Delay Tolerant Networks by Longxiang Gao Shui Yu Tom H. Luan & Wanlei Zhou
Author:Longxiang Gao, Shui Yu, Tom H. Luan & Wanlei Zhou
Language: eng
Format: epub
Publisher: Springer International Publishing, Cham
4.1 Background
In this background section, social concepts used for this chapter are introduced firstly, which are homophily, small world theory and key paths. After that, a real trace file in DTNs is analysed to study the impact and importance of social characteristics in DTNs.
4.1.1 Social Concepts
4.1.1.1 Homophily
Similar characteristics between individuals generally result in a bond between two people. The saying “birds of a feather flock together” suggests [4] people with different characteristics, such as gender, age or educational background tend to have very different qualities. Alternatively, people with similar interests, backgrounds or beliefs tend to form stronger relationships than those with dissimilar ones [5]. Individuals with less in common are less likely to develop or maintain a strong tie, and therefore a pathway of communication between them will not be as strong. This phenomenon, known as homophily [4], suggests contact between similar people occurs at a higher rate than dissimilar people and their social characteristics are translated into distance. For example, people with a common interest may belong to the same social club and physical space at the same time.
The structure of a social network is greatly influenced by this principle. Individuals form groups or cliques in a given social network largely depending on their shared attributes. These attributes include similar interests, backgrounds, socioeconomic status, family ties, generation, age, affiliation, career, education, etc. Because such similarities connect (and disconnect) nodes in a powerful way, it dictates the flow of information in a given social network. Therefore efficient message pathways with fewer hops are inevitably created and reused if deemed to be dependable over time.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(26277)
Hello! Python by Anthony Briggs(25204)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(24433)
Kotlin in Action by Dmitry Jemerov(23524)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(22869)
Dependency Injection in .NET by Mark Seemann(22658)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(21420)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(20258)
Grails in Action by Glen Smith Peter Ledbrook(19332)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17045)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(16357)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(14071)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(12244)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11520)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10635)
Hit Refresh by Satya Nadella(9211)
The Kubernetes Operator Framework Book by Michael Dame(8573)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8423)
Robo-Advisor with Python by Aki Ranin(8366)