Research Article
Ferry Node Identification Model for the Security of Mobile Ad Hoc Network
Algorithm 1
: Algorithm for calculating the importance of structural holes.
| Input: node set G | | Output: structural hole constraint coefficient, , of all nodes in G | (1) | for : //G is the node set of the opportunistic network | (2) | Calculate k (i) | (3) | for : | (4) | Calculate Q (i) | (5) | for : | (6) | for : // is the set of all neighboring nodes of node i | (7) | Calculate | (8) | for : | (9) | Calculate and | (10) | Calculate | (11) | for : | (12) | Calculate | (13) | for : | (14) | Calculate | (15) | return Ln |
|