1
|
Lou Y, Wu C, Li J, Wang L, Chen G. Network Robustness Prediction: Influence of Training Data Distributions. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2024; 35:13496-13507. [PMID: 37220060 DOI: 10.1109/tnnls.2023.3269753] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/25/2023]
Abstract
Network robustness refers to the ability of a network to continue its functioning against malicious attacks, which is critical for various natural and industrial networks. Network robustness can be quantitatively measured by a sequence of values that record the remaining functionality after a sequential node- or edge-removal attacks. Robustness evaluations are traditionally determined by attack simulations, which are computationally very time-consuming and sometimes practically infeasible. The convolutional neural network (CNN)-based prediction provides a cost-efficient approach to fast evaluating the network robustness. In this article, the prediction performances of the learning feature representation-based CNN (LFR-CNN) and PATCHY-SAN methods are compared through extensively empirical experiments. Specifically, three distributions of network size in the training data are investigated, including the uniform, Gaussian, and extra distributions. The relationship between the CNN input size and the dimension of the evaluated network is studied. Extensive experimental results reveal that compared to the training data of uniform distribution, the Gaussian and extra distributions can significantly improve both the prediction performance and the generalizability, for both LFR-CNN and PATCHY-SAN, and for various functionality robustness. The extension ability of LFR-CNN is significantly better than PATCHY-SAN, verified by extensive comparisons on predicting the robustness of unseen networks. In general, LFR-CNN outperforms PATCHY-SAN, and thus LFR-CNN is recommended over PATCHY-SAN. However, since both LFR-CNN and PATCHY-SAN have advantages for different scenarios, the optimal settings of the input size of CNN are recommended under different configurations.
Collapse
|
2
|
Yang JX, Wang H, Li X, Tan Y, Ma Y, Zeng M. A control measure for epidemic spread based on the susceptible-infectious-susceptible (SIS) model. Biosystems 2024; 246:105341. [PMID: 39332804 DOI: 10.1016/j.biosystems.2024.105341] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/18/2024] [Revised: 09/14/2024] [Accepted: 09/22/2024] [Indexed: 09/29/2024]
Abstract
When an epidemic occurs in a network, finding the important links and cutting them off is an effective measure for preventing the spread of the epidemic. Traditional methods that remove important links easily lead to a disconnected network, inevitably incurring high costs arising from quarantining individuals or communities in a real-world network. In this study, we combine the clustering coefficient and the eigenvector to identify the important links using the susceptible-infectious-susceptible (SIS) model. The results show that our approach can improve the epidemic threshold while maintaining the connectivity of the network to control the spread of the epidemic. Experiments on multiple real-world and synthetic networks of varying sizes, demonstrate the effectiveness and scalability of our approach.
Collapse
Affiliation(s)
- Jin-Xuan Yang
- School of Statistics and Mathematics, Yunnan University of Finance and Economics, Kunming, 650221, PR China.
| | - Haiyan Wang
- School of Statistics and Mathematics, Yunnan University of Finance and Economics, Kunming, 650221, PR China
| | - Xin Li
- School of Statistics and Mathematics, Yunnan University of Finance and Economics, Kunming, 650221, PR China
| | - Ying Tan
- School of Statistics and Mathematics, Yunnan University of Finance and Economics, Kunming, 650221, PR China
| | - Yongjuan Ma
- School of Statistics and Mathematics, Yunnan University of Finance and Economics, Kunming, 650221, PR China
| | - Min Zeng
- School of Statistics and Mathematics, Yunnan University of Finance and Economics, Kunming, 650221, PR China
| |
Collapse
|
3
|
Cavallaro L, De Meo P, Fiumara G, Liotta A. On the sensitivity of centrality metrics. PLoS One 2024; 19:e0299255. [PMID: 38722923 PMCID: PMC11081296 DOI: 10.1371/journal.pone.0299255] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/03/2023] [Accepted: 02/07/2024] [Indexed: 05/13/2024] Open
Abstract
Despite the huge importance that the centrality metrics have in understanding the topology of a network, too little is known about the effects that small alterations in the topology of the input graph induce in the norm of the vector that stores the node centralities. If so, then it could be possible to avoid re-calculating the vector of centrality metrics if some minimal changes occur in the network topology, which would allow for significant computational savings. Hence, after formalising the notion of centrality, three of the most basic metrics were herein considered (i.e., Degree, Eigenvector, and Katz centrality). To perform the simulations, two probabilistic failure models were used to describe alterations in network topology: Uniform (i.e., all nodes can be independently deleted from the network with a fixed probability) and Best Connected (i.e., the probability a node is removed depends on its degree). Our analysis suggests that, in the case of degree, small variations in the topology of the input graph determine small variations in Degree centrality, independently of the topological features of the input graph; conversely, both Eigenvector and Katz centralities can be extremely sensitive to changes in the topology of the input graph. In other words, if the input graph has some specific features, even small changes in the topology of the input graph can have catastrophic effects on the Eigenvector or Katz centrality.
Collapse
Affiliation(s)
- Lucia Cavallaro
- Institute for Computing and Information Sciences, Radboud University, Nijmegen, The Netherlands
| | | | | | - Antonio Liotta
- Faculty of Engineering, Free University of Bozen-Bolzano, Bolzano, Italy
| |
Collapse
|
4
|
McKee J, Dallas T. Structural network characteristics affect epidemic severity and prediction in social contact networks. Infect Dis Model 2024; 9:204-213. [PMID: 38293687 PMCID: PMC10824764 DOI: 10.1016/j.idm.2023.12.008] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/29/2023] [Revised: 11/14/2023] [Accepted: 12/27/2023] [Indexed: 02/01/2024] Open
Abstract
Understanding and mitigating epidemic spread in complex networks requires the measurement of structural network properties associated with epidemic risk. Classic measures of epidemic thresholds like the basic reproduction number (R0) have been adapted to account for the structure of social contact networks but still may be unable to capture epidemic potential relative to more recent measures based on spectral graph properties. Here, we explore the ability of R0 and the spectral radius of the social contact network to estimate epidemic susceptibility. To do so, we simulate epidemics on a series of constructed (small world, scale-free, and random networks) and a collection of over 700 empirical biological social contact networks. Further, we explore how other network properties are related to these two epidemic estimators (R0 and spectral radius) and mean infection prevalence in simulated epidemics. Overall, we find that network properties strongly influence epidemic dynamics and the subsequent utility of R0 and spectral radius as indicators of epidemic risk.
Collapse
Affiliation(s)
- Jae McKee
- Bioinnovation Program, Tulane University, New Orleans, LA, 70118, USA
- Department of Medicine, Tulane University School of Medicine, New Orleans, LA, 70112, USA
| | - Tad Dallas
- Department of Biological Sciences, University of South Carolina, Columbia, SC, 29208, USA
| |
Collapse
|
5
|
Wang F, Cetinay H, He Z, Liu L, Van Mieghem P, Kooij RE. Recovering Power Grids Using Strategies Based on Network Metrics and Greedy Algorithms. ENTROPY (BASEL, SWITZERLAND) 2023; 25:1455. [PMID: 37895578 PMCID: PMC10606524 DOI: 10.3390/e25101455] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/05/2023] [Revised: 09/29/2023] [Accepted: 10/07/2023] [Indexed: 10/29/2023]
Abstract
For this study, we investigated efficient strategies for the recovery of individual links in power grids governed by the direct current (DC) power flow model, under random link failures. Our primary objective was to explore the efficacy of recovering failed links based solely on topological network metrics. In total, we considered 13 recovery strategies, which encompassed 2 strategies based on link centrality values (link betweenness and link flow betweenness), 8 strategies based on the products of node centrality values at link endpoints (degree, eigenvector, weighted eigenvector, closeness, electrical closeness, weighted electrical closeness, zeta vector, and weighted zeta vector), and 2 heuristic strategies (greedy recovery and two-step greedy recovery), in addition to the random recovery strategy. To evaluate the performance of these proposed strategies, we conducted simulations on three distinct power systems: the IEEE 30, IEEE 39, and IEEE 118 systems. Our findings revealed several key insights: Firstly, there were notable variations in the performance of the recovery strategies based on topological network metrics across different power systems. Secondly, all such strategies exhibited inferior performance when compared to the heuristic recovery strategies. Thirdly, the two-step greedy recovery strategy consistently outperformed the others, with the greedy recovery strategy ranking second. Based on our results, we conclude that relying solely on a single metric for the development of a recovery strategy is insufficient when restoring power grids following link failures. By comparison, recovery strategies employing greedy algorithms prove to be more effective choices.
Collapse
Affiliation(s)
- Fenghua Wang
- Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, 2628 CD Delft, The Netherlands; (L.L.); (P.V.M.); (R.E.K.)
| | - Hale Cetinay
- Asset Management, System Insights and Advanced Analytics, Stedin, 3011 TA Rotterdam, The Netherlands;
| | - Zhidong He
- DS Information Technology Co., Ltd., Shanghai 200032, China;
| | - Le Liu
- Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, 2628 CD Delft, The Netherlands; (L.L.); (P.V.M.); (R.E.K.)
| | - Piet Van Mieghem
- Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, 2628 CD Delft, The Netherlands; (L.L.); (P.V.M.); (R.E.K.)
| | - Robert E. Kooij
- Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, 2628 CD Delft, The Netherlands; (L.L.); (P.V.M.); (R.E.K.)
- Unit ICT, Strategy and Policy, Netherlands Organisation for Applied Scientific Research (TNO), 2595 DA Den Haag, The Netherlands
| |
Collapse
|
6
|
Jhun B, Choi H. Abrupt transition of the efficient vaccination strategy in a population with heterogeneous fatality rates. CHAOS (WOODBURY, N.Y.) 2022; 32:093140. [PMID: 36182386 DOI: 10.1063/5.0087627] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/07/2022] [Accepted: 09/01/2022] [Indexed: 06/16/2023]
Abstract
An insufficient supply of an effective SARS-CoV-2 vaccine in most countries demands an effective vaccination strategy to minimize the damage caused by the disease. Currently, many countries vaccinate their population in descending order of age (i.e., descending order of fatality rate) to minimize the deaths caused by the disease; however, the effectiveness of this strategy needs to be quantitatively assessed. We employ the susceptible-infected-recovered-dead model to investigate various vaccination strategies. We constructed a metapopulation model with heterogeneous contact and fatality rates and investigated the effectiveness of vaccination strategies to reduce epidemic mortality. We found that the fatality-based strategy, which is currently employed in many countries, is more effective when the contagion rate is high and vaccine supply is low, but the contact-based method outperforms the fatality-based strategy when there is a sufficiently high supply of the vaccine. We identified a discontinuous transition of the optimal vaccination strategy and path-dependency analogous to hysteresis. This transition and path-dependency imply that combining the fatality-based and contact-based strategies is ineffective in reducing the number of deaths. Furthermore, we demonstrate that such phenomena occur in real-world epidemic diseases, such as tuberculosis and COVID-19. We also show that the conclusions of this research are valid even when the complex epidemic stages, efficacy of the vaccine, and reinfection are considered.
Collapse
Affiliation(s)
- Bukyoung Jhun
- CCSS, CTP, and Department of Physics and Astronomy, Seoul National University, Seoul 08826, South Korea
| | - Hoyun Choi
- CCSS, CTP, and Department of Physics and Astronomy, Seoul National University, Seoul 08826, South Korea
| |
Collapse
|
7
|
Adiga A, Palmer N, Baek YY, Mortveit H, Ravi SS. Network Models and Simulation Analytics for Multi-scale Dynamics of Biological Invasions. Front Big Data 2022; 5:796897. [PMID: 35198973 PMCID: PMC8859470 DOI: 10.3389/fdata.2022.796897] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/18/2021] [Accepted: 01/10/2022] [Indexed: 11/13/2022] Open
Abstract
Globalization and climate change facilitate the spread and establishment of invasive species throughout the world via multiple pathways. These spread mechanisms can be effectively represented as diffusion processes on multi-scale, spatial networks. Such network-based modeling and simulation approaches are being increasingly applied in this domain. However, these works tend to be largely domain-specific, lacking any graph theoretic formalisms, and do not take advantage of more recent developments in network science. This work is aimed toward filling some of these gaps. We develop a generic multi-scale spatial network framework that is applicable to a wide range of models developed in the literature on biological invasions. A key question we address is the following: how do individual pathways and their combinations influence the rate and pattern of spread? The analytical complexity arises more from the multi-scale nature and complex functional components of the networks rather than from the sizes of the networks. We present theoretical bounds on the spectral radius and the diameter of multi-scale networks. These two structural graph parameters have established connections to diffusion processes. Specifically, we study how network properties, such as spectral radius and diameter are influenced by model parameters. Further, we analyze a multi-pathway diffusion model from the literature by conducting simulations on synthetic and real-world networks and then use regression tree analysis to identify the important network and diffusion model parameters that influence the dynamics.
Collapse
Affiliation(s)
- Abhijin Adiga
- Biocomplexity Institute and Initiative, University of Virginia, Charlottesville, VA, United States
| | - Nicholas Palmer
- Biocomplexity Institute and Initiative, University of Virginia, Charlottesville, VA, United States
| | - Young Yun Baek
- Biocomplexity Institute and Initiative, University of Virginia, Charlottesville, VA, United States
| | - Henning Mortveit
- Biocomplexity Institute and Initiative, University of Virginia, Charlottesville, VA, United States
- Department of Engineering Systems and Environment, University of Virginia, Charlottesville, VA, United States
| | - S. S. Ravi
- Biocomplexity Institute and Initiative, University of Virginia, Charlottesville, VA, United States
- Department of Computer Science, University at Albany—SUNY, Albany, NY, United States
| |
Collapse
|
8
|
Scalable graph neural network-based framework for identifying critical nodes and links in complex networks. Neurocomputing 2022. [DOI: 10.1016/j.neucom.2021.10.031] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
|
9
|
Nissen IA, Millán AP, Stam CJ, van Straaten ECW, Douw L, Pouwels PJW, Idema S, Baayen JC, Velis D, Van Mieghem P, Hillebrand A. Optimization of epilepsy surgery through virtual resections on individual structural brain networks. Sci Rep 2021; 11:19025. [PMID: 34561483 PMCID: PMC8463605 DOI: 10.1038/s41598-021-98046-0] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/19/2021] [Accepted: 08/13/2021] [Indexed: 11/10/2022] Open
Abstract
The success of epilepsy surgery in patients with refractory epilepsy depends upon correct identification of the epileptogenic zone (EZ) and an optimal choice of the resection area. In this study we developed individualized computational models based upon structural brain networks to explore the impact of different virtual resections on the propagation of seizures. The propagation of seizures was modelled as an epidemic process [susceptible-infected-recovered (SIR) model] on individual structural networks derived from presurgical diffusion tensor imaging in 19 patients. The candidate connections for the virtual resection were all connections from the clinically hypothesized EZ, from which the seizures were modelled to start, to other brain areas. As a computationally feasible surrogate for the SIR model, we also removed the connections that maximally reduced the eigenvector centrality (EC) (large values indicate network hubs) of the hypothesized EZ, with a large reduction meaning a large effect. The optimal combination of connections to be removed for a maximal effect were found using simulated annealing. For comparison, the same number of connections were removed randomly, or based on measures that quantify the importance of a node or connection within the network. We found that 90% of the effect (defined as reduction of EC of the hypothesized EZ) could already be obtained by removing substantially less than 90% of the connections. Thus, a smaller, optimized, virtual resection achieved almost the same effect as the actual surgery yet at a considerably smaller cost, sparing on average 27.49% (standard deviation: 4.65%) of the connections. Furthermore, the maximally effective connections linked the hypothesized EZ to hubs. Finally, the optimized resection was equally or more effective than removal based on structural network characteristics both regarding reducing the EC of the hypothesized EZ and seizure spreading. The approach of using reduced EC as a surrogate for simulating seizure propagation can suggest more restrictive resection strategies, whilst obtaining an almost optimal effect on reducing seizure propagation, by taking into account the unique topology of individual structural brain networks of patients.
Collapse
Affiliation(s)
- Ida A Nissen
- Department of Clinical Neurophysiology and MEG Center, Amsterdam Neuroscience, Vrije Universiteit Amsterdam, Amsterdam UMC, Amsterdam, The Netherlands
| | - Ana P Millán
- Department of Clinical Neurophysiology and MEG Center, Amsterdam Neuroscience, Vrije Universiteit Amsterdam, Amsterdam UMC, Amsterdam, The Netherlands.
| | - Cornelis J Stam
- Department of Clinical Neurophysiology and MEG Center, Amsterdam Neuroscience, Vrije Universiteit Amsterdam, Amsterdam UMC, Amsterdam, The Netherlands
| | - Elisabeth C W van Straaten
- Department of Clinical Neurophysiology and MEG Center, Amsterdam Neuroscience, Vrije Universiteit Amsterdam, Amsterdam UMC, Amsterdam, The Netherlands
| | - Linda Douw
- Department of Anatomy and Neuroscience, Amsterdam Neuroscience, Vrije Universiteit Amsterdam, Amsterdam UMC, Amsterdam, The Netherlands
| | - Petra J W Pouwels
- Radiology and Nuclear Medicine, Amsterdam Neuroscience, Vrije Universiteit Amsterdam, Amsterdam UMC, Amsterdam, The Netherlands
| | - Sander Idema
- Department of Neurosurgery, Amsterdam Neuroscience, Vrije Universiteit Amsterdam, Amsterdam UMC, Amsterdam, The Netherlands
| | - Johannes C Baayen
- Department of Neurosurgery, Amsterdam Neuroscience, Vrije Universiteit Amsterdam, Amsterdam UMC, Amsterdam, The Netherlands
| | - Demetrios Velis
- Department of Clinical Neurophysiology and MEG Center, Amsterdam Neuroscience, Vrije Universiteit Amsterdam, Amsterdam UMC, Amsterdam, The Netherlands
| | - Piet Van Mieghem
- Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, Delft, The Netherlands
| | - Arjan Hillebrand
- Department of Clinical Neurophysiology and MEG Center, Amsterdam Neuroscience, Vrije Universiteit Amsterdam, Amsterdam UMC, Amsterdam, The Netherlands
| |
Collapse
|
10
|
Chen J, Hoops S, Marathe A, Mortveit H, Lewis B, Venkatramanan S, Haddadan A, Bhattacharya P, Adiga A, Vullikanti A, Srinivasan A, Wilson M, Ehrlich G, Fenster M, Eubank S, Barrett C, Marathe M. Prioritizing allocation of COVID-19 vaccines based on social contacts increases vaccination effectiveness. MEDRXIV : THE PREPRINT SERVER FOR HEALTH SCIENCES 2021:2021.02.04.21251012. [PMID: 33564778 PMCID: PMC7872370 DOI: 10.1101/2021.02.04.21251012] [Citation(s) in RCA: 19] [Impact Index Per Article: 4.8] [Reference Citation Analysis] [Abstract] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 04/28/2023]
Abstract
We study allocation of COVID-19 vaccines to individuals based on the structural properties of their underlying social contact network. Even optimistic estimates suggest that most countries will likely take 6 to 24 months to vaccinate their citizens. These time estimates and the emergence of new viral strains urge us to find quick and effective ways to allocate the vaccines and contain the pandemic. While current approaches use combinations of age-based and occupation-based prioritizations, our strategy marks a departure from such largely aggregate vaccine allocation strategies. We propose a novel approach motivated by recent advances in (i) science of real-world networks that point to efficacy of certain vaccination strategies and (ii) digital technologies that improve our ability to estimate some of these structural properties. Using a realistic representation of a social contact network for the Commonwealth of Virginia, combined with accurate surveillance data on spatiotemporal cases and currently accepted models of within- and between-host disease dynamics, we study how a limited number of vaccine doses can be strategically distributed to individuals to reduce the overall burden of the pandemic. We show that allocation of vaccines based on individuals' degree (number of social contacts) and total social proximity time is significantly more effective than the currently used age-based allocation strategy in terms of number of infections, hospitalizations and deaths. Our results suggest that in just two months, by March 31, 2021, compared to age-based allocation, the proposed degree-based strategy can result in reducing an additional 56-110k infections, 3.2- 5.4k hospitalizations, and 700-900 deaths just in the Commonwealth of Virginia. Extrapolating these results for the entire US, this strategy can lead to 3-6 million fewer infections, 181-306k fewer hospitalizations, and 51-62k fewer deaths compared to age-based allocation. The overall strategy is robust even: (i) if the social contacts are not estimated correctly; (ii) if the vaccine efficacy is lower than expected or only a single dose is given; (iii) if there is a delay in vaccine production and deployment; and (iv) whether or not non-pharmaceutical interventions continue as vaccines are deployed. For reasons of implementability, we have used degree, which is a simple structural measure and can be easily estimated using several methods, including the digital technology available today. These results are significant, especially for resource-poor countries, where vaccines are less available, have lower efficacy, and are more slowly distributed.
Collapse
|
11
|
Secure the IoT Networks as Epidemic Containment Game. Symmetry (Basel) 2021. [DOI: 10.3390/sym13020156] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022] Open
Abstract
The spread of a computer virus among the Internet of Things (IoT) devices can be modeled as an Epidemic Containment (EC) game, where each owner decides the strategy, e.g., installing anti-virus software, to maximize his utility against the susceptible-infected-susceptible (SIS) model of the epidemics on graphs. The EC game’s canonical solution concepts are the Minimum/Maximum Nash Equilibria (MinNE/MaxNE). However, computing the exact MinNE/MaxNE is NP-hard, and only several heuristic algorithms are proposed to approximate the MinNE/MaxNE. To calculate the exact MinNE/MaxNE, we provide a thorough analysis of some special graphs and propose scalable and exact algorithms for general graphs. Especially, our contributions are four-fold. First, we analytically give the MinNE/MaxNE for EC on special graphs based on spectral radius. Second, we provide an integer linear programming formulation (ILP) to determine MinNE/MaxNE for the general graphs with the small epidemic threshold. Third, we propose a branch-and-bound (BnB) framework to compute the exact MinNE/MaxNE in the general graphs with several heuristic methods to branch the variables. Fourth, we adopt NetShiled (NetS) method to approximate the MinNE to improve the scalability. Extensive experiments demonstrate that our BnB algorithm can outperform the naive enumeration method in scalability, and the NetS can improve the scalability significantly and outperform the previous heuristic method in solution quality.
Collapse
|
12
|
Lifetime distribution of information diffusion on simultaneously growing networks. SOCIAL NETWORK ANALYSIS AND MINING 2020. [DOI: 10.1007/s13278-020-00651-w] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
|
13
|
|
14
|
Ahmad M, Ali S, Tariq J, Khan I, Shabbir M, Zaman A. Combinatorial trace method for network immunization. Inf Sci (N Y) 2020. [DOI: 10.1016/j.ins.2020.01.037] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
|
15
|
Vajdi A, Juher D, Saldaña J, Scoglio C. A multilayer temporal network model for STD spreading accounting for permanent and casual partners. Sci Rep 2020; 10:3846. [PMID: 32123251 PMCID: PMC7052224 DOI: 10.1038/s41598-020-60790-0] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/05/2019] [Accepted: 02/11/2020] [Indexed: 11/25/2022] Open
Abstract
Sexually transmitted diseases (STD) modeling has used contact networks to study the spreading of pathogens. Recent findings have stressed the increasing role of casual partners, often enabled by online dating applications. We study the Susceptible-Infected-Susceptible (SIS) epidemic model –appropriate for STDs– over a two-layer network aimed to account for the effect of casual partners in the spreading of STDs. In this novel model, individuals have a set of steady partnerships (links in layer 1). At certain rates, every individual can switch between active and inactive states and, while active, it establishes casual partnerships with some probability with active neighbors in layer 2 (whose links can be thought as potential casual partnerships). Individuals that are not engaged in casual partnerships are classified as inactive, and the transitions between active and inactive states are independent of their infectious state. We use mean-field equations as well as stochastic simulations to derive the epidemic threshold, which decreases substantially with the addition of the second layer. Interestingly, for a given expected number of casual partnerships, which depends on the probabilities of being active, this threshold turns out to depend on the duration of casual partnerships: the longer they are, the lower the threshold.
Collapse
Affiliation(s)
- Aram Vajdi
- Kansas StateUniversity, Department of Electrical and Computer Engineering, Manhattan, Kansas, USA.
| | - David Juher
- Universitat de Girona, Department of Computer Science, Applied Mathematics, and Statistics, Girona, Catalonia, Spain
| | - Joan Saldaña
- Universitat de Girona, Department of Computer Science, Applied Mathematics, and Statistics, Girona, Catalonia, Spain
| | - Caterina Scoglio
- Kansas StateUniversity, Department of Electrical and Computer Engineering, Manhattan, Kansas, USA
| |
Collapse
|
16
|
He Z, Yao C, Yu J, Zhan M. Perturbation analysis and comparison of network synchronization methods. Phys Rev E 2019; 99:052207. [PMID: 31212531 DOI: 10.1103/physreve.99.052207] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/14/2018] [Indexed: 11/07/2022]
Abstract
In many networked systems, synchronization is important and useful, and how to enhance synchronizability is an interesting problem. Based on the matrix perturbation theory, we analyze five methods of network synchronization enhancement, including the link removal, node removal, dividing hub node, pull control, and pinning control methods, and obtain explicit expressions for eigenvalue changes. By these comparisons, we find that, among all these methods, the pull control method is remarkable, as it can extend the synchronization (coupling strength) region from both the left and right sides, for any controlled node. Extensive simulation results are given to support the accuracy of the perturbation-based analysis.
Collapse
Affiliation(s)
- Zhiwei He
- Department of Mathematics, Shaoxing University, Shaoxing 312000, China
| | - Chenggui Yao
- Department of Mathematics, Shaoxing University, Shaoxing 312000, China
| | - Jun Yu
- Institute of Nonlinear Science, Shaoxing University, Shaoxing 312000, China
| | - Meng Zhan
- State Key Laboratory of Advanced Electromagnetic Engineering and Technology, School of Electrical and Electronic Engineering, Huazhong University of Science and Technology, Wuhan 430074, China
| |
Collapse
|
17
|
Data-driven efficient network and surveillance-based immunization. Knowl Inf Syst 2019. [DOI: 10.1007/s10115-018-01326-x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
|
18
|
Matamalas JT, Arenas A, Gómez S. Effective approach to epidemic containment using link equations in complex networks. SCIENCE ADVANCES 2018; 4:eaau4212. [PMID: 30525105 PMCID: PMC6281434 DOI: 10.1126/sciadv.aau4212] [Citation(s) in RCA: 31] [Impact Index Per Article: 4.4] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/08/2018] [Accepted: 11/07/2018] [Indexed: 05/20/2023]
Abstract
Epidemic containment is a major concern when confronting large-scale infections in complex networks. Many studies have been devoted to analytically understand how to restructure the network to minimize the impact of major outbreaks of infections at large scale. In many cases, the strategies are based on isolating certain nodes, while less attention has been paid to interventions on the links. In epidemic spreading, links inform about the probability of carrying the contagion of the disease from infected to susceptible individuals. Note that these states depend on the full structure of the network, and its determination is not straightforward from the knowledge of nodes' states. Here, we confront this challenge and propose a set of discrete-time governing equations that can be closed and analyzed, assessing the contribution of links to spreading processes in complex networks. Our approach allows a scheme for the containment of epidemics based on deactivating the most important links in transmitting the disease. The model is validated in synthetic and real networks, yielding an accurate determination of epidemic incidence and critical thresholds. Epidemic containment based on link deactivation promises to be an effective tool to maintain functionality of networks while controlling the spread of diseases, such as disease spread through air transportation networks.
Collapse
Affiliation(s)
| | - Alex Arenas
- Corresponding author. (J.T.M.); (A.A.); (S.G.)
| | | |
Collapse
|
19
|
Šubelj L. Convex skeletons of complex networks. J R Soc Interface 2018; 15:20180422. [PMID: 30111666 PMCID: PMC6127167 DOI: 10.1098/rsif.2018.0422] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/07/2018] [Accepted: 07/13/2018] [Indexed: 11/12/2022] Open
Abstract
A convex network can be defined as a network such that every connected induced subgraph includes all the shortest paths between its nodes. A fully convex network would therefore be a collection of cliques stitched together in a tree. In this paper, we study the largest high-convexity part of empirical networks obtained by removing the least number of edges, which we call a convex skeleton. A convex skeleton is a generalization of a network spanning tree in which each edge can be replaced by a clique of arbitrary size. We present different approaches for extracting convex skeletons and apply them to social collaboration and protein interactions networks, autonomous systems graphs and food webs. We show that the extracted convex skeletons retain the degree distribution, clustering, connectivity, distances, node position and also community structure, while making the shortest paths between the nodes largely unique. Moreover, in the Slovenian computer scientists coauthorship network, a convex skeleton retains the strongest ties between the authors, differently from a spanning tree or high-betweenness backbone and high-salience skeleton. A convex skeleton thus represents a simple definition of a network backbone with applications in coauthorship and other social collaboration networks.
Collapse
Affiliation(s)
- Lovro Šubelj
- Faculty of Computer and Information Science, University of Ljubljana, Ljubljana, Slovenia
| |
Collapse
|
20
|
Van Mieghem P, Devriendt K, Cetinay H. Pseudoinverse of the Laplacian and best spreader node in a network. Phys Rev E 2017; 96:032311. [PMID: 29346956 DOI: 10.1103/physreve.96.032311] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/09/2017] [Indexed: 06/07/2023]
Abstract
Determining a set of "important" nodes in a network constitutes a basic endeavor in network science. Inspired by electrical flows in a resistor network, we propose the best conducting node j in a graph G as the minimizer of the diagonal element Q_{jj}^{†} of the pseudoinverse matrix Q^{†} of the weighted Laplacian matrix of the graph G. We propose a new graph metric that complements the effective graph resistance R_{G} and that specifies the heterogeneity of the nodal spreading capacity in a graph. Various formulas and bounds for the diagonal element Q_{jj}^{†} are presented. Finally, we compute the pseudoinverse matrix of the Laplacian of star, path, and cycle graphs and derive an expansion and lower bound of the effective graph resistance R_{G} based on the complement of the graph G.
Collapse
Affiliation(s)
- P Van Mieghem
- Faculty of EECS, Delft University of Technology, P.O. Box 5031, 2600 GA Delft, The Netherlands
| | - K Devriendt
- Faculty of EECS, Delft University of Technology, P.O. Box 5031, 2600 GA Delft, The Netherlands
| | - H Cetinay
- Faculty of EECS, Delft University of Technology, P.O. Box 5031, 2600 GA Delft, The Netherlands
| |
Collapse
|
21
|
Pradhan P, Yadav A, Dwivedi SK, Jalan S. Optimized evolution of networks for principal eigenvector localization. Phys Rev E 2017; 96:022312. [PMID: 28950611 DOI: 10.1103/physreve.96.022312] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/13/2017] [Indexed: 05/11/2023]
Abstract
Network science is increasingly being developed to get new insights about behavior and properties of complex systems represented in terms of nodes and interactions. One useful approach is investigating the localization properties of eigenvectors having diverse applications including disease-spreading phenomena in underlying networks. In this work, we evolve an initial random network with an edge rewiring optimization technique considering the inverse participation ratio as a fitness function. The evolution process yields a network having a localized principal eigenvector. We analyze various properties of the optimized networks and those obtained at the intermediate stage. Our investigations reveal the existence of a few special structural features of such optimized networks, for instance, the presence of a set of edges which are necessary for localization, and rewiring only one of them leads to complete delocalization of the principal eigenvector. Furthermore, we report that principal eigenvector localization is not a consequence of changes in a single network property and, preferably, requires the collective influence of various distinct structural as well as spectral features.
Collapse
Affiliation(s)
- Priodyuti Pradhan
- Complex Systems Lab, Discipline of Physics, Indian Institute of Technology Indore, Khandwa Road, Simrol, Indore 453552, India
| | - Alok Yadav
- Complex Systems Lab, Discipline of Physics, Indian Institute of Technology Indore, Khandwa Road, Simrol, Indore 453552, India
| | - Sanjiv K Dwivedi
- Complex Systems Lab, Discipline of Physics, Indian Institute of Technology Indore, Khandwa Road, Simrol, Indore 453552, India
| | - Sarika Jalan
- Complex Systems Lab, Discipline of Physics, Indian Institute of Technology Indore, Khandwa Road, Simrol, Indore 453552, India
- Centre for Biosciences and Biomedical Engineering, Indian Institute of Technology Indore, Khandwa Road, Simrol, Indore 453552, India
| |
Collapse
|
22
|
Nakamura GM, Monteiro ACP, Cardoso GC, Martinez AS. Efficient method for comprehensive computation of agent-level epidemic dissemination in networks. Sci Rep 2017; 7:40885. [PMID: 28106086 PMCID: PMC5247741 DOI: 10.1038/srep40885] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/28/2016] [Accepted: 12/12/2016] [Indexed: 11/09/2022] Open
Abstract
Susceptible-infected (SI) and susceptible-infected-susceptible (SIS) are simple agent-based models often employed in epidemic studies. Both models describe the time evolution of infectious diseases in networks whose vertices are either susceptible (S) or infected (I) agents. Precise estimation for disease spreading is one of the major goals in epidemic studies but often restricted to heavy numerical simulations. Analytic methods using operatorial content are subject to the asymmetric eigenvalue problem, limiting the use of perturbative methods. Numerical methods are limited to small populations, since the vector space increases exponentially with population size N. Here, we propose the use of the squared norm of the probability vector to obtain an algebraic equation, which permits the evaluation of stationary states in Markov processes. The equation requires the eigenvalues of symmetrized time generators and takes full advantage of symmetries, reducing the time evolution to an O(N) sparse problem. The calculation of eigenvalues employs quantum many-body techniques, while the standard perturbation theory accounts for small modifications to the network topology.
Collapse
Affiliation(s)
- Gilberto M Nakamura
- Universidade de São Paulo (USP), Faculdade de Filosofia, Ciências e Letras de Ribeirão Preto (FFCLRP), Av. Bandeirantes 3900, Ribeirão Preto 14040-901, Brazil
| | - Ana Carolina P Monteiro
- Universidade de São Paulo (USP), Faculdade de Filosofia, Ciências e Letras de Ribeirão Preto (FFCLRP), Av. Bandeirantes 3900, Ribeirão Preto 14040-901, Brazil
| | - George C Cardoso
- Universidade de São Paulo (USP), Faculdade de Filosofia, Ciências e Letras de Ribeirão Preto (FFCLRP), Av. Bandeirantes 3900, Ribeirão Preto 14040-901, Brazil
| | - Alexandre S Martinez
- Universidade de São Paulo (USP), Faculdade de Filosofia, Ciências e Letras de Ribeirão Preto (FFCLRP), Av. Bandeirantes 3900, Ribeirão Preto 14040-901, Brazil.,Instituto Nacional de Ciência e Tecnologia - Sistemas Complexos (INCT-SC), Rio de Janeiro 22460-320, Brazil
| |
Collapse
|
23
|
Van Mieghem P. Approximate formula and bounds for the time-varying susceptible-infected-susceptible prevalence in networks. Phys Rev E 2016; 93:052312. [PMID: 27300915 DOI: 10.1103/physreve.93.052312] [Citation(s) in RCA: 21] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/01/2016] [Indexed: 11/07/2022]
Abstract
Based on a recent exact differential equation, the time dependence of the SIS prevalence, the average fraction of infected nodes, in any graph is first studied and then upper and lower bounded by an explicit analytic function of time. That new approximate "tanh formula" obeys a Riccati differential equation and bears resemblance to the classical expression in epidemiology of Kermack and McKendrick [Proc. R. Soc. London A 115, 700 (1927)1364-502110.1098/rspa.1927.0118] but enhanced with graph specific properties, such as the algebraic connectivity, the second smallest eigenvalue of the Laplacian of the graph. We further revisit the challenge of finding tight upper bounds for the SIS (and SIR) epidemic threshold for all graphs. We propose two new upper bounds and show the importance of the variance of the number of infected nodes. Finally, a formula for the epidemic threshold in the cycle (or ring graph) is presented.
Collapse
Affiliation(s)
- P Van Mieghem
- Delft University of Technology, Faculty of EECS, P.O. Box 5031, 2600 GA Delft, The Netherlands
| |
Collapse
|
24
|
Yang X, Li P, Yang LX, Wu Y. Reducing the Spectral Radius of a Torus Network by Link Removal. PLoS One 2016; 11:e0155580. [PMID: 27171372 PMCID: PMC4865235 DOI: 10.1371/journal.pone.0155580] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/24/2016] [Accepted: 05/01/2016] [Indexed: 11/26/2022] Open
Abstract
The optimal link removal (OLR) problem aims at removing a given number of links of a network so that the spectral radius of the residue network obtained by removing the links from the network attains the minimum. Torus networks are a class of regular networks that have witnessed widespread applications. This paper addresses three subproblems of the OLR problem for torus networks, where two or three or four edges are removed. For either of the three subproblems, a link-removing scheme is described. Exhaustive searches show that, for small-sized tori, each of the proposed schemes produces an optimal solution to the corresponding subproblem. Monte-Carlo simulations demonstrate that, for medium-sized tori, each of the three schemes produces a solution to the corresponding subproblem, which is optimal when compared to a large set of randomly produced link-removing schemes. Consequently, it is speculated that each of the three schemes produces an optimal solution to the corresponding subproblem for all torus networks. The set of links produced by each of our schemes is evenly distributed over a network, which may be a common feature of an optimal solution to the OLR problem for regular networks.
Collapse
Affiliation(s)
- Xiaofan Yang
- School of Software Engineering, Chongqing University, Chongqing, China
| | - Pengdeng Li
- School of Software Engineering, Chongqing University, Chongqing, China
| | - Lu-Xing Yang
- School of Software Engineering, Chongqing University, Chongqing, China
- * E-mail:
| | - Yingbo Wu
- School of Software Engineering, Chongqing University, Chongqing, China
| |
Collapse
|
25
|
|
26
|
Savol AJ, Chennubhotla CS. Approximating frustration scores in complex networks via perturbed Laplacian spectra. PHYSICAL REVIEW. E, STATISTICAL, NONLINEAR, AND SOFT MATTER PHYSICS 2015; 92:062806. [PMID: 26764743 PMCID: PMC4769078 DOI: 10.1103/physreve.92.062806] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/11/2015] [Indexed: 06/05/2023]
Abstract
Systems of many interacting components, as found in physics, biology, infrastructure, and the social sciences, are often modeled by simple networks of nodes and edges. The real-world systems frequently confront outside intervention or internal damage whose impact must be predicted or minimized, and such perturbations are then mimicked in the models by altering nodes or edges. This leads to the broad issue of how to best quantify changes in a model network after some type of perturbation. In the case of node removal there are many centrality metrics which associate a scalar quantity with the removed node, but it can be difficult to associate the quantities with some intuitive aspect of physical behavior in the network. This presents a serious hurdle to the application of network theory: real-world utility networks are rarely altered according to theoretic principles unless the kinetic impact on the network's users are fully appreciated beforehand. In pursuit of a kinetically interpretable centrality score, we discuss the f-score, or frustration score. Each f-score quantifies whether a selected node accelerates or inhibits global mean first passage times to a second, independently selected target node. We show that this is a natural way of revealing the dynamical importance of a node in some networks. After discussing merits of the f-score metric, we combine spectral and Laplacian matrix theory in order to quickly approximate the exact f-score values, which can otherwise be expensive to compute. Following tests on both synthetic and real medium-sized networks, we report f-score runtime improvements over exact brute force approaches in the range of 0 to 400% with low error (<3%).
Collapse
Affiliation(s)
- Andrej J Savol
- Department of Computational and Systems Biology, University of Pittsburgh School of Medicine, Pittsburgh, Pennsylvania 15260, USA
| | - Chakra S Chennubhotla
- Department of Computational and Systems Biology, University of Pittsburgh School of Medicine, Pittsburgh, Pennsylvania 15260, USA
| |
Collapse
|
27
|
Cator E, Van Mieghem P. Nodal infection in Markovian susceptible-infected-susceptible and susceptible-infected-removed epidemics on networks are non-negatively correlated. PHYSICAL REVIEW. E, STATISTICAL, NONLINEAR, AND SOFT MATTER PHYSICS 2014; 89:052802. [PMID: 25353839 DOI: 10.1103/physreve.89.052802] [Citation(s) in RCA: 11] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/07/2013] [Indexed: 06/04/2023]
Abstract
By invoking the famous Fortuin, Kasteleyn, and Ginibre (FKG) inequality, we prove the conjecture that the correlation of infection at the same time between any pair of nodes in a network cannot be negative for (exact) Markovian susceptible-infected-susceptible (SIS) and susceptible-infected-removed (SIR) epidemics on networks. The truth of the conjecture establishes that the N-intertwined mean-field approximation (NIMFA) upper bounds the infection probability in any graph so that network design based on NIMFA always leads to safe protections against malware spread. However, when the infection or/and curing are not Poisson processes, the infection correlation between two nodes can be negative.
Collapse
Affiliation(s)
- E Cator
- Faculty of Science, P.O. Box 9010, 6500 GL Nijmegen, The Netherlands
| | - P Van Mieghem
- Faculty of Electrical Engineering, Mathematics, and Computer Science, Delft University of Technology, Delft, The Netherlands
| |
Collapse
|
28
|
Li C, Wang H, Van Mieghem P. Epidemic threshold in directed networks. PHYSICAL REVIEW. E, STATISTICAL, NONLINEAR, AND SOFT MATTER PHYSICS 2013; 88:062802. [PMID: 24483506 DOI: 10.1103/physreve.88.062802] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/28/2013] [Revised: 10/25/2013] [Indexed: 06/03/2023]
Abstract
Epidemics have so far been mostly studied in undirected networks. However, many real-world networks, such as the online social network Twitter and the world wide web, on which information, emotion, or malware spreads, are directed networks, composed of both unidirectional links and bidirectional links. We define the directionality ξ as the percentage of unidirectional links. The epidemic threshold τ(c) for the susceptible-infected-susceptible (SIS) epidemic is lower bounded by 1/λ(1) in directed networks, where λ(1), also called the spectral radius, is the largest eigenvalue of the adjacency matrix. In this work, we propose two algorithms to generate directed networks with a given directionality ξ. The effect of ξ on the spectral radius λ(1), principal eigenvector x(1), spectral gap (λ(1)-|λ(2)|), and algebraic connectivity μ(N-1) is studied. Important findings are that the spectral radius λ(1) decreases with the directionality ξ, whereas the spectral gap and the algebraic connectivity increase with the directionality ξ. The extent of the decrease of the spectral radius depends on both the degree distribution and the degree-degree correlation ρ(D). Hence, in directed networks, the epidemic threshold is larger and a random walk converges to its steady state faster than that in undirected networks with the same degree distribution.
Collapse
Affiliation(s)
- Cong Li
- Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, Delft, The Netherlands
| | - Huijuan Wang
- Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, Delft, The Netherlands
| | - Piet Van Mieghem
- Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, Delft, The Netherlands
| |
Collapse
|
29
|
Deng C. The robustness analysis of wireless sensor networks under uncertain interference. ScientificWorldJournal 2013; 2013:185970. [PMID: 24363613 PMCID: PMC3864151 DOI: 10.1155/2013/185970] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/09/2013] [Accepted: 11/17/2013] [Indexed: 11/17/2022] Open
Abstract
Based on the complex network theory, robustness analysis of condition monitoring wireless sensor network under uncertain interference is present. In the evolution of the topology of sensor networks, the density weighted algebraic connectivity is taken into account, and the phenomenon of removing and repairing the link and node in the network is discussed. Numerical simulation is conducted to explore algebraic connectivity characteristics and network robustness performance. It is found that nodes density has the effect on algebraic connectivity distribution in the random graph model; high density nodes carry more connections, use more throughputs, and may be more unreliable. Moreover, the results show that, when network should be more error tolerant or robust by repairing nodes or adding new nodes, the network should be better clustered in median and high scale wireless sensor networks and be meshing topology in small scale networks.
Collapse
Affiliation(s)
- Changjian Deng
- School of Automation Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
- Department of Control Engineering, Chengdu University of Information Technology, Chengdu 610225, China
| |
Collapse
|
30
|
Schneider CM, Yazdani N, Araújo NAM, Havlin S, Herrmann HJ. Towards designing robust coupled networks. Sci Rep 2013; 3:1969. [PMID: 23752705 PMCID: PMC3678138 DOI: 10.1038/srep01969] [Citation(s) in RCA: 145] [Impact Index Per Article: 12.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/11/2013] [Accepted: 05/24/2013] [Indexed: 11/08/2022] Open
Abstract
Natural and technological interdependent systems have been shown to be highly vulnerable due to cascading failures and an abrupt collapse of global connectivity under initial failure. Mitigating the risk by partial disconnection endangers their functionality. Here we propose a systematic strategy of selecting a minimum number of autonomous nodes that guarantee a smooth transition in robustness. Our method which is based on betweenness is tested on various examples including the famous 2003 electrical blackout of Italy. We show that, with this strategy, the necessary number of autonomous nodes can be reduced by a factor of five compared to a random choice. We also find that the transition to abrupt collapse follows tricritical scaling characterized by a set of exponents which is independent on the protection strategy.
Collapse
Affiliation(s)
- Christian M. Schneider
- Department of Civil and Environmental Engineering, Massachusetts Institute of Technology, 77 Massachusetts Avenue, Cambridge, MA 02139, USA
| | - Nuri Yazdani
- Computational Physics for Engineering Materials, IfB, ETH Zurich, Wolfgang-Pauli-Strasse 27, CH-8093 Zurich, Switzerland
| | - Nuno A. M. Araújo
- Computational Physics for Engineering Materials, IfB, ETH Zurich, Wolfgang-Pauli-Strasse 27, CH-8093 Zurich, Switzerland
| | - Shlomo Havlin
- Department of Physics, Bar-Ilan University, 52900 Ramat-Gan, Israel
| | - Hans J. Herrmann
- Computational Physics for Engineering Materials, IfB, ETH Zurich, Wolfgang-Pauli-Strasse 27, CH-8093 Zurich, Switzerland
- Departamento de Física, Universidade Federal do Ceará, 60451-970 Fortaleza, Ceará, Brazil
| |
Collapse
|
31
|
Liu D, Trajanovski S, Van Mieghem P. Random line graphs and a linear law for assortativity. PHYSICAL REVIEW. E, STATISTICAL, NONLINEAR, AND SOFT MATTER PHYSICS 2013; 87:012816. [PMID: 23410397 DOI: 10.1103/physreve.87.012816] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/10/2012] [Revised: 11/25/2012] [Indexed: 06/01/2023]
Abstract
For a fixed number N of nodes, the number of links L in the line graph H(N,L) can only appear in consecutive intervals, called a band of L. We prove that some consecutive integers can never represent the number of links L in H(N,L), and they are called a bandgap of L. We give the exact expressions of bands and bandgaps of L. We propose a model which can randomly generate simple graphs which are line graphs of other simple graphs. The essence of our model is to merge step by step a pair of nodes in cliques, which we use to construct line graphs. Obeying necessary rules to ensure that the resulting graphs are line graphs, two nodes to be merged are randomly chosen at each step. If the cliques are all of the same size, the assortativity of the line graphs in each step are close to 0, and the assortativity of the corresponding root graphs increases linearly from -1 to 0 with the steps of the nodal merging process. If we dope the constructing elements of the line graphs-the cliques of the same size-with a relatively smaller number of cliques of different size, the characteristics of the assortativity of the line graphs is completely altered. We also generate line graphs with the cliques whose sizes follow a binomial distribution. The corresponding root graphs, with binomial degree distributions, zero assortativity, and semicircle eigenvalue distributions, are equivalent to Erdős-Rényi random graphs.
Collapse
Affiliation(s)
- Dajie Liu
- Delft University of Technology, P.O Box 5031, NL-2600 GA Delft, The Netherlands.
| | | | | |
Collapse
|
32
|
Taylor D, Larremore DB. Social climber attachment in forming networks produces a phase transition in a measure of connectivity. PHYSICAL REVIEW. E, STATISTICAL, NONLINEAR, AND SOFT MATTER PHYSICS 2012; 86:031140. [PMID: 23030899 DOI: 10.1103/physreve.86.031140] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/16/2012] [Indexed: 06/01/2023]
Abstract
The formation and fragmentation of networks are typically studied using percolation theory, but most previous research has been restricted to studying a phase transition in cluster size, examining the emergence of a giant component. This approach does not study the effects of evolving network structure on dynamics that occur at the nodes, such as the synchronization of oscillators and the spread of information, epidemics, and neuronal excitations. We introduce and analyze an alternative link-formation rule, called social climber (SC) attachment, that may be combined with arbitrary percolation models to produce a phase transition using the largest eigenvalue of the network adjacency matrix as the order parameter. This eigenvalue is significant in the analyses of many network-coupled dynamical systems in which it measures the quality of global coupling and is hence a natural measure of connectivity. We highlight the important self-organized properties of SC attachment and discuss implications for controlling dynamics on networks.
Collapse
Affiliation(s)
- Dane Taylor
- Department of Applied Mathematics, University of Colorado, Boulder, Colorado 80309, USA.
| | | |
Collapse
|
33
|
Van Mieghem P, Cator E. Epidemics in networks with nodal self-infection and the epidemic threshold. PHYSICAL REVIEW. E, STATISTICAL, NONLINEAR, AND SOFT MATTER PHYSICS 2012; 86:016116. [PMID: 23005500 DOI: 10.1103/physreve.86.016116] [Citation(s) in RCA: 31] [Impact Index Per Article: 2.4] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/10/2012] [Indexed: 06/01/2023]
Abstract
Since the Susceptible-Infected-Susceptible (SIS) epidemic threshold is not precisely defined in spite of its practical importance, the classical SIS epidemic process has been generalized to the ε-SIS model, where a node possesses a self-infection rate ε, in addition to a link infection rate β and a curing rate δ. The exact Markov equations are derived, from which the steady state can be computed. The major advantage of the ε-SIS model is that its steady state is different from the absorbing (or overall-healthy state) and approximates, for a certain range of small ε > 0, the in reality observed phase transition, also called the "metastable" state, that is characterized by the epidemic threshold. The exact steady-state analysis for the complete graph illustrates the effect of small ε and the quality of the first-order mean-field approximation, the N-intertwined model, proposed earlier. Apart from duality principles, often used in the mathematical literature, we present an exact recursion relation for the Markov infinitesimal generator.
Collapse
Affiliation(s)
- Piet Van Mieghem
- Delft University of Technology, Faculty of Electrical Engineering, Mathematics and Computer Science, P.O Box 5031, 2600 GA Delft, The Netherlands.
| | | |
Collapse
|
34
|
Cator E, Van Mieghem P. Second-order mean-field susceptible-infected-susceptible epidemic threshold. PHYSICAL REVIEW. E, STATISTICAL, NONLINEAR, AND SOFT MATTER PHYSICS 2012; 85:056111. [PMID: 23004825 DOI: 10.1103/physreve.85.056111] [Citation(s) in RCA: 16] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/23/2011] [Indexed: 05/12/2023]
Abstract
Given the adjacency matrix A of a network, we present a second-order mean-field expansion that improves on the first-order N-intertwined susceptible-infected-susceptible (SIS) epidemic model. Unexpectedly, we found that, in contrast to first-order, second-order mean-field theory is not always possible: the network size N should be large enough. Under the assumption of large N, we show that the crucial and characterizing quantity, the SIS epidemic threshold τ(c), obeys an eigenvalue equation, more complex than the one in the first-order N-intertwined model. However, the resulting epidemic threshold is more accurate: τ(c)((2)) = τ(c)((1)) + O(τ(c)((1))/N), where the first-order epidemic threshold is τ(c)((1)) = 1/λ(1)(A) and where λ(1)(A) is the spectral radius of the adjacency matrix A.
Collapse
Affiliation(s)
- E Cator
- Faculty of Electrical Engineering, Mathematics and Computer Science, GA Delft, The Netherlands.
| | | |
Collapse
|