Chapter 1 Recent Results

1.1

Network Analysis with Parallel Coordinates Yaron Singer School of Computer Science, Tel Aviv University, Israel [email protected] & Ohad Greenshpan Department of Computer Science Ben Gurion University, Israel [email protected]

1.1.1

Introduction

With the large complexity they are often associated with, networks impose a challenge in many areas of research and visualization plays a major role in analyzing topological traits and large amounts of information which they are associated with. Methods such as SeeNet [1], Genius [2], SpectralNet [3] and approaches suggested by Bolser et al [4] and McGrath et al [5] all display a variety of network visualization techniques in different research areas, dealing with complexity and data of large-scale networks. Although the intersection between the disciplines of networks’ topological analysis and multi-variate visualization is not immediate, with the wide spectrum of applications which we have thus far witnessed([6],[7],[8]), it is clear that topological network analysis could benefit from multi-varied visualization in general, and ||-coords in particular. In this chapter we introduce the Node Extraction Visualization (NEVIS) method which enables networks’ topological visualization using ||-coords. As networks are subject to changes which effect their function and performance, understanding the effects due to changing conditions is vital to their analysis. Here, we use chang1

ing conditions of node extractions to obtain topological insight about the network. Though the likelihood of such an event varies from one network to another, in instances where network functionality is determined largely by path distances and connectivity of nodes, node extraction is a crucial event. NEVIS transforms a given network into an equivalent representation in ||-coords. Under this transformation networks under changing conditions are produced who’s functionality is visualized. As NEVIS transforms nodes into multi-dimensional points, we will see how it can be utilized to study key traits such as nodes’ stability, backup, interrelationship between nodes, identify topological patterns in the network and other properties of interest in network research. We will also see that NEVIS’ implementation is simple and modular.

1.1.2

The NEVIS Transformation

We begin by introducing and discussing extracted networks and the χ function which are the basic elements of NEVIS. We will then see how to use these elements in the construction of the NEVIS algorithm. Extracted Networks Informally, dynamic networks are networks which are subject to topological change. We focus on a unique subset of dynamic networks, entitled extracted networks which are defined as follows. For the network modeled by a directed graph S = (V, E) with nodes V = {v1 , v2 . . . , vn } and edges E = {(vi , vj ) ∈ V × V | vi is connected to vj }, let the ith extracted network, denoted by Si , to be the original network S without the node vi and without any edges connected to it. That is, Si := (V \{vi }, E\{(vj , vk ) ∈ V × V | j = i ∨ k = i}).

(1.1)

For example, in Fig. 1.1 the network S and its 3rd extracted network, S3 , are shown. Transformation of a network with n nodes as above requires producing a set of extracted networks {S1 , S2 , . . . , Sn }. This set produces an n-dimensional space as explained in detail below.

Figure 1.1: Network S and the 3rd extracted network, S3

2

Function χ - Measuring Node Centrality Topological properties are frequently used to measure networks’ functionality, which in turn depends on shortest paths and connectivity. To apply an appropriate measure which enables classification of nodes by these criteria the χ function below is used to determine a node’s topological centrality. For a network S = (V, E), with V and E as above and some node u∈ / V , χ : V ∪ {u} −→ R is defined by: χ(vi ) =

 Pn

1 j=1,j6=i d(vi ,vj )

−∞

vi ∈ V vi ∈ /V

,

with the following conventions: 1. d(vi , vi ) = 0

∀i ∈ {1, 2, . . . , n}

2. d(vi , vj ) = ∞ ⇐⇒ vj 3. if d(vi , vj ) = ∞ then Clearly, 0 ≤ χ(vi ) ≤ n − 1

cannot be reached from vi 1 d(vi ,vj )

=0

∀vi ∈ V .

Figure 1.2: Network S whose χ function values are given in the table To further clarify, for the network shown in figure 1.2, the χ function values for each node are given in the table below. vi v1 v2 v3 v4 v5

d(vi , v1 ) d(vi , v2 ) d(vi , v3 ) d(vi , v4 ) 0 1 1 1 1 0 1 2 1 1 0 2 1 2 2 0 1 2 2 2

d(vi , v5 ) 1 2 2 2 0

3

Pn χ value 1 =1 d(v1 ,vj ) = 4 Pj=1,j6 n 1 =2 d(v2 ,vj ) = 3 Pj=1,j6 n 1 =3 Pnj=1,j6=3 d(v13 ,vj ) =4 d(v4 ,vj ) = 2.5 Pj=1,j6 n 1 j=1,j6=5 d(v5 ,vj ) = 2.5

Why χ? For a node vi ∈ V , note that χ(vi ) depends on the number of nodes connected to vi and their distances from it; χ monotonically increases with respect to both centrality and connectivity of the node. Thus, in relation to other nodes in the network, for a node vi which is connected to a large number of nodes at short distances, χ(vi ) is high; symmetrically, for a node vj which is connected to a small number of nodes at large distances χ(vj ) is low. These properties make the χ function a favorable candidate for measuring nodes’ centrality in the network. The NEVIS Algorithm Having introduced its elements, we now show the NEVIS transformation and the algorithm used to implement it. For a network S as described above, we produce n extracted networks S1 , S2 , . . . , Sn . By extracting the node vi from S, we produce the ith extracted network Si which consists of n − 1 nodes. For each extracted network, using the Breadth First Search (BFS) algorithm for graphs to obtain edge distances between nodes, we calculate the χ function values of all n nodes (by definition χ(vi ) = 0 in Si ∀i ∈ {1, . . . n}). This process produces a matrix of order n × n (see algorithm below). CreateMatrix for all vi ∈ V do Si ← ExtractN ode(vi , S) for all vj ∈ V \{vi } do BF S(Si , vj ) χ(vj ) ← 0 for all vk reachable from vj do χ(vj ) ← χ(vj ) + d(vj1,vk ) end for Mij ← χ(vj ) end for end for return M

The matrix is then transformed to its equivalent multidimensional representation by considering each row as an n-dimensional point. With parallel each point is represented as a polygonal line. We obtain visualization with the networks S1 , S2 , . . . , Sn represented by the multidimensional coordinates system with 1st , 2nd , . . . , nth axes respectively. In turn, the nodes v1 , v2 , . . . , vn are represented by n polygonal lines. Figure 1.3 describes a flow of this implementation. NEVIS transforms a network with n nodes into n points in an n-dimensional space. The n extracted networks serve as the components of the nth dimensional space, and the nodes’ χ values are transformed into points in that space. The following section discusses the properties of this transformation and their use in network analysis. 4

Figure 1.3: The NEVIS transformation from a network into a n points in an n dimensional space. General Network Transformations Note that we can generalize the idea of network transformation beyond NEVIS. We can formally categorize network transformations into parallel coordinates with the following functions: 1. γ function which is defined on the set of all possible directed graphs and returns a set networks. 2. ν function which is defined on the set of all possible directed graphs and returns a real 5

value. In the NEVIS we use the γ function which produces the set of all possible extracted networks. That is γ(S) = {S1 , S2 , . . . , Sn } for a network with n nodes. The ν function used can be seen as a combination of ψ which is defined by ψ(S) = V , and χ as shown above. Thus selection of γ, ν, ψ, χ can yield different network transformations as desired.

1.1.3

Properties of NEVIS

We can now begin exploring some of the properties of NEVIS. The principle properties discussed here facilitate the analysis of large-scaled networks as presented later. Topological Significance After creating the n extracted networks S1 , S2 , . . . , Sn , the effects of each extraction are independently measured by χ(vj ) ∀vj ∈ V \{vi }. By studying the ith component of the n-tuple produced by NEVIS, one can comprehend the effect of extracting vi from the network. If vi has a significant effect on the network’s centrality and connectivity, this property is manifested in drop of polygonal lines representing nodes depending on vi in the ith axis in NEVIS. It thus follows that the topological significance of vi correlates with the number of polygonal lines dropping in NEVIS, and the sharpness of their drop.

Figure 1.4: Visualizing topological significance. The drops in the 6th as opposed to the consistency in the 3rd insinuate that v3 is backed up in the network. Contrary to our intuition, high χ do not necessarily guarantee topological significance. Figure 1.4 displays an example where v3 has a high χ value in the network (this can be seen in NEVIS by the fact that its corresponding polygonal line is the top outlier), though observing the 3th axis in NEVIS, it is clear that v3 ’s extraction is not significant to the network. On the other hand, there is a dramatic drop in the 6th component, despite of the fact that χ(v6 ) is not among the highest in the network. This seemingly counter intuitive example reveals one of the strong properties in NEVIS. A closer study of the above example shows that the 6

extraction of v6 is more significant to the network than that of v3 ’s despite χ(v6 ) < χ(v3 ) since each node connected to v3 is also connected to v10 . Intuitively, the idea of a backup of a node is the existence of alternate paths connecting a pair its neighbors without passing through the node. In figure 1.4 v3 ’s extraction is not significant to the network’s stability since v10 serves as a full backup. We can think of v3 as having a backup of order 4 (v3 ’s degree) in the sense that there is another node (v1 0) connected to all of v3 ’s 4 neighbors ({v6 , v7 , v9 , v10 }). Formally, suppose that vi is connected to {v1 , . . . , vr }. We say that vi has a backup of order k, k ≤ r, if there is at least one node in the network connected to k of vi ’s neighbors. Clearly a node’s significance in the network highly depends on its backup order. Study of the drops in the ith axis in NEVIS provides a measure of vi ’s global significance which considers its backup order. The ability to measure node significance considering both centrality and its backup order enables evaluating a node’s impact on the network’s topology in the network. As a node can be partially backed up by a set of nodes which are reached at different distances, the ability to consider such a complicated factor such as a node’s backup makes NEVIS a useful tool. Relationship Between Nodes An immediate conclusion from the above is that relationship between nodes vj and vk , can be studied by examining the drop of vk in the jth axis, and symmetrically examining the drop of vj in the kth axis. Although the latter is one of its fundamental properties, NEVIS’ representation of nodes as polygonal lines enables greater study of relationship between nodes. Since each node’s χ value throughout n extractions is represented as a polygonal line, studying the relationship between the polygonal lines representing vj and vk provides insight to the relationship between these nodes. Consider the network portrayed in figure 1.5 comprised of three separate connected components. To achieve clarity nodes in the same connected component are given an identical color. Assume the axes are ordered in the manner displayed (we refer to this point below). In this example it is evident that polygonal lines of the same color have a specified range in which they are subject to change and a complement range where they run horizontally. It is easy to see that this property directly derives from the fact that nodes in the same connected component react similarly to extractions in the network - influenced only by extractions in the connected component which they belong to, and insensitive to extractions from other connected component. In this example we have chosen a specific axes ordering obtained by sorting according to χ value. . Stability of Nodes As the nodes’ χ values are represented by polygonal lines in the NEVIS representation, peaks of polygonal lines disclose the corresponding nodes’ centrality values in instances where the node extracted has minimal effect. Note that for a network S = (V, E) as above, it is possible to implement NEVIS as n points in an n + 1-dimensional space by adding the 0th extracted network to be S and thus obtain visualization of the χ value in S itself. In figure 1.6, the top outlier is shown by a red polygonal line which represents v15 in the network, with noticeably higher values than the rest of the nodes in the network. This can be easily 7

Figure 1.5: Network Comprised of Strongly Connected Components which displays the interrelationship between nodes

verified by observing the node-link diagram. NEVIS orders the polygonal lines, starting from the top, in order of decreasing centrality throughout all extractions.

Figure 1.6: Analyzing stability through behavior of polygonal lines. The green polygonal line remains relatively steady whereas the red polygonal line has sharp drops.

As the axes represent the extracted networks, it follows that polygonal lines free of dramatic inclines and declines represent nodes which are relatively stable and immune to node extractions. in the network. Note that node stability does not necessarily correlate with high centrality value. In figure 1.6 the sharp inclines and declines of the red polygonal line testify that its corresponding node v15 is unstable in the sense that its centrality is highly effected by extractions. In contrast, it can be inferred that v3 is relatively stable by inspecting the yellow polygonal line by which it is represented in NEVIS. In this case, it is not clear how this can be deduced by studying the node-link diagram alone. The ability to analyze node stability in the network can be widely used in network analysis, as it discloses weak links in the network. 8

Identifying Topological Patterns Identifying unique topological patterns can be used in network analysis to deduce relevant information in first encounter with a given network. To identify unique topological patterns, we use a slight variation of NEVIS by replacing the χ function with χ0 defined by:  Pn 1 j=1,j6=i d(vi ,vj ) vj ∈ V χ0 (vi ) = 0 vj ∈ /V , NEVIS reveals the network’s distinct topological properties by mapping them one-to-one into distinct patterns. Figure 1.1.3A displays a ’clique’ - a graph in which all the nodes are connected between one another, and figure 1.1.3B ’star’ - a set of independent nodes all connected to a single node, presented in figure 1.1.3.

Figure 1.7: Clique comprised of 15 nodes is presented in 1.1.3A, and a star with 15 nodes is presented in 1.1.3B. Following a one-to-one transformation between topological properties and patterns in ||-coords, networks with topological patterns which are almost symmetrical are represented as their almost symmetrical equivalents in NEVIS. Figures 1.1.3 A and 1.1.3 B display networks which are almost a clique and almost a star, respectively. Comparing the NEVIS representation of the perfect graphs with the almost perfect ones, this point is made clear. This property is very useful in the study of topological properties in networks. As perfect 9

topological patterns are rare in the real world, their almost counterparts are more common. We now show how this property can be used in network study.

Figure 1.8: Network with an almost clique topology is presented in 1.1.3A, and one with almost star topology is shown in 1.1.3B.

1.1.4

Large Scaled Networks

In this section we discuss applications of NEVIS on large scaled networks. As it synthesizes network analysis and multi-variate data visualization, NEVIS benefits from both worlds; Preprocessing algorithms which enable combinatoric reduction of the network can be applied as well as any methods which enable dealing with large data sets in ||-coords. We display examples of both in this chapter. Our interest here is not to offer novel methods for rescaling networks nor reducing large data sets for visualization, but rather show how existing methods of these ideas can be applied on NEVIS. Matrix Manipulations We can now view possible simple solutions to deal with large-scaled networks from the ||coords end. The scalability that network researchers are often faced with due the large networks under analysis, understanding how to implement solutions which are relevant to networks with ||-coords is essential. Figure 1.9A displays a node-link diagram of a network 10

which consists of 100 nodes, and its NEVIS presentation is represented in 1.9B Due to NEVIS’ simple construction, selecting a subset of nodes to be visualized is easy. Recall from section 3, that implementing NEVIS requires producing a matrix which represents nodes’ χ values throughout extractions. To ignore polygonal lines, we simply replace the values of their corresponding rows in the produced matrix with -∞. That is, in order to ignore the vj in the NEVIS visualization, replace the jth row in the matrix returned by CreateM atrix:       x11 . . . x1n 0 0 0 x11 . . . x1n .. ..  .. ..   .. .. ..   ..  .. . .  . .   . . .   .  .        xj1 . . . xjn  +  −∞ . . . −∞  =  −∞ . . . −∞   .  .  . .. ..  .. ..  .. ..   .. . .  . .   .. . .   .. xn1 . . . xnn 0 ... 0 xn1 . . . xnn The results of this procedure are shown in figure 1.9C. Similarly, it is easy to reduce a subset of axes from NEVIS, by reducing the matrix to represent the desired axes only. An example of such reduction is shown below. The result of reducing both polygonal lines and axes is presented is displayed in figure 1.9D.     

x11 . . . x1j x21 . . . x2j .. . . . . . .. xn1 . . . xnj

. . . x1n . . . x2n . . . . .. . . . xnn





    +  

0 . . . −∞ . . . 0 . . . −∞ . . . .. .. . ... . ... 0 . . . −∞ . . .

0 0 .. . 0





    =  

x11 . . . −∞ . . . x1n x21 . . . −∞ . . . x2n .. .. . . ... . . . . .. xn1 . . . −∞ . . . xnn

    

The running time required to implement NEVIS depends on the CreateM atrix procedure, and visualization is thereafter achieved in linear time. This implementation allows performing such manipulation efficiently. Moreover, due to this implementation, a wide range of solutions to dealing with large data sets in ||-coords can be applied in a simple manner. Combinatoric Manipulations Figure 1.10 displays a node-link diagram of a genetic regulatory network of over 3000 nodes. The network shown is a protein regulatory networks, modeled by a directed graph, where proteins are represented by nodes and regulatory interactions are represented by edges. Clearly, the size of the network raises serious obstacles in attempts for visual analysis. To obtain visualization of the above network, we apply NEVIS on the network and show nodes with out-degree greater zero. The reasoning here is that nodes with no out-degree have little effect on χ values (why?), and visualization in NEVIS does not provide any relevant information. We thus obtain a visualization of 142 nodes of the network in NEVIS as shown in figure 1.11. We can now use the properties of NEVIS from the section above to analyze the network. In this instance a few immediate conclusions can be drawn about the network. Generally, apart from a few specific instances, the polygonal lines run relatively horizontally which testifies that the network is relatively stable. Note also that there is an area in which is 11

Figure 1.9: Example of possible solutions for large networks. Figure 1.9C displays polygonal line reductions which represent 10 nodes in a 100-dimensional space and 1.9D shows the 10 nodes in their corresponding 10-dimensional space.

Figure 1.10: NEVIS applied to a genetic regulatory network with over 3000 nodes. Only every fifth node is presented. clear of polygonal lines. We conclude that no node receives χ values in that area, and that it may testify to segmentation of two separate connected components in the network. 12

Figure 1.11: Visualization of 142 nodes of the regulatory network displayed in 1.10 with out degree greater than zero. The horizontal polygonal lines in the lower values support this hypothesis, similar to the connected components example presented in the previous section. Examining the top blue polygonal line, it is evident that despite its high centrality value, its extraction does not effect the network’s functionality. Using an interactive tool which enables pointing on the polygonal line and obtaining its number, we can inspect its extraction effect on other nodes. Examining the 127th axis, we learn that its extraction does not effect functionality in the network. Closer study reveals that there are in fact two polygonal lines of maximal χ values which race between one another throughout all extraction. We assume this node serves as its backup. There are 4 nodes which their extraction has significant effect on the network. This is manifested in the drops of polygonal lines in the area of the 9th ,15th , 34th , 82nd , 124th axis. This signifies that these nodes are have relatively poor backup in the network, and their extraction effects the network’s functionality. The interest that can be found in this example is not only for researchers in biological networks. As internet researchers find interest in nodes which are cardinal to transfer of data, visualization of end-users in the network may have little interest and a similar method may be applied. Other works on combinatoric reduction of the problem can also be applied as pre-processing algorithms in a similar manner to reduce the combinatoric problem. Exercises 1. What is the running time of the CreateM atrix algorithm? 2. Give an example of a connected graph which has horizonal portions in NEVIS. 3. Suppose that for S = (V, E), and some node u ∈ / V we implement NEVIS replacing the χ function with the function deg : V ∪ {u} → N defined by: deg(v) =



|{w : w is connected to v}| v ∈ V −∞ v∈ /V 13

,

(a) Apply NEVIS with the deg and χ (not χ0 ) function on a five node star and five node clique. Any difference? Why? (b) What would be the motivation to replace deg with χ for topological pattern identification? (c) Think of other topological functions under which a star would look the same as in NEVIS. 4. This question discusses backup order which has been defined above. (a) Prove that the relation Rk = {< u, v > |u is a backup of order k of v} is symmetrical. That is, prove that u is a backup of order k of v ⇐⇒ v is a backup of order k of u. (b) Is it possible that u has a backup of order k, where k = degree(u), and there will still be a significant drop in its axis?

References [1] Becker, R.A., Eick, S.G., Wilks, A.R. Visualizing network data. IEEE Transactions on Visualization and Computer Graphics (1995), Vol. 1-1; 16-21. [2] Ciccarese, P., Mazzocchi, S., Ferrazzi, F., Sacchi, L. Genius: A new tool for gene networks visualization. Intelligent Data Analysis in Medicine and Pharmacology (IDAMAP) Proceedings (2004). [3] Forman, J.J., Clemons, P.A., Schreiber, S.L., Haggarty, S.J. SpectralNET–an application for spectral graph analysis and visualization. BMC Bioinformatics. 2005 Oct 19;6:260. [4] Bolser, D., Dafas, P., Harrington, R., Park, J., Schroeder, M., Visualisation and graphtheoretic analysis of a large-scale protein structural interactome. BMC Bioinformatics 2003; 4: 45. [5] McGrath, C., Hardt, D.C., Blythe, J. Visualizing Complexity in networks: Seeing both the forest and the trees. Connections 25(1):37-41 2002 INSNA [6] Keim, D.A., Information Visualization and Visual Data Mining. IEEE TVCG, 7-1, 2002, pp. 100-107 [7] Shneiderman, B. The Eyes Have It : A Task By Data Type Taxonomy for Information Visualizations. Proceedings of the 1996 IEEE Symposium on Visual Languages. [8] Wegenkittl, R., Loffelmann, H., Groller, E., Visualizing the Behaviour of Higher Dimensional dynamical systems. Proceesings of IEEE VIS 1997 pg. 119-126.

14

Chapter 1 Recent Results

1.1.1 Introduction. With the large complexity they are often associated with, networks impose a challenge in many areas of research and visualization plays a ...

832KB Sizes 0 Downloads 184 Views

Recommend Documents

some recent results
Federal Reserve Bank of Minneapolis and. University of Minnesota. ABSTRACT ... and not necessarily those of the Federal Reserve. Bank of Minneapolis or the Federal Reserve System. .... where the limits are taken over sequences of histories s* contain

1 Results
Sep 27, 2010 - 0. W(s)ds,. U(r) = W(r) − rW(1),. Z(r) = W1(r) −. ∫. 1. 0. W1(s)ds, where τ = T1−δ. Nη . This is the same notation used in the main paper with the dependence upon i in W(r), W1(r), U(r) and Z(r) suppressed. Lemmas A.2 and A.

chapter p chapter 1
Write the product in standard form. 5) (3 + 5i)(2 + 9i). 5). Find the product of the complex number and its conjugate. 6) -1 - 5i. 6). CHAPTER 1. Find the domain of ...

Stage 1 - Desired Results
344. T.ELA8W3.21 : The student selects and uses a variety of technology tools to locate, analyze, synthesize, evaluate and/or apply information to accomplish a content specific task. T.ELA8W4.6 : The student uses brainstorming/webbing software in pla

Chapter 1
converged to the highest peak because the selective pressure focuses attention to the area of .... thus allowing the formation of non-equal hyper-volume niches. In order to ..... The crossover operator exchanges the architecture of two ANNs in.

Chapter 1
strategy entails, the research findings are difficult to compare. .... rooms (cf. Li 1984; Wu 2001; Yu 2001). Comprehensive Surveys of EFL Learner Behaviours.

Chapter 1
increasing timeliness, and increasing precision [265]. Example: New data enable new analyses ..... but they allow researchers to take on problems of great scale and complexity. Furthermore, they are developing at ..... For MySQL, Chapter 4 provides i

Chapter 1
Digital System Test and Testable Design: Using HDL Models and Architectures ... What it is that we are testing in digital system test and why we are testing it? ..... mainframe cabinet containing the power distribution unit, heat exchanger for liquid

Chapter 1
Shall I send for the doctor?" The last thing he needed was a dose of the site doctor's hippopotamus-blood-and-cat- hair paste. He clambered quickly to his feet. Reonet peered at him through her fringe and pretended to continue with her work. The rest

Chapter 1
The expression x2 is greater than 2x for x 5 3. Through trial and error you can find that 3 is the only value of x where x2 is greater than 2x because 32 5 3 p 3 5 9 and. 23 5 2 p 2 p 2 5 8. Problem Solving. 48. 4s 5 4(7.5) 5 30. The perimeter is 30

Chapter 1
Impact of Bullying on Hospital, GP and Child Psychiatric Health Services. Long-term ... Appendix for Parents – Is My Child Being Bullied? Fears ..... per cent of lone mothers living alone had major problems in the area of social contact. ... Childr

Chapter 1
The Continuum Publishing Group Ltd 2003, The Tower Building, 11 York Road, London SE1 7NX ... trying to find a link between this information and its insight into peda- ..... reports on Chinese EFL learners' strategies for oral communication.

Chapter 1
Patients with AH make external misattributions of the source ... The exclusive license for this PDF is limited to personal website use only. No part of this digital ...... (2001). Verbal self-monitoring and auditory verbal hallucinations in patients

CCG Chapter 1 TV
CPM Educational Program. Lesson 1.3.2A Resource Page. Shapes Toolkit. Equilateral. Triangle: Isosceles. Triangle: Scalene. Triangle: Scalene Right. Triangle: Isosceles. Right. Triangle: Square: Rectangle: A quadrilateral with four right angles. Paral

Chapter 1 -
The Challenges and Opportunities. Of Marketing in Today's Economy. • Power Shift to Customers. • Massive Increase in Product Selection. • Audience and ...

Chapter 1
This is known as producing an ARCHIVE of the data. (Schools normally archive data for 7 years before destroying it). Note: Archived data is NOT used for retrieving the file if something goes wrong, it is used for storing little used or redundant data

1 RECENT PALEOENVIRONMENTAL EVOLUTION OF ...
Savoie, Centre Interdisciplinaire des Sciences de la Montagne ... evolution during the last 2000 years based on pollen and sedimentological .... The degree of saturation of the lake water with respect to calcite, aragonite, monohydrocalcite, and gyps

Chapter 1 - FAO
schedule, which changed from odd- to even-numbered years in 2010, to align with the new FAO. Conference schedule. ... globalization. Many countries were decentralizing the responsibility for forest planning and management while facing the impacts of

Chapter 1 - GitHub
Jan 23, 2017 - 1. What are all these things? 2. What is the mean of yi? 3. What is the distribution of ϵi? 4. What is the notation X or Y ? Drawing a sample yi = xi β + ϵi. Write code which draws a sample form the population given by this model. p

Chapter 1
in improving learner proficiency, accounting for 63.4% of the variance. Although Liu ..... strategies used by Masters' degree level English and non-English majors.

Chapter 1 -
The electrical costs of running a roller coaster ..... at a General Electric ...... $160,000 and 65% of the tellers' time is spent processing deposits and withdrawals:.