Implementing a Random Graph (Erdos- Renyi Model)-1Download
124Implementing a Random Graph (Erdos- Renyi Model)-2Download
125Forced Versus Random Removal of Nodes (Attack Survivability)Download
126Rich Get Richer - A Possible ReasonDownload
127Rich Get Richer - The Long TailDownload
128Epidemics- An IntroductionDownload
129Introduction to epidemics (contd..)Download
130Simple Branching Process for Modeling EpidemicsDownload
131Simple Branching Process for Modeling Epidemics (contd..)Download
132Basic Reproductive NumberDownload
133Modeling epidemics on complex networksDownload
134SIR and SIS spreading modelsDownload
135Comparison between SIR and SIS spreading modelsDownload
136Basic Reproductive Number Revisited for Complex NetworksDownload
137Percolation modelDownload
138Analysis of basic reproductive number in branching model (The problem statement)Download
139Analyzing basic reproductive number 2Download
140Analyzing basic reproductive number 3Download
141Analyzing basic reproductive number 4Download
142Analyzing basic reproductive number 5Download
143Small World Effect - An IntroductionDownload
144Milgram's ExperimentDownload
145The ReasonDownload
146The Generative ModelDownload
147Decentralized Search - IDownload
148Decentralized Search - IIDownload
149Decentralized Search - IIIDownload
150Programming illustration- Small world networks : IntroductionDownload
151Base codeDownload
152Making homophily based edgesDownload
153Adding weak tiesDownload
154Plotting change in diameterDownload
155Programming illustration- Myopic Search : IntroductionDownload
156Myopic SearchDownload
157Myopic Search comparision to optimal searchDownload
158Time Taken by Myopic SearchDownload
159PseudoCores : IntroductionDownload
160How to be ViralDownload
161Who are the right key nodes?Download
162finding the right key nodes (the core)Download
163Coding K-Shell DecompositionDownload
164Coding cascading ModelDownload
165Coding the importance of core nodes in cascadingDownload
166Pseudo coreDownload
167Live Session 1Download
168Live Session 2Download
169Live Session 3Download
170Live Session 4Download
171Live Session 5Download

Sl.No Chapter Name English
1IntroductionDownload
To be verified
2Answer to the puzzleDownload
To be verified
3Introduction to Python-1Download
To be verified
4Introduction to Python-2Download
To be verified
5Introduction to Networkx-1Download
To be verified
6Introduction to Networkx-2Download
To be verified
7Social Networks: The ChallengeDownload
To be verified
8Google Page RankDownload
To be verified
9Searching in a NetworkDownload
To be verified
10Link PredictionDownload
To be verified
11The ContagionsDownload
To be verified
12Importance of AcquaintancesDownload
To be verified
13Marketing on Social NetworksDownload
To be verified
14Introduction to DatasetsDownload
To be verified
15Ingredients NetworkDownload
To be verified
16Synonymy NetworkDownload
To be verified
17Web GraphDownload
To be verified
18Social Network DatasetsDownload
To be verified
19Datasets: Different Formats Download
To be verified
20Datasets : How to Download?Download
To be verified
21Datasets: Analysing Using NetworkxDownload
To be verified
22Datasets: Analysing Using GephiDownload
To be verified
23Introduction : Emergence of ConnectednessDownload
To be verified
24Advanced Material : Emergence of ConnectednessDownload
To be verified
25Programming Illustration : Emergence of ConnectednessDownload
To be verified
26Summary to DatasetsDownload
To be verified
27 Introduction Download
To be verified
28Granovetter's Strength of weak tiesDownload
To be verified
29Triads, clustering coefficient and neighborhood overlapDownload
To be verified
30Structure of weak ties, bridges, and local bridgesDownload
To be verified
31Validation of Granovetter's experiment using cell phone dataDownload
To be verified
32EmbedednessDownload
To be verified
33Structural HolesDownload
To be verified
34Social CapitalDownload
To be verified
35Finding Communities in a graph (Brute Force Method)Download
To be verified
36Community Detection Using Girvan Newman AlgorithmDownload
To be verified
37Visualising Communities using GephiDownload
To be verified
38Tie Strength, Social Media and Passive EngagementDownload
To be verified
39Betweenness Measures and Graph PartitioningDownload
To be verified
40Strong and Weak Relationship - Summary Download
To be verified
41Introduction to Homophily - Should you watch your company ?Download
To be verified
42Selection and Social InfluenceDownload
To be verified
43Interplay between Selection and Social InfluenceDownload
To be verified
44Homophily - Definition and measurementDownload
To be verified
45Foci Closure and Membership ClosureDownload
To be verified
46Introduction to Fatman Evolutionary model Download
To be verified
47Fatman Evolutionary Model- The Base Code (Adding people)Download
To be verified
48Fatman Evolutionary Model- The Base Code (Adding Social Foci)Download
To be verified
49Fatman Evolutionary Model- Implementing HomophilyDownload
To be verified
50Quantifying the Effect of Triadic Closure Download
To be verified
51Fatman Evolutionary Model- Implementing ClosuresDownload
To be verified
52Fatman Evolutionary Model- Implementing Social InfluenceDownload
To be verified
53Fatman Evolutionary Model- Storing and analyzing longitudnal dataDownload
To be verified
54Spatial Segregation: An IntroductionDownload
To be verified
55Spatial Segregation: Simulation of the Schelling Model Download
To be verified
56Spatial Segregation: ConclusionDownload
To be verified
57Schelling Model Implementation-1(Introduction)Download
To be verified
58Schelling Model Implementation-2 (Base Code)Download
To be verified
59Schelling Model Implementation-3 (Visualization and Getting a list of boundary and internal nodes)Download
To be verified
60Schelling Model Implementation-4 (Getting a list of unsatisfied nodes)Download
To be verified
61Schelling Model Implementation-5 (Shifting the unsatisfied nodes and visualizing the final graph)Download
To be verified
62CHAPTER - 5 POSITIVE AND NEGATIVE RELATIONSHIPS (INTRODUCTION)Download
To be verified
63STRUCTURAL BALANCEDownload
To be verified
64ENEMY'S ENEMY IS A FRIENDDownload
To be verified
65Characterizing the structure of balanced networksDownload
To be verified
66BALANCE THEOREMDownload
To be verified
67PROOF OF BALANCE THEOREMDownload
To be verified
68Introduction to positive and negative edgesDownload
To be verified
69Outline of implemantationDownload
To be verified
70Creating graph, displaying it and counting unstable trianglesDownload
To be verified
71Moving a network from an unstable to stable stateDownload
To be verified
72Forming two coalitionsDownload
To be verified
73Forming two coalitions contdDownload
To be verified
74Visualizing coalitions and the evolutionDownload
To be verified
75The Web GraphDownload
To be verified
76Collecting the Web GraphDownload
To be verified
77Equal Coin DistributionDownload
To be verified
78Random Coin DroppingDownload
To be verified
79Google Page Ranking Using Web GraphDownload
To be verified
80Implementing PageRank Using Points Distribution Method-1Download
To be verified
81Implementing PageRank Using Points Distribution Method-2Download
To be verified
82Implementing PageRank Using Points Distribution Method-3Download
To be verified
83Implementing PageRank Using Points Distribution Method-4Download
To be verified
84Implementing PageRank Using Random Walk Method -1Download
To be verified
85Implementing PageRank Using Random Walk Method -2Download
To be verified
86DegreeRank versus PageRankDownload
To be verified
87We FollowDownload
To be verified
88Why do we Follow?Download
To be verified
89Diffusion in NetworksDownload
To be verified
90Modeling DiffusionDownload
To be verified
91Modeling Diffusion (continued)Download
To be verified
92Impact of Commmunities on DiffusionDownload
To be verified
93Cascade and ClustersDownload
To be verified
94Knowledge, Thresholds and the Collective ActionDownload
To be verified
95An Introduction to the Programming Screencast (Coding 4 major ideas)Download
To be verified
96The Base CodeDownload
To be verified
97Coding the First Big Idea - Increasing the PayoffDownload
To be verified
98Coding the Second Big Idea - Key PeopleDownload
To be verified
99Coding the Third Big Idea- Impact of Communities on CascadesDownload
To be verified
100Coding the Fourth Big Idea - Cascades and ClustersDownload
To be verified
101Introduction to Hubs and Authorities (A Story)Download
To be verified
102Principle of Repeated Improvement (A story)Download
To be verified
103Principle of Repeated Improvement (An example)Download
To be verified
104Hubs and AuthoritiesDownload
To be verified
105PageRank Revisited - An exampleDownload
To be verified
106PageRank Revisited - Convergence in the ExampleDownload
To be verified
107PageRank Revisited - Conservation and ConvergenceDownload
To be verified
108PageRank, conservation and convergence - Another exampleDownload
To be verified
109Matrix Multiplication (Pre-requisite 1)Download
To be verified
110Convergence in Repeated Matrix Multiplication (Pre-requisite 1)Download
To be verified
111Addition of Two Vectors (Pre-requisite 2)Download
To be verified
112Convergence in Repeated Matrix Multiplication- The DetailsDownload
To be verified
113PageRank as a Matrix OperationDownload
To be verified
114PageRank ExplainedDownload
To be verified
115Introduction to PowerlawDownload
To be verified
116Why do Normal Distributions Appear?Download
To be verified
117Power Law emerges in WWW graphsDownload
To be verified
118Detecting the Presence of PowerlawDownload
To be verified
119Rich Get Richer PhenomenonDownload
To be verified
120 Summary So FarDownload
To be verified
121Implementing Rich-getting-richer Phenomenon (Barabasi-Albert Model)-1Download
To be verified
122Implementing Rich-getting-richer Phenomenon (Barabasi-Albert Model)-2Download
To be verified
123Implementing a Random Graph (Erdos- Renyi Model)-1Download
To be verified
124Implementing a Random Graph (Erdos- Renyi Model)-2Download
To be verified
125Forced Versus Random Removal of Nodes (Attack Survivability)Download
To be verified
126Rich Get Richer - A Possible ReasonDownload
To be verified
127Rich Get Richer - The Long TailDownload
To be verified
128Epidemics- An IntroductionDownload
To be verified
129Introduction to epidemics (contd..)Download
To be verified
130Simple Branching Process for Modeling EpidemicsDownload
To be verified
131Simple Branching Process for Modeling Epidemics (contd..)Download
To be verified
132Basic Reproductive NumberDownload
To be verified
133Modeling epidemics on complex networksDownload
To be verified
134SIR and SIS spreading modelsDownload
To be verified
135Comparison between SIR and SIS spreading modelsDownload
To be verified
136Basic Reproductive Number Revisited for Complex NetworksDownload
To be verified
137Percolation modelDownload
To be verified
138Analysis of basic reproductive number in branching model (The problem statement)Download
To be verified
139Analyzing basic reproductive number 2Download
To be verified
140Analyzing basic reproductive number 3Download
To be verified
141Analyzing basic reproductive number 4Download
To be verified
142Analyzing basic reproductive number 5Download
To be verified
143Small World Effect - An IntroductionDownload
To be verified
144Milgram's ExperimentDownload
To be verified
145The ReasonDownload
To be verified
146The Generative ModelDownload
To be verified
147Decentralized Search - IDownload
To be verified
148Decentralized Search - IIDownload
To be verified
149Decentralized Search - IIIDownload
To be verified
150Programming illustration- Small world networks : IntroductionDownload
To be verified
151Base codeDownload
To be verified
152Making homophily based edgesDownload
To be verified
153Adding weak tiesDownload
To be verified
154Plotting change in diameterDownload
To be verified
155Programming illustration- Myopic Search : IntroductionDownload
To be verified
156Myopic SearchDownload
To be verified
157Myopic Search comparision to optimal searchDownload
To be verified
158Time Taken by Myopic SearchDownload
To be verified
159PseudoCores : IntroductionDownload
To be verified
160How to be ViralDownload
To be verified
161Who are the right key nodes?Download
To be verified
162finding the right key nodes (the core)Download
To be verified
163Coding K-Shell DecompositionDownload
To be verified
164Coding cascading ModelDownload
To be verified
165Coding the importance of core nodes in cascadingDownload
To be verified
166Pseudo coreDownload
To be verified
167Live Session 1PDF unavailable
168Live Session 2PDF unavailable
169Live Session 3PDF unavailable
170Live Session 4PDF unavailable
171Live Session 5PDF unavailable


Sl.No Language Book link
1EnglishNot Available
2BengaliNot Available
3GujaratiNot Available
4HindiNot Available
5KannadaNot Available
6MalayalamNot Available
7MarathiNot Available
8TamilNot Available
9TeluguNot Available