Unit 3 Rest From
Unit 3 Rest From
Think of it like this: If you were the ego, your ego-centered network would be all your friends,
family, colleagues, and anyone else you know directly. It would also include information about
which of your friends know each other, which colleagues work together outside of their
connection to you, and so on.
In essence, it's a personal network that captures the immediate social environment of an
individual and the connections within that environment. This approach is valuable for
understanding how an individual's position within their own network influences things like:
Social support
Access to information
Influence and diffusion of ideas
Health and well-being
Opportunities
Dominance hierarchy
Social Structure:
Hierarchies provide a framework for social interactions, reducing conflict and
facilitating cooperation within the group.
Resource Access:
High-ranking individuals typically have preferential access to resources like food,
mating opportunities, and prime locations.
Behavioral Influences:
Dominance status affects an individual's behavior, including foraging, mating, and
social interactions with other group members.
Examples of Dominance Hierarchies:
Baboons:
Dominance hierarchies are well-documented in baboons, with males often forming a
linear hierarchy based on size, aggression, and social skills.
Chimpanzees:
Chimpanzee dominance hierarchies are complex and involve both males and females,
with social bonds and alliances playing a significant role.
Birds:
Chickens exhibit clear dominance hierarchies, often referred to as "pecking orders,"
where each individual knows its place in the hierarchy.
Other Animals:
Dominance hierarchies have been observed in various other species, including
rodents, primates, fish, and insects.
Maintenance of Dominance Hierarchies:
Individual Recognition:
Once established, hierarchies are maintained through individual recognition, where
animals recognize each other's rank and avoid unnecessary conflict.
Status Signals:
Animals may use signals like body size, aggressive displays, or badges of status to
communicate their rank and deter challenges from lower-ranking individuals.
Resource Competition:
Dominance hierarchies often emerge as a result of competition for resources like food
and mates, leading to a ranking system that reduces conflict.
Third party records refer to documents or data collected or maintained by entities that are not directly
involved in a specific interaction, transaction, or event, but that hold relevant information about it.
These records are important in various contexts such as law, research, education, healthcare, and data
privacy.
Affiliation Networks
Affiliation networks refer to the relationships and connections between individuals (or entities)
and the platforms, groups, or events they are associated with. Social media, by its nature,
involves complex interactions that are often mediated by shared affiliations (e.g., interests,
groups, hashtags, pages, or events). Analyzing affiliation networks in social media can uncover
insights about user behavior, group dynamics, content distribution, and influence patterns.
An affiliation network connects actors (users or entities) to affiliations (groups, events,
hashtags, or pages) through shared relationships. Each actor can participate in multiple
affiliations, creating edges between them. The network is often represented as a bipartite graph
with actors on one side and affiliations on the other. By projecting this bipartite graph, we can
create actor-actor networks or affiliation-affiliation networks. These projections reveal how
actors interact through common affiliations or how affiliations are related based on shared
actors. Centrality measures identify influential actors or affiliations, while community detection
uncovers groups of related users. Influence propagation studies how content or information
spreads across the network. This structure is used for recommendations, marketing analysis,
and community detection. The affiliation network provides insights into user behavior, content
diffusion, and group dynamics.
A citation network is a type of directed graph where nodes represent publications (e.g.,
research papers, articles, patents, or books), and edges represent citations between those
publications. In other words, if one publication cites another, an edge is drawn from the citing
publication to the cited publication. This type of network is widely used in academic research,
intellectual property, and other areas where the relationship between works and their influences
is important.
Example of Citation Network
If Paper A cites Paper B and Paper B cites Paper C, the citation network would look like this:
In this network:
What Is Peer-To-Peer?
Peer-to-peer (P2P) is a decentralized network architecture in
which participants, called peers, interact directly with each
other without needing a central authority or server. In a P2P
network, each participant acts as both a client and a server,
enabling them to share resources and services directly with
other peers.
To understand better, imagine a group of friends studying
together for an exam. In a traditional classroom setting
(client-server architecture), there is a teacher who serves as
a central authority and provides information to all the
students (clients). The students rely on the teacher for the
necessary study materials and guidance.
Now, let’s apply the P2P concept to our study group. In this
scenario, each student is considered a peer. Instead of
relying solely on the teacher, the students can directly
interact with each other, exchange study materials, and help
each other understand difficult concepts.
For example, if one student has summarized notes for a
particular topic, they can share it with the rest of the group
by making copies or simply showing it to others. Another
student might have found useful online resources or practice
questions, which they can share with the group. The students
can discuss and explain concepts to each other, asking
questions and clarifying doubts.
1. Decentralized Architecture:
o Unlike traditional client-server networks, P2P networks have a decentralized
structure where each node (peer) acts as both a client and a server. Every peer can
share resources, such as files, bandwidth, or processing power, with other peers
directly without the need for a central server.
2. Direct Communication:
o Peers communicate directly with each other, bypassing centralized intermediaries.
This reduces latency and can lead to more efficient data sharing and resource
usage.
3. Distributed Resources:
o In a P2P network, resources like storage, computational power, and bandwidth are
distributed among all participants. This makes the network highly resilient and
scalable, as each additional peer increases the overall available resources.
4. Scalability:
o P2P networks can easily scale as new peers join the network. Since there is no
central server, the capacity and resources of the network grow organically with
the addition of each peer.
5. Fault Tolerance and Redundancy:
o P2P networks are highly fault-tolerant. If one peer fails or goes offline, other
peers can still maintain the network’s functionality by taking over or re-routing
requests. Data is often replicated across multiple peers to ensure redundancy.
6. Resource Sharing:
o Peers in a P2P network can share a variety of resources such as files (e.g.,
BitTorrent), computational power (e.g., SETI@home), or even internet bandwidth
(e.g., mesh networks).
7. Self-Organizing:
o P2P networks are often self-organizing, meaning peers automatically discover
each other and join the network without the need for manual configuration. This is
particularly important for dynamic, real-time networks.
8. Peer Discovery:
o To connect with other peers, discovery protocols are used (e.g., Distributed Hash
Tables or DHT) that help locate and retrieve data from peers in a highly efficient
manner.
9. Security and Trust Issues:
o P2P networks may face security concerns like data integrity, malicious peers, and
privacy. To address this, mechanisms like encryption, digital signatures, and
reputation systems are often implemented to maintain trust and secure
communication between peers.
10. Anonymity:
Some P2P networks (like those used for anonymous file-sharing or cryptocurrency
transactions) offer features that enhance the anonymity of peers by masking their identity
and location, which helps protect users’ privacy.
Recommendation System
A recommendation system (or recommender system) is a class of machine learning that
uses data to help predict, narrow down, and find what people are looking for among an
exponentially growing number of options.
What Is a Recommendation System?
A recommendation system is an artificial intelligence or AI algorithm, usually associated
with machine learning, that uses Big Data to suggest or recommend additional products to
consumers. These can be based on various criteria, including past purchases, search
history, demographic information, and other factors. Recommender systems are highly
useful as they help users discover products and services they might otherwise have not
found on their own.
Recommender systems are trained to understand the preferences, previous decisions, and
characteristics of people and products using data gathered about their interactions. These
include impressions, clicks, likes, and purchases. Because of their capability to predict
consumer interests and desires on a highly personalized level, recommender systems are a
favorite with content and product providers. They can drive consumers to just about any
product or service that interests them, from books to videos to health classes to clothing.
https://www.nvidia.com/en-in/glossary/recommendation-system/
Biological networks are systems that represent the relationships and interactions between
biological components like genes, proteins, or cells. These networks are typically modeled as
graphs, where nodes represent biological entities and edges represent interactions or
relationships.
1. Protein-Protein Interaction (PPI) Networks: Show how proteins interact within cells.
2. Gene Regulatory Networks (GRNs): Represent how genes regulate each other.
3. Metabolic Networks: Model biochemical reactions and metabolites.
4. Signaling Pathways: Illustrate cellular signal transmission.
5. Neural Networks: Represent connections between neurons in the brain.
Key Features:
Applications: