0% found this document useful (0 votes)
8 views9 pages

Unit 3 Rest From

The document discusses various types of networks, including ego-centered networks, dominance hierarchies, third-party records, affiliation networks, citation networks, peer-to-peer networks, recommendation systems, and biological networks. Each type of network is defined, highlighting its structure, key features, and applications in social dynamics, research, and technology. The document emphasizes the importance of these networks in understanding relationships, information flow, and resource access across different contexts.

Uploaded by

tushar34india
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views9 pages

Unit 3 Rest From

The document discusses various types of networks, including ego-centered networks, dominance hierarchies, third-party records, affiliation networks, citation networks, peer-to-peer networks, recommendation systems, and biological networks. Each type of network is defined, highlighting its structure, key features, and applications in social dynamics, research, and technology. The document emphasizes the importance of these networks in understanding relationships, information flow, and resource access across different contexts.

Uploaded by

tushar34india
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Ego-centered networks are essentially a way of looking at social connections from the

perspective of a single individual, called the ego. It includes:

 The Ego: The focal person in the network.


 Alters: The people the ego is directly connected to.
 Ego-Alter Relationships: The ties or links between the ego and each of these alters.
These relationships can have different qualities, like how strong they are or how often the
ego interacts with the alter.
 Alter-Alter Relationships: Importantly, ego-centered networks also often consider how
the alters themselves are connected to each other.

Think of it like this: If you were the ego, your ego-centered network would be all your friends,
family, colleagues, and anyone else you know directly. It would also include information about
which of your friends know each other, which colleagues work together outside of their
connection to you, and so on.

In essence, it's a personal network that captures the immediate social environment of an
individual and the connections within that environment. This approach is valuable for
understanding how an individual's position within their own network influences things like:

 Social support
 Access to information
 Influence and diffusion of ideas
 Health and well-being
 Opportunities

Dominance hierarchy

is a social structure within a group of animals where individuals are ranked


based on their ability to dominate others, typically through agonistic
interactions. This ranking system influences access to resources like food,
mating opportunities, and protected positions, shaping social behaviors and
overall group dynamics.

Key aspects of dominance hierarchies:


 Ranking System:
Individuals are arranged in a linear or near-linear order, with each member dominant
over those below and subordinate to those above.
 Agonistic Interactions:
Dominance is established and maintained through competitive interactions, including
threats, fights, and displays of aggression or submission.

 Social Structure:
Hierarchies provide a framework for social interactions, reducing conflict and
facilitating cooperation within the group.
 Resource Access:
High-ranking individuals typically have preferential access to resources like food,
mating opportunities, and prime locations.
 Behavioral Influences:
Dominance status affects an individual's behavior, including foraging, mating, and
social interactions with other group members.
Examples of Dominance Hierarchies:
 Baboons:
Dominance hierarchies are well-documented in baboons, with males often forming a
linear hierarchy based on size, aggression, and social skills.
 Chimpanzees:
Chimpanzee dominance hierarchies are complex and involve both males and females,
with social bonds and alliances playing a significant role.
 Birds:
Chickens exhibit clear dominance hierarchies, often referred to as "pecking orders,"
where each individual knows its place in the hierarchy.
 Other Animals:
Dominance hierarchies have been observed in various other species, including
rodents, primates, fish, and insects.
Maintenance of Dominance Hierarchies:
 Individual Recognition:
Once established, hierarchies are maintained through individual recognition, where
animals recognize each other's rank and avoid unnecessary conflict.
 Status Signals:
Animals may use signals like body size, aggressive displays, or badges of status to
communicate their rank and deter challenges from lower-ranking individuals.
 Resource Competition:
Dominance hierarchies often emerge as a result of competition for resources like food
and mates, leading to a ranking system that reduces conflict.
Third party records refer to documents or data collected or maintained by entities that are not directly
involved in a specific interaction, transaction, or event, but that hold relevant information about it.
These records are important in various contexts such as law, research, education, healthcare, and data
privacy.

What Counts as a Third Party Record in Social Media?

Entity Type of Record Example


User activity logs, private
Social Media Platforms (e.g., Facebook records of message
messages, metadata, login
Meta, X/Twitter, TikTok) timestamps or deleted posts
history
Tracking cookies, ad Google Analytics tracking social
Analytics/Ad Companies
engagement, user profiling media referrals
Embedded videos, shared YouTube comments shared via
Content Hosts
media Facebook
Internet Archive or Wayback
Archiving Tools Screenshots, archives, scrapes Machine captures of deleted
tweets
Combined user profiles from Profiles built from LinkedIn,
Data Brokers / Aggregators
multiple platforms Instagram, and TikTok data

Importance of Third Party Record

In law, research, or investigations, these records can:

 Confirm or contradict claims (e.g., alibis, harassment)


 Provide evidence of communication, intent, or behavior
 Reveal patterns of misinformation, influence, or bias
 Track digital footprints, even after content is deleted

Affiliation Networks

Affiliation networks refer to the relationships and connections between individuals (or entities)
and the platforms, groups, or events they are associated with. Social media, by its nature,
involves complex interactions that are often mediated by shared affiliations (e.g., interests,
groups, hashtags, pages, or events). Analyzing affiliation networks in social media can uncover
insights about user behavior, group dynamics, content distribution, and influence patterns.
An affiliation network connects actors (users or entities) to affiliations (groups, events,
hashtags, or pages) through shared relationships. Each actor can participate in multiple
affiliations, creating edges between them. The network is often represented as a bipartite graph
with actors on one side and affiliations on the other. By projecting this bipartite graph, we can
create actor-actor networks or affiliation-affiliation networks. These projections reveal how
actors interact through common affiliations or how affiliations are related based on shared
actors. Centrality measures identify influential actors or affiliations, while community detection
uncovers groups of related users. Influence propagation studies how content or information
spreads across the network. This structure is used for recommendations, marketing analysis,
and community detection. The affiliation network provides insights into user behavior, content
diffusion, and group dynamics.

Applications of affiliation networks:

1. Community Detection: Identifying groups of users with shared interests or affiliations,


helping to understand community structures.
2. Influence Propagation: Studying how information, opinions, or content spread across
social networks based on shared affiliations.
3. Recommendation Systems: Suggesting relevant groups, pages, hashtags, or users based
on shared affiliations or interests.
4. Social Media Analytics: Analyzing user engagement with specific affiliations, such as
hashtags, groups, or events.
5. Brand and Influencer Analysis: Assessing the reach and impact of brands or influencers
by examining their shared affiliations with users.
6. Event Tracking: Analyzing participation in events or campaigns, like live streams or
political rallies, to measure engagement.
7. Content Virality: Understanding how content or trends spread across different
affiliations and communities.
8. Sentiment Analysis: Measuring user sentiment around affiliations like brands, events, or
political movements.
9. Market Segmentation: Segmenting users based on shared affiliations to target specific
audiences for ads or content.
10. Political Network Analysis: Studying the relationships between political figures, parties,
and their supporters through shared affiliations.

What is a Citation Network?

A citation network is a type of directed graph where nodes represent publications (e.g.,
research papers, articles, patents, or books), and edges represent citations between those
publications. In other words, if one publication cites another, an edge is drawn from the citing
publication to the cited publication. This type of network is widely used in academic research,
intellectual property, and other areas where the relationship between works and their influences
is important.
Example of Citation Network

If Paper A cites Paper B and Paper B cites Paper C, the citation network would look like this:

 Paper A → Paper B → Paper C

In this network:

 Paper A has an outbound citation to Paper B.


 Paper B has an inbound citation from Paper A and an outbound citation to Paper C.
 Paper C only has an inbound citation from Paper B.

Applications of Citation Networks

1. Measuring Academic Influence:


o The number of citations a paper receives is often used as an indicator of its
academic influence or significance.
o Tools like h-index measure an author’s productivity and citation impact.
2. Identifying Key Papers:
o Citation networks help identify seminal or highly influential papers in a field by
looking at papers with the most citations or those cited by many others.
3. Research Trend Analysis:
o Citation networks allow researchers to track the evolution of topics over time,
identifying emerging trends or shifts in research focus.
4. Author Collaboration Networks:
o By examining the citation network, you can also trace collaboration patterns
between authors, as papers frequently cited by each other may indicate
collaborations.
5. Academic Search and Recommendation Systems:
o Citation networks form the basis of academic search engines (e.g., Google
Scholar, Semantic Scholar) by recommending relevant papers based on citation
links.
6. Plagiarism Detection:
o Citation networks can be used to detect citation manipulation, where authors may
falsely cite works to inflate their publication’s perceived impact.
7. Patent Analysis:
o Citation networks are also used in patent databases to track how patents reference
one another, helping to evaluate the impact of patents or technologies.

What Is Peer-To-Peer?
Peer-to-peer (P2P) is a decentralized network architecture in
which participants, called peers, interact directly with each
other without needing a central authority or server. In a P2P
network, each participant acts as both a client and a server,
enabling them to share resources and services directly with
other peers.
To understand better, imagine a group of friends studying
together for an exam. In a traditional classroom setting
(client-server architecture), there is a teacher who serves as
a central authority and provides information to all the
students (clients). The students rely on the teacher for the
necessary study materials and guidance.
Now, let’s apply the P2P concept to our study group. In this
scenario, each student is considered a peer. Instead of
relying solely on the teacher, the students can directly
interact with each other, exchange study materials, and help
each other understand difficult concepts.
For example, if one student has summarized notes for a
particular topic, they can share it with the rest of the group
by making copies or simply showing it to others. Another
student might have found useful online resources or practice
questions, which they can share with the group. The students
can discuss and explain concepts to each other, asking
questions and clarifying doubts.

Key Features of Peer-to-Peer (P2P) Networks

1. Decentralized Architecture:
o Unlike traditional client-server networks, P2P networks have a decentralized
structure where each node (peer) acts as both a client and a server. Every peer can
share resources, such as files, bandwidth, or processing power, with other peers
directly without the need for a central server.
2. Direct Communication:
o Peers communicate directly with each other, bypassing centralized intermediaries.
This reduces latency and can lead to more efficient data sharing and resource
usage.
3. Distributed Resources:
o In a P2P network, resources like storage, computational power, and bandwidth are
distributed among all participants. This makes the network highly resilient and
scalable, as each additional peer increases the overall available resources.
4. Scalability:
o P2P networks can easily scale as new peers join the network. Since there is no
central server, the capacity and resources of the network grow organically with
the addition of each peer.
5. Fault Tolerance and Redundancy:
o P2P networks are highly fault-tolerant. If one peer fails or goes offline, other
peers can still maintain the network’s functionality by taking over or re-routing
requests. Data is often replicated across multiple peers to ensure redundancy.
6. Resource Sharing:
o Peers in a P2P network can share a variety of resources such as files (e.g.,
BitTorrent), computational power (e.g., SETI@home), or even internet bandwidth
(e.g., mesh networks).
7. Self-Organizing:
o P2P networks are often self-organizing, meaning peers automatically discover
each other and join the network without the need for manual configuration. This is
particularly important for dynamic, real-time networks.
8. Peer Discovery:
o To connect with other peers, discovery protocols are used (e.g., Distributed Hash
Tables or DHT) that help locate and retrieve data from peers in a highly efficient
manner.
9. Security and Trust Issues:
o P2P networks may face security concerns like data integrity, malicious peers, and
privacy. To address this, mechanisms like encryption, digital signatures, and
reputation systems are often implemented to maintain trust and secure
communication between peers.
10. Anonymity:

 Some P2P networks (like those used for anonymous file-sharing or cryptocurrency
transactions) offer features that enhance the anonymity of peers by masking their identity
and location, which helps protect users’ privacy.

Examples of P2P Networks:

 File Sharing: BitTorrent, Napster (early example).


 Cryptocurrencies: Bitcoin and other blockchain-based networks.
 Distributed Computing: SETI@home, Folding@home.
 VoIP and Messaging: Skype (early versions).

Recommendation System
A recommendation system (or recommender system) is a class of machine learning that
uses data to help predict, narrow down, and find what people are looking for among an
exponentially growing number of options.
What Is a Recommendation System?
A recommendation system is an artificial intelligence or AI algorithm, usually associated
with machine learning, that uses Big Data to suggest or recommend additional products to
consumers. These can be based on various criteria, including past purchases, search
history, demographic information, and other factors. Recommender systems are highly
useful as they help users discover products and services they might otherwise have not
found on their own.
Recommender systems are trained to understand the preferences, previous decisions, and
characteristics of people and products using data gathered about their interactions. These
include impressions, clicks, likes, and purchases. Because of their capability to predict
consumer interests and desires on a highly personalized level, recommender systems are a
favorite with content and product providers. They can drive consumers to just about any
product or service that interests them, from books to videos to health classes to clothing.

Visit this for more details

https://www.nvidia.com/en-in/glossary/recommendation-system/

Biological networks are systems that represent the relationships and interactions between
biological components like genes, proteins, or cells. These networks are typically modeled as
graphs, where nodes represent biological entities and edges represent interactions or
relationships.

Types of Biological Networks:

1. Protein-Protein Interaction (PPI) Networks: Show how proteins interact within cells.
2. Gene Regulatory Networks (GRNs): Represent how genes regulate each other.
3. Metabolic Networks: Model biochemical reactions and metabolites.
4. Signaling Pathways: Illustrate cellular signal transmission.
5. Neural Networks: Represent connections between neurons in the brain.

Key Features:

 Interconnectedness: Biological components interact with many others.


 Modularity: Networks form functional subunits.
 Scale-Free: Some nodes (hubs) have many connections.
 Dynamic: Networks change over time in response to conditions.

Applications:

 Disease Understanding: Identifying drug targets.


 Gene Function Prediction: Discovering the role of unknown genes.
 Systems Biology: Modeling cellular functions.
 Personalized Medicine: Tailoring treatments to individuals.

You might also like