Infectious disease control using contact tracing in random and scale-free networks
Kiss, Istvan Z; Green, Darren M; Kao, Rowland R
2005-01-01
Contact tracing aims to identify and isolate individuals that have been in contact with infectious individuals. The efficacy of contact tracing and the hierarchy of traced nodes—nodes with higher degree traced first—is investigated and compared on random and scale-free (SF) networks with the same number of nodes N and average connection K. For values of the transmission rate larger than a threshold, the final epidemic size on SF networks is smaller than that on corresponding random networks. While in random networks new infectious and traced nodes from all classes have similar average degrees, in SF networks the average degree of nodes that are in more advanced stages of the disease is higher at any given time. On SF networks tracing removes possible sources of infection with high average degree. However a higher tracing effort is required to control the epidemic than on corresponding random networks due to the high initial velocity of spread towards the highly connected nodes. An increased latency period fails to significantly improve contact tracing efficacy. Contact tracing has a limited effect if the removal rate of susceptible nodes is relatively high, due to the fast local depletion of susceptible nodes. PMID:16849217
Constrained target controllability of complex networks
NASA Astrophysics Data System (ADS)
Guo, Wei-Feng; Zhang, Shao-Wu; Wei, Ze-Gang; Zeng, Tao; Liu, Fei; Zhang, Jingsong; Wu, Fang-Xiang; Chen, Luonan
2017-06-01
It is of great theoretical interest and practical significance to study how to control a system by applying perturbations to only a few driver nodes. Recently, a hot topic of modern network researches is how to determine driver nodes that allow the control of an entire network. However, in practice, to control a complex network, especially a biological network, one may know not only the set of nodes which need to be controlled (i.e. target nodes), but also the set of nodes to which only control signals can be applied (i.e. constrained control nodes). Compared to the general concept of controllability, we introduce the concept of constrained target controllability (CTC) of complex networks, which concerns the ability to drive any state of target nodes to their desirable state by applying control signals to the driver nodes from the set of constrained control nodes. To efficiently investigate the CTC of complex networks, we further design a novel graph-theoretic algorithm called CTCA to estimate the ability of a given network to control targets by choosing driver nodes from the set of constrained control nodes. We extensively evaluate the CTC of numerous real complex networks. The results indicate that biological networks with a higher average degree are easier to control than biological networks with a lower average degree, while electronic networks with a lower average degree are easier to control than web networks with a higher average degree. We also show that our CTCA can more efficiently produce driver nodes for target-controlling the networks than existing state-of-the-art methods. Moreover, we use our CTCA to analyze two expert-curated bio-molecular networks and compare to other state-of-the-art methods. The results illustrate that our CTCA can efficiently identify proven drug targets and new potentials, according to the constrained controllability of those biological networks.
Densification and structural transitions in networks that grow by node copying
NASA Astrophysics Data System (ADS)
Bhat, U.; Krapivsky, P. L.; Lambiotte, R.; Redner, S.
2016-12-01
We introduce a growing network model, the copying model, in which a new node attaches to a randomly selected target node and, in addition, independently to each of the neighbors of the target with copying probability p . When p <1/2 , this algorithm generates sparse networks, in which the average node degree is finite. A power-law degree distribution also arises, with a nonuniversal exponent whose value is determined by a transcendental equation in p . In the sparse regime, the network is "normal," e.g., the relative fluctuations in the number of links are asymptotically negligible. For p ≥1/2 , the emergent networks are dense (the average degree increases with the number of nodes N ), and they exhibit intriguing structural behaviors. In particular, the N dependence of the number of m cliques (complete subgraphs of m nodes) undergoes m -1 transitions from normal to progressively more anomalous behavior at an m -dependent critical values of p . Different realizations of the network, which start from the same initial state, exhibit macroscopic fluctuations in the thermodynamic limit: absence of self-averaging. When linking to second neighbors of the target node can occur, the number of links asymptotically grows as N2 as N →∞ , so that the network is effectively complete as N →∞ .
A novel topology control approach to maintain the node degree in dynamic wireless sensor networks.
Huang, Yuanjiang; Martínez, José-Fernán; Díaz, Vicente Hernández; Sendra, Juana
2014-03-07
Topology control is an important technique to improve the connectivity and the reliability of Wireless Sensor Networks (WSNs) by means of adjusting the communication range of wireless sensor nodes. In this paper, a novel Fuzzy-logic Topology Control (FTC) is proposed to achieve any desired average node degree by adaptively changing communication range, thus improving the network connectivity, which is the main target of FTC. FTC is a fully localized control algorithm, and does not rely on location information of neighbors. Instead of designing membership functions and if-then rules for fuzzy-logic controller, FTC is constructed from the training data set to facilitate the design process. FTC is proved to be accurate, stable and has short settling time. In order to compare it with other representative localized algorithms (NONE, FLSS, k-Neighbor and LTRT), FTC is evaluated through extensive simulations. The simulation results show that: firstly, similar to k-Neighbor algorithm, FTC is the best to achieve the desired average node degree as node density varies; secondly, FTC is comparable to FLSS and k-Neighbor in terms of energy-efficiency, but is better than LTRT and NONE; thirdly, FTC has the lowest average maximum communication range than other algorithms, which indicates that the most energy-consuming node in the network consumes the lowest power.
Zhang, Jiang; Li, Yuyao; Chen, Huafu; Ding, Jurong; Yuan, Zhen
2016-11-04
In this study, small-world network analysis was performed to identify the similarities and differences between functional brain networks for right- and left-hand motor imageries (MIs). First, Pearson correlation coefficients among the nodes within the functional brain networks from healthy subjects were calculated. Then, small-world network indicators, including the clustering coefficient, the average path length, the global efficiency, the local efficiency, the average node degree, and the small-world index, were generated for the functional brain networks during both right- and left-hand MIs. We identified large differences in the small-world network indicators between the functional networks during MI and in the random networks. More importantly, the functional brain networks underlying the right- and left-hand MIs exhibited similar small-world properties in terms of the clustering coefficient, the average path length, the global efficiency, and the local efficiency. By contrast, the right- and left-hand MI brain networks showed differences in small-world characteristics, including indicators such as the average node degree and the small-world index. Interestingly, our findings also suggested that the differences in the activity intensity and range, the average node degree, and the small-world index of brain networks between the right- and left-hand MIs were associated with the asymmetry of brain functions.
A Novel Topology Control Approach to Maintain the Node Degree in Dynamic Wireless Sensor Networks
Huang, Yuanjiang; Martínez, José-Fernán; Díaz, Vicente Hernández; Sendra, Juana
2014-01-01
Topology control is an important technique to improve the connectivity and the reliability of Wireless Sensor Networks (WSNs) by means of adjusting the communication range of wireless sensor nodes. In this paper, a novel Fuzzy-logic Topology Control (FTC) is proposed to achieve any desired average node degree by adaptively changing communication range, thus improving the network connectivity, which is the main target of FTC. FTC is a fully localized control algorithm, and does not rely on location information of neighbors. Instead of designing membership functions and if-then rules for fuzzy-logic controller, FTC is constructed from the training data set to facilitate the design process. FTC is proved to be accurate, stable and has short settling time. In order to compare it with other representative localized algorithms (NONE, FLSS, k-Neighbor and LTRT), FTC is evaluated through extensive simulations. The simulation results show that: firstly, similar to k-Neighbor algorithm, FTC is the best to achieve the desired average node degree as node density varies; secondly, FTC is comparable to FLSS and k-Neighbor in terms of energy-efficiency, but is better than LTRT and NONE; thirdly, FTC has the lowest average maximum communication range than other algorithms, which indicates that the most energy-consuming node in the network consumes the lowest power. PMID:24608008
Efficient sampling of complex network with modified random walk strategies
NASA Astrophysics Data System (ADS)
Xie, Yunya; Chang, Shuhua; Zhang, Zhipeng; Zhang, Mi; Yang, Lei
2018-02-01
We present two novel random walk strategies, choosing seed node (CSN) random walk and no-retracing (NR) random walk. Different from the classical random walk sampling, the CSN and NR strategies focus on the influences of the seed node choice and path overlap, respectively. Three random walk samplings are applied in the Erdös-Rényi (ER), Barabási-Albert (BA), Watts-Strogatz (WS), and the weighted USAir networks, respectively. Then, the major properties of sampled subnets, such as sampling efficiency, degree distributions, average degree and average clustering coefficient, are studied. The similar conclusions can be reached with these three random walk strategies. Firstly, the networks with small scales and simple structures are conducive to the sampling. Secondly, the average degree and the average clustering coefficient of the sampled subnet tend to the corresponding values of original networks with limited steps. And thirdly, all the degree distributions of the subnets are slightly biased to the high degree side. However, the NR strategy performs better for the average clustering coefficient of the subnet. In the real weighted USAir networks, some obvious characters like the larger clustering coefficient and the fluctuation of degree distribution are reproduced well by these random walk strategies.
Identification of influential nodes in complex networks: Method from spreading probability viewpoint
NASA Astrophysics Data System (ADS)
Bao, Zhong-Kui; Ma, Chuang; Xiang, Bing-Bing; Zhang, Hai-Feng
2017-02-01
The problem of identifying influential nodes in complex networks has attracted much attention owing to its wide applications, including how to maximize the information diffusion, boost product promotion in a viral marketing campaign, prevent a large scale epidemic and so on. From spreading viewpoint, the probability of one node propagating its information to one other node is closely related to the shortest distance between them, the number of shortest paths and the transmission rate. However, it is difficult to obtain the values of transmission rates for different cases, to overcome such a difficulty, we use the reciprocal of average degree to approximate the transmission rate. Then a semi-local centrality index is proposed to incorporate the shortest distance, the number of shortest paths and the reciprocal of average degree simultaneously. By implementing simulations in real networks as well as synthetic networks, we verify that our proposed centrality can outperform well-known centralities, such as degree centrality, betweenness centrality, closeness centrality, k-shell centrality, and nonbacktracking centrality. In particular, our findings indicate that the performance of our method is the most significant when the transmission rate nears to the epidemic threshold, which is the most meaningful region for the identification of influential nodes.
Efficient packet transportation on complex networks with nonuniform node capacity distribution
NASA Astrophysics Data System (ADS)
He, Xuan; Niu, Kai; He, Zhiqiang; Lin, Jiaru; Jiang, Zhong-Yuan
2015-03-01
Provided that node delivery capacity may be not uniformly distributed in many realistic networks, we present a node delivery capacity distribution in which each node capacity is composed of uniform fraction and degree related proportion. Based on the node delivery capacity distribution, we construct a novel routing mechanism called efficient weighted routing (EWR) strategy to enhance network traffic capacity and transportation efficiency. Compared with the shortest path routing and the efficient routing strategies, the EWR achieves the highest traffic capacity. After investigating average path length, network diameter, maximum efficient betweenness, average efficient betweenness, average travel time and average traffic load under extensive simulations, it indicates that the EWR appears to be a very effective routing method. The idea of this routing mechanism gives us a good insight into network science research. The practical use of this work is prospective in some real complex systems such as the Internet.
Empirical study on a directed and weighted bus transport network in China
NASA Astrophysics Data System (ADS)
Feng, Shumin; Hu, Baoyu; Nie, Cen; Shen, Xianghao
2016-01-01
Bus transport networks are directed complex networks that consist of routes, stations, and passenger flow. In this study, the concept of duplication factor is introduced to analyze the differences between uplinks and downlinks for the bus transport network of Harbin (BTN-H). Further, a new representation model for BTNs is proposed, named as directed-space P. Two empirical characteristics of BTN-H are reported in this paper. First, the cumulative distributions of weighted degree, degree, number of routes that connect to each station, and node weight (peak-hour trips at a station) uniformly follow the exponential law. Meanwhile, the node weight shows positive correlations with the corresponding weighted degree, degree, and number of routes that connect to a station. Second, a new richness parameter of a node is explored by its node weight and the connectivity, weighted connectivity, average shortest path length and efficiency between rich nodes can be fitted by composite exponential functions to demonstrate the rich-club phenomenon.
Relationships between Perron-Frobenius eigenvalue and measurements of loops in networks
NASA Astrophysics Data System (ADS)
Chen, Lei; Kou, Yingxin; Li, Zhanwu; Xu, An; Chang, Yizhe
2018-07-01
The Perron-Frobenius eigenvalue (PFE) is widely used as measurement of the number of loops in networks, but what exactly the relationship between the PFE and the number of loops in networks is has not been researched yet, is it strictly monotonically increasing? And what are the relationships between the PFE and other measurements of loops in networks? Such as the average loop degree of nodes, and the distribution of loop ranks. We make researches on these questions based on samples of ER random network, NW small-world network and BA scale-free network, and the results confirm that, both the number of loops in network and the average loop degree of nodes of all samples do increase with the increase of the PFE in general trend, but neither of them are strictly monotonically increasing, so the PFE is capable to be used as a rough estimative measurement of the number of loops in networks and the average loop degree of nodes. Furthermore, we find that a majority of the loop ranks of all samples obey Weibull distribution, of which the scale parameter A and the shape parameter B have approximate power-law relationships with the PFE of the samples.
Node-based measures of connectivity in genetic networks.
Koen, Erin L; Bowman, Jeff; Wilson, Paul J
2016-01-01
At-site environmental conditions can have strong influences on genetic connectivity, and in particular on the immigration and settlement phases of dispersal. However, at-site processes are rarely explored in landscape genetic analyses. Networks can facilitate the study of at-site processes, where network nodes are used to model site-level effects. We used simulated genetic networks to compare and contrast the performance of 7 node-based (as opposed to edge-based) genetic connectivity metrics. We simulated increasing node connectivity by varying migration in two ways: we increased the number of migrants moving between a focal node and a set number of recipient nodes, and we increased the number of recipient nodes receiving a set number of migrants. We found that two metrics in particular, the average edge weight and the average inverse edge weight, varied linearly with simulated connectivity. Conversely, node degree was not a good measure of connectivity. We demonstrated the use of average inverse edge weight to describe the influence of at-site habitat characteristics on genetic connectivity of 653 American martens (Martes americana) in Ontario, Canada. We found that highly connected nodes had high habitat quality for marten (deep snow and high proportions of coniferous and mature forest) and were farther from the range edge. We recommend the use of node-based genetic connectivity metrics, in particular, average edge weight or average inverse edge weight, to model the influences of at-site habitat conditions on the immigration and settlement phases of dispersal. © 2015 John Wiley & Sons Ltd.
NASA Technical Reports Server (NTRS)
Diskin, Boris; Thomas, James L.; Nielsen, Eric J.; Nishikawa, Hiroaki; White, Jeffery A.
2010-01-01
Discretization of the viscous terms in current finite-volume unstructured-grid schemes are compared using node-centered and cell-centered approaches in two dimensions. Accuracy and complexity are studied for four nominally second-order accurate schemes: a node-centered scheme and three cell-centered schemes - a node-averaging scheme and two schemes with nearest-neighbor and adaptive compact stencils for least-square face gradient reconstruction. The grids considered range from structured (regular) grids to irregular grids composed of arbitrary mixtures of triangles and quadrilaterals, including random perturbations of the grid points to bring out the worst possible behavior of the solution. Two classes of tests are considered. The first class of tests involves smooth manufactured solutions on both isotropic and highly anisotropic grids with discontinuous metrics, typical of those encountered in grid adaptation. The second class concerns solutions and grids varying strongly anisotropically over a curved body, typical of those encountered in high-Reynolds number turbulent flow simulations. Tests from the first class indicate the face least-square methods, the node-averaging method without clipping, and the node-centered method demonstrate second-order convergence of discretization errors with very similar accuracies per degree of freedom. The tests of the second class are more discriminating. The node-centered scheme is always second order with an accuracy and complexity in linearization comparable to the best of the cell-centered schemes. In comparison, the cell-centered node-averaging schemes may degenerate on mixed grids, have a higher complexity in linearization, and can fail to converge to the exact solution when clipping of the node-averaged values is used. The cell-centered schemes using least-square face gradient reconstruction have more compact stencils with a complexity similar to that of the node-centered scheme. For simulations on highly anisotropic curved grids, the least-square methods have to be amended either by introducing a local mapping based on a distance function commonly available in practical schemes or modifying the scheme stencil to reflect the direction of strong coupling. The major conclusion is that accuracies of the node centered and the best cell-centered schemes are comparable at equivalent number of degrees of freedom.
A new measure based on degree distribution that links information theory and network graph analysis
2012-01-01
Background Detailed connection maps of human and nonhuman brains are being generated with new technologies, and graph metrics have been instrumental in understanding the general organizational features of these structures. Neural networks appear to have small world properties: they have clustered regions, while maintaining integrative features such as short average pathlengths. Results We captured the structural characteristics of clustered networks with short average pathlengths through our own variable, System Difference (SD), which is computationally simple and calculable for larger graph systems. SD is a Jaccardian measure generated by averaging all of the differences in the connection patterns between any two nodes of a system. We calculated SD over large random samples of matrices and found that high SD matrices have a low average pathlength and a larger number of clustered structures. SD is a measure of degree distribution with high SD matrices maximizing entropic properties. Phi (Φ), an information theory metric that assesses a system’s capacity to integrate information, correlated well with SD - with SD explaining over 90% of the variance in systems above 11 nodes (tested for 4 to 13 nodes). However, newer versions of Φ do not correlate well with the SD metric. Conclusions The new network measure, SD, provides a link between high entropic structures and degree distributions as related to small world properties. PMID:22726594
Geometric evolution of complex networks with degree correlations
NASA Astrophysics Data System (ADS)
Murphy, Charles; Allard, Antoine; Laurence, Edward; St-Onge, Guillaume; Dubé, Louis J.
2018-03-01
We present a general class of geometric network growth mechanisms by homogeneous attachment in which the links created at a given time t are distributed homogeneously between a new node and the existing nodes selected uniformly. This is achieved by creating links between nodes uniformly distributed in a homogeneous metric space according to a Fermi-Dirac connection probability with inverse temperature β and general time-dependent chemical potential μ (t ) . The chemical potential limits the spatial extent of newly created links. Using a hidden variable framework, we obtain an analytical expression for the degree sequence and show that μ (t ) can be fixed to yield any given degree distributions, including a scale-free degree distribution. Additionally, we find that depending on the order in which nodes appear in the network—its history—the degree-degree correlations can be tuned to be assortative or disassortative. The effect of the geometry on the structure is investigated through the average clustering coefficient 〈c 〉 . In the thermodynamic limit, we identify a phase transition between a random regime where 〈c 〉→0 when β <βc and a geometric regime where 〈c 〉>0 when β >βc .
Some scale-free networks could be robust under selective node attacks
NASA Astrophysics Data System (ADS)
Zheng, Bojin; Huang, Dan; Li, Deyi; Chen, Guisheng; Lan, Wenfei
2011-04-01
It is a mainstream idea that scale-free network would be fragile under the selective attacks. Internet is a typical scale-free network in the real world, but it never collapses under the selective attacks of computer viruses and hackers. This phenomenon is different from the deduction of the idea above because this idea assumes the same cost to delete an arbitrary node. Hence this paper discusses the behaviors of the scale-free network under the selective node attack with different cost. Through the experiments on five complex networks, we show that the scale-free network is possibly robust under the selective node attacks; furthermore, the more compact the network is, and the larger the average degree is, then the more robust the network is; with the same average degrees, the more compact the network is, the more robust the network is. This result would enrich the theory of the invulnerability of the network, and can be used to build robust social, technological and biological networks, and also has the potential to find the target of drugs.
Impact of degree heterogeneity on the behavior of trapping in Koch networks
NASA Astrophysics Data System (ADS)
Zhang, Zhongzhi; Gao, Shuyang; Xie, Wenlei
2010-12-01
Previous work shows that the mean first-passage time (MFPT) for random walks to a given hub node (node with maximum degree) in uncorrelated random scale-free networks is closely related to the exponent γ of power-law degree distribution P(k )˜k-γ, which describes the extent of heterogeneity of scale-free network structure. However, extensive empirical research indicates that real networked systems also display ubiquitous degree correlations. In this paper, we address the trapping issue on the Koch networks, which is a special random walk with one trap fixed at a hub node. The Koch networks are power-law with the characteristic exponent γ in the range between 2 and 3, they are either assortative or disassortative. We calculate exactly the MFPT that is the average of first-passage time from all other nodes to the trap. The obtained explicit solution shows that in large networks the MFPT varies lineally with node number N, which is obviously independent of γ and is sharp contrast to the scaling behavior of MFPT observed for uncorrelated random scale-free networks, where γ influences qualitatively the MFPT of trapping problem.
Cascade phenomenon against subsequent failures in complex networks
NASA Astrophysics Data System (ADS)
Jiang, Zhong-Yuan; Liu, Zhi-Quan; He, Xuan; Ma, Jian-Feng
2018-06-01
Cascade phenomenon may lead to catastrophic disasters which extremely imperil the network safety or security in various complex systems such as communication networks, power grids, social networks and so on. In some flow-based networks, the load of failed nodes can be redistributed locally to their neighboring nodes to maximally preserve the traffic oscillations or large-scale cascading failures. However, in such local flow redistribution model, a small set of key nodes attacked subsequently can result in network collapse. Then it is a critical problem to effectively find the set of key nodes in the network. To our best knowledge, this work is the first to study this problem comprehensively. We first introduce the extra capacity for every node to put up with flow fluctuations from neighbors, and two extra capacity distributions including degree based distribution and average distribution are employed. Four heuristic key nodes discovering methods including High-Degree-First (HDF), Low-Degree-First (LDF), Random and Greedy Algorithms (GA) are presented. Extensive simulations are realized in both scale-free networks and random networks. The results show that the greedy algorithm can efficiently find the set of key nodes in both scale-free and random networks. Our work studies network robustness against cascading failures from a very novel perspective, and methods and results are very useful for network robustness evaluations and protections.
Coupling of link- and node-ordering in the coevolving voter model.
Toruniewska, J; Kułakowski, K; Suchecki, K; Hołyst, J A
2017-10-01
We consider the process of reaching the final state in the coevolving voter model. There is a coevolution of state dynamics, where a node can copy a state from a random neighbor with probabilty 1-p and link dynamics, where a node can rewire its link to another node of the same state with probability p. That exhibits an absorbing transition to a frozen phase above a critical value of rewiring probability. Our analytical and numerical studies show that in the active phase mean values of magnetization of nodes n and links m tend to the same value that depends on initial conditions. In a similar way mean degrees of spins up and spins down become equal. The system obeys a special statistical conservation law since a linear combination of both types magnetizations averaged over many realizations starting from the same initial conditions is a constant of motion: Λ≡(1-p)μm(t)+pn(t)=const., where μ is the mean node degree. The final mean magnetization of nodes and links in the active phase is proportional to Λ while the final density of active links is a square function of Λ. If the rewiring probability is above a critical value and the system separates into disconnected domains, then the values of nodes and links magnetizations are not the same and final mean degrees of spins up and spins down can be different.
Topology Property and Dynamic Behavior of a Growing Spatial Network
NASA Astrophysics Data System (ADS)
Cao, Xian-Bin; Du, Wen-Bo; Hu, Mao-Bin; Rong, Zhi-Hai; Sun, Peng; Chen, Cai-Long
In this paper, we propose a growing spatial network (GSN) model and investigate its topology properties and dynamical behaviors. The model is generated by adding one node i with m links into a square lattice at each time step and the new node i is connected to the existing nodes with probabilities proportional to: ({kj})α /dij2, where kj is the degree of node j, α is the tunable parameter and dij is the Euclidean distance between i and j. It is found that both the degree heterogeneity and the clustering coefficient monotonously increase with the increment of α, while the average shortest path length monotonously decreases. Moreover, the evolutionary game dynamics and network traffic dynamics are investigated. Simulation results show that the value of α can also greatly influence the dynamic behaviors.
Opinion formation on adaptive networks with intensive average degree
NASA Astrophysics Data System (ADS)
Schmittmann, B.; Mukhopadhyay, Abhishek
2010-12-01
We study the evolution of binary opinions on a simple adaptive network of N nodes. At each time step, a randomly selected node updates its state (“opinion”) according to the majority opinion of the nodes that it is linked to; subsequently, all links are reassigned with probability p˜ (q˜) if they connect nodes with equal (opposite) opinions. In contrast to earlier work, we ensure that the average connectivity (“degree”) of each node is independent of the system size (“intensive”), by choosing p˜ and q˜ to be of O(1/N) . Using simulations and analytic arguments, we determine the final steady states and the relaxation into these states for different system sizes. We find two absorbing states, characterized by perfect consensus, and one metastable state, characterized by a population split evenly between the two opinions. The relaxation time of this state grows exponentially with the number of nodes, N . A second metastable state, found in the earlier studies, is no longer observed.
A character network study of two Sci-Fi TV series
NASA Astrophysics Data System (ADS)
Tan, M. S. A.; Ujum, E. A.; Ratnavelu, K.
2014-03-01
This work is an analysis of the character networks in two science fiction television series: Stargate and Star Trek. These networks are constructed on the basis of scene co-occurrence between characters to indicate the presence of a connection. Global network structure measures such as the average path length, graph density, network diameter, average degree, median degree, maximum degree, and average clustering coefficient are computed as well as individual node centrality scores. The two fictional networks constructed are found to be quite similar in structure which is astonishing given that Stargate only ran for 18 years in comparison to the 48 years for Star Trek.
Distinguishing manipulated stocks via trading network analysis
NASA Astrophysics Data System (ADS)
Sun, Xiao-Qian; Cheng, Xue-Qi; Shen, Hua-Wei; Wang, Zhao-Yang
2011-10-01
Manipulation is an important issue for both developed and emerging stock markets. For the study of manipulation, it is critical to analyze investor behavior in the stock market. In this paper, an analysis of the full transaction records of over a hundred stocks in a one-year period is conducted. For each stock, a trading network is constructed to characterize the relations among its investors. In trading networks, nodes represent investors and a directed link connects a stock seller to a buyer with the total trade size as the weight of the link, and the node strength is the sum of all edge weights of a node. For all these trading networks, we find that the node degree and node strength both have tails following a power-law distribution. Compared with non-manipulated stocks, manipulated stocks have a high lower bound of the power-law tail, a high average degree of the trading network and a low correlation between the price return and the seller-buyer ratio. These findings may help us to detect manipulated stocks.
Extreme events and event size fluctuations in biased random walks on networks.
Kishore, Vimal; Santhanam, M S; Amritkar, R E
2012-05-01
Random walk on discrete lattice models is important to understand various types of transport processes. The extreme events, defined as exceedences of the flux of walkers above a prescribed threshold, have been studied recently in the context of complex networks. This was motivated by the occurrence of rare events such as traffic jams, floods, and power blackouts which take place on networks. In this work, we study extreme events in a generalized random walk model in which the walk is preferentially biased by the network topology. The walkers preferentially choose to hop toward the hubs or small degree nodes. In this setting, we show that extremely large fluctuations in event sizes are possible on small degree nodes when the walkers are biased toward the hubs. In particular, we obtain the distribution of event sizes on the network. Further, the probability for the occurrence of extreme events on any node in the network depends on its "generalized strength," a measure of the ability of a node to attract walkers. The generalized strength is a function of the degree of the node and that of its nearest neighbors. We obtain analytical and simulation results for the probability of occurrence of extreme events on the nodes of a network using a generalized random walk model. The result reveals that the nodes with a larger value of generalized strength, on average, display lower probability for the occurrence of extreme events compared to the nodes with lower values of generalized strength.
Color Filtering Localization for Three-Dimensional Underwater Acoustic Sensor Networks
Liu, Zhihua; Gao, Han; Wang, Wuling; Chang, Shuai; Chen, Jiaxing
2015-01-01
Accurate localization of mobile nodes has been an important and fundamental problem in underwater acoustic sensor networks (UASNs). The detection information returned from a mobile node is meaningful only if its location is known. In this paper, we propose two localization algorithms based on color filtering technology called PCFL and ACFL. PCFL and ACFL aim at collaboratively accomplishing accurate localization of underwater mobile nodes with minimum energy expenditure. They both adopt the overlapping signal region of task anchors which can communicate with the mobile node directly as the current sampling area. PCFL employs the projected distances between each of the task projections and the mobile node, while ACFL adopts the direct distance between each of the task anchors and the mobile node. The proportion factor of distance is also proposed to weight the RGB values. By comparing the nearness degrees of the RGB sequences between the samples and the mobile node, samples can be filtered out. The normalized nearness degrees are considered as the weighted standards to calculate the coordinates of the mobile nodes. The simulation results show that the proposed methods have excellent localization performance and can localize the mobile node in a timely way. The average localization error of PCFL is decreased by about 30.4% compared to the AFLA method. PMID:25774706
The fastest spreader in SIS epidemics on networks
NASA Astrophysics Data System (ADS)
He, Zhidong; Van Mieghem, Piet
2018-05-01
Identifying the fastest spreaders in epidemics on a network helps to ensure an efficient spreading. By ranking the average spreading time for different spreaders, we show that the fastest spreader may change with the effective infection rate of a SIS epidemic process, which means that the time-dependent influence of a node is usually strongly coupled to the dynamic process and the underlying network. With increasing effective infection rate, we illustrate that the fastest spreader changes from the node with the largest degree to the node with the shortest flooding time. (The flooding time is the minimum time needed to reach all other nodes if the process is reduced to a flooding process.) Furthermore, by taking the local topology around the spreader and the average flooding time into account, we propose the spreading efficiency as a metric to quantify the efficiency of a spreader and identify the fastest spreader, which is adaptive to different infection rates in general networks.
Structural Transitions in Densifying Networks
NASA Astrophysics Data System (ADS)
Lambiotte, R.; Krapivsky, P. L.; Bhat, U.; Redner, S.
2016-11-01
We introduce a minimal generative model for densifying networks in which a new node attaches to a randomly selected target node and also to each of its neighbors with probability p . The networks that emerge from this copying mechanism are sparse for p <1/2 and dense (average degree increasing with number of nodes N ) for p ≥1/2 . The behavior in the dense regime is especially rich; for example, individual network realizations that are built by copying are disparate and not self-averaging. Further, there is an infinite sequence of structural anomalies at p =2/3 , 3/4 , 4/5 , etc., where the N dependences of the number of triangles (3-cliques), 4-cliques, undergo phase transitions. When linking to second neighbors of the target can occur, the probability that the resulting graph is complete—all nodes are connected—is nonzero as N →∞ .
Optimal allocation of resources for suppressing epidemic spreading on networks
NASA Astrophysics Data System (ADS)
Chen, Hanshuang; Li, Guofeng; Zhang, Haifeng; Hou, Zhonghuai
2017-07-01
Efficient allocation of limited medical resources is crucial for controlling epidemic spreading on networks. Based on the susceptible-infected-susceptible model, we solve the optimization problem of how best to allocate the limited resources so as to minimize prevalence, providing that the curing rate of each node is positively correlated to its medical resource. By quenched mean-field theory and heterogeneous mean-field (HMF) theory, we prove that an epidemic outbreak will be suppressed to the greatest extent if the curing rate of each node is directly proportional to its degree, under which the effective infection rate λ has a maximal threshold λcopt=1 /
Community detection in networks with unequal groups.
Zhang, Pan; Moore, Cristopher; Newman, M E J
2016-01-01
Recently, a phase transition has been discovered in the network community detection problem below which no algorithm can tell which nodes belong to which communities with success any better than a random guess. This result has, however, so far been limited to the case where the communities have the same size or the same average degree. Here we consider the case where the sizes or average degrees differ. This asymmetry allows us to assign nodes to communities with better-than-random success by examining their local neighborhoods. Using the cavity method, we show that this removes the detectability transition completely for networks with four groups or fewer, while for more than four groups the transition persists up to a critical amount of asymmetry but not beyond. The critical point in the latter case coincides with the point at which local information percolates, causing a global transition from a less-accurate solution to a more-accurate one.
NASA Technical Reports Server (NTRS)
Diskin, Boris; Thomas, James L.; Nielsen, Eric J.; Nishikawa, Hiroaki; White, Jeffery A.
2009-01-01
Discretization of the viscous terms in current finite-volume unstructured-grid schemes are compared using node-centered and cell-centered approaches in two dimensions. Accuracy and efficiency are studied for six nominally second-order accurate schemes: a node-centered scheme, cell-centered node-averaging schemes with and without clipping, and cell-centered schemes with unweighted, weighted, and approximately mapped least-square face gradient reconstruction. The grids considered range from structured (regular) grids to irregular grids composed of arbitrary mixtures of triangles and quadrilaterals, including random perturbations of the grid points to bring out the worst possible behavior of the solution. Two classes of tests are considered. The first class of tests involves smooth manufactured solutions on both isotropic and highly anisotropic grids with discontinuous metrics, typical of those encountered in grid adaptation. The second class concerns solutions and grids varying strongly anisotropically over a curved body, typical of those encountered in high-Reynolds number turbulent flow simulations. Results from the first class indicate the face least-square methods, the node-averaging method without clipping, and the node-centered method demonstrate second-order convergence of discretization errors with very similar accuracies per degree of freedom. The second class of tests are more discriminating. The node-centered scheme is always second order with an accuracy and complexity in linearization comparable to the best of the cell-centered schemes. In comparison, the cell-centered node-averaging schemes are less accurate, have a higher complexity in linearization, and can fail to converge to the exact solution when clipping of the node-averaged values is used. The cell-centered schemes using least-square face gradient reconstruction have more compact stencils with a complexity similar to the complexity of the node-centered scheme. For simulations on highly anisotropic curved grids, the least-square methods have to be amended either by introducing a local mapping of the surface anisotropy or modifying the scheme stencil to reflect the direction of strong coupling.
Complex Network Theory Applied to the Growth of Kuala Lumpur's Public Urban Rail Transit Network.
Ding, Rui; Ujang, Norsidah; Hamid, Hussain Bin; Wu, Jianjun
2015-01-01
Recently, the number of studies involving complex network applications in transportation has increased steadily as scholars from various fields analyze traffic networks. Nonetheless, research on rail network growth is relatively rare. This research examines the evolution of the Public Urban Rail Transit Networks of Kuala Lumpur (PURTNoKL) based on complex network theory and covers both the topological structure of the rail system and future trends in network growth. In addition, network performance when facing different attack strategies is also assessed. Three topological network characteristics are considered: connections, clustering and centrality. In PURTNoKL, we found that the total number of nodes and edges exhibit a linear relationship and that the average degree stays within the interval [2.0488, 2.6774] with heavy-tailed distributions. The evolutionary process shows that the cumulative probability distribution (CPD) of degree and the average shortest path length show good fit with exponential distribution and normal distribution, respectively. Moreover, PURTNoKL exhibits clear cluster characteristics; most of the nodes have a 2-core value, and the CPDs of the centrality's closeness and betweenness follow a normal distribution function and an exponential distribution, respectively. Finally, we discuss four different types of network growth styles and the line extension process, which reveal that the rail network's growth is likely based on the nodes with the biggest lengths of the shortest path and that network protection should emphasize those nodes with the largest degrees and the highest betweenness values. This research may enhance the networkability of the rail system and better shape the future growth of public rail networks.
Zeltzer, Assaf A; Anzarut, Alexander; Braeckmans, Delphine; Seidenstuecker, Katrin; Hendrickx, Benoit; Van Hedent, Eddy; Hamdi, Moustapha
2017-09-01
A growing number of surgeons perform lymph node transfers for the treatment of lymphedema. When harvesting a vascularized lymph node groin flap (VGLNF) one of the major concerns is the potential risk of iatrogenic lymphedema of the donor-site. This article helps understanding of the lymph node distribution of the groin in order to minimize this risk. Fifty consecutive patients undergoing abdominal mapping by multi-detector CT scanner were included and 100 groins analyzed. The groin was divided in three zones (of which zone II is the safe zone) and lymph nodes were counted and mapped with their distances to anatomic landmarks. Further node units were plotted and counted. The average age was 48 years. A mean number of nodes of 6.5/groin was found. In zone II, which is our zone of interest a mean of 3.1 nodes were counted with a mean size of 7.8 mm. In three patients no nodes were found in zone II. In five patients nodes were seen in zone II but were not sufficient in size or number to be considered a lymph node unit. On average the lymph node unit in zone II was found to be 48.3 mm from the pubic tubercle when projected on a line from the pubic tubercle to the anterior superior iliac spine, 16.0 mm caudal to this line, and 20.4 mm above the groin crease. On average the lymph node unit was a mean of 41.7 mm lateral to the SCIV-SIEV confluence. This study provides increased understanding of the lymphatic anatomy in zone II of the groin flap and suggests a refined technique for designing the VGLNF. As with any flap there is a degree of individual patient variability. However, having information on the most common anatomy and flap design is of great value. © 2017 Wiley Periodicals, Inc.
Gao, Jianxi; Buldyrev, S V; Havlin, S; Stanley, H E
2012-06-01
Many real-world networks interact with and depend upon other networks. We develop an analytical framework for studying a network formed by n fully interdependent randomly connected networks, each composed of the same number of nodes N. The dependency links connecting nodes from different networks establish a unique one-to-one correspondence between the nodes of one network and the nodes of the other network. We study the dynamics of the cascades of failures in such a network of networks (NON) caused by a random initial attack on one of the networks, after which a fraction p of its nodes survives. We find for the fully interdependent loopless NON that the final state of the NON does not depend on the dynamics of the cascades but is determined by a uniquely defined mutual giant component of the NON, which generalizes both the giant component of regular percolation of a single network (n=1) and the recently studied case of the mutual giant component of two interdependent networks (n=2). We also find that the mutual giant component does not depend on the topology of the NON and express it in terms of generating functions of the degree distributions of the network. Our results show that, for any n≥2 there exists a critical p=p(c)>0 below which the mutual giant component abruptly collapses from a finite nonzero value for p≥p(c) to zero for p
2, a RR NON is stable for any n with p(c)<1). This results arises from the critical role played by singly connected nodes which exist in an ER NON and enhance the cascading failures, but do not exist in a RR NON.
Structural and functional networks in complex systems with delay.
Eguíluz, Víctor M; Pérez, Toni; Borge-Holthoefer, Javier; Arenas, Alex
2011-05-01
Functional networks of complex systems are obtained from the analysis of the temporal activity of their components, and are often used to infer their unknown underlying connectivity. We obtain the equations relating topology and function in a system of diffusively delay-coupled elements in complex networks. We solve exactly the resulting equations in motifs (directed structures of three nodes) and in directed networks. The mean-field solution for directed uncorrelated networks shows that the clusterization of the activity is dominated by the in-degree of the nodes, and that the locking frequency decreases with increasing average degree. We find that the exponent of a power law degree distribution of the structural topology γ is related to the exponent of the associated functional network as α=(2-γ)(-1) for γ<2. © 2011 American Physical Society
Node-node correlations and transport properties in scale-free networks
NASA Astrophysics Data System (ADS)
Obregon, Bibiana; Guzman, Lev
2011-03-01
We study some transport properties of complex networks. We focus our attention on transport properties of scale-free and small-world networks and compare two types of transport: Electric and max-flow cases. In particular, we construct scale-free networks, with a given degree sequence, to estimate the distribution of conductances for different values of assortative/dissortative mixing. For the electric case we find that the distributions of conductances are affect ed by the assortative mixing of the network whereas for the max-flow case, the distributions almost do not show changes when node-node correlations are altered. Finally, we compare local and global transport in terms of the average conductance for the small-world (Watts-Strogatz) model
Naming Game with Multiple Hearers
NASA Astrophysics Data System (ADS)
Li, Bing; Chen, Guanrong; Chow, Tommy W. S.
2013-05-01
A new model called Naming Game with Multiple Hearers (NGMH) is proposed in this paper. A naming game over a population of individuals aims to reach consensus on the name of an object through pair-wise local interactions among all the individuals. The proposed NGMH model describes the learning process of a new word, in a population with one speaker and multiple hearers, at each interaction towards convergence. The characteristics of NGMH are examined on three types of network topologies, namely ER random-graph network, WS small-world network, and BA scale-free network. Comparative analysis on the convergence time is performed, revealing that the topology with a larger average (node) degree can reach consensus faster than the others over the same population. It is found that, for a homogeneous network, the average degree is the limiting value of the number of hearers, which reduces the individual ability of learning new words, consequently decreasing the convergence time; for a scale-free network, this limiting value is the deviation of the average degree. It is also found that a network with a larger clustering coefficient takes longer time to converge; especially a small-word network with smallest rewiring possibility takes longest time to reach convergence. As more new nodes are being added to scale-free networks with different degree distributions, their convergence time appears to be robust against the network-size variation. Most new findings reported in this paper are different from that of the single-speaker/single-hearer naming games documented in the literature.
Unimodular lattice triangulations as small-world and scale-free random graphs
NASA Astrophysics Data System (ADS)
Krüger, B.; Schmidt, E. M.; Mecke, K.
2015-02-01
Real-world networks, e.g., the social relations or world-wide-web graphs, exhibit both small-world and scale-free behaviour. We interpret lattice triangulations as planar graphs by identifying triangulation vertices with graph nodes and one-dimensional simplices with edges. Since these triangulations are ergodic with respect to a certain Pachner flip, applying different Monte Carlo simulations enables us to calculate average properties of random triangulations, as well as canonical ensemble averages, using an energy functional that is approximately the variance of the degree distribution. All considered triangulations have clustering coefficients comparable with real-world graphs; for the canonical ensemble there are inverse temperatures with small shortest path length independent of system size. Tuning the inverse temperature to a quasi-critical value leads to an indication of scale-free behaviour for degrees k≥slant 5. Using triangulations as a random graph model can improve the understanding of real-world networks, especially if the actual distance of the embedded nodes becomes important.
Shock waves on complex networks
NASA Astrophysics Data System (ADS)
Mones, Enys; Araújo, Nuno A. M.; Vicsek, Tamás; Herrmann, Hans J.
2014-05-01
Power grids, road maps, and river streams are examples of infrastructural networks which are highly vulnerable to external perturbations. An abrupt local change of load (voltage, traffic density, or water level) might propagate in a cascading way and affect a significant fraction of the network. Almost discontinuous perturbations can be modeled by shock waves which can eventually interfere constructively and endanger the normal functionality of the infrastructure. We study their dynamics by solving the Burgers equation under random perturbations on several real and artificial directed graphs. Even for graphs with a narrow distribution of node properties (e.g., degree or betweenness), a steady state is reached exhibiting a heterogeneous load distribution, having a difference of one order of magnitude between the highest and average loads. Unexpectedly we find for the European power grid and for finite Watts-Strogatz networks a broad pronounced bimodal distribution for the loads. To identify the most vulnerable nodes, we introduce the concept of node-basin size, a purely topological property which we show to be strongly correlated to the average load of a node.
Optical mapping of prefrontal brain connectivity and activation during emotion anticipation.
Wang, Meng-Yun; Lu, Feng-Mei; Hu, Zhishan; Zhang, Juan; Yuan, Zhen
2018-09-17
Accumulated neuroimaging evidence shows that the dorsal lateral prefrontal cortex (dlPFC) is activated during emotion anticipation. The aim of this work is to examine the brain connectivity and activation differences in dlPFC between the positive, neutral and negative emotion anticipation by using functional near-infrared spectroscopy (fNIRS). The hemodynamic responses were first assessed for all subjects during the performance of various emotion anticipation tasks. And then small-world analysis was performed, in which the small-world network indicators including the clustering coefficient, average path length, average node degree, and measure of small-world index were calculated for the functional brain networks associated with the positive, neutral and negative emotion anticipation, respectively. We discovered that compared to negative and neutral emotion anticipation, the positive one exhibited enhanced brain activation in the left dlPFC. Although the functional brain networks for the three emotion anticipation cases manifested the small-world properties regarding the clustering coefficient, average path length, average node degree, and measure of small-world index, the positive one showed significantly higher clustering coefficient and shorter average path length than those from the neutral and negative cases. Consequently, the small-world network indicators and brain activation in dlPPC were able to distinguish well between the positive, neutral and negative emotion anticipation. Copyright © 2018 Elsevier B.V. All rights reserved.
Exact sampling of graphs with prescribed degree correlations
NASA Astrophysics Data System (ADS)
Bassler, Kevin E.; Del Genio, Charo I.; Erdős, Péter L.; Miklós, István; Toroczkai, Zoltán
2015-08-01
Many real-world networks exhibit correlations between the node degrees. For instance, in social networks nodes tend to connect to nodes of similar degree and conversely, in biological and technological networks, high-degree nodes tend to be linked with low-degree nodes. Degree correlations also affect the dynamics of processes supported by a network structure, such as the spread of opinions or epidemics. The proper modelling of these systems, i.e., without uncontrolled biases, requires the sampling of networks with a specified set of constraints. We present a solution to the sampling problem when the constraints imposed are the degree correlations. In particular, we develop an exact method to construct and sample graphs with a specified joint-degree matrix, which is a matrix providing the number of edges between all the sets of nodes of a given degree, for all degrees, thus completely specifying all pairwise degree correlations, and additionally, the degree sequence itself. Our algorithm always produces independent samples without backtracking. The complexity of the graph construction algorithm is {O}({NM}) where N is the number of nodes and M is the number of edges.
Zealotry effects on opinion dynamics in the adaptive voter model
NASA Astrophysics Data System (ADS)
Klamser, Pascal P.; Wiedermann, Marc; Donges, Jonathan F.; Donner, Reik V.
2017-11-01
The adaptive voter model has been widely studied as a conceptual model for opinion formation processes on time-evolving social networks. Past studies on the effect of zealots, i.e., nodes aiming to spread their fixed opinion throughout the system, only considered the voter model on a static network. Here we extend the study of zealotry to the case of an adaptive network topology co-evolving with the state of the nodes and investigate opinion spreading induced by zealots depending on their initial density and connectedness. Numerical simulations reveal that below the fragmentation threshold a low density of zealots is sufficient to spread their opinion to the whole network. Beyond the transition point, zealots must exhibit an increased degree as compared to ordinary nodes for an efficient spreading of their opinion. We verify the numerical findings using a mean-field approximation of the model yielding a low-dimensional set of coupled ordinary differential equations. Our results imply that the spreading of the zealots' opinion in the adaptive voter model is strongly dependent on the link rewiring probability and the average degree of normal nodes in comparison with that of the zealots. In order to avoid a complete dominance of the zealots' opinion, there are two possible strategies for the remaining nodes: adjusting the probability of rewiring and/or the number of connections with other nodes, respectively.
Dennis, Emily L.; Jahanshad, Neda; Toga, Arthur W.; McMahon, Katie L.; de Zubicaray, Greig I.; Hickie, Ian; Wright, Margaret J.; Thompson, Paul M.
2014-01-01
The ‘rich club’ coefficient describes a phenomenon where a network's hubs (high-degree nodes) are on average more intensely interconnected than lower-degree nodes. Networks with rich clubs often have an efficient, higher-order organization, but we do not yet know how the rich club emerges in the living brain, or how it changes as our brain networks develop. Here we chart the developmental trajectory of the rich club in anatomical brain networks from 438 subjects aged 12-30. Cortical networks were constructed from 68×68 connectivity matrices of fiber density, using whole-brain tractography in 4-Tesla 105-gradient high angular resolution diffusion images (HARDI). The adult and younger cohorts had rich clubs that included different nodes; the rich club effect intensified with age. Rich-club organization is a sign of a network's efficiency and robustness. These concepts and findings may be advantageous for studying brain maturation and abnormal brain development. PMID:24827471
Seasonal air and water mass redistribution effects on LAGEOS and Starlette
NASA Technical Reports Server (NTRS)
Gutierrez, Roberto; Wilson, Clark R.
1987-01-01
Zonal geopotential coefficients have been computed from average seasonal variations in global air and water mass distribution. These coefficients are used to predict the seasonal variations of LAGEOS' and Starlette's orbital node, the node residual, and the seasonal variation in the 3rd degree zonal coefficient for Starlette. A comparison of these predictions with the observed values indicates that air pressure and, to a lesser extent, water storage may be responsible for a large portion of the currently unmodeled variation in the earth's gravity field.
NASA Astrophysics Data System (ADS)
Ikeda, Nobutoshi
2017-12-01
In network models that take into account growth properties, deletion of old nodes has a serious impact on degree distributions, because old nodes tend to become hub nodes. In this study, we aim to provide a simple explanation for why hubs can exist even in conditions where the number of nodes is stationary due to the deletion of old nodes. We show that an exponential increase in the degree of nodes is a natural consequence of the balance between the deletion and addition of nodes as long as a preferential attachment mechanism holds. As a result, the largest degree is determined by the magnitude relationship between the time scale of the exponential growth of degrees and lifetime of old nodes. The degree distribution exhibits a power-law form ˜ k -γ with exponent γ = 1 when the lifetime of nodes is constant. However, various values of γ can be realized by introducing distributed lifetime of nodes.
Exploring the evolutionary mechanism of complex supply chain systems using evolving hypergraphs
NASA Astrophysics Data System (ADS)
Suo, Qi; Guo, Jin-Li; Sun, Shiwei; Liu, Han
2018-01-01
A new evolutionary model is proposed to describe the characteristics and evolution pattern of supply chain systems using evolving hypergraphs, in which nodes represent enterprise entities while hyperedges represent the relationships among diverse trades. The nodes arrive at the system in accordance with a Poisson process, with the evolving process incorporating the addition of new nodes, linking of old nodes, and rewiring of links. Grounded in the Poisson process theory and continuum theory, the stationary average hyperdegree distribution is shown to follow a shifted power law (SPL), and the theoretical predictions are consistent with the results of numerical simulations. Testing the impact of parameters on the model yields a positive correlation between hyperdegree and degree. The model also uncovers macro characteristics of the relationships among enterprises due to the microscopic interactions among individuals.
Robustness of network of networks under targeted attack.
Dong, Gaogao; Gao, Jianxi; Du, Ruijin; Tian, Lixin; Stanley, H Eugene; Havlin, Shlomo
2013-05-01
The robustness of a network of networks (NON) under random attack has been studied recently [Gao et al., Phys. Rev. Lett. 107, 195701 (2011)]. Understanding how robust a NON is to targeted attacks is a major challenge when designing resilient infrastructures. We address here the question how the robustness of a NON is affected by targeted attack on high- or low-degree nodes. We introduce a targeted attack probability function that is dependent upon node degree and study the robustness of two types of NON under targeted attack: (i) a tree of n fully interdependent Erdős-Rényi or scale-free networks and (ii) a starlike network of n partially interdependent Erdős-Rényi networks. For any tree of n fully interdependent Erdős-Rényi networks and scale-free networks under targeted attack, we find that the network becomes significantly more vulnerable when nodes of higher degree have higher probability to fail. When the probability that a node will fail is proportional to its degree, for a NON composed of Erdős-Rényi networks we find analytical solutions for the mutual giant component P(∞) as a function of p, where 1-p is the initial fraction of failed nodes in each network. We also find analytical solutions for the critical fraction p(c), which causes the fragmentation of the n interdependent networks, and for the minimum average degree k[over ¯](min) below which the NON will collapse even if only a single node fails. For a starlike NON of n partially interdependent Erdős-Rényi networks under targeted attack, we find the critical coupling strength q(c) for different n. When q>q(c), the attacked system undergoes an abrupt first order type transition. When q≤q(c), the system displays a smooth second order percolation transition. We also evaluate how the central network becomes more vulnerable as the number of networks with the same coupling strength q increases. The limit of q=0 represents no dependency, and the results are consistent with the classical percolation theory of a single network under targeted attack.
Protograph LDPC Codes with Node Degrees at Least 3
NASA Technical Reports Server (NTRS)
Divsalar, Dariush; Jones, Christopher
2006-01-01
In this paper we present protograph codes with a small number of degree-3 nodes and one high degree node. The iterative decoding threshold for proposed rate 1/2 codes are lower, by about 0.2 dB, than the best known irregular LDPC codes with degree at least 3. The main motivation is to gain linear minimum distance to achieve low error floor. Also to construct rate-compatible protograph-based LDPC codes for fixed block length that simultaneously achieves low iterative decoding threshold and linear minimum distance. We start with a rate 1/2 protograph LDPC code with degree-3 nodes and one high degree node. Higher rate codes are obtained by connecting check nodes with degree-2 non-transmitted nodes. This is equivalent to constraint combining in the protograph. The condition where all constraints are combined corresponds to the highest rate code. This constraint must be connected to nodes of degree at least three for the graph to have linear minimum distance. Thus having node degree at least 3 for rate 1/2 guarantees linear minimum distance property to be preserved for higher rates. Through examples we show that the iterative decoding threshold as low as 0.544 dB can be achieved for small protographs with node degrees at least three. A family of low- to high-rate codes with minimum distance linearly increasing in block size and with capacity-approaching performance thresholds is presented. FPGA simulation results for a few example codes show that the proposed codes perform as predicted.
Improved targeted immunization strategies based on two rounds of selection
NASA Astrophysics Data System (ADS)
Xia, Ling-Ling; Song, Yu-Rong; Li, Chan-Chan; Jiang, Guo-Ping
2018-04-01
In the case of high degree targeted immunization where the number of vaccine is limited, when more than one node associated with the same degree meets the requirement of high degree centrality, how can we choose a certain number of nodes from those nodes, so that the number of immunized nodes will not exceed the limit? In this paper, we introduce a new idea derived from the selection process of second-round exam to solve this problem and then propose three improved targeted immunization strategies. In these proposed strategies, the immunized nodes are selected through two rounds of selection, where we increase the quotas of first-round selection according the evaluation criterion of degree centrality and then consider another characteristic parameter of node, such as node's clustering coefficient, betweenness and closeness, to help choose targeted nodes in the second-round selection. To validate the effectiveness of the proposed strategies, we compare them with the degree immunizations including the high degree targeted and the high degree adaptive immunizations using two metrics: the size of the largest connected component of immunized network and the number of infected nodes. Simulation results demonstrate that the proposed strategies based on two rounds of sorting are effective for heterogeneous networks and their immunization effects are better than that of the degree immunizations.
The robustness of multiplex networks under layer node-based attack
Zhao, Da-wei; Wang, Lian-hai; Zhi, Yong-feng; Zhang, Jun; Wang, Zhen
2016-01-01
From transportation networks to complex infrastructures, and to social and economic networks, a large variety of systems can be described in terms of multiplex networks formed by a set of nodes interacting through different network layers. Network robustness, as one of the most successful application areas of complex networks, has attracted great interest in a myriad of research realms. In this regard, how multiplex networks respond to potential attack is still an open issue. Here we study the robustness of multiplex networks under layer node-based random or targeted attack, which means that nodes just suffer attacks in a given layer yet no additional influence to their connections beyond this layer. A theoretical analysis framework is proposed to calculate the critical threshold and the size of giant component of multiplex networks when nodes are removed randomly or intentionally. Via numerous simulations, it is unveiled that the theoretical method can accurately predict the threshold and the size of giant component, irrespective of attack strategies. Moreover, we also compare the robustness of multiplex networks under multiplex node-based attack and layer node-based attack, and find that layer node-based attack makes multiplex networks more vulnerable, regardless of average degree and underlying topology. PMID:27075870
The robustness of multiplex networks under layer node-based attack.
Zhao, Da-wei; Wang, Lian-hai; Zhi, Yong-feng; Zhang, Jun; Wang, Zhen
2016-04-14
From transportation networks to complex infrastructures, and to social and economic networks, a large variety of systems can be described in terms of multiplex networks formed by a set of nodes interacting through different network layers. Network robustness, as one of the most successful application areas of complex networks, has attracted great interest in a myriad of research realms. In this regard, how multiplex networks respond to potential attack is still an open issue. Here we study the robustness of multiplex networks under layer node-based random or targeted attack, which means that nodes just suffer attacks in a given layer yet no additional influence to their connections beyond this layer. A theoretical analysis framework is proposed to calculate the critical threshold and the size of giant component of multiplex networks when nodes are removed randomly or intentionally. Via numerous simulations, it is unveiled that the theoretical method can accurately predict the threshold and the size of giant component, irrespective of attack strategies. Moreover, we also compare the robustness of multiplex networks under multiplex node-based attack and layer node-based attack, and find that layer node-based attack makes multiplex networks more vulnerable, regardless of average degree and underlying topology.
Modelling students' knowledge organisation: Genealogical conceptual networks
NASA Astrophysics Data System (ADS)
Koponen, Ismo T.; Nousiainen, Maija
2018-04-01
Learning scientific knowledge is largely based on understanding what are its key concepts and how they are related. The relational structure of concepts also affects how concepts are introduced in teaching scientific knowledge. We model here how students organise their knowledge when they represent their understanding of how physics concepts are related. The model is based on assumptions that students use simple basic linking-motifs in introducing new concepts and mostly relate them to concepts that were introduced a few steps earlier, i.e. following a genealogical ordering. The resulting genealogical networks have relatively high local clustering coefficients of nodes but otherwise resemble networks obtained with an identical degree distribution of nodes but with random linking between them (i.e. the configuration-model). However, a few key nodes having a special structural role emerge and these nodes have a higher than average communicability betweenness centralities. These features agree with the empirically found properties of students' concept networks.
Complex networks repair strategies: Dynamic models
NASA Astrophysics Data System (ADS)
Fu, Chaoqi; Wang, Ying; Gao, Yangjun; Wang, Xiaoyang
2017-09-01
Network repair strategies are tactical methods that restore the efficiency of damaged networks; however, unreasonable repair strategies not only waste resources, they are also ineffective for network recovery. Most extant research on network repair focuses on static networks, but results and findings on static networks cannot be applied to evolutionary dynamic networks because, in dynamic models, complex network repair has completely different characteristics. For instance, repaired nodes face more severe challenges, and require strategic repair methods in order to have a significant effect. In this study, we propose the Shell Repair Strategy (SRS) to minimize the risk of secondary node failures due to the cascading effect. Our proposed method includes the identification of a set of vital nodes that have a significant impact on network repair and defense. Our identification of these vital nodes reduces the number of switching nodes that face the risk of secondary failures during the dynamic repair process. This is positively correlated with the size of the average degree 〈 k 〉 and enhances network invulnerability.
Axelrod's Metanorm Games on Networks
Galán, José M.; Łatek, Maciej M.; Rizi, Seyed M. Mussavi
2011-01-01
Metanorms is a mechanism proposed to promote cooperation in social dilemmas. Recent experimental results show that network structures that underlie social interactions influence the emergence of norms that promote cooperation. We generalize Axelrod's analysis of metanorms dynamics to interactions unfolding on networks through simulation and mathematical modeling. Network topology strongly influences the effectiveness of the metanorms mechanism in establishing cooperation. In particular, we find that average degree, clustering coefficient and the average number of triplets per node play key roles in sustaining or collapsing cooperation. PMID:21655211
Smoluchowski Equation for Networks: Merger Induced Intermittent Giant Node Formation and Degree Gap
NASA Astrophysics Data System (ADS)
Goto, Hayato; Viegas, Eduardo; Jensen, Henrik Jeldtoft; Takayasu, Hideki; Takayasu, Misako
2018-06-01
The dynamical phase diagram of a network undergoing annihilation, creation, and coagulation of nodes is found to exhibit two regimes controlled by the combined effect of preferential attachment for initiator and target nodes during coagulation and for link assignment to new nodes. The first regime exhibits smooth dynamics and power law degree distributions. In the second regime, giant degree nodes and gaps in the degree distribution are formed intermittently. Data for the Japanese firm network in 1994 and 2014 suggests that this network is moving towards the intermittent switching region.
Eradicating catastrophic collapse in interdependent networks via reinforced nodes
Yuan, Xin; Hu, Yanqing; Havlin, Shlomo
2017-01-01
In interdependent networks, it is usually assumed, based on percolation theory, that nodes become nonfunctional if they lose connection to the network giant component. However, in reality, some nodes, equipped with alternative resources, together with their connected neighbors can still be functioning after disconnected from the giant component. Here, we propose and study a generalized percolation model that introduces a fraction of reinforced nodes in the interdependent networks that can function and support their neighborhood. We analyze, both analytically and via simulations, the order parameter—the functioning component—comprising both the giant component and smaller components that include at least one reinforced node. Remarkably, it is found that, for interdependent networks, we need to reinforce only a small fraction of nodes to prevent abrupt catastrophic collapses. Moreover, we find that the universal upper bound of this fraction is 0.1756 for two interdependent Erdős–Rényi (ER) networks: regular random (RR) networks and scale-free (SF) networks with large average degrees. We also generalize our theory to interdependent networks of networks (NONs). These findings might yield insight for designing resilient interdependent infrastructure networks. PMID:28289204
A bipartite graph of Neuroendocrine System
NASA Astrophysics Data System (ADS)
Guo, Zhong-Wei; Zou, Sheng-Rong; Peng, Yu-Jing; Zhou, Ta; Gu, Chang-Gui; He, Da-Ren
2008-03-01
We present an empirical investigation on the neuroendocrine system and suggest describe it by a bipartite graph. In the net the cells can be regarded as collaboration acts and the mediators can be regarded as collaboration actors. The act degree stands for the number of the cells that secrete a single mediator. Among them bFGF (the basic fibroblast growth factor) has the largest node act degree. It is the most important mitogenic cytokine, followed by TGF-beta, IL-6, IL1-beta, VEGF, IGF-1and so on. They are critical in neuroendocrine system to maintain bodily healthiness, emotional stabilization and endocrine harmony. The act degree distribution shows a shifted power law (SPL) function forms [1]. The average act degree of neuroendocrine network is h=3.01, It means that each mediator is secreted by three cells on average. The similarity, which stands for the average probability of secreting the same mediators by all neuroendocrine cells, is observed as s=0.14. Our results may be used in the research of the medical treatment of neuroendocrine diseases. [1] Assortativity and act degree distribution of some collaboration networks, Hui Chang, Bei-Bei Su, Yue-Ping Zhou, Daren He, Physica A, 383 (2007) 687-702
Patel, Priya; Wada, Hironobu; Hu, Hsin-Pei; Hirohashi, Kentaro; Kato, Tatsuya; Ujiie, Hideki; Ahn, Jin Young; Lee, Daiyoon; Geddie, William; Yasufuku, Kazuhiro
2017-04-01
Endobronchial ultrasonography (EBUS)-guided transbronchial needle aspiration allows for sampling of mediastinal lymph nodes. The external diameter, rigidity, and angulation of the convex probe EBUS renders limited accessibility. This study compares the accessibility and transbronchial needle aspiration capability of the prototype thin convex probe EBUS against the convex probe EBUS in human ex vivo lungs rejected for transplant. The prototype thin convex probe EBUS (BF-Y0055; Olympus, Tokyo, Japan) with a thinner tip (5.9 mm), greater upward angle (170 degrees), and decreased forward oblique direction of view (20 degrees) was compared with the current convex probe EBUS (6.9-mm tip, 120 degrees, and 35 degrees, respectively). Accessibility and transbronchial needle aspiration capability was assessed in ex vivo human lungs declined for lung transplant. The distance of maximum reach and sustainable endoscopic limit were measured. Transbronchial needle aspiration capability was assessed using the prototype 25G aspiration needle in segmental lymph nodes. In all evaluated lungs (n = 5), the thin convex probe EBUS demonstrated greater reach and a higher success rate, averaging 22.1 mm greater maximum reach and 10.3 mm further endoscopic visibility range than convex probe EBUS, and could assess selectively almost all segmental bronchi (98% right, 91% left), demonstrating nearly twice the accessibility as the convex probe EBUS (48% right, 47% left). The prototype successfully enabled cytologic assessment of subsegmental lymph nodes with adequate quality using the dedicated 25G aspiration needle. Thin convex probe EBUS has greater accessibility to peripheral airways in human lungs and is capable of sampling segmental lymph nodes using the aspiration needle. That will allow for more precise assessment of N1 nodes and, possibly, intrapulmonary lesions normally inaccessible to the conventional convex probe EBUS. Copyright © 2017 The Society of Thoracic Surgeons. Published by Elsevier Inc. All rights reserved.
Chen, Yi-Ting; Horng, Mong-Fong; Lo, Chih-Cheng; Chu, Shu-Chuan; Pan, Jeng-Shyang; Liao, Bin-Yih
2013-03-20
Transmission power optimization is the most significant factor in prolonging the lifetime and maintaining the connection quality of wireless sensor networks. Un-optimized transmission power of nodes either interferes with or fails to link neighboring nodes. The optimization of transmission power depends on the expected node degree and node distribution. In this study, an optimization approach to an energy-efficient and full reachability wireless sensor network is proposed. In the proposed approach, an adjustment model of the transmission range with a minimum node degree is proposed that focuses on topology control and optimization of the transmission range according to node degree and node density. The model adjusts the tradeoff between energy efficiency and full reachability to obtain an ideal transmission range. In addition, connectivity and reachability are used as performance indices to evaluate the connection quality of a network. The two indices are compared to demonstrate the practicability of framework through simulation results. Furthermore, the relationship between the indices under the conditions of various node degrees is analyzed to generalize the characteristics of node densities. The research results on the reliability and feasibility of the proposed approach will benefit the future real deployments.
Chen, Yi-Ting; Horng, Mong-Fong; Lo, Chih-Cheng; Chu, Shu-Chuan; Pan, Jeng-Shyang; Liao, Bin-Yih
2013-01-01
Transmission power optimization is the most significant factor in prolonging the lifetime and maintaining the connection quality of wireless sensor networks. Un-optimized transmission power of nodes either interferes with or fails to link neighboring nodes. The optimization of transmission power depends on the expected node degree and node distribution. In this study, an optimization approach to an energy-efficient and full reachability wireless sensor network is proposed. In the proposed approach, an adjustment model of the transmission range with a minimum node degree is proposed that focuses on topology control and optimization of the transmission range according to node degree and node density. The model adjusts the tradeoff between energy efficiency and full reachability to obtain an ideal transmission range. In addition, connectivity and reachability are used as performance indices to evaluate the connection quality of a network. The two indices are compared to demonstrate the practicability of framework through simulation results. Furthermore, the relationship between the indices under the conditions of various node degrees is analyzed to generalize the characteristics of node densities. The research results on the reliability and feasibility of the proposed approach will benefit the future real deployments. PMID:23519351
A 4-node assumed-stress hybrid shell element with rotational degrees of freedom
NASA Technical Reports Server (NTRS)
Aminpour, Mohammad A.
1990-01-01
An assumed-stress hybrid/mixed 4-node quadrilateral shell element is introduced that alleviates most of the deficiencies associated with such elements. The formulation of the element is based on the assumed-stress hybrid/mixed method using the Hellinger-Reissner variational principle. The membrane part of the element has 12 degrees of freedom including rotational or drilling degrees of freedom at the nodes. The bending part of the element also has 12 degrees of freedom. The bending part of the element uses the Reissner-Mindlin plate theory which takes into account the transverse shear contributions. The element formulation is derived from an 8-node isoparametric element. This process is accomplished by assuming quadratic variations for both in-plane and out-of-plane displacement fields and linear variations for both in-plane and out-of-plane rotation fields along the edges of the element. In addition, the degrees of freedom at midside nodes are approximated in terms of the degrees of freedom at corner nodes. During this process the rotational degrees of freedom at the corner nodes enter into the formulation of the element. The stress field are expressed in the element natural-coordinate system such that the element remains invariant with respect to node numbering.
On the topology of the world exchange arrangements web
NASA Astrophysics Data System (ADS)
Li, Xiang; Jin, Yu Ying; Chen, Guanrong
2004-11-01
Exchange arrangements among different countries over the world are foundations of the world economy, which generally stand behind the daily economic evolution. As the first study of the world exchange arrangements web (WEAW), we built a bipartite network with countries as one type of nodes and currencies as the other, and found it to have a prominent scale-free feature with a power-law degree distribution. In a further empirical study of the currency section of the WEAW, we calculated the clustering coefficients, average nearest-neighbors degree, and average shortest distance. As an essential economic network, the WEAW is found to be a correlated disassortative network with a hierarchical structure, possessing a more prominent scale-free feature than the world trade web (WTW).
Improvement of the SEP protocol based on community structure of node degree
NASA Astrophysics Data System (ADS)
Li, Donglin; Wei, Suyuan
2017-05-01
Analyzing the Stable election protocol (SEP) in wireless sensor networks and aiming at the problem of inhomogeneous cluster-heads distribution and unreasonable cluster-heads selectivity and single hop transmission in the SEP, a SEP Protocol based on community structure of node degree (SEP-CSND) is proposed. In this algorithm, network node deployed by using grid deployment model, and the connection between nodes established by setting up the communication threshold. The community structure constructed by node degree, then cluster head is elected in the community structure. On the basis of SEP, the node's residual energy and node degree is added in cluster-heads election. The information is transmitted with mode of multiple hops between network nodes. The simulation experiments showed that compared to the classical LEACH and SEP, this algorithm balances the energy consumption of the entire network and significantly prolongs network lifetime.
Fast sparsely synchronized brain rhythms in a scale-free neural network
NASA Astrophysics Data System (ADS)
Kim, Sang-Yoon; Lim, Woochang
2015-08-01
We consider a directed version of the Barabási-Albert scale-free network model with symmetric preferential attachment with the same in- and out-degrees and study the emergence of sparsely synchronized rhythms for a fixed attachment degree in an inhibitory population of fast-spiking Izhikevich interneurons. Fast sparsely synchronized rhythms with stochastic and intermittent neuronal discharges are found to appear for large values of J (synaptic inhibition strength) and D (noise intensity). For an intensive study we fix J at a sufficiently large value and investigate the population states by increasing D . For small D , full synchronization with the same population-rhythm frequency fp and mean firing rate (MFR) fi of individual neurons occurs, while for large D partial synchronization with fp>
Scale-free networks which are highly assortative but not small world
NASA Astrophysics Data System (ADS)
Small, Michael; Xu, Xiaoke; Zhou, Jin; Zhang, Jie; Sun, Junfeng; Lu, Jun-An
2008-06-01
Uncorrelated scale-free networks are necessarily small world (and, in fact, smaller than small world). Nonetheless, for scale-free networks with correlated degree distribution this may not be the case. We describe a mechanism to generate highly assortative scale-free networks which are not small world. We show that it is possible to generate scale-free networks, with arbitrary degree exponent γ>1 , such that the average distance between nodes in the network is large. To achieve this, nodes are not added to the network with preferential attachment. Instead, we greedily optimize the assortativity of the network. The network generation scheme is physically motivated, and we show that the recently observed global network of Avian Influenza outbreaks arises through a mechanism similar to what we present here. Simulations show that this network exhibits very similar physical characteristics (very high assortativity, clustering, and path length).
Kim, Sang-Yoon; Lim, Woochang
2016-07-01
We investigate the effect of network architecture on burst and spike synchronization in a directed scale-free network (SFN) of bursting neurons, evolved via two independent α- and β-processes. The α-process corresponds to a directed version of the Barabási-Albert SFN model with growth and preferential attachment, while for the β-process only preferential attachments between pre-existing nodes are made without addition of new nodes. We first consider the "pure" α-process of symmetric preferential attachment (with the same in- and out-degrees), and study emergence of burst and spike synchronization by varying the coupling strength J and the noise intensity D for a fixed attachment degree. Characterizations of burst and spike synchronization are also made by employing realistic order parameters and statistical-mechanical measures. Next, we choose appropriate values of J and D where only burst synchronization occurs, and investigate the effect of the scale-free connectivity on the burst synchronization by varying (1) the symmetric attachment degree and (2) the asymmetry parameter (representing deviation from the symmetric case) in the α-process, and (3) the occurrence probability of the β-process. In all these three cases, changes in the type and the degree of population synchronization are studied in connection with the network topology such as the degree distribution, the average path length Lp, and the betweenness centralization Bc. It is thus found that just taking into consideration Lp and Bc (affecting global communication between nodes) is not sufficient to understand emergence of population synchronization in SFNs, but in addition to them, the in-degree distribution (affecting individual dynamics) must also be considered to fully understand for the effective population synchronization. Copyright © 2016 Elsevier Ltd. All rights reserved.
Topology-dependent rationality and quantal response equilibria in structured populations
NASA Astrophysics Data System (ADS)
Roman, Sabin; Brede, Markus
2017-05-01
Given that the assumption of perfect rationality is rarely met in the real world, we explore a graded notion of rationality in socioecological systems of networked actors. We parametrize an actors' rationality via their place in a social network and quantify system rationality via the average Jensen-Shannon divergence between the games Nash and logit quantal response equilibria. Previous work has argued that scale-free topologies maximize a system's overall rationality in this setup. Here we show that while, for certain games, it is true that increasing degree heterogeneity of complex networks enhances rationality, rationality-optimal configurations are not scale-free. For the Prisoner's Dilemma and Stag Hunt games, we provide analytic arguments complemented by numerical optimization experiments to demonstrate that core-periphery networks composed of a few dominant hub nodes surrounded by a periphery of very low degree nodes give strikingly smaller overall deviations from rationality than scale-free networks. Similarly, for the Battle of the Sexes and the Matching Pennies games, we find that the optimal network structure is also a core-periphery graph but with a smaller difference in the average degrees of the core and the periphery. These results provide insight on the interplay between the topological structure of socioecological systems and their collective cognitive behavior, with potential applications to understanding wealth inequality and the structural features of the network of global corporate control.
Topology-dependent rationality and quantal response equilibria in structured populations.
Roman, Sabin; Brede, Markus
2017-05-01
Given that the assumption of perfect rationality is rarely met in the real world, we explore a graded notion of rationality in socioecological systems of networked actors. We parametrize an actors' rationality via their place in a social network and quantify system rationality via the average Jensen-Shannon divergence between the games Nash and logit quantal response equilibria. Previous work has argued that scale-free topologies maximize a system's overall rationality in this setup. Here we show that while, for certain games, it is true that increasing degree heterogeneity of complex networks enhances rationality, rationality-optimal configurations are not scale-free. For the Prisoner's Dilemma and Stag Hunt games, we provide analytic arguments complemented by numerical optimization experiments to demonstrate that core-periphery networks composed of a few dominant hub nodes surrounded by a periphery of very low degree nodes give strikingly smaller overall deviations from rationality than scale-free networks. Similarly, for the Battle of the Sexes and the Matching Pennies games, we find that the optimal network structure is also a core-periphery graph but with a smaller difference in the average degrees of the core and the periphery. These results provide insight on the interplay between the topological structure of socioecological systems and their collective cognitive behavior, with potential applications to understanding wealth inequality and the structural features of the network of global corporate control.
An Analytical Framework for Fast Estimation of Capacity and Performance in Communication Networks
2012-01-25
standard random graph (due to Erdos- Renyi ) in the regime where the average degrees remain fixed (and above 1) and the number of nodes get large, is not...abs/1010.3305 (Oct 2010). [6] O. Narayan, I. Saniee, G. H. Tucci, “Lack of Spectral Gap and Hyperbolicity in Asymptotic Erdös- Renyi Random Graphs
Growing optimal scale-free networks via likelihood
NASA Astrophysics Data System (ADS)
Small, Michael; Li, Yingying; Stemler, Thomas; Judd, Kevin
2015-04-01
Preferential attachment, by which new nodes attach to existing nodes with probability proportional to the existing nodes' degree, has become the standard growth model for scale-free networks, where the asymptotic probability of a node having degree k is proportional to k-γ. However, the motivation for this model is entirely ad hoc. We use exact likelihood arguments and show that the optimal way to build a scale-free network is to attach most new links to nodes of low degree. Curiously, this leads to a scale-free network with a single dominant hub: a starlike structure we call a superstar network. Asymptotically, the optimal strategy is to attach each new node to one of the nodes of degree k with probability proportional to 1/N +ζ (γ ) (k+1 ) γ (in a N node network): a stronger bias toward high degree nodes than exhibited by standard preferential attachment. Our algorithm generates optimally scale-free networks (the superstar networks) as well as randomly sampling the space of all scale-free networks with a given degree exponent γ . We generate viable realization with finite N for 1 ≪γ <2 as well as γ >2 . We observe an apparently discontinuous transition at γ ≈2 between so-called superstar networks and more treelike realizations. Gradually increasing γ further leads to reemergence of a superstar hub. To quantify these structural features, we derive a new analytic expression for the expected degree exponent of a pure preferential attachment process and introduce alternative measures of network entropy. Our approach is generic and can also be applied to an arbitrary degree distribution.
Nonlinear Dynamic Responses of Composite Rotor Blades
1988-08-01
models. QHD40 is an eight-noded plate element with seven degrees of freedom (three midsurface displacements, two rotations and two higher order terms for...in-plane displacements) per corner node and three degrees of freedom (transverse midsurface displacement and two rotations) per mid-state node. QHD48...and QHD48S are eight-noded plate and shell elements respectively, with six degrees of freedom (three midsurface displacements and three rotations
Value of peripheral nodes in controlling multilayer scale-free networks
NASA Astrophysics Data System (ADS)
Zhang, Yan; Garas, Antonios; Schweitzer, Frank
2016-01-01
We analyze the controllability of a two-layer network, where driver nodes can be chosen randomly only from one layer. Each layer contains a scale-free network with directed links and the node dynamics depends on the incoming links from other nodes. We combine the in-degree and out-degree values to assign an importance value w to each node, and distinguish between peripheral nodes with low w and central nodes with high w . Based on numerical simulations, we find that the controllable part of the network is larger when choosing low w nodes to connect the two layers. The control is as efficient when peripheral nodes are driver nodes as it is for the case of more central nodes. However, if we assume a cost to utilize nodes that is proportional to their overall degree, utilizing peripheral nodes to connect the two layers or to act as driver nodes is not only the most cost-efficient solution, it is also the one that performs best in controlling the two-layer network among the different interconnecting strategies we have tested.
Enhancement of large fluctuations to extinction in adaptive networks
NASA Astrophysics Data System (ADS)
Hindes, Jason; Schwartz, Ira B.; Shaw, Leah B.
2018-01-01
During an epidemic, individual nodes in a network may adapt their connections to reduce the chance of infection. A common form of adaption is avoidance rewiring, where a noninfected node breaks a connection to an infected neighbor and forms a new connection to another noninfected node. Here we explore the effects of such adaptivity on stochastic fluctuations in the susceptible-infected-susceptible model, focusing on the largest fluctuations that result in extinction of infection. Using techniques from large-deviation theory, combined with a measurement of heterogeneity in the susceptible degree distribution at the endemic state, we are able to predict and analyze large fluctuations and extinction in adaptive networks. We find that in the limit of small rewiring there is a sharp exponential reduction in mean extinction times compared to the case of zero adaption. Furthermore, we find an exponential enhancement in the probability of large fluctuations with increased rewiring rate, even when holding the average number of infected nodes constant.
Amano, Sun-Ichi; Ogawa, Ken-Ichiro; Miyake, Yoshihiro
2018-05-31
Weighted networks have been extensively studied because they can represent various phenomena in which the diversity of edges is essential. To investigate the properties of weighted networks, various centrality measures have been proposed, such as strength, weighted clustering coefficients, and weighted betweenness centrality. In such measures, only direct connections or entire network connectivity from arbitrary nodes have been used to calculate the connectivity of each node. However, in weighted networks composed of autonomous elements such as humans, middle ranges from each node are also considered to be meaningful for characterizing each node's connectability. In this study, we define a new node property in weighted networks to consider connectability to nodes within a range of two degrees of separation, then apply this new centrality to face-to-face human communication networks in corporate organizations. Our results show that the proposed centrality distinguishes inherent communities corresponding to the job types in each organization with a high degree of accuracy. This indicates the possibility that connectability to nodes within two degrees of separation reveals potential trends of weighted networks that are not apparent from conventional measures.
Core-periphery structure requires something else in the network
NASA Astrophysics Data System (ADS)
Kojaku, Sadamori; Masuda, Naoki
2018-04-01
A network with core-periphery structure consists of core nodes that are densely interconnected. In contrast to a community structure, which is a different meso-scale structure of networks, core nodes can be connected to peripheral nodes and peripheral nodes are not densely interconnected. Although core-periphery structure sounds reasonable, we argue that it is merely accounted for by heterogeneous degree distributions, if one partitions a network into a single core block and a single periphery block, which the famous Borgatti–Everett algorithm and many succeeding algorithms assume. In other words, there is a strong tendency that high-degree and low-degree nodes are judged to be core and peripheral nodes, respectively. To discuss core-periphery structure beyond the expectation of the node’s degree (as described by the configuration model), we propose that one needs to assume at least one block of nodes apart from the focal core-periphery structure, such as a different core-periphery pair, community or nodes not belonging to any meso-scale structure. We propose a scalable algorithm to detect pairs of core and periphery in networks, controlling for the effect of the node’s degree. We illustrate our algorithm using various empirical networks.
Protograph based LDPC codes with minimum distance linearly growing with block size
NASA Technical Reports Server (NTRS)
Divsalar, Dariush; Jones, Christopher; Dolinar, Sam; Thorpe, Jeremy
2005-01-01
We propose several LDPC code constructions that simultaneously achieve good threshold and error floor performance. Minimum distance is shown to grow linearly with block size (similar to regular codes of variable degree at least 3) by considering ensemble average weight enumerators. Our constructions are based on projected graph, or protograph, structures that support high-speed decoder implementations. As with irregular ensembles, our constructions are sensitive to the proportion of degree-2 variable nodes. A code with too few such nodes tends to have an iterative decoding threshold that is far from the capacity threshold. A code with too many such nodes tends to not exhibit a minimum distance that grows linearly in block length. In this paper we also show that precoding can be used to lower the threshold of regular LDPC codes. The decoding thresholds of the proposed codes, which have linearly increasing minimum distance in block size, outperform that of regular LDPC codes. Furthermore, a family of low to high rate codes, with thresholds that adhere closely to their respective channel capacity thresholds, is presented. Simulation results for a few example codes show that the proposed codes have low error floors as well as good threshold SNFt performance.
An analysis of herding behavior in security analysts’ networks
NASA Astrophysics Data System (ADS)
Zhao, Zheng; Zhang, YongJie; Feng, Xu; Zhang, Wei
2014-11-01
In this paper, we build undirected weighted networks to study herding behavior among analysts and to analyze the characteristics and the structure of these networks. We then construct a new indicator based on the average degree of nodes and the average weighted clustering coefficient to research the various types of herding behavior. Our findings suggest that every industry has, to a certain degree, herding behavior among analysts. While there is obvious uninformed herding behavior in real estate and certain other industries, industries such as mining and nonferrous metals have informed herding behavior caused by analysts’ similar reactions to public information. Furthermore, we relate the two types of herding behavior to stock price and find that uninformed herding behavior has a positive effect on market prices, whereas informed herding behavior has a negative effect.
A New Measure of Centrality for Brain Networks
Joyce, Karen E.; Laurienti, Paul J.; Burdette, Jonathan H.; Hayasaka, Satoru
2010-01-01
Recent developments in network theory have allowed for the study of the structure and function of the human brain in terms of a network of interconnected components. Among the many nodes that form a network, some play a crucial role and are said to be central within the network structure. Central nodes may be identified via centrality metrics, with degree, betweenness, and eigenvector centrality being three of the most popular measures. Degree identifies the most connected nodes, whereas betweenness centrality identifies those located on the most traveled paths. Eigenvector centrality considers nodes connected to other high degree nodes as highly central. In the work presented here, we propose a new centrality metric called leverage centrality that considers the extent of connectivity of a node relative to the connectivity of its neighbors. The leverage centrality of a node in a network is determined by the extent to which its immediate neighbors rely on that node for information. Although similar in concept, there are essential differences between eigenvector and leverage centrality that are discussed in this manuscript. Degree, betweenness, eigenvector, and leverage centrality were compared using functional brain networks generated from healthy volunteers. Functional cartography was also used to identify neighborhood hubs (nodes with high degree within a network neighborhood). Provincial hubs provide structure within the local community, and connector hubs mediate connections between multiple communities. Leverage proved to yield information that was not captured by degree, betweenness, or eigenvector centrality and was more accurate at identifying neighborhood hubs. We propose that this metric may be able to identify critical nodes that are highly influential within the network. PMID:20808943
Construction of Protograph LDPC Codes with Linear Minimum Distance
NASA Technical Reports Server (NTRS)
Divsalar, Dariush; Dolinar, Sam; Jones, Christopher
2006-01-01
A construction method for protograph-based LDPC codes that simultaneously achieve low iterative decoding threshold and linear minimum distance is proposed. We start with a high-rate protograph LDPC code with variable node degrees of at least 3. Lower rate codes are obtained by splitting check nodes and connecting them by degree-2 nodes. This guarantees the linear minimum distance property for the lower-rate codes. Excluding checks connected to degree-1 nodes, we show that the number of degree-2 nodes should be at most one less than the number of checks for the protograph LDPC code to have linear minimum distance. Iterative decoding thresholds are obtained by using the reciprocal channel approximation. Thresholds are lowered by using either precoding or at least one very high-degree node in the base protograph. A family of high- to low-rate codes with minimum distance linearly increasing in block size and with capacity-approaching performance thresholds is presented. FPGA simulation results for a few example codes show that the proposed codes perform as predicted.
Scaling and correlations in three bus-transport networks of China
NASA Astrophysics Data System (ADS)
Xu, Xinping; Hu, Junhui; Liu, Feng; Liu, Lianshou
2007-01-01
We report the statistical properties of three bus-transport networks (BTN) in three different cities of China. These networks are composed of a set of bus lines and stations serviced by these. Network properties, including the degree distribution, clustering and average path length are studied in different definitions of network topology. We explore scaling laws and correlations that may govern intrinsic features of such networks. Besides, we create a weighted network representation for BTN with lines mapped to nodes and number of common stations to weights between lines. In such a representation, the distributions of degree, strength and weight are investigated. A linear behavior between strength and degree s(k)∼k is also observed.
Generalized friendship paradox in complex networks: The case of scientific collaboration
NASA Astrophysics Data System (ADS)
Eom, Young-Ho; Jo, Hang-Hyun
2014-04-01
The friendship paradox states that your friends have on average more friends than you have. Does the paradox ``hold'' for other individual characteristics like income or happiness? To address this question, we generalize the friendship paradox for arbitrary node characteristics in complex networks. By analyzing two coauthorship networks of Physical Review journals and Google Scholar profiles, we find that the generalized friendship paradox (GFP) holds at the individual and network levels for various characteristics, including the number of coauthors, the number of citations, and the number of publications. The origin of the GFP is shown to be rooted in positive correlations between degree and characteristics. As a fruitful application of the GFP, we suggest effective and efficient sampling methods for identifying high characteristic nodes in large-scale networks. Our study on the GFP can shed lights on understanding the interplay between network structure and node characteristics in complex networks.
Generalized friendship paradox in complex networks: The case of scientific collaboration
Eom, Young-Ho; Jo, Hang-Hyun
2014-01-01
The friendship paradox states that your friends have on average more friends than you have. Does the paradox “hold” for other individual characteristics like income or happiness? To address this question, we generalize the friendship paradox for arbitrary node characteristics in complex networks. By analyzing two coauthorship networks of Physical Review journals and Google Scholar profiles, we find that the generalized friendship paradox (GFP) holds at the individual and network levels for various characteristics, including the number of coauthors, the number of citations, and the number of publications. The origin of the GFP is shown to be rooted in positive correlations between degree and characteristics. As a fruitful application of the GFP, we suggest effective and efficient sampling methods for identifying high characteristic nodes in large-scale networks. Our study on the GFP can shed lights on understanding the interplay between network structure and node characteristics in complex networks. PMID:24714092
Traffic placement policies for a multi-band network
NASA Technical Reports Server (NTRS)
Maly, Kurt J.; Foudriat, E. C.; Game, David; Mukkamala, R.; Overstreet, C. Michael
1990-01-01
Recently protocols were introduced that enable the integration of synchronous traffic (voice or video) and asynchronous traffic (data) and extend the size of local area networks without loss in speed or capacity. One of these is DRAMA, a multiband protocol based on broadband technology. It provides dynamic allocation of bandwidth among clusters of nodes in the total network. A number of traffic placement policies for such networks are proposed and evaluated. Metrics used for performance evaluation include average network access delay, degree of fairness of access among the nodes, and network throughput. The feasibility of the DRAMA protocol is established through simulation studies. DRAMA provides effective integration of synchronous and asychronous traffic due to its ability to separate traffic types. Under the suggested traffic placement policies, the DRAMA protocol is shown to handle diverse loads, mixes of traffic types, and numbers of nodes, as well as modifications to the network structure and momentary traffic overloads.
NASA Astrophysics Data System (ADS)
Wang, Xiaoming; Lin, Yaguang; Zhang, Shanshan; Cai, Zhipeng
2017-05-01
Sudden disasters such as earthquake, flood and hurricane necessitate the employment of communication networks to carry out emergency response activities. Routing has a significant impact on the functionality, performance and flexibility of communication networks. In this article, the routing problem is studied considering the delivery ratio of messages, the overhead ratio of messages and the average delay of messages in mobile opportunistic networks (MONs) for enterprise-level emergency response communications in sudden disaster scenarios. Unlike the traditional routing methods for MONS, this article presents a new two-stage spreading and forwarding dynamic routing algorithm based on the proposed social activity degree and physical contact factor for mobile customers. A new modelling method for describing a dynamic evolving process of the topology structure of a MON is first proposed. Then a multi-copy spreading strategy based on the social activity degree of nodes and a single-copy forwarding strategy based on the physical contact factor between nodes are designed. Compared with the most relevant routing algorithms such as Epidemic, Prophet, Labelled-sim, Dlife-comm and Distribute-sim, the proposed routing algorithm can significantly increase the delivery ratio of messages, and decrease the overhead ratio and average delay of messages.
Predicting Node Degree Centrality with the Node Prominence Profile
Yang, Yang; Dong, Yuxiao; Chawla, Nitesh V.
2014-01-01
Centrality of a node measures its relative importance within a network. There are a number of applications of centrality, including inferring the influence or success of an individual in a social network, and the resulting social network dynamics. While we can compute the centrality of any node in a given network snapshot, a number of applications are also interested in knowing the potential importance of an individual in the future. However, current centrality is not necessarily an effective predictor of future centrality. While there are different measures of centrality, we focus on degree centrality in this paper. We develop a method that reconciles preferential attachment and triadic closure to capture a node's prominence profile. We show that the proposed node prominence profile method is an effective predictor of degree centrality. Notably, our analysis reveals that individuals in the early stage of evolution display a distinctive and robust signature in degree centrality trend, adequately predicted by their prominence profile. We evaluate our work across four real-world social networks. Our findings have important implications for the applications that require prediction of a node's future degree centrality, as well as the study of social network dynamics. PMID:25429797
GFT centrality: A new node importance measure for complex networks
NASA Astrophysics Data System (ADS)
Singh, Rahul; Chakraborty, Abhishek; Manoj, B. S.
2017-12-01
Identifying central nodes is very crucial to design efficient communication networks or to recognize key individuals of a social network. In this paper, we introduce Graph Fourier Transform Centrality (GFT-C), a metric that incorporates local as well as global characteristics of a node, to quantify the importance of a node in a complex network. GFT-C of a reference node in a network is estimated from the GFT coefficients derived from the importance signal of the reference node. Our study reveals the superiority of GFT-C over traditional centralities such as degree centrality, betweenness centrality, closeness centrality, eigenvector centrality, and Google PageRank centrality, in the context of various arbitrary and real-world networks with different degree-degree correlations.
Fast sparsely synchronized brain rhythms in a scale-free neural network.
Kim, Sang-Yoon; Lim, Woochang
2015-08-01
We consider a directed version of the Barabási-Albert scale-free network model with symmetric preferential attachment with the same in- and out-degrees and study the emergence of sparsely synchronized rhythms for a fixed attachment degree in an inhibitory population of fast-spiking Izhikevich interneurons. Fast sparsely synchronized rhythms with stochastic and intermittent neuronal discharges are found to appear for large values of J (synaptic inhibition strength) and D (noise intensity). For an intensive study we fix J at a sufficiently large value and investigate the population states by increasing D. For small D, full synchronization with the same population-rhythm frequency fp and mean firing rate (MFR) fi of individual neurons occurs, while for large D partial synchronization with fp>〈fi〉 (〈fi〉: ensemble-averaged MFR) appears due to intermittent discharge of individual neurons; in particular, the case of fp>4〈fi〉 is referred to as sparse synchronization. For the case of partial and sparse synchronization, MFRs of individual neurons vary depending on their degrees. As D passes a critical value D* (which is determined by employing an order parameter), a transition to unsynchronization occurs due to the destructive role of noise to spoil the pacing between sparse spikes. For D
Understanding the influence of all nodes in a network
Lawyer, Glenn
2015-01-01
Centrality measures such as the degree, k-shell, or eigenvalue centrality can identify a network's most influential nodes, but are rarely usefully accurate in quantifying the spreading power of the vast majority of nodes which are not highly influential. The spreading power of all network nodes is better explained by considering, from a continuous-time epidemiological perspective, the distribution of the force of infection each node generates. The resulting metric, the expected force, accurately quantifies node spreading power under all primary epidemiological models across a wide range of archetypical human contact networks. When node power is low, influence is a function of neighbor degree. As power increases, a node's own degree becomes more important. The strength of this relationship is modulated by network structure, being more pronounced in narrow, dense networks typical of social networking and weakening in broader, looser association networks such as the Internet. The expected force can be computed independently for individual nodes, making it applicable for networks whose adjacency matrix is dynamic, not well specified, or overwhelmingly large. PMID:25727453
Spectral analysis of Chinese language: Co-occurrence networks from four literary genres
NASA Astrophysics Data System (ADS)
Liang, Wei; Chen, Guanrong
2016-05-01
The eigenvalues and eigenvectors of the adjacency matrix of a network contain essential information about its topology. For each of the Chinese language co-occurrence networks constructed from four literary genres, i.e., essay, popular science article, news report, and novel, it is found that the largest eigenvalue depends on the network size N, the number of edges, the average shortest path length, and the clustering coefficient. Moreover, it is found that their node-degree distributions all follow a power-law. The number of different eigenvalues, Nλ, is found numerically to increase in the manner of Nλ ∝ log N for novel and Nλ ∝ N for the other three literary genres. An ;M; shape or a triangle-like distribution appears in their spectral densities. The eigenvector corresponding to the largest eigenvalue is mostly localized to a node with the largest degree. For the above observed phenomena, mathematical analysis is provided with interpretation from a linguistic perspective.
Reconfiguration and Search of Social Networks
Zhang, Lianming; Peng, Aoyuan
2013-01-01
Social networks tend to exhibit some topological characteristics different from regular networks and random networks, such as shorter average path length and higher clustering coefficient, and the node degree of the majority of social networks obeys exponential distribution. Based on the topological characteristics of the real social networks, a new network model which suits to portray the structure of social networks was proposed, and the characteristic parameters of the model were calculated. To find out the relationship between two people in the social network, and using the local information of the social network and the parallel mechanism, a hybrid search strategy based on k-walker random and a high degree was proposed. Simulation results show that the strategy can significantly reduce the average number of search steps, so as to effectively improve the search speed and efficiency. PMID:24574861
Jiang, Peng; Liu, Shuai; Liu, Jun; Wu, Feng; Zhang, Le
2016-07-14
Most of the existing node depth-adjustment deployment algorithms for underwater wireless sensor networks (UWSNs) just consider how to optimize network coverage and connectivity rate. However, these literatures don't discuss full network connectivity, while optimization of network energy efficiency and network reliability are vital topics for UWSN deployment. Therefore, in this study, a depth-adjustment deployment algorithm based on two-dimensional (2D) convex hull and spanning tree (NDACS) for UWSNs is proposed. First, the proposed algorithm uses the geometric characteristics of a 2D convex hull and empty circle to find the optimal location of a sleep node and activate it, minimizes the network coverage overlaps of the 2D plane, and then increases the coverage rate until the first layer coverage threshold is reached. Second, the sink node acts as a root node of all active nodes on the 2D convex hull and then forms a small spanning tree gradually. Finally, the depth-adjustment strategy based on time marker is used to achieve the three-dimensional overall network deployment. Compared with existing depth-adjustment deployment algorithms, the simulation results show that the NDACS algorithm can maintain full network connectivity with high network coverage rate, as well as improved network average node degree, thus increasing network reliability.
Jiang, Peng; Liu, Shuai; Liu, Jun; Wu, Feng; Zhang, Le
2016-01-01
Most of the existing node depth-adjustment deployment algorithms for underwater wireless sensor networks (UWSNs) just consider how to optimize network coverage and connectivity rate. However, these literatures don’t discuss full network connectivity, while optimization of network energy efficiency and network reliability are vital topics for UWSN deployment. Therefore, in this study, a depth-adjustment deployment algorithm based on two-dimensional (2D) convex hull and spanning tree (NDACS) for UWSNs is proposed. First, the proposed algorithm uses the geometric characteristics of a 2D convex hull and empty circle to find the optimal location of a sleep node and activate it, minimizes the network coverage overlaps of the 2D plane, and then increases the coverage rate until the first layer coverage threshold is reached. Second, the sink node acts as a root node of all active nodes on the 2D convex hull and then forms a small spanning tree gradually. Finally, the depth-adjustment strategy based on time marker is used to achieve the three-dimensional overall network deployment. Compared with existing depth-adjustment deployment algorithms, the simulation results show that the NDACS algorithm can maintain full network connectivity with high network coverage rate, as well as improved network average node degree, thus increasing network reliability. PMID:27428970
Weighted compactness function based label propagation algorithm for community detection
NASA Astrophysics Data System (ADS)
Zhang, Weitong; Zhang, Rui; Shang, Ronghua; Jiao, Licheng
2018-02-01
Community detection in complex networks, is to detect the community structure with the internal structure relatively compact and the external structure relatively sparse, according to the topological relationship among nodes in the network. In this paper, we propose a compactness function which combines the weight of nodes, and use it as the objective function to carry out the node label propagation. Firstly, according to the node degree, we find the sets of core nodes which have great influence on the network. The more the connections between the core nodes and the other nodes are, the larger the amount of the information these kernel nodes receive and transform. Then, according to the similarity of the nodes between the core nodes sets and the nodes degree, we assign weights to the nodes in the network. So the label of the nodes with great influence will be the priority in the label propagation process, which effectively improves the accuracy of the label propagation. The compactness function between nodes and communities in this paper is based on the nodes influence. It combines the connections between nodes and communities with the degree of the node belongs to its neighbor communities based on calculating the node weight. The function effectively uses the information of nodes and connections in the network. The experimental results show that the proposed algorithm can achieve good results in the artificial network and large-scale real networks compared with the 8 contrast algorithms.
An assumed-stress hybrid 4-node shell element with drilling degrees of freedom
NASA Technical Reports Server (NTRS)
Aminpour, M. A.
1992-01-01
An assumed-stress hybrid/mixed 4-node quadrilateral shell element is introduced that alleviates most of the deficiencies associated with such elements. The formulation of the element is based on the assumed-stress hybrid/mixed method using the Hellinger-Reissner variational principle. The membrane part of the element has 12 degrees of freedom including rotational or 'drilling' degrees of freedom at the nodes. The bending part of the element also has 12 degrees of freedom. The bending part of the element uses the Reissner-Mindlin plate theory which takes into account the transverse shear contributions. The element formulation is derived from an 8-node isoparametric element by expressing the midside displacement degrees of freedom in terms of displacement and rotational degrees of freedom at corner nodes. The element passes the patch test, is nearly insensitive to mesh distortion, does not 'lock', possesses the desirable invariance properties, has no hidden spurious modes, and for the majority of test cases used in this paper produces more accurate results than the other elements employed herein for comparison.
Network-based study of Lagrangian transport and mixing
NASA Astrophysics Data System (ADS)
Padberg-Gehle, Kathrin; Schneide, Christiane
2017-10-01
Transport and mixing processes in fluid flows are crucially influenced by coherent structures and the characterization of these Lagrangian objects is a topic of intense current research. While established mathematical approaches such as variational methods or transfer-operator-based schemes require full knowledge of the flow field or at least high-resolution trajectory data, this information may not be available in applications. Recently, different computational methods have been proposed to identify coherent behavior in flows directly from Lagrangian trajectory data, that is, numerical or measured time series of particle positions in a fluid flow. In this context, spatio-temporal clustering algorithms have been proven to be very effective for the extraction of coherent sets from sparse and possibly incomplete trajectory data. Inspired by these recent approaches, we consider an unweighted, undirected network, where Lagrangian particle trajectories serve as network nodes. A link is established between two nodes if the respective trajectories come close to each other at least once in the course of time. Classical graph concepts are then employed to analyze the resulting network. In particular, local network measures such as the node degree, the average degree of neighboring nodes, and the clustering coefficient serve as indicators of highly mixing regions, whereas spectral graph partitioning schemes allow us to extract coherent sets. The proposed methodology is very fast to run and we demonstrate its applicability in two geophysical flows - the Bickley jet as well as the Antarctic stratospheric polar vortex.
Parameters affecting the resilience of scale-free networks to random failures.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Link, Hamilton E.; LaViolette, Randall A.; Lane, Terran
2005-09-01
It is commonly believed that scale-free networks are robust to massive numbers of random node deletions. For example, Cohen et al. in (1) study scale-free networks including some which approximate the measured degree distribution of the Internet. Their results suggest that if each node in this network failed independently with probability 0.99, most of the remaining nodes would still be connected in a giant component. In this paper, we show that a large and important subclass of scale-free networks are not robust to massive numbers of random node deletions. In particular, we study scale-free networks which have minimum node degreemore » of 1 and a power-law degree distribution beginning with nodes of degree 1 (power-law networks). We show that, in a power-law network approximating the Internet's reported distribution, when the probability of deletion of each node is 0.5 only about 25% of the surviving nodes in the network remain connected in a giant component, and the giant component does not persist beyond a critical failure rate of 0.9. The new result is partially due to improved analytical accommodation of the large number of degree-0 nodes that result after node deletions. Our results apply to power-law networks with a wide range of power-law exponents, including Internet-like networks. We give both analytical and empirical evidence that such networks are not generally robust to massive random node deletions.« less
Direct formulation of a 4-node hybrid shell element with rotational degrees of freedom
NASA Technical Reports Server (NTRS)
Aminpour, Mohammad A.
1990-01-01
A simple 4-node assumed-stress hybrid quadrilateral shell element with rotational or drilling degrees of freedom is formulated. The element formulation is based directly on a 4-node element. This direct formulation requires fewer computations than a similar element that is derived from an internal 8-node isoparametric element in which the midside degrees of freedom are eliminated in favor of rotational degree of freedom at the corner nodes. The formulation is based on the principle of minimum complementary energy. The membrane part of the element has 12 degrees of freedom including rotational degrees of freedom. The bending part of the element also has 12 degrees of freedom. The bending part of the quadratic variations for both in-plane and out-of-plane displacement fields and linear variations for both in-plane and out-of-plane rotation fields are assumed along the edges of the element. The element Cartesian-coordinate system is chosen such as to make the stress field invariant with respect to node numbering. The membrane part of the stress field is based on a 9-parameter equilibrating stress field, while the bending part is based on a 13-parameter equilibrating stress field. The element passes the patch test, is nearly insensitive to mesh distortion, does not lock, possesses the desirable invariance properties, has no spurious modes, and produces accurate and reliable results.
Optimal synchronization in space
NASA Astrophysics Data System (ADS)
Brede, Markus
2010-02-01
In this Rapid Communication we investigate spatially constrained networks that realize optimal synchronization properties. After arguing that spatial constraints can be imposed by limiting the amount of “wire” available to connect nodes distributed in space, we use numerical optimization methods to construct networks that realize different trade offs between optimal synchronization and spatial constraints. Over a large range of parameters such optimal networks are found to have a link length distribution characterized by power-law tails P(l)∝l-α , with exponents α increasing as the networks become more constrained in space. It is also shown that the optimal networks, which constitute a particular type of small world network, are characterized by the presence of nodes of distinctly larger than average degree around which long-distance links are centered.
Reverse preferential spread in complex networks
NASA Astrophysics Data System (ADS)
Toyoizumi, Hiroshi; Tani, Seiichi; Miyoshi, Naoto; Okamoto, Yoshio
2012-08-01
Large-degree nodes may have a larger influence on the network, but they can be bottlenecks for spreading information since spreading attempts tend to concentrate on these nodes and become redundant. We discuss that the reverse preferential spread (distributing information inversely proportional to the degree of the receiving node) has an advantage over other spread mechanisms. In large uncorrelated networks, we show that the mean number of nodes that receive information under the reverse preferential spread is an upper bound among any other weight-based spread mechanisms, and this upper bound is indeed a logistic growth independent of the degree distribution.
Learning about knowledge: A complex network approach
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fontoura Costa, Luciano da
2006-08-15
An approach to modeling knowledge acquisition in terms of walks along complex networks is described. Each subset of knowledge is represented as a node, and relations between such knowledge are expressed as edges. Two types of edges are considered, corresponding to free and conditional transitions. The latter case implies that a node can only be reached after visiting previously a set of nodes (the required conditions). The process of knowledge acquisition can then be simulated by considering the number of nodes visited as a single agent moves along the network, starting from its lowest layer. It is shown that hierarchicalmore » networks--i.e., networks composed of successive interconnected layers--are related to compositions of the prerequisite relationships between the nodes. In order to avoid deadlocks--i.e., unreachable nodes--the subnetwork in each layer is assumed to be a connected component. Several configurations of such hierarchical knowledge networks are simulated and the performance of the moving agent quantified in terms of the percentage of visited nodes after each movement. The Barabasi-Albert and random models are considered for the layer and interconnecting subnetworks. Although all subnetworks in each realization have the same number of nodes, several interconnectivities, defined by the average node degree of the interconnection networks, have been considered. Two visiting strategies are investigated: random choice among the existing edges and preferential choice to so far untracked edges. A series of interesting results are obtained, including the identification of a series of plateaus of knowledge stagnation in the case of the preferential movement strategy in the presence of conditional edges.« less
Assortativity and leadership emerge from anti-preferential attachment in heterogeneous networks.
Sendiña-Nadal, I; Danziger, M M; Wang, Z; Havlin, S; Boccaletti, S
2016-02-18
Real-world networks have distinct topologies, with marked deviations from purely random networks. Many of them exhibit degree-assortativity, with nodes of similar degree more likely to link to one another. Though microscopic mechanisms have been suggested for the emergence of other topological features, assortativity has proven elusive. Assortativity can be artificially implanted in a network via degree-preserving link permutations, however this destroys the graph's hierarchical clustering and does not correspond to any microscopic mechanism. Here, we propose the first generative model which creates heterogeneous networks with scale-free-like properties in degree and clustering distributions and tunable realistic assortativity. Two distinct populations of nodes are incrementally added to an initial network by selecting a subgraph to connect to at random. One population (the followers) follows preferential attachment, while the other population (the potential leaders) connects via anti-preferential attachment: they link to lower degree nodes when added to the network. By selecting the lower degree nodes, the potential leader nodes maintain high visibility during the growth process, eventually growing into hubs. The evolution of links in Facebook empirically validates the connection between the initial anti-preferential attachment and long term high degree. In this way, our work sheds new light on the structure and evolution of social networks.
Assortativity and leadership emerge from anti-preferential attachment in heterogeneous networks
NASA Astrophysics Data System (ADS)
Sendiña-Nadal, I.; Danziger, M. M.; Wang, Z.; Havlin, S.; Boccaletti, S.
2016-02-01
Real-world networks have distinct topologies, with marked deviations from purely random networks. Many of them exhibit degree-assortativity, with nodes of similar degree more likely to link to one another. Though microscopic mechanisms have been suggested for the emergence of other topological features, assortativity has proven elusive. Assortativity can be artificially implanted in a network via degree-preserving link permutations, however this destroys the graph’s hierarchical clustering and does not correspond to any microscopic mechanism. Here, we propose the first generative model which creates heterogeneous networks with scale-free-like properties in degree and clustering distributions and tunable realistic assortativity. Two distinct populations of nodes are incrementally added to an initial network by selecting a subgraph to connect to at random. One population (the followers) follows preferential attachment, while the other population (the potential leaders) connects via anti-preferential attachment: they link to lower degree nodes when added to the network. By selecting the lower degree nodes, the potential leader nodes maintain high visibility during the growth process, eventually growing into hubs. The evolution of links in Facebook empirically validates the connection between the initial anti-preferential attachment and long term high degree. In this way, our work sheds new light on the structure and evolution of social networks.
Trust transitivity in social networks.
Richters, Oliver; Peixoto, Tiago P
2011-04-05
Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust) is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP) web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected "fringe" nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its "fringe" peers.
Trust Transitivity in Social Networks
Richters, Oliver; Peixoto, Tiago P.
2011-01-01
Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust) is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP) web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected “fringe” nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its “fringe” peers. PMID:21483683
Structural and functional properties of spatially embedded scale-free networks.
Emmerich, Thorsten; Bunde, Armin; Havlin, Shlomo
2014-06-01
Scale-free networks have been studied mostly as non-spatially embedded systems. However, in many realistic cases, they are spatially embedded and these constraints should be considered. Here, we study the structural and functional properties of a model of scale-free (SF) spatially embedded networks. In our model, both the degree and the length of links follow power law distributions as found in many real networks. We show that not all SF networks can be embedded in space and that the largest degree of a node in the network is usually smaller than in nonembedded SF networks. Moreover, the spatial constraints (each node has only few neighboring nodes) introduce degree-degree anticorrelations (disassortativity) since two high degree nodes cannot stay close in space. We also find significant effects of space embedding on the hopping distances (chemical distance) and the vulnerability of the networks.
Locating multiple diffusion sources in time varying networks from sparse observations.
Hu, Zhao-Long; Shen, Zhesi; Cao, Shinan; Podobnik, Boris; Yang, Huijie; Wang, Wen-Xu; Lai, Ying-Cheng
2018-02-08
Data based source localization in complex networks has a broad range of applications. Despite recent progress, locating multiple diffusion sources in time varying networks remains to be an outstanding problem. Bridging structural observability and sparse signal reconstruction theories, we develop a general framework to locate diffusion sources in time varying networks based solely on sparse data from a small set of messenger nodes. A general finding is that large degree nodes produce more valuable information than small degree nodes, a result that contrasts that for static networks. Choosing large degree nodes as the messengers, we find that sparse observations from a few such nodes are often sufficient for any number of diffusion sources to be located for a variety of model and empirical networks. Counterintuitively, sources in more rapidly varying networks can be identified more readily with fewer required messenger nodes.
Local versus global knowledge in the Barabási-Albert scale-free network model.
Gómez-Gardeñes, Jesús; Moreno, Yamir
2004-03-01
The scale-free model of Barabási and Albert (BA) gave rise to a burst of activity in the field of complex networks. In this paper, we revisit one of the main assumptions of the model, the preferential attachment (PA) rule. We study a model in which the PA rule is applied to a neighborhood of newly created nodes and thus no global knowledge of the network is assumed. We numerically show that global properties of the BA model such as the connectivity distribution and the average shortest path length are quite robust when there is some degree of local knowledge. In contrast, other properties such as the clustering coefficient and degree-degree correlations differ and approach the values measured for real-world networks.
Scale-free behavior of networks with the copresence of preferential and uniform attachment rules
NASA Astrophysics Data System (ADS)
Pachon, Angelica; Sacerdote, Laura; Yang, Shuyi
2018-05-01
Complex networks in different areas exhibit degree distributions with a heavy upper tail. A preferential attachment mechanism in a growth process produces a graph with this feature. We herein investigate a variant of the simple preferential attachment model, whose modifications are interesting for two main reasons: to analyze more realistic models and to study the robustness of the scale-free behavior of the degree distribution. We introduce and study a model which takes into account two different attachment rules: a preferential attachment mechanism (with probability 1 - p) that stresses the rich get richer system, and a uniform choice (with probability p) for the most recent nodes, i.e. the nodes belonging to a window of size w to the left of the last born node. The latter highlights a trend to select one of the last added nodes when no information is available. The recent nodes can be either a given fixed number or a proportion (αn) of the total number of existing nodes. In the first case, we prove that this model exhibits an asymptotically power-law degree distribution. The same result is then illustrated through simulations in the second case. When the window of recent nodes has a constant size, we herein prove that the presence of the uniform rule delays the starting time from which the asymptotic regime starts to hold. The mean number of nodes of degree k and the asymptotic degree distribution are also determined analytically. Finally, a sensitivity analysis on the parameters of the model is performed.
Revisiting node-based SIR models in complex networks with degree correlations
NASA Astrophysics Data System (ADS)
Wang, Yi; Cao, Jinde; Alofi, Abdulaziz; AL-Mazrooei, Abdullah; Elaiw, Ahmed
2015-11-01
In this paper, we consider two growing networks which will lead to the degree-degree correlations between two nearest neighbors in the network. When the network grows to some certain size, we introduce an SIR-like disease such as pandemic influenza H1N1/09 to the population. Due to its rapid spread, the population size changes slowly, and thus the disease spreads on correlated networks with approximately fixed size. To predict the disease evolution on correlated networks, we first review two node-based SIR models incorporating degree correlations and an edge-based SIR model without considering degree correlation, and then compare the predictions of these models with stochastic SIR simulations, respectively. We find that the edge-based model, even without considering degree correlations, agrees much better than the node-based models incorporating degree correlations with stochastic SIR simulations in many respects. Moreover, simulation results show that for networks with positive correlation, the edge-based model provides a better upper bound of the cumulative incidence than the node-based SIR models, whereas for networks with negative correlation, it provides a lower bound of the cumulative incidence.
Nonlinear dynamic evolution and control in CCFN with mixed attachment mechanisms
NASA Astrophysics Data System (ADS)
Wang, Jianrong; Wang, Jianping; Han, Dun
2017-01-01
In recent years, wireless communication plays an important role in our lives. Cooperative communication, is used by a mobile station with single antenna to share with each other forming a virtual MIMO antenna system, will become a development with a diversity gain for wireless communication in tendency future. In this paper, a fitness model of evolution network based on complex networks with mixed attachment mechanisms is devised in order to study an actual network-CCFN (cooperative communication fitness network). Firstly, the evolution of CCFN is given by four cases with different probabilities, and the rate equations of nodes degree are presented to analyze the evolution of CCFN. Secondly, the degree distribution is analyzed by calculating the rate equation and numerical simulation with the examples of four fitness distributions such as power law, uniform fitness distribution, exponential fitness distribution and Rayleigh fitness distribution. Finally, the robustness of CCFN is studied by numerical simulation with four fitness distributions under random attack and intentional attack to analyze the effects of degree distribution, average path length and average degree. The results of this paper offers insights for building CCFN systems in order to program communication resources.
Adaptive random walks on the class of Web graphs
NASA Astrophysics Data System (ADS)
Tadić, B.
2001-09-01
We study random walk with adaptive move strategies on a class of directed graphs with variable wiring diagram. The graphs are grown from the evolution rules compatible with the dynamics of the world-wide Web [B. Tadić, Physica A 293, 273 (2001)], and are characterized by a pair of power-law distributions of out- and in-degree for each value of the parameter β, which measures the degree of rewiring in the graph. The walker adapts its move strategy according to locally available information both on out-degree of the visited node and in-degree of target node. A standard random walk, on the other hand, uses the out-degree only. We compute the distribution of connected subgraphs visited by an ensemble of walkers, the average access time and survival probability of the walks. We discuss these properties of the walk dynamics relative to the changes in the global graph structure when the control parameter β is varied. For β≥ 3, corresponding to the world-wide Web, the access time of the walk to a given level of hierarchy on the graph is much shorter compared to the standard random walk on the same graph. By reducing the amount of rewiring towards rigidity limit β↦βc≲ 0.1, corresponding to the range of naturally occurring biochemical networks, the survival probability of adaptive and standard random walk become increasingly similar. The adaptive random walk can be used as an efficient message-passing algorithm on this class of graphs for large degree of rewiring.
Characteristics of real futures trading networks
NASA Astrophysics Data System (ADS)
Wang, Junjie; Zhou, Shuigeng; Guan, Jihong
2011-01-01
Futures trading is the core of futures business, and it is considered as one of the typical complex systems. To investigate the complexity of futures trading, we employ the analytical method of complex networks. First, we use real trading records from the Shanghai Futures Exchange to construct futures trading networks, in which nodes are trading participants, and two nodes have a common edge if the two corresponding investors appear simultaneously in at least one trading record as a purchaser and a seller, respectively. Then, we conduct a comprehensive statistical analysis on the constructed futures trading networks. Empirical results show that the futures trading networks exhibit features such as scale-free behavior with interesting odd-even-degree divergence in low-degree regions, small-world effect, hierarchical organization, power-law betweenness distribution, disassortative mixing, and shrinkage of both the average path length and the diameter as network size increases. To the best of our knowledge, this is the first work that uses real data to study futures trading networks, and we argue that the research results can shed light on the nature of real futures business.
Research on Some Bus Transport Networks with Random Overlapping Clique Structure
NASA Astrophysics Data System (ADS)
Yang, Xu-Hua; Wang, Bo; Wang, Wan-Liang; Sun, You-Xian
2008-11-01
On the basis of investigating the statistical data of bus transport networks of three big cities in China, we propose that each bus route is a clique (maximal complete subgraph) and a bus transport network (BTN) consists of a lot of cliques, which intensively connect and overlap with each other. We study the network properties, which include the degree distribution, multiple edges' overlapping time distribution, distribution of the overlap size between any two overlapping cliques, distribution of the number of cliques that a node belongs to. Naturally, the cliques also constitute a network, with the overlapping nodes being their multiple links. We also research its network properties such as degree distribution, clustering, average path length, and so on. We propose that a BTN has the properties of random clique increment and random overlapping clique, at the same time, a BTN is a small-world network with highly clique-clustered and highly clique-overlapped. Finally, we introduce a BTN evolution model, whose simulation results agree well with the statistical laws that emerge in real BTNs.
Maximizing the Spread of Influence via Generalized Degree Discount.
Wang, Xiaojie; Zhang, Xue; Zhao, Chengli; Yi, Dongyun
2016-01-01
It is a crucial and fundamental issue to identify a small subset of influential spreaders that can control the spreading process in networks. In previous studies, a degree-based heuristic called DegreeDiscount has been shown to effectively identify multiple influential spreaders and has severed as a benchmark method. However, the basic assumption of DegreeDiscount is not adequate, because it treats all the nodes equally without any differences. To consider a general situation in real world networks, a novel heuristic method named GeneralizedDegreeDiscount is proposed in this paper as an effective extension of original method. In our method, the status of a node is defined as a probability of not being influenced by any of its neighbors, and an index generalized discounted degree of one node is presented to measure the expected number of nodes it can influence. Then the spreaders are selected sequentially upon its generalized discounted degree in current network. Empirical experiments are conducted on four real networks, and the results show that the spreaders identified by our approach are more influential than several benchmark methods. Finally, we analyze the relationship between our method and three common degree-based methods.
Maximizing the Spread of Influence via Generalized Degree Discount
Wang, Xiaojie; Zhang, Xue; Zhao, Chengli; Yi, Dongyun
2016-01-01
It is a crucial and fundamental issue to identify a small subset of influential spreaders that can control the spreading process in networks. In previous studies, a degree-based heuristic called DegreeDiscount has been shown to effectively identify multiple influential spreaders and has severed as a benchmark method. However, the basic assumption of DegreeDiscount is not adequate, because it treats all the nodes equally without any differences. To consider a general situation in real world networks, a novel heuristic method named GeneralizedDegreeDiscount is proposed in this paper as an effective extension of original method. In our method, the status of a node is defined as a probability of not being influenced by any of its neighbors, and an index generalized discounted degree of one node is presented to measure the expected number of nodes it can influence. Then the spreaders are selected sequentially upon its generalized discounted degree in current network. Empirical experiments are conducted on four real networks, and the results show that the spreaders identified by our approach are more influential than several benchmark methods. Finally, we analyze the relationship between our method and three common degree-based methods. PMID:27732681
Ensemble Weight Enumerators for Protograph LDPC Codes
NASA Technical Reports Server (NTRS)
Divsalar, Dariush
2006-01-01
Recently LDPC codes with projected graph, or protograph structures have been proposed. In this paper, finite length ensemble weight enumerators for LDPC codes with protograph structures are obtained. Asymptotic results are derived as the block size goes to infinity. In particular we are interested in obtaining ensemble average weight enumerators for protograph LDPC codes which have minimum distance that grows linearly with block size. As with irregular ensembles, linear minimum distance property is sensitive to the proportion of degree-2 variable nodes. In this paper the derived results on ensemble weight enumerators show that linear minimum distance condition on degree distribution of unstructured irregular LDPC codes is a sufficient but not a necessary condition for protograph LDPC codes.
Node degree distribution in spanning trees
NASA Astrophysics Data System (ADS)
Pozrikidis, C.
2016-03-01
A method is presented for computing the number of spanning trees involving one link or a specified group of links, and excluding another link or a specified group of links, in a network described by a simple graph in terms of derivatives of the spanning-tree generating function defined with respect to the eigenvalues of the Kirchhoff (weighted Laplacian) matrix. The method is applied to deduce the node degree distribution in a complete or randomized set of spanning trees of an arbitrary network. An important feature of the proposed method is that the explicit construction of spanning trees is not required. It is shown that the node degree distribution in the spanning trees of the complete network is described by the binomial distribution. Numerical results are presented for the node degree distribution in square, triangular, and honeycomb lattices.
Correlation between centrality metrics and their application to the opinion model
NASA Astrophysics Data System (ADS)
Li, Cong; Li, Qian; Van Mieghem, Piet; Stanley, H. Eugene; Wang, Huijuan
2015-03-01
In recent decades, a number of centrality metrics describing network properties of nodes have been proposed to rank the importance of nodes. In order to understand the correlations between centrality metrics and to approximate a high-complexity centrality metric by a strongly correlated low-complexity metric, we first study the correlation between centrality metrics in terms of their Pearson correlation coefficient and their similarity in ranking of nodes. In addition to considering the widely used centrality metrics, we introduce a new centrality measure, the degree mass. The mth-order degree mass of a node is the sum of the weighted degree of the node and its neighbors no further than m hops away. We find that the betweenness, the closeness, and the components of the principal eigenvector of the adjacency matrix are strongly correlated with the degree, the 1st-order degree mass and the 2nd-order degree mass, respectively, in both network models and real-world networks. We then theoretically prove that the Pearson correlation coefficient between the principal eigenvector and the 2nd-order degree mass is larger than that between the principal eigenvector and a lower order degree mass. Finally, we investigate the effect of the inflexible contrarians selected based on different centrality metrics in helping one opinion to compete with another in the inflexible contrarian opinion (ICO) model. Interestingly, we find that selecting the inflexible contrarians based on the leverage, the betweenness, or the degree is more effective in opinion-competition than using other centrality metrics in all types of networks. This observation is supported by our previous observations, i.e., that there is a strong linear correlation between the degree and the betweenness, as well as a high centrality similarity between the leverage and the degree.
Analysis of complex network performance and heuristic node removal strategies
NASA Astrophysics Data System (ADS)
Jahanpour, Ehsan; Chen, Xin
2013-12-01
Removing important nodes from complex networks is a great challenge in fighting against criminal organizations and preventing disease outbreaks. Six network performance metrics, including four new metrics, are applied to quantify networks' diffusion speed, diffusion scale, homogeneity, and diameter. In order to efficiently identify nodes whose removal maximally destroys a network, i.e., minimizes network performance, ten structured heuristic node removal strategies are designed using different node centrality metrics including degree, betweenness, reciprocal closeness, complement-derived closeness, and eigenvector centrality. These strategies are applied to remove nodes from the September 11, 2001 hijackers' network, and their performance are compared to that of a random strategy, which removes randomly selected nodes, and the locally optimal solution (LOS), which removes nodes to minimize network performance at each step. The computational complexity of the 11 strategies and LOS is also analyzed. Results show that the node removal strategies using degree and betweenness centralities are more efficient than other strategies.
NASA Astrophysics Data System (ADS)
Sagar, Vikram; Zhao, Yi
2017-02-01
In the present work, the effect of personal behavior induced preventive measures is studied on the spread of epidemics over scale free networks that are characterized by the differential rate of disease transmission. The role of personal behavior induced preventive measures is parameterized in terms of variable λ, which modulates the number of concurrent contacts a node makes with the fraction of its neighboring nodes. The dynamics of the disease is described by a non-linear Susceptible Infected Susceptible model based upon the discrete time Markov Chain method. The network mean field approach is generalized to account for the effect of non-linear coupling between the aforementioned factors on the collective dynamics of nodes. The upper bound estimates of the disease outbreak threshold obtained from the mean field theory are found to be in good agreement with the corresponding non-linear stochastic model. From the results of parametric study, it is shown that the epidemic size has inverse dependence on the preventive measures (λ). It has also been shown that the increase in the average degree of the nodes lowers the time of spread and enhances the size of epidemics.
Rumor spreading in online social networks by considering the bipolar social reinforcement
NASA Astrophysics Data System (ADS)
Ma, Jing; Li, Dandan; Tian, Zihao
2016-04-01
Considering the bipolar social reinforcement which includes positive and negative effects, in this paper we explore the rumor spreading dynamics in online social networks. By means of the generation function and cavity method developed from statistical physics of disordered system, the rumor spreading threshold can be theoretically drawn. Simulation results indicate that decreasing the positive reinforcement factor or increasing the negative reinforcement factor can suppress the rumor spreading effectively. By analyzing the topological properties of the real world social network, we find that the nodes with lower degree usually have smaller weight. However, the nodes with lower degree may have larger k-shell. In order to curb rumor spreading, some control strategies that are based on the nodes' degree, k-shell and weight are presented. By comparison, we show that controlling those nodes that have larger degree or weight are two effective strategies to prevent the rumor spreading.
Effects of maximum node degree on computer virus spreading in scale-free networks
NASA Astrophysics Data System (ADS)
Bamaarouf, O.; Ould Baba, A.; Lamzabi, S.; Rachadi, A.; Ez-Zahraouy, H.
2017-10-01
The increase of the use of the Internet networks favors the spread of viruses. In this paper, we studied the spread of viruses in the scale-free network with different topologies based on the Susceptible-Infected-External (SIE) model. It is found that the network structure influences the virus spreading. We have shown also that the nodes of high degree are more susceptible to infection than others. Furthermore, we have determined a critical maximum value of node degree (Kc), below which the network is more resistible and the computer virus cannot expand into the whole network. The influence of network size is also studied. We found that the network with low size is more effective to reduce the proportion of infected nodes.
The effect of Reynolds number and turbulence on airfoil aerodynamics at -90 degrees incidence
NASA Technical Reports Server (NTRS)
Stremel, Paul M.
1993-01-01
A method has been developed for calculating the viscous flow about airfoils in with and without deflected flaps at -90 deg incidence. This method provides for the solution of the unsteady incompressible Navier-Stokes equations by means of an implicit technique. The solution is calculated on a body-fitted computational mesh using a staggered grid method. The vorticity is defined at the node points, and the velocity components are defined at the mesh-cell sides. The staggered-grid orientation provides for accurate representation of vorticity at the node points and the continuity equation at the mesh-cell centers. The method provides for the direct solution of the flow field and satisfies the continuity equation to machine zero at each time-step. The method is evaluated in terms of its ability to predict two-dimensional flow about an airfoil at -90 degrees incidence for varying Reynolds number and different boundary layer models. A laminar and a turbulent boundary layer models. A laminar and a turbulent boundary layer model are considered in the evaluation of the method. The variation of the average loading and surface pressure distribution due to flap deflection, Reynolds number, and laminar or turbulent flow are presented and compared with experimental results. The comparisons indicate that the calculated drag and drag reduction caused by flap deflection and the calculated average surface pressure are in excellent agreement with the measured results at a similar Reynolds number.
Kulboka, Arūnas; Veikutis, Vincentas; Pauza, Dainius Haroldas; Lekas, Raimundas
2003-01-01
The aims of present study were to verify the topography of the intracardiac nerve subplexuses (INS) by using electrophysiological methods, its relations with sinoatrial (SA) node function and to investigate possibility of selective surgical SA node denervation. Fifteen mongrel dogs of either sex weighing 8 to 15 kg were used for electrophysiological studies. Both cervical vagosympathetic trunks were isolated and crushed by tight ligatures. Nervus subplexuses destructions were performed by cryocoagulation in three zones located around the right superior vena cava: ventral, lateral and dorsal. The sinus rhythm, SA node function recovery time, AV node conductivity, AV node and atrial effective refractory period were measured. Five experiments in each of three zones were performed. Experimental data show that destruction of the epicardial nerves has different effect on electrophysiological parameters. After destruction of the anterior zone of the right atrium the sinus rhythm decreased on an average by 11.6%; SA node function recovery time prolonged by 7.2%; AV node conductivity decreased by 13.1%; AV node effective refractory period prolonged by 12.9% and atrial effective refractory period, by 10.9 %. Measurements of electrophysiological parameters after intravenous injection of atropine sulphate show that sinus rhythm decreased on an average by 23.4%; SA node function recovery time increased by 9.1%; the conductivity of AV node decreased by 10.2%; AV node effective refractory period prolonged by 15.4% and atrial effective refractory period, by 13.2%. After destruction of the intracardiac nerves of the lateral zone, the sinus rhythm decreased by 15.7%; SA node function recovery time increased by 16.3%; AV node conductivity decreased by 8.3%; AV node effective refractory period and atrial effective refractory period prolonged by 11.9% and 10.0%, respectively. After the atropine sulphate intravenous injection, the sinus rhythm decreased on an average by 7.1%, SA node function recovery time prolonged by 7.1%, AV conductivity decreased by 9.1%, AV node effective refractory period increased by 12.4%, and atrial effective refractory period prolonged by 12.5%. After destruction of the nerves in the dorsal zone the changes of electrophysiological parameters were opposite to those obtained after destruction of the nerve tracts in the anterior or lateral zones: the sinus rhythm increased on an average by 4.3%; SA node function recovery time shortened by 8.8%; AV conductivity increased by 9.7%; AV node and atrial effective refractory period decreased by 12.3% and 12.1%, respectively. After intravenous atropine sulphate infusion, sinus rhythm decreased on an average by 8.3%; SA node function recovery time prolonged by 9.6%; AV node conductivity decreased by 5%; AV node and atrial effective refractory period prolonged by 4.2% and 5.2%, respectively. The average changes of electrophysiological parameters before and after INS destruction shows that cryocoagulation of ventral and lateral zones eliminates the effects of sympathetic tone to SA and AV nodal activity. Cryocoagulation of dorsal zone eliminates the effects of nervus vagus to both nodal structures. These findings shows the possibility alter or correct SA node function by making selective surgical SA node denervation.
Role of centrality for the identification of influential spreaders in complex networks.
de Arruda, Guilherme Ferraz; Barbieri, André Luiz; Rodríguez, Pablo Martín; Rodrigues, Francisco A; Moreno, Yamir; Costa, Luciano da Fontoura
2014-09-01
The identification of the most influential spreaders in networks is important to control and understand the spreading capabilities of the system as well as to ensure an efficient information diffusion such as in rumorlike dynamics. Recent works have suggested that the identification of influential spreaders is not independent of the dynamics being studied. For instance, the key disease spreaders might not necessarily be so important when it comes to analyzing social contagion or rumor propagation. Additionally, it has been shown that different metrics (degree, coreness, etc.) might identify different influential nodes even for the same dynamical processes with diverse degrees of accuracy. In this paper, we investigate how nine centrality measures correlate with the disease and rumor spreading capabilities of the nodes in different synthetic and real-world (both spatial and nonspatial) networks. We also propose a generalization of the random walk accessibility as a new centrality measure and derive analytical expressions for the latter measure for simple network configurations. Our results show that for nonspatial networks, the k-core and degree centralities are the most correlated to epidemic spreading, whereas the average neighborhood degree, the closeness centrality, and accessibility are the most related to rumor dynamics. On the contrary, for spatial networks, the accessibility measure outperforms the rest of the centrality metrics in almost all cases regardless of the kind of dynamics considered. Therefore, an important consequence of our analysis is that previous studies performed in synthetic random networks cannot be generalized to the case of spatial networks.
Network overload due to massive attacks
NASA Astrophysics Data System (ADS)
Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.
2018-05-01
We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p
Degree and wealth distribution in a network induced by wealth
NASA Astrophysics Data System (ADS)
Lee, Gyemin; Kim, Gwang Il
2007-09-01
A network induced by wealth is a social network model in which wealth induces individuals to participate as nodes, and every node in the network produces and accumulates wealth utilizing its links. More specifically, at every time step a new node is added to the network, and a link is created between one of the existing nodes and the new node. Innate wealth-producing ability is randomly assigned to every new node, and the node to be connected to the new node is chosen randomly, with odds proportional to the accumulated wealth of each existing node. Analyzing this network using the mean value and continuous flow approaches, we derive a relation between the conditional expectations of the degree and the accumulated wealth of each node. From this relation, we show that the degree distribution of the network induced by wealth is scale-free. We also show that the wealth distribution has a power-law tail and satisfies the 80/20 rule. We also show that, over the whole range, the cumulative wealth distribution exhibits the same topological characteristics as the wealth distributions of several networks based on the Bouchaud-Mèzard model, even though the mechanism for producing wealth is quite different in our model. Further, we show that the cumulative wealth distribution for the poor and middle class seems likely to follow by a log-normal distribution, while for the richest, the cumulative wealth distribution has a power-law behavior.
Optimal cost for strengthening or destroying a given network
NASA Astrophysics Data System (ADS)
Patron, Amikam; Cohen, Reuven; Li, Daqing; Havlin, Shlomo
2017-05-01
Strengthening or destroying a network is a very important issue in designing resilient networks or in planning attacks against networks, including planning strategies to immunize a network against diseases, viruses, etc. Here we develop a method for strengthening or destroying a random network with a minimum cost. We assume a correlation between the cost required to strengthen or destroy a node and the degree of the node. Accordingly, we define a cost function c (k ) , which is the cost of strengthening or destroying a node with degree k . Using the degrees k in a network and the cost function c (k ) , we develop a method for defining a list of priorities of degrees and for choosing the right group of degrees to be strengthened or destroyed that minimizes the total price of strengthening or destroying the entire network. We find that the list of priorities of degrees is universal and independent of the network's degree distribution, for all kinds of random networks. The list of priorities is the same for both strengthening a network and for destroying a network with minimum cost. However, in spite of this similarity, there is a difference between their pc, the critical fraction of nodes that has to be functional to guarantee the existence of a giant component in the network.
Optimal cost for strengthening or destroying a given network.
Patron, Amikam; Cohen, Reuven; Li, Daqing; Havlin, Shlomo
2017-05-01
Strengthening or destroying a network is a very important issue in designing resilient networks or in planning attacks against networks, including planning strategies to immunize a network against diseases, viruses, etc. Here we develop a method for strengthening or destroying a random network with a minimum cost. We assume a correlation between the cost required to strengthen or destroy a node and the degree of the node. Accordingly, we define a cost function c(k), which is the cost of strengthening or destroying a node with degree k. Using the degrees k in a network and the cost function c(k), we develop a method for defining a list of priorities of degrees and for choosing the right group of degrees to be strengthened or destroyed that minimizes the total price of strengthening or destroying the entire network. We find that the list of priorities of degrees is universal and independent of the network's degree distribution, for all kinds of random networks. The list of priorities is the same for both strengthening a network and for destroying a network with minimum cost. However, in spite of this similarity, there is a difference between their p_{c}, the critical fraction of nodes that has to be functional to guarantee the existence of a giant component in the network.
Robustness of networks formed from interdependent correlated networks under intentional attacks
NASA Astrophysics Data System (ADS)
Liu, Long; Meng, Ke; Dong, Zhaoyang
2018-02-01
We study the problem of intentional attacks targeting to interdependent networks generated with known degree distribution (in-degree oriented model) or distribution of interlinks (out-degree oriented model). In both models, each node's degree is correlated with the number of its links that connect to the other network. For both models, varying the correlation coefficient has a significant effect on the robustness of a system undergoing random attacks or attacks targeting nodes with low degree. For a system with an assortative relationship between in-degree and out-degree, reducing the broadness of networks' degree distributions can increase the resistance of systems against intentional attacks.
Importance of small-degree nodes in assortative networks with degree-weight correlations
NASA Astrophysics Data System (ADS)
Ma, Sijuan; Feng, Ling; Monterola, Christopher Pineda; Lai, Choy Heng
2017-10-01
It has been known that assortative network structure plays an important role in spreading dynamics for unweighted networks. Yet its influence on weighted networks is not clear, in particular when weight is strongly correlated with the degrees of the nodes as we empirically observed in Twitter. Here we use the self-consistent probability method and revised nonperturbative heterogenous mean-field theory method to investigate this influence on both susceptible-infective-recovered (SIR) and susceptible-infective-susceptible (SIS) spreading dynamics. Both our simulation and theoretical results show that while the critical threshold is not significantly influenced by the assortativity, the prevalence in the supercritical regime shows a crossover under different degree-weight correlations. In particular, unlike the case of random mixing networks, in assortative networks, the negative degree-weight correlation leads to higher prevalence in their spreading beyond the critical transmissivity than that of the positively correlated. In addition, the previously observed inhibition effect on spreading velocity by assortative structure is not apparent in negatively degree-weight correlated networks, while it is enhanced for that of the positively correlated. Detailed investigation into the degree distribution of the infected nodes reveals that small-degree nodes play essential roles in the supercritical phase of both SIR and SIS spreadings. Our results have direct implications in understanding viral information spreading over online social networks and epidemic spreading over contact networks.
NASA Astrophysics Data System (ADS)
da Silva, Roberto
2018-06-01
This work explores the features of a graph generated by agents that hop from one node to another node, where the nodes have evolutionary attractiveness. The jumps are governed by Boltzmann-like transition probabilities that depend both on the euclidean distance between the nodes and on the ratio (β) of the attractiveness between them. It is shown that persistent nodes, i.e., nodes that never been reached by this special random walk are possible in the stationary limit differently from the case where the attractiveness is fixed and equal to one for all nodes (β = 1). Simultaneously, one also investigates the spectral properties and statistics related to the attractiveness and degree distribution of the evolutionary network. Finally, a study of the crossover between persistent phase and no persistent phase was performed and it was also observed the existence of a special type of transition probability which leads to a power law behaviour for the time evolution of the persistence.
The Nature of the Nodes, Weights and Degree of Precision in Gaussian Quadrature Rules
ERIC Educational Resources Information Center
Prentice, J. S. C.
2011-01-01
We present a comprehensive proof of the theorem that relates the weights and nodes of a Gaussian quadrature rule to its degree of precision. This level of detail is often absent in modern texts on numerical analysis. We show that the degree of precision is maximal, and that the approximation error in Gaussian quadrature is minimal, in a…
Evolution of cooperation under social pressure in multiplex networks
NASA Astrophysics Data System (ADS)
Pereda, María
2016-09-01
In this work, we aim to contribute to the understanding of human prosocial behavior by studying the influence that a particular form of social pressure, "being watched," has on the evolution of cooperative behavior. We study how cooperation emerges in multiplex complex topologies by analyzing a particular bidirectionally coupled dynamics on top of a two-layer multiplex network (duplex). The coupled dynamics appears between the prisoner's dilemma game in a network and a threshold cascade model in the other. The threshold model is intended to abstract the behavior of a network of vigilant nodes that impose the pressure of being observed altering hence the temptation to defect of the dilemma. Cooperation or defection in the game also affects the state of a node of being vigilant. We analyze these processes on different duplex networks structures and assess the influence of the topology, average degree and correlated multiplexity, on the outcome of cooperation. Interestingly, we find that the social pressure of vigilance may impact cooperation positively or negatively, depending on the duplex structure, specifically the degree correlations between layers is determinant. Our results give further quantitative insights in the promotion of cooperation under social pressure.
To Each According to its Degree: The Meritocracy and Topocracy of Embedded Markets
NASA Astrophysics Data System (ADS)
Borondo, J.; Borondo, F.; Rodriguez-Sickert, C.; Hidalgo, C. A.
2014-01-01
A system is said to be meritocratic if the compensation and power available to individuals is determined by their abilities and merits. A system is topocratic if the compensation and power available to an individual is determined primarily by her position in a network. Here we introduce a model that is perfectly meritocratic for fully connected networks but that becomes topocratic for sparse networks-like the ones in society. In the model, individuals produce and sell content, but also distribute the content produced by others when they belong to the shortest path connecting a buyer and a seller. The production and distribution of content defines two channels of compensation: a meritocratic channel, where individuals are compensated for the content they produce, and a topocratic channel, where individual compensation is based on the number of shortest paths that go through them in the network. We solve the model analytically and show that the distribution of payoffs is meritocratic only if the average degree of the nodes is larger than a root of the total number of nodes. We conclude that, in the light of this model, the sparsity and structure of networks represents a fundamental constraint to the meritocracy of societies.
To each according to its degree: the meritocracy and topocracy of embedded markets.
Borondo, J; Borondo, F; Rodriguez-Sickert, C; Hidalgo, C A
2014-01-21
A system is said to be meritocratic if the compensation and power available to individuals is determined by their abilities and merits. A system is topocratic if the compensation and power available to an individual is determined primarily by her position in a network. Here we introduce a model that is perfectly meritocratic for fully connected networks but that becomes topocratic for sparse networks-like the ones in society. In the model, individuals produce and sell content, but also distribute the content produced by others when they belong to the shortest path connecting a buyer and a seller. The production and distribution of content defines two channels of compensation: a meritocratic channel, where individuals are compensated for the content they produce, and a topocratic channel, where individual compensation is based on the number of shortest paths that go through them in the network. We solve the model analytically and show that the distribution of payoffs is meritocratic only if the average degree of the nodes is larger than a root of the total number of nodes. We conclude that, in the light of this model, the sparsity and structure of networks represents a fundamental constraint to the meritocracy of societies.
Evolution of cooperation under social pressure in multiplex networks.
Pereda, María
2016-09-01
In this work, we aim to contribute to the understanding of human prosocial behavior by studying the influence that a particular form of social pressure, "being watched," has on the evolution of cooperative behavior. We study how cooperation emerges in multiplex complex topologies by analyzing a particular bidirectionally coupled dynamics on top of a two-layer multiplex network (duplex). The coupled dynamics appears between the prisoner's dilemma game in a network and a threshold cascade model in the other. The threshold model is intended to abstract the behavior of a network of vigilant nodes that impose the pressure of being observed altering hence the temptation to defect of the dilemma. Cooperation or defection in the game also affects the state of a node of being vigilant. We analyze these processes on different duplex networks structures and assess the influence of the topology, average degree and correlated multiplexity, on the outcome of cooperation. Interestingly, we find that the social pressure of vigilance may impact cooperation positively or negatively, depending on the duplex structure, specifically the degree correlations between layers is determinant. Our results give further quantitative insights in the promotion of cooperation under social pressure.
What can graph theory tell us about word learning and lexical retrieval?
Vitevitch, Michael S
2008-04-01
Graph theory and the new science of networks provide a mathematically rigorous approach to examine the development and organization of complex systems. These tools were applied to the mental lexicon to examine the organization of words in the lexicon and to explore how that structure might influence the acquisition and retrieval of phonological word-forms. Pajek, a program for large network analysis and visualization (V. Batagelj & A. Mvrar, 1998), was used to examine several characteristics of a network derived from a computerized database of the adult lexicon. Nodes in the network represented words, and a link connected two nodes if the words were phonological neighbors. The average path length and clustering coefficient suggest that the phonological network exhibits small-world characteristics. The degree distribution was fit better by an exponential rather than a power-law function. Finally, the network exhibited assortative mixing by degree. Some of these structural characteristics were also found in graphs that were formed by 2 simple stochastic processes suggesting that similar processes might influence the development of the lexicon. The graph theoretic perspective may provide novel insights about the mental lexicon and lead to future studies that help us better understand language development and processing.
Toward cost-efficient sampling methods
NASA Astrophysics Data System (ADS)
Luo, Peng; Li, Yongli; Wu, Chong; Zhang, Guijie
2015-09-01
The sampling method has been paid much attention in the field of complex network in general and statistical physics in particular. This paper proposes two new sampling methods based on the idea that a small part of vertices with high node degree could possess the most structure information of a complex network. The two proposed sampling methods are efficient in sampling high degree nodes so that they would be useful even if the sampling rate is low, which means cost-efficient. The first new sampling method is developed on the basis of the widely used stratified random sampling (SRS) method and the second one improves the famous snowball sampling (SBS) method. In order to demonstrate the validity and accuracy of two new sampling methods, we compare them with the existing sampling methods in three commonly used simulation networks that are scale-free network, random network, small-world network, and also in two real networks. The experimental results illustrate that the two proposed sampling methods perform much better than the existing sampling methods in terms of achieving the true network structure characteristics reflected by clustering coefficient, Bonacich centrality and average path length, especially when the sampling rate is low.
Characterization of topological structure on complex networks.
Nakamura, Ikuo
2003-10-01
Characterizing the topological structure of complex networks is a significant problem especially from the viewpoint of data mining on the World Wide Web. "Page rank" used in the commercial search engine Google is such a measure of authority to rank all the nodes matching a given query. We have investigated the page-rank distribution of the real Web and a growing network model, both of which have directed links and exhibit a power law distributions of in-degree (the number of incoming links to the node) and out-degree (the number of outgoing links from the node), respectively. We find a concentration of page rank on a small number of nodes and low page rank on high degree regimes in the real Web, which can be explained by topological properties of the network, e.g., network motifs, and connectivities of nearest neighbors.
Spontaneous scale-free structure in adaptive networks with synchronously dynamical linking
NASA Astrophysics Data System (ADS)
Yuan, Wu-Jie; Zhou, Jian-Fang; Li, Qun; Chen, De-Bao; Wang, Zhen
2013-08-01
Inspired by the anti-Hebbian learning rule in neural systems, we study how the feedback from dynamical synchronization shapes network structure by adding new links. Through extensive numerical simulations, we find that an adaptive network spontaneously forms scale-free structure, as confirmed in many real systems. Moreover, the adaptive process produces two nontrivial power-law behaviors of deviation strength from mean activity of the network and negative degree correlation, which exists widely in technological and biological networks. Importantly, these scalings are robust to variation of the adaptive network parameters, which may have meaningful implications in the scale-free formation and manipulation of dynamical networks. Our study thus suggests an alternative adaptive mechanism for the formation of scale-free structure with negative degree correlation, which means that nodes of high degree tend to connect, on average, with others of low degree and vice versa. The relevance of the results to structure formation and dynamical property in neural networks is briefly discussed as well.
Robustness of Controllability for Networks Based on Edge-Attack
Nie, Sen; Wang, Xuwen; Zhang, Haifeng; Li, Qilang; Wang, Binghong
2014-01-01
We study the controllability of networks in the process of cascading failures under two different attacking strategies, random and intentional attack, respectively. For the highest-load edge attack, it is found that the controllability of Erdős-Rényi network, that with moderate average degree, is less robust, whereas the Scale-free network with moderate power-law exponent shows strong robustness of controllability under the same attack strategy. The vulnerability of controllability under random and intentional attacks behave differently with the increasing of removal fraction, especially, we find that the robustness of control has important role in cascades for large removal fraction. The simulation results show that for Scale-free networks with various power-law exponents, the network has larger scale of cascades do not mean that there will be more increments of driver nodes. Meanwhile, the number of driver nodes in cascading failures is also related to the edges amount in strongly connected components. PMID:24586507
Robustness of controllability for networks based on edge-attack.
Nie, Sen; Wang, Xuwen; Zhang, Haifeng; Li, Qilang; Wang, Binghong
2014-01-01
We study the controllability of networks in the process of cascading failures under two different attacking strategies, random and intentional attack, respectively. For the highest-load edge attack, it is found that the controllability of Erdős-Rényi network, that with moderate average degree, is less robust, whereas the Scale-free network with moderate power-law exponent shows strong robustness of controllability under the same attack strategy. The vulnerability of controllability under random and intentional attacks behave differently with the increasing of removal fraction, especially, we find that the robustness of control has important role in cascades for large removal fraction. The simulation results show that for Scale-free networks with various power-law exponents, the network has larger scale of cascades do not mean that there will be more increments of driver nodes. Meanwhile, the number of driver nodes in cascading failures is also related to the edges amount in strongly connected components.
Enhancing the transmission efficiency by edge deletion in scale-free networks
NASA Astrophysics Data System (ADS)
Zhang, Guo-Qing; Wang, Di; Li, Guo-Jie
2007-07-01
How to improve the transmission efficiency of Internet-like packet switching networks is one of the most important problems in complex networks as well as for the Internet research community. In this paper we propose a convenient method to enhance the transmission efficiency of scale-free networks dramatically by kicking out the edges linking to nodes with large betweenness, which we called the “black sheep.” The advantages of our method are of facility and practical importance. Since the black sheep edges are very costly due to their large bandwidth, our method could decrease the cost as well as gain higher throughput of networks. Moreover, we analyze the curve of the largest betweenness on deleting more and more black sheep edges and find that there is a sharp transition at the critical point where the average degree of the nodes ⟨k⟩→2 .
Percolation of spatially constrained Erdős-Rényi networks with degree correlations.
Schmeltzer, C; Soriano, J; Sokolov, I M; Rüdiger, S
2014-01-01
Motivated by experiments on activity in neuronal cultures [ J. Soriano, M. Rodríguez Martínez, T. Tlusty and E. Moses Proc. Natl. Acad. Sci. 105 13758 (2008)], we investigate the percolation transition and critical exponents of spatially embedded Erdős-Rényi networks with degree correlations. In our model networks, nodes are randomly distributed in a two-dimensional spatial domain, and the connection probability depends on Euclidian link length by a power law as well as on the degrees of linked nodes. Generally, spatial constraints lead to higher percolation thresholds in the sense that more links are needed to achieve global connectivity. However, degree correlations favor or do not favor percolation depending on the connectivity rules. We employ two construction methods to introduce degree correlations. In the first one, nodes stay homogeneously distributed and are connected via a distance- and degree-dependent probability. We observe that assortativity in the resulting network leads to a decrease of the percolation threshold. In the second construction methods, nodes are first spatially segregated depending on their degree and afterwards connected with a distance-dependent probability. In this segregated model, we find a threshold increase that accompanies the rising assortativity. Additionally, when the network is constructed in a disassortative way, we observe that this property has little effect on the percolation transition.
IT product competition Network
NASA Astrophysics Data System (ADS)
Xu, Xiu-Lian; Zhou, Lei; Shi, Jian-Jun; Wang, Yong-Li; Feng, Ai-Xia; He, Da-Ren
2008-03-01
Along with the technical development, the IT product competition becomes increasingly fierce in recent years. The factories, which produce the same IT product, have to improve continuously their own product quality for taking a large piece of cake in the product sale market. We suggest using a complex network description for the IT product competition. In the network the factories are defined as nodes, and two nodes are connected by a link if they produce a common IT product. The edge represents the sale competition relationship. 2121 factories and 265 products have been investigated. Some statistical properties, such as the degree distribution, node strength distribution, assortativity, and node degree correlation have been empirically obtained.
Shi, Binbin; Wei, Wei; Wang, Yihuai; Shu, Wanneng
2016-01-01
In high-density sensor networks, scheduling some sensor nodes to be in the sleep mode while other sensor nodes remain active for monitoring or forwarding packets is an effective control scheme to conserve energy. In this paper, a Coverage-Preserving Control Scheduling Scheme (CPCSS) based on a cloud model and redundancy degree in sensor networks is proposed. Firstly, the normal cloud model is adopted for calculating the similarity degree between the sensor nodes in terms of their historical data, and then all nodes in each grid of the target area can be classified into several categories. Secondly, the redundancy degree of a node is calculated according to its sensing area being covered by the neighboring sensors. Finally, a centralized approximation algorithm based on the partition of the target area is designed to obtain the approximate minimum set of nodes, which can retain the sufficient coverage of the target region and ensure the connectivity of the network at the same time. The simulation results show that the proposed CPCSS can balance the energy consumption and optimize the coverage performance of the sensor network. PMID:27754405
Shi, Binbin; Wei, Wei; Wang, Yihuai; Shu, Wanneng
2016-10-14
In high-density sensor networks, scheduling some sensor nodes to be in the sleep mode while other sensor nodes remain active for monitoring or forwarding packets is an effective control scheme to conserve energy. In this paper, a Coverage-Preserving Control Scheduling Scheme (CPCSS) based on a cloud model and redundancy degree in sensor networks is proposed. Firstly, the normal cloud model is adopted for calculating the similarity degree between the sensor nodes in terms of their historical data, and then all nodes in each grid of the target area can be classified into several categories. Secondly, the redundancy degree of a node is calculated according to its sensing area being covered by the neighboring sensors. Finally, a centralized approximation algorithm based on the partition of the target area is designed to obtain the approximate minimum set of nodes, which can retain the sufficient coverage of the target region and ensure the connectivity of the network at the same time. The simulation results show that the proposed CPCSS can balance the energy consumption and optimize the coverage performance of the sensor network.
A spread willingness computing-based information dissemination model.
Huang, Haojing; Cui, Zhiming; Zhang, Shukui
2014-01-01
This paper constructs a kind of spread willingness computing based on information dissemination model for social network. The model takes into account the impact of node degree and dissemination mechanism, combined with the complex network theory and dynamics of infectious diseases, and further establishes the dynamical evolution equations. Equations characterize the evolutionary relationship between different types of nodes with time. The spread willingness computing contains three factors which have impact on user's spread behavior: strength of the relationship between the nodes, views identity, and frequency of contact. Simulation results show that different degrees of nodes show the same trend in the network, and even if the degree of node is very small, there is likelihood of a large area of information dissemination. The weaker the relationship between nodes, the higher probability of views selection and the higher the frequency of contact with information so that information spreads rapidly and leads to a wide range of dissemination. As the dissemination probability and immune probability change, the speed of information dissemination is also changing accordingly. The studies meet social networking features and can help to master the behavior of users and understand and analyze characteristics of information dissemination in social network.
A Spread Willingness Computing-Based Information Dissemination Model
Cui, Zhiming; Zhang, Shukui
2014-01-01
This paper constructs a kind of spread willingness computing based on information dissemination model for social network. The model takes into account the impact of node degree and dissemination mechanism, combined with the complex network theory and dynamics of infectious diseases, and further establishes the dynamical evolution equations. Equations characterize the evolutionary relationship between different types of nodes with time. The spread willingness computing contains three factors which have impact on user's spread behavior: strength of the relationship between the nodes, views identity, and frequency of contact. Simulation results show that different degrees of nodes show the same trend in the network, and even if the degree of node is very small, there is likelihood of a large area of information dissemination. The weaker the relationship between nodes, the higher probability of views selection and the higher the frequency of contact with information so that information spreads rapidly and leads to a wide range of dissemination. As the dissemination probability and immune probability change, the speed of information dissemination is also changing accordingly. The studies meet social networking features and can help to master the behavior of users and understand and analyze characteristics of information dissemination in social network. PMID:25110738
Degree Distribution of Position-Dependent Ball-Passing Networks in Football Games
NASA Astrophysics Data System (ADS)
Narizuka, Takuma; Yamamoto, Ken; Yamazaki, Yoshihiro
2015-08-01
We propose a simple stochastic model describing the position-dependent ball-passing network in football (soccer) games. In this network, a player in a certain area in a divided field is a node, and a pass between two nodes corresponds to an edge. Our stochastic process model is characterized by the consecutive choice of a node depending on its intrinsic fitness. We derive an explicit expression for the degree distribution and find that the derived distribution reproduces that for actual data reasonably well.
Characterizing the topology of probabilistic biological networks.
Todor, Andrei; Dobra, Alin; Kahveci, Tamer
2013-01-01
Biological interactions are often uncertain events, that may or may not take place with some probability. This uncertainty leads to a massive number of alternative interaction topologies for each such network. The existing studies analyze the degree distribution of biological networks by assuming that all the given interactions take place under all circumstances. This strong and often incorrect assumption can lead to misleading results. In this paper, we address this problem and develop a sound mathematical basis to characterize networks in the presence of uncertain interactions. Using our mathematical representation, we develop a method that can accurately describe the degree distribution of such networks. We also take one more step and extend our method to accurately compute the joint-degree distributions of node pairs connected by edges. The number of possible network topologies grows exponentially with the number of uncertain interactions. However, the mathematical model we develop allows us to compute these degree distributions in polynomial time in the number of interactions. Our method works quickly even for entire protein-protein interaction (PPI) networks. It also helps us find an adequate mathematical model using MLE. We perform a comparative study of node-degree and joint-degree distributions in two types of biological networks: the classical deterministic networks and the more flexible probabilistic networks. Our results confirm that power-law and log-normal models best describe degree distributions for both probabilistic and deterministic networks. Moreover, the inverse correlation of degrees of neighboring nodes shows that, in probabilistic networks, nodes with large number of interactions prefer to interact with those with small number of interactions more frequently than expected. We also show that probabilistic networks are more robust for node-degree distribution computation than the deterministic ones. all the data sets used, the software implemented and the alignments found in this paper are available at http://bioinformatics.cise.ufl.edu/projects/probNet/.
NASA Astrophysics Data System (ADS)
Yang, Hong-Yong; Zhang, Shun; Zong, Guang-Deng
2011-01-01
In this paper, the trajectory control of multi-agent dynamical systems with exogenous disturbances is studied. Suppose multiple agents composing of a scale-free network topology, the performance of rejecting disturbances for the low degree node and high degree node is analyzed. Firstly, the consensus of multi-agent systems without disturbances is studied by designing a pinning control strategy on a part of agents, where this pinning control can bring multiple agents' states to an expected consensus track. Then, the influence of the disturbances is considered by developing disturbance observers, and disturbance observers based control (DOBC) are developed for disturbances generated by an exogenous system to estimate the disturbances. Asymptotical consensus of the multi-agent systems with disturbances under the composite controller can be achieved for scale-free network topology. Finally, by analyzing examples of multi-agent systems with scale-free network topology and exogenous disturbances, the verities of the results are proved. Under the DOBC with the designed parameters, the trajectory convergence of multi-agent systems is researched by pinning two class of the nodes. We have found that it has more stronger robustness to exogenous disturbances for the high degree node pinned than that of the low degree node pinned.
Alagapan, Sankaraleengam; Franca, Eric; Pan, Liangbin; Leondopulos, Stathis; Wheeler, Bruce C; DeMarse, Thomas B
2016-01-01
In this study, we created four network topologies composed of living cortical neurons and compared resultant structural-functional dynamics including the nature and quality of information transmission. Each living network was composed of living cortical neurons and were created using microstamping of adhesion promoting molecules and each was "designed" with different levels of convergence embedded within each structure. Networks were cultured over a grid of electrodes that permitted detailed measurements of neural activity at each node in the network. Of the topologies we tested, the "Random" networks in which neurons connect based on their own intrinsic properties transmitted information embedded within their spike trains with higher fidelity relative to any other topology we tested. Within our patterned topologies in which we explicitly manipulated structure, the effect of convergence on fidelity was dependent on both topology and time-scale (rate vs. temporal coding). A more detailed examination using tools from network analysis revealed that these changes in fidelity were also associated with a number of other structural properties including a node's degree, degree-degree correlations, path length, and clustering coefficients. Whereas information transmission was apparent among nodes with few connections, the greatest transmission fidelity was achieved among the few nodes possessing the highest number of connections (high degree nodes or putative hubs). These results provide a unique view into the relationship between structure and its affect on transmission fidelity, at least within these small neural populations with defined network topology. They also highlight the potential role of tools such as microstamp printing and microelectrode array recordings to construct and record from arbitrary network topologies to provide a new direction in which to advance the study of structure-function relationships.
The degree-related clustering coefficient and its application to link prediction
NASA Astrophysics Data System (ADS)
Liu, Yangyang; Zhao, Chengli; Wang, Xiaojie; Huang, Qiangjuan; Zhang, Xue; Yi, Dongyun
2016-07-01
Link prediction plays a significant role in explaining the evolution of networks. However it is still a challenging problem that has been addressed only with topological information in recent years. Based on the belief that network nodes with a great number of common neighbors are more likely to be connected, many similarity indices have achieved considerable accuracy and efficiency. Motivated by the natural assumption that the effect of missing links on the estimation of a node's clustering ability could be related to node degree, in this paper, we propose a degree-related clustering coefficient index to quantify the clustering ability of nodes. Unlike the classical clustering coefficient, our new coefficient is highly robust when the observed bias of links is considered. Furthermore, we propose a degree-related clustering ability path (DCP) index, which applies the proposed coefficient to the link prediction problem. Experiments on 12 real-world networks show that our proposed method is highly accurate and robust compared with four common-neighbor-based similarity indices (Common Neighbors(CN), Adamic-Adar(AA), Resource Allocation(RA), and Preferential Attachment(PA)), and the recently introduced clustering ability (CA) index.
NASA Astrophysics Data System (ADS)
Al-garadi, Mohammed Ali; Varathan, Kasturi Dewi; Ravana, Sri Devi
2017-02-01
Online social networks (OSNs) have become a vital part of everyday living. OSNs provide researchers and scientists with unique prospects to comprehend individuals on a scale and to analyze human behavioral patterns. Influential spreaders identification is an important subject in understanding the dynamics of information diffusion in OSNs. Targeting these influential spreaders is significant in planning the techniques for accelerating the propagation of information that is useful for various applications, such as viral marketing applications or blocking the diffusion of annoying information (spreading of viruses, rumors, online negative behaviors, and cyberbullying). Existing K-core decomposition methods consider links equally when calculating the influential spreaders for unweighted networks. Alternatively, the proposed link weights are based only on the degree of nodes. Thus, if a node is linked to high-degree nodes, then this node will receive high weight and is treated as an important node. Conversely, the degree of nodes in OSN context does not always provide accurate influence of users. In the present study, we improve the K-core method for OSNs by proposing a novel link-weighting method based on the interaction among users. The proposed method is based on the observation that the interaction of users is a significant factor in quantifying the spreading capability of user in OSNs. The tracking of diffusion links in the real spreading dynamics of information verifies the effectiveness of our proposed method for identifying influential spreaders in OSNs as compared with degree centrality, PageRank, and original K-core.
Complex network structure of musical compositions: Algorithmic generation of appealing music
NASA Astrophysics Data System (ADS)
Liu, Xiao Fan; Tse, Chi K.; Small, Michael
2010-01-01
In this paper we construct networks for music and attempt to compose music artificially. Networks are constructed with nodes and edges corresponding to musical notes and their co-occurring connections. We analyze classical music from Bach, Mozart, Chopin, as well as other types of music such as Chinese pop music. We observe remarkably similar properties in all networks constructed from the selected compositions. We conjecture that preserving the universal network properties is a necessary step in artificial composition of music. Power-law exponents of node degree, node strength and/or edge weight distributions, mean degrees, clustering coefficients, mean geodesic distances, etc. are reported. With the network constructed, music can be composed artificially using a controlled random walk algorithm, which begins with a randomly chosen note and selects the subsequent notes according to a simple set of rules that compares the weights of the edges, weights of the nodes, and/or the degrees of nodes. By generating a large number of compositions, we find that this algorithm generates music which has the necessary qualities to be subjectively judged as appealing.
[Numbers of lymph nodes in large intestinal resections for colorectal carcinoma].
Motycka, V; Ferko, A; Tycová, V; Nikolov, Hadzi; Sotona, O; Cecka, F; Dusek, T; Chobola, M; Pospísil, I
2010-03-01
Precise evaluation of lymph nodes in the surgical specimen is crucial for the staging and subsequent decision about the adjuvant therapy in colorectal cancer. Prognosis of the patients can be assessed only in cases when at least 12 lymph nodes in the surgical specimen are examined. To evaluate the radicalism of resections for colorectal carcinoma after introducing laparoscopic approach. We compared all resections for primary colorectal cancer and rectal cancer (C 18-C20) performed in the Department of Surgery in University Hospital Hradec Králové in the years 2005 and 2008 and we evaluated numbers of examined lymph nodes in the surgical specimens. The patients with recurrent tumours and the patients with complete pathological response (negative histology) after neoadjuvant therapy were excluded from the study. 117 patients were included in the study in 2005, 2 of them were operated laparoscopically. 155 patients (more by 32.5%) were included in the study in 2008, 53 of them (34.2%) were operated laparoscopically. In tumours of the right part of the colon (C180-C184) treated by right hemicolectomy: on an average 7.9 (+/- 5.3) lymph nodes were examined in the specimens in 2005, and 15.3 (+/- 7.0) lymph nodes in 2008. In tumours of the left part of the colon (C185-C186) treated by left hemicolectomy: 6.5 (+/- 5.1) lymph nodes were examined in 2005, and 19.6 (+/- 15.6) in 2008. In tumours of the sigmoid colon (C187) 9.1 (+/- 6.9) lymph nodes were examined in 2005,and 15.4 (+/- 7.9) in 2008. In tumours of the rectosigmoid junction (C19) 8.0 (+/- 6.9) lymph nodes were examined in 2005, and 17.8 (+/- 11.2) in 2008. In rectal cancer (C20) 5.2 (+/- 4.5) lymph nodes were examined in 2005, and 13.6 (+/- 12.5) in 2008. There is a significant difference in a number of examined lymph nodes in patients without neodadjuvant treatment compared to those with neoadjuvant chemoradiotherapy and neoadjuvant radiotherapy. In 2005, in an average 3.7 (+/- 3.3) lymph nodes were removed in rectal resections after neoadjuvant chemoradiotherapy, in 2008 in an average 7.6 (+/- 6.1) lymph nodes were removed. In 2005, in an average 5.1 (+/- 3.7) lymph nodes in rectal resections after neoadjuvant radiotherapy were removed, in 2008 6.3 (+/- 4.3) lymph nodes were removed. In 2005, in an average 7.0 (+/- 5.5) lymph nodes in rectal resections without neoadjuvant therapy were removed, in 2008 20.9 (+/- 14.1) lymph nodes were removed. Laparoscopic resections were comparable with open resections regarding the number of examined lymph nodes in our group of patients. Introducing the laparoscopic approach to resections of colorectal carcinomas did not decrease radicalism of the operation as to the number of removed lymph nodes.
Empirical investigation of topological and weighted properties of a bus transport network from China
NASA Astrophysics Data System (ADS)
Shu-Min, Feng; Bao-Yu, Hu; Cen, Nie; Xiang-Hao, Shen; Yu-Sheng, Ci
2016-03-01
Many bus transport networks (BTNs) have evolved into directed networks. A new representation model for BTNs is proposed, called directed-space P. The bus transport network of Harbin (BTN-H) is described as a directed and weighted complex network by the proposed representation model and by giving each node weights. The topological and weighted properties are revealed in detail. In-degree and out-degree distributions, in-weight and out-weight distributions are presented as an exponential law, respectively. There is a strong relation between in-weight and in-degree (also between out-weight and out-degree), which can be fitted by a power function. Degree-degree and weight-weight correlations are investigated to reveal that BTN-H has a disassortative behavior as the nodes have relatively high degree (or weight). The disparity distributions of out-degree and in-degree follow an approximate power-law. Besides, the node degree shows a near linear increase with the number of routes that connect to the corresponding station. These properties revealed in this paper can help public transport planners to analyze the status quo of the BTN in nature. Project supported by the National High Technology Research and Development Program of China (Grant No. 2014AA110304).
10 % fluorescein sodium vs 1 % isosulfan blue in breast sentinel lymph node biopsy.
Ren, Lidong; Liu, Zhao; Liang, Mengdi; Wang, Li; Song, Xingli; Wang, Shui
2016-11-03
Sentinel lymph node biopsy (SLNB) is well accepted to be a standard procedure in breast cancer surgery with clinically negative lymph nodes. Isosulfan blue is the first dye approved by the USA Food and Drug Administration for the localization of the lymphatic system. Few alternative tracers have been investigated. In this study, we aimed to compare the differences between 10 % fluorescein sodium and 1 % isosulfan blue in breast sentinel lymph node biopsy and to investigate the feasibility of using 10 % fluorescein sodium as a new dye for breast sentinel lymph node biopsy. A total of 30 New Zealand rabbits were randomly divided into the fluorescein sodium group and the isosulfan blue group (15 rabbits per group). Fluorescein sodium or isosulfan blue was injected subcutaneously into the second pair of mammary areolas. The average fading time of the second lymph nodes in the isosulfan blue group was significantly shorter than that in the fluorescein sodium group. Moreover, the detection rates of SLNs were higher in the fluorescein sodium group than in the isosulfan blue group. No significant differences between the fluorescein sodium group and isosulfan blue group were observed regarding the distances between the detected sentinel lymph nodes and second pair of mammary areolas, the distances between the second lymph nodes and second pair of mammary areolas, the number of detected sentinel lymph nodes and second lymph nodes, the average dyeing time of the sentinel and the second lymph nodes, and the average fading time of the second lymph nodes. In summary, we first reported that fluorescein sodium is a potential new tracer for breast sentinel lymph node biopsy.
NASA Astrophysics Data System (ADS)
Del Rey Fernández, David C.; Boom, Pieter D.; Zingg, David W.
2017-02-01
Combined with simultaneous approximation terms, summation-by-parts (SBP) operators offer a versatile and efficient methodology that leads to consistent, conservative, and provably stable discretizations. However, diagonal-norm operators with a repeating interior-point operator that have thus far been constructed suffer from a loss of accuracy. While on the interior, these operators are of degree 2p, at a number of nodes near the boundaries, they are of degree p, and therefore of global degree p - meaning the highest degree monomial for which the operators are exact at all nodes. This implies that for hyperbolic problems and operators of degree greater than unity they lead to solutions with a global order of accuracy lower than the degree of the interior-point operator. In this paper, we develop a procedure to construct diagonal-norm first-derivative SBP operators that are of degree 2p at all nodes and therefore can lead to solutions of hyperbolic problems of order 2 p + 1. This is accomplished by adding nonzero entries in the upper-right and lower-left corners of SBP operator matrices with a repeating interior-point operator. This modification necessitates treating these new operators as elements, where mesh refinement is accomplished by increasing the number of elements in the mesh rather than increasing the number of nodes. The significant improvements in accuracy of this new family, for the same repeating interior-point operator, are demonstrated in the context of the linear convection equation.
Seo, Joo-Hyun; Park, Jihyang; Kim, Eun-Mi; Kim, Juhan; Joo, Keehyoung; Lee, Jooyoung; Kim, Byung-Gee
2014-02-01
Sequence subgrouping for a given sequence set can enable various informative tasks such as the functional discrimination of sequence subsets and the functional inference of unknown sequences. Because an identity threshold for sequence subgrouping may vary according to the given sequence set, it is highly desirable to construct a robust subgrouping algorithm which automatically identifies an optimal identity threshold and generates subgroups for a given sequence set. To meet this end, an automatic sequence subgrouping method, named 'Subgrouping Automata' was constructed. Firstly, tree analysis module analyzes the structure of tree and calculates the all possible subgroups in each node. Sequence similarity analysis module calculates average sequence similarity for all subgroups in each node. Representative sequence generation module finds a representative sequence using profile analysis and self-scoring for each subgroup. For all nodes, average sequence similarities are calculated and 'Subgrouping Automata' searches a node showing statistically maximum sequence similarity increase using Student's t-value. A node showing the maximum t-value, which gives the most significant differences in average sequence similarity between two adjacent nodes, is determined as an optimum subgrouping node in the phylogenetic tree. Further analysis showed that the optimum subgrouping node from SA prevents under-subgrouping and over-subgrouping. Copyright © 2013. Published by Elsevier Ltd.
NASA Astrophysics Data System (ADS)
Gui, Chun; Zhang, Ruisheng; Zhao, Zhili; Wei, Jiaxuan; Hu, Rongjing
In order to deal with stochasticity in center node selection and instability in community detection of label propagation algorithm, this paper proposes an improved label propagation algorithm named label propagation algorithm based on community belonging degree (LPA-CBD) that employs community belonging degree to determine the number and the center of community. The general process of LPA-CBD is that the initial community is identified by the nodes with the maximum degree, and then it is optimized or expanded by community belonging degree. After getting the rough structure of network community, the remaining nodes are labeled by using label propagation algorithm. The experimental results on 10 real-world networks and three synthetic networks show that LPA-CBD achieves reasonable community number, better algorithm accuracy and higher modularity compared with other four prominent algorithms. Moreover, the proposed algorithm not only has lower algorithm complexity and higher community detection quality, but also improves the stability of the original label propagation algorithm.
Effects of multiple spreaders in community networks
NASA Astrophysics Data System (ADS)
Hu, Zhao-Long; Ren, Zhuo-Ming; Yang, Guang-Yong; Liu, Jian-Guo
2014-12-01
Human contact networks exhibit the community structure. Understanding how such community structure affects the epidemic spreading could provide insights for preventing the spreading of epidemics between communities. In this paper, we explore the spreading of multiple spreaders in community networks. A network based on the clustering preferential mechanism is evolved, whose communities are detected by the Girvan-Newman (GN) algorithm. We investigate the spreading effectiveness by selecting the nodes as spreaders in the following ways: nodes with the largest degree in each community (community hubs), the same number of nodes with the largest degree from the global network (global large-degree) and randomly selected one node within each community (community random). The experimental results on the SIR model show that the spreading effectiveness based on the global large-degree and community hubs methods is the same in the early stage of the infection and the method of community random is the worst. However, when the infection rate exceeds the critical value, the global large-degree method embodies the worst spreading effectiveness. Furthermore, the discrepancy of effectiveness for the three methods will decrease as the infection rate increases. Therefore, we should immunize the hubs in each community rather than those hubs in the global network to prevent the outbreak of epidemics.
Wan, Jan; Xiong, Naixue; Zhang, Wei; Zhang, Qinchao; Wan, Zheng
2012-01-01
The reliability of wireless sensor networks (WSNs) can be greatly affected by failures of sensor nodes due to energy exhaustion or the influence of brutal external environment conditions. Such failures seriously affect the data persistence and collection efficiency. Strategies based on network coding technology for WSNs such as LTCDS can improve the data persistence without mass redundancy. However, due to the bad intermediate performance of LTCDS, a serious ‘cliff effect’ may appear during the decoding period, and source data are hard to recover from sink nodes before sufficient encoded packets are collected. In this paper, the influence of coding degree distribution strategy on the ‘cliff effect’ is observed and the prioritized data storage and dissemination algorithm PLTD-ALPHA is presented to achieve better data persistence and recovering performance. With PLTD-ALPHA, the data in sensor network nodes present a trend that their degree distribution increases along with the degree level predefined, and the persistent data packets can be submitted to the sink node according to its degree in order. Finally, the performance of PLTD-ALPHA is evaluated and experiment results show that PLTD-ALPHA can greatly improve the data collection performance and decoding efficiency, while data persistence is not notably affected. PMID:23235451
Gosak, Marko; Stožer, Andraž; Markovič, Rene; Dolenšek, Jurij; Marhl, Marko; Rupnik, Marjan Slak; Perc, Matjaž
2015-07-01
Self-sustained oscillatory dynamics is a motion along a stable limit cycle in the phase space, and it arises in a wide variety of mechanical, electrical, and biological systems. Typically, oscillations are due to a balance between energy dissipation and generation. Their stability depends on the properties of the attractor, in particular, its dissipative characteristics, which in turn determine the flexibility of a given dynamical system. In a network of oscillators, the coupling additionally contributes to the dissipation, and hence affects the robustness of the oscillatory solution. Here, we therefore investigate how a heterogeneous network structure affects the dissipation rate of individual oscillators. First, we show that in a network of diffusively coupled oscillators, the dissipation is a linearly decreasing function of the node degree, and we demonstrate this numerically by calculating the average divergence of coupled Hopf oscillators. Subsequently, we use recordings of intracellular calcium dynamics in pancreatic beta cells in mouse acute tissue slices and the corresponding functional connectivity networks for an experimental verification of the presented theory. We use methods of nonlinear time series analysis to reconstruct the phase space and calculate the sum of Lyapunov exponents. Our analysis reveals a clear tendency of cells with a higher degree, that is, more interconnected cells, having more negative values of divergence, thus confirming our theoretical predictions. We discuss these findings in the context of energetic aspects of signaling in beta cells and potential risks for pathological changes in the tissue.
Identifying Node Role in Social Network Based on Multiple Indicators
Huang, Shaobin; Lv, Tianyang; Zhang, Xizhe; Yang, Yange; Zheng, Weimin; Wen, Chao
2014-01-01
It is a classic topic of social network analysis to evaluate the importance of nodes and identify the node that takes on the role of core or bridge in a network. Because a single indicator is not sufficient to analyze multiple characteristics of a node, it is a natural solution to apply multiple indicators that should be selected carefully. An intuitive idea is to select some indicators with weak correlations to efficiently assess different characteristics of a node. However, this paper shows that it is much better to select the indicators with strong correlations. Because indicator correlation is based on the statistical analysis of a large number of nodes, the particularity of an important node will be outlined if its indicator relationship doesn't comply with the statistical correlation. Therefore, the paper selects the multiple indicators including degree, ego-betweenness centrality and eigenvector centrality to evaluate the importance and the role of a node. The importance of a node is equal to the normalized sum of its three indicators. A candidate for core or bridge is selected from the great degree nodes or the nodes with great ego-betweenness centrality respectively. Then, the role of a candidate is determined according to the difference between its indicators' relationship with the statistical correlation of the overall network. Based on 18 real networks and 3 kinds of model networks, the experimental results show that the proposed methods perform quite well in evaluating the importance of nodes and in identifying the node role. PMID:25089823
What Can Graph Theory Tell Us About Word Learning and Lexical Retrieval?
Vitevitch, Michael S.
2008-01-01
Purpose Graph theory and the new science of networks provide a mathematically rigorous approach to examine the development and organization of complex systems. These tools were applied to the mental lexicon to examine the organization of words in the lexicon and to explore how that structure might influence the acquisition and retrieval of phonological word-forms. Method Pajek, a program for large network analysis and visualization (V. Batagelj & A. Mvrar, 1998), was used to examine several characteristics of a network derived from a computerized database of the adult lexicon. Nodes in the network represented words, and a link connected two nodes if the words were phonological neighbors. Results The average path length and clustering coefficient suggest that the phonological network exhibits small-world characteristics. The degree distribution was fit better by an exponential rather than a power-law function. Finally, the network exhibited assortative mixing by degree. Some of these structural characteristics were also found in graphs that were formed by 2 simple stochastic processes suggesting that similar processes might influence the development of the lexicon. Conclusions The graph theoretic perspective may provide novel insights about the mental lexicon and lead to future studies that help us better understand language development and processing. PMID:18367686
Effect of node attributes on the temporal dynamics of network structure
NASA Astrophysics Data System (ADS)
Momeni, Naghmeh; Fotouhi, Babak
2017-03-01
Many natural and social networks evolve in time and their structures are dynamic. In most networks, nodes are heterogeneous, and their roles in the evolution of structure differ. This paper focuses on the role of individual attributes on the temporal dynamics of network structure. We focus on a basic model for growing networks that incorporates node attributes (which we call "quality"), and we focus on the problem of forecasting the structural properties of the network in arbitrary times for an arbitrary initial network. That is, we address the following question: If we are given a certain initial network with given arbitrary structure and known node attributes, then how does the structure change in time as new nodes with given distribution of attributes join the network? We solve the model analytically and obtain the quality-degree joint distribution and degree correlations. We characterize the role of individual attributes in the position of individual nodes in the hierarchy of connections. We confirm the theoretical findings with Monte Carlo simulations.
Percolation on bipartite scale-free networks
NASA Astrophysics Data System (ADS)
Hooyberghs, H.; Van Schaeybroeck, B.; Indekeu, J. O.
2010-08-01
Recent studies introduced biased (degree-dependent) edge percolation as a model for failures in real-life systems. In this work, such process is applied to networks consisting of two types of nodes with edges running only between nodes of unlike type. Such bipartite graphs appear in many social networks, for instance in affiliation networks and in sexual-contact networks in which both types of nodes show the scale-free characteristic for the degree distribution. During the depreciation process, an edge between nodes with degrees k and q is retained with a probability proportional to (, where α is positive so that links between hubs are more prone to failure. The removal process is studied analytically by introducing a generating functions theory. We deduce exact self-consistent equations describing the system at a macroscopic level and discuss the percolation transition. Critical exponents are obtained by exploiting the Fortuin-Kasteleyn construction which provides a link between our model and a limit of the Potts model.
Performance Optimization of Priority Assisted CSMA/CA Mechanism of 802.15.6 under Saturation Regime
Shakir, Mustafa; Rehman, Obaid Ur; Rahim, Mudassir; Alrajeh, Nabil; Khan, Zahoor Ali; Khan, Mahmood Ashraf; Niaz, Iftikhar Azim; Javaid, Nadeem
2016-01-01
Due to the recent development in the field of Wireless Sensor Networks (WSNs), the Wireless Body Area Networks (WBANs) have become a major area of interest for the developers and researchers. Human body exhibits postural mobility due to which distance variation occurs and the status of connections amongst sensors change time to time. One of the major requirements of WBAN is to prolong the network lifetime without compromising on other performance measures, i.e., delay, throughput and bandwidth efficiency. Node prioritization is one of the possible solutions to obtain optimum performance in WBAN. IEEE 802.15.6 CSMA/CA standard splits the nodes with different user priorities based on Contention Window (CW) size. Smaller CW size is assigned to higher priority nodes. This standard helps to reduce delay, however, it is not energy efficient. In this paper, we propose a hybrid node prioritization scheme based on IEEE 802.15.6 CSMA/CA to reduce energy consumption and maximize network lifetime. In this scheme, optimum performance is achieved by node prioritization based on CW size as well as power in respective user priority. Our proposed scheme reduces the average back off time for channel access due to CW based prioritization. Additionally, power based prioritization for a respective user priority helps to minimize required number of retransmissions. Furthermore, we also compare our scheme with IEEE 802.15.6 CSMA/CA standard (CW assisted node prioritization) and power assisted node prioritization under postural mobility in WBAN. Mathematical expressions are derived to determine the accurate analytical model for throughput, delay, bandwidth efficiency, energy consumption and life time for each node prioritization scheme. With the intention of analytical model validation, we have performed the simulations in OMNET++/MIXIM framework. Analytical and simulation results show that our proposed hybrid node prioritization scheme outperforms other node prioritization schemes in terms of average network delay, average throughput, average bandwidth efficiency and network lifetime. PMID:27598167
Spectra of random networks in the weak clustering regime
NASA Astrophysics Data System (ADS)
Peron, Thomas K. DM.; Ji, Peng; Kurths, Jürgen; Rodrigues, Francisco A.
2018-03-01
The asymptotic behavior of dynamical processes in networks can be expressed as a function of spectral properties of the corresponding adjacency and Laplacian matrices. Although many theoretical results are known for the spectra of traditional configuration models, networks generated through these models fail to describe many topological features of real-world networks, in particular non-null values of the clustering coefficient. Here we study effects of cycles of order three (triangles) in network spectra. By using recent advances in random matrix theory, we determine the spectral distribution of the network adjacency matrix as a function of the average number of triangles attached to each node for networks without modular structure and degree-degree correlations. Implications to network dynamics are discussed. Our findings can shed light in the study of how particular kinds of subgraphs influence network dynamics.
ERIC Educational Resources Information Center
Rapoport, Amnon
The prediction that two different methods of constructing linear, tree graphs will yield the same formal structure of semantic space and measurement of word proximity was tested by comparing the distribution of node degree, the distribution of the number of pairs of nodes connected y times, and the distribution of adjective degree in trees…
NASA Astrophysics Data System (ADS)
Azevedo, Hátylas; Moreira-Filho, Carlos Alberto
2015-11-01
Biological networks display high robustness against random failures but are vulnerable to targeted attacks on central nodes. Thus, network topology analysis represents a powerful tool for investigating network susceptibility against targeted node removal. Here, we built protein interaction networks associated with chemoresistance to temozolomide, an alkylating agent used in glioma therapy, and analyzed their modular structure and robustness against intentional attack. These networks showed functional modules related to DNA repair, immunity, apoptosis, cell stress, proliferation and migration. Subsequently, network vulnerability was assessed by means of centrality-based attacks based on the removal of node fractions in descending orders of degree, betweenness, or the product of degree and betweenness. This analysis revealed that removing nodes with high degree and high betweenness was more effective in altering networks’ robustness parameters, suggesting that their corresponding proteins may be particularly relevant to target temozolomide resistance. In silico data was used for validation and confirmed that central nodes are more relevant for altering proliferation rates in temozolomide-resistant glioma cell lines and for predicting survival in glioma patients. Altogether, these results demonstrate how the analysis of network vulnerability to topological attack facilitates target prioritization for overcoming cancer chemoresistance.
Epidemic dynamics on a risk-based evolving social network
NASA Astrophysics Data System (ADS)
Antwi, Shadrack; Shaw, Leah
2013-03-01
Social network models have been used to study how behavior affects the dynamics of an infection in a population. Motivated by HIV, we consider how a trade-off between benefits and risks of sexual connections determine network structure and disease prevalence. We define a stochastic network model with formation and breaking of links as changes in sexual contacts. Each node has an intrinsic benefit its neighbors derive from connecting to it. Nodes' infection status is not apparent to others, but nodes with more connections (higher degree) are assumed more likely to be infected. The probability to form and break links is determined by a payoff computed from the benefit and degree-dependent risk. The disease is represented by a SI (susceptible-infected) model. We study network and epidemic evolution via Monte Carlo simulation and analytically predict the behavior with a heterogeneous mean field approach. The dependence of network connectivity and infection threshold on parameters is determined, and steady state degree distribution and epidemic levels are obtained. We also study a situation where system-wide infection levels alter perception of risk and cause nodes to adjust their behavior. This is a case of an adaptive network, where node status feeds back to change network geometry.
A Novel Four-Node Quadrilateral Smoothing Element for Stress Enhancement and Error Estimation
NASA Technical Reports Server (NTRS)
Tessler, A.; Riggs, H. R.; Dambach, M.
1998-01-01
A four-node, quadrilateral smoothing element is developed based upon a penalized-discrete-least-squares variational formulation. The smoothing methodology recovers C1-continuous stresses, thus enabling effective a posteriori error estimation and automatic adaptive mesh refinement. The element formulation is originated with a five-node macro-element configuration consisting of four triangular anisoparametric smoothing elements in a cross-diagonal pattern. This element pattern enables a convenient closed-form solution for the degrees of freedom of the interior node, resulting from enforcing explicitly a set of natural edge-wise penalty constraints. The degree-of-freedom reduction scheme leads to a very efficient formulation of a four-node quadrilateral smoothing element without any compromise in robustness and accuracy of the smoothing analysis. The application examples include stress recovery and error estimation in adaptive mesh refinement solutions for an elasticity problem and an aerospace structural component.
van Rijk, Maartje C; Nieweg, Omgo E; Rutgers, Emiel J T; Oldenburg, Hester S A; Olmos, Renato Valdés; Hoefnagel, Cornelis A; Kroon, Bin B R
2006-04-01
Neoadjuvant chemotherapy in breast cancer patients is a valuable method to determine the efficacy of chemotherapy and potentially downsize the primary tumor, which facilitates breast-conserving therapy. In 18 studies published about sentinel node biopsy after neoadjuvant chemotherapy, the sentinel node was identified in on average 89%, and the false-negative rate was on average 10%. Because of these mediocre results, no author dares to omit axillary clearance just yet. In our institute, sentinel lymph node biopsy is performed before neoadjuvant chemotherapy. The aim of this study was to evaluate our experience with this approach. Sentinel node biopsy was performed before neoadjuvant chemotherapy in 25 T2N0 patients by using lymphoscintigraphy, a gamma ray detection probe, and patent blue dye. Axillary lymph node dissection was performed after chemotherapy if the sentinel node contained metastases. Ten patients had a tumor-positive axillary sentinel node, and one patient had an involved lateral intramammary node. Four patients had additional involved nodes in the completion lymph node dissection specimen. The other 14 patients (56%) had a tumor-negative sentinel node and did not undergo axillary lymph node dissection. No recurrences have been observed after a median follow-up of 18 months. Fourteen (56%) of the 25 patients were spared axillary lymph node dissection when the sentinel node was found to be disease free. Performing sentinel node biopsy before neoadjuvant chemotherapy seems successful and reliable in patients with T2N0 breast cancer.
Effect of Reynolds number and turbulence on airfoil aerodynamics at -90-degree incidence
NASA Technical Reports Server (NTRS)
Stremel, Paul M.
1994-01-01
A method has been developed for calculating the viscous flow about airfoils with and without deflected flaps at -90 deg incidence. This method provides for the solution of the unsteady incompressible Navier-Stokes equations by means of an implicit technique. The solution is calculated on a body-fitted computational mesh using a staggered-grid method. The vorticity is defined at the node points, and the velocity components are defined at the mesh-cell sides. The staggered-grid orientation provides for accurate representation of vorticity at the node points and the continuity equation at the mesh-cell centers. The method provides for the noniterative solution of the flowfield and satisfies the continuity equation to machine zero at each time step. The method is evaluated in terms of its stability to predict two-dimensional flow about an airfoil at -90-deg incidence for varying Reynolds number and laminar/turbulent models. The variations of the average loading and surface pressure distribution due to flap deflection, Reynolds number, and laminar or turbulent flow are presented and compared with experimental results. The comparisom indicate that the calculated drag and drag reduction caused by flap deflection and the calculated average surface pressure are in excellent agreement with the measured results at a similar Reynolds number.
Morbidity after conventional dissection of axillary lymph nodes in breast cancer patients
2014-01-01
Background Conventional axillary lymph node dissection (ALND) has recently become less radical. The treatment morbidity effects of reduced ALND aggressiveness are unknown. This article investigates the prevalence of the main complications of ALND: lymphedema, range-of-motion restriction, and arm paresthesia and pain. Methods This cross-sectional study included 200 women with invasive breast cancer who underwent breast-conserving surgery (82.5%, n = 165) or mastectomy (17.5%, n = 35) with ALND from 2007 to 2011. Arm perimetry was used to assess lymphedema, defined as a difference >2 cm in the upper arm circumference between the nonsurgical and surgical arms. Range-of-motion restriction was assessed by evaluating the degree of arm abduction. Paresthesia was measured in the inner and proximal arm regions. Arm pain was assessed by directly questioning the patients and defined as either present or absent. Results The average (±SD) time between ALND and morbidity evaluation was 35 ± 18 months (range, 7-60 months). The average dissected lymph node number per patient was 14 ± 4 (range, 6-30 lymph nodes). Only 3.5% (n = 7) of the patients presented with lymphedema. Single-incision approaches to breast tumor and ALND (P = 0.04) and the presence of a postoperative seroma (P = 0.02) were associated with lymphedema in univariate analysis. Paresthesia was the most frequent side effect observed (53% of patients, n = 106). This complication was associated with increased age (P < 0.0001) and a larger dissected lymph node number (P = 0.01) in univariate and multivariate analysis. Additionally, 24% (n = 48) of patients had noticeable limited arm abduction. Among the patients, 27.5% (n = 55) experienced sporadic arm pain corresponding to the surgically treated armpit. In multivariate analysis, the pain risk was 1.9-fold higher in patients who underwent ALND corresponding to their dominant arm (95% CI, 1.0-3.7, P = 0.04). Conclusion Conventional ALND in breast cancer patients can result in unwanted complications. However, the current lymphedema prevalence is lower than that of the other analyzed side effects. PMID:24670000
A long-time limit for world subway networks.
Roth, Camille; Kang, Soong Moon; Batty, Michael; Barthelemy, Marc
2012-10-07
We study the temporal evolution of the structure of the world's largest subway networks in an exploratory manner. We show that, remarkably, all these networks converge to a shape that shares similar generic features despite their geographical and economic differences. This limiting shape is made of a core with branches radiating from it. For most of these networks, the average degree of a node (station) within the core has a value of order 2.5 and the proportion of k = 2 nodes in the core is larger than 60 per cent. The number of branches scales roughly as the square root of the number of stations, the current proportion of branches represents about half of the total number of stations, and the average diameter of branches is about twice the average radial extension of the core. Spatial measures such as the number of stations at a given distance to the barycentre display a first regime which grows as r(2) followed by another regime with different exponents, and eventually saturates. These results--difficult to interpret in the framework of fractal geometry--confirm and yield a natural explanation in the geometric picture of this core and their branches: the first regime corresponds to a uniform core, while the second regime is controlled by the interstation spacing on branches. The apparent convergence towards a unique network shape in the temporal limit suggests the existence of dominant, universal mechanisms governing the evolution of these structures.
A long-time limit for world subway networks
Roth, Camille; Kang, Soong Moon; Batty, Michael; Barthelemy, Marc
2012-01-01
We study the temporal evolution of the structure of the world's largest subway networks in an exploratory manner. We show that, remarkably, all these networks converge to a shape that shares similar generic features despite their geographical and economic differences. This limiting shape is made of a core with branches radiating from it. For most of these networks, the average degree of a node (station) within the core has a value of order 2.5 and the proportion of k = 2 nodes in the core is larger than 60 per cent. The number of branches scales roughly as the square root of the number of stations, the current proportion of branches represents about half of the total number of stations, and the average diameter of branches is about twice the average radial extension of the core. Spatial measures such as the number of stations at a given distance to the barycentre display a first regime which grows as r2 followed by another regime with different exponents, and eventually saturates. These results—difficult to interpret in the framework of fractal geometry—confirm and yield a natural explanation in the geometric picture of this core and their branches: the first regime corresponds to a uniform core, while the second regime is controlled by the interstation spacing on branches. The apparent convergence towards a unique network shape in the temporal limit suggests the existence of dominant, universal mechanisms governing the evolution of these structures. PMID:22593096
Constraints and entropy in a model of network evolution
NASA Astrophysics Data System (ADS)
Tee, Philip; Wakeman, Ian; Parisis, George; Dawes, Jonathan; Kiss, István Z.
2017-11-01
Barabási-Albert's "Scale Free" model is the starting point for much of the accepted theory of the evolution of real world communication networks. Careful comparison of the theory with a wide range of real world networks, however, indicates that the model is in some cases, only a rough approximation to the dynamical evolution of real networks. In particular, the exponent γ of the power law distribution of degree is predicted by the model to be exactly 3, whereas in a number of real world networks it has values between 1.2 and 2.9. In addition, the degree distributions of real networks exhibit cut offs at high node degree, which indicates the existence of maximal node degrees for these networks. In this paper we propose a simple extension to the "Scale Free" model, which offers better agreement with the experimental data. This improvement is satisfying, but the model still does not explain why the attachment probabilities should favor high degree nodes, or indeed how constraints arrive in non-physical networks. Using recent advances in the analysis of the entropy of graphs at the node level we propose a first principles derivation for the "Scale Free" and "constraints" model from thermodynamic principles, and demonstrate that both preferential attachment and constraints could arise as a natural consequence of the second law of thermodynamics.
Measuring and modeling correlations in multiplex networks.
Nicosia, Vincenzo; Latora, Vito
2015-09-01
The interactions among the elementary components of many complex systems can be qualitatively different. Such systems are therefore naturally described in terms of multiplex or multilayer networks, i.e., networks where each layer stands for a different type of interaction between the same set of nodes. There is today a growing interest in understanding when and why a description in terms of a multiplex network is necessary and more informative than a single-layer projection. Here we contribute to this debate by presenting a comprehensive study of correlations in multiplex networks. Correlations in node properties, especially degree-degree correlations, have been thoroughly studied in single-layer networks. Here we extend this idea to investigate and characterize correlations between the different layers of a multiplex network. Such correlations are intrinsically multiplex, and we first study them empirically by constructing and analyzing several multiplex networks from the real world. In particular, we introduce various measures to characterize correlations in the activity of the nodes and in their degree at the different layers and between activities and degrees. We show that real-world networks exhibit indeed nontrivial multiplex correlations. For instance, we find cases where two layers of the same multiplex network are positively correlated in terms of node degrees, while other two layers are negatively correlated. We then focus on constructing synthetic multiplex networks, proposing a series of models to reproduce the correlations observed empirically and/or to assess their relevance.
The Evolution of Hyperedge Cardinalities and Bose-Einstein Condensation in Hypernetworks.
Guo, Jin-Li; Suo, Qi; Shen, Ai-Zhong; Forrest, Jeffrey
2016-09-27
To depict the complex relationship among nodes and the evolving process of a complex system, a Bose-Einstein hypernetwork is proposed in this paper. Based on two basic evolutionary mechanisms, growth and preference jumping, the distribution of hyperedge cardinalities is studied. The Poisson process theory is used to describe the arrival process of new node batches. And, by using the Poisson process theory and a continuity technique, the hypernetwork is analyzed and the characteristic equation of hyperedge cardinalities is obtained. Additionally, an analytical expression for the stationary average hyperedge cardinality distribution is derived by employing the characteristic equation, from which Bose-Einstein condensation in the hypernetwork is obtained. The theoretical analyses in this paper agree with the conducted numerical simulations. This is the first study on the hyperedge cardinality in hypernetworks, where Bose-Einstein condensation can be regarded as a special case of hypernetworks. Moreover, a condensation degree is also discussed with which Bose-Einstein condensation can be classified.
Robustness of networks with assortative dependence groups
NASA Astrophysics Data System (ADS)
Wang, Hui; Li, Ming; Deng, Lin; Wang, Bing-Hong
2018-07-01
Assortativity is one of the important characteristics in real networks. To study the effects of this characteristic on the robustness of networks, we propose a percolation model on networks with assortative dependence group. The assortativity in this model means that the nodes with the same or similar degrees form dependence groups, for which one node fails, other nodes in the same group are very likely to fail. We find that the assortativity makes the nodes with large degrees easier to survive from the cascading failure. In this way, such networks are more robust than that with random dependence group, which also proves the assortative network is robust in another perspective. Furthermore, we also present exact solutions to the size of the giant component and the critical point, which are in agreement with the simulation results well.
Communication Dynamics in Finite Capacity Social Networks
NASA Astrophysics Data System (ADS)
Haerter, Jan O.; Jamtveit, Bjørn; Mathiesen, Joachim
2012-10-01
In communication networks, structure and dynamics are tightly coupled. The structure controls the flow of information and is itself shaped by the dynamical process of information exchanged between nodes. In order to reconcile structure and dynamics, a generic model, based on the local interaction between nodes, is considered for the communication in large social networks. In agreement with data from a large human organization, we show that the flow is non-Markovian and controlled by the temporal limitations of individuals. We confirm the versatility of our model by predicting simultaneously the degree-dependent node activity, the balance between information input and output of nodes, and the degree distribution. Finally, we quantify the limitations to network analysis when it is based on data sampled over a finite period of time.
Characterizing Topology of Probabilistic Biological Networks.
Todor, Andrei; Dobra, Alin; Kahveci, Tamer
2013-09-06
Biological interactions are often uncertain events, that may or may not take place with some probability. Existing studies analyze the degree distribution of biological networks by assuming that all the given interactions take place under all circumstances. This strong and often incorrect assumption can lead to misleading results. Here, we address this problem and develop a sound mathematical basis to characterize networks in the presence of uncertain interactions. We develop a method that accurately describes the degree distribution of such networks. We also extend our method to accurately compute the joint degree distributions of node pairs connected by edges. The number of possible network topologies grows exponentially with the number of uncertain interactions. However, the mathematical model we develop allows us to compute these degree distributions in polynomial time in the number of interactions. It also helps us find an adequate mathematical model using maximum likelihood estimation. Our results demonstrate that power law and log-normal models best describe degree distributions for probabilistic networks. The inverse correlation of degrees of neighboring nodes shows that, in probabilistic networks, nodes with large number of interactions prefer to interact with those with small number of interactions more frequently than expected.
Evolving network with different edges
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sun Jie; Department of Mathematics and Computer Science, Clarkson University, Potsdam, New York 13699; Ge Yizhi
2007-10-15
We propose a scale-free network similar to Barabasi-Albert networks but with two different types of edges. This model is based on the idea that in many cases there are more than one kind of link in a network and when a new node enters the network both old nodes and different kinds of links compete to obtain it. The degree distribution of both the total degree and the degree of each type of edge is analyzed and found to be scale-free. Simulations are shown to confirm these results.
Features and heterogeneities in growing network models
NASA Astrophysics Data System (ADS)
Ferretti, Luca; Cortelezzi, Michele; Yang, Bin; Marmorini, Giacomo; Bianconi, Ginestra
2012-06-01
Many complex networks from the World Wide Web to biological networks grow taking into account the heterogeneous features of the nodes. The feature of a node might be a discrete quantity such as a classification of a URL document such as personal page, thematic website, news, blog, search engine, social network, etc., or the classification of a gene in a functional module. Moreover the feature of a node can be a continuous variable such as the position of a node in the embedding space. In order to account for these properties, in this paper we provide a generalization of growing network models with preferential attachment that includes the effect of heterogeneous features of the nodes. The main effect of heterogeneity is the emergence of an “effective fitness” for each class of nodes, determining the rate at which nodes acquire new links. The degree distribution exhibits a multiscaling behavior analogous to the the fitness model. This property is robust with respect to variations in the model, as long as links are assigned through effective preferential attachment. Beyond the degree distribution, in this paper we give a full characterization of the other relevant properties of the model. We evaluate the clustering coefficient and show that it disappears for large network size, a property shared with the Barabási-Albert model. Negative degree correlations are also present in this class of models, along with nontrivial mixing patterns among features. We therefore conclude that both small clustering coefficients and disassortative mixing are outcomes of the preferential attachment mechanism in general growing networks.
NASA Astrophysics Data System (ADS)
Li, Mengtian; Zhang, Ruisheng; Hu, Rongjing; Yang, Fan; Yao, Yabing; Yuan, Yongna
2018-03-01
Identifying influential spreaders is a crucial problem that can help authorities to control the spreading process in complex networks. Based on the classical degree centrality (DC), several improved measures have been presented. However, these measures cannot rank spreaders accurately. In this paper, we first calculate the sum of the degrees of the nearest neighbors of a given node, and based on the calculated sum, a novel centrality named clustered local-degree (CLD) is proposed, which combines the sum and the clustering coefficients of nodes to rank spreaders. By assuming that the spreading process in networks follows the susceptible-infectious-recovered (SIR) model, we perform extensive simulations on a series of real networks to compare the performances between the CLD centrality and other six measures. The results show that the CLD centrality has a competitive performance in distinguishing the spreading ability of nodes, and exposes the best performance to identify influential spreaders accurately.
On Prolonging Network Lifetime through Load-Similar Node Deployment in Wireless Sensor Networks
Li, Qiao-Qin; Gong, Haigang; Liu, Ming; Yang, Mei; Zheng, Jun
2011-01-01
This paper is focused on the study of the energy hole problem in the Progressive Multi-hop Rotational Clustered (PMRC)-structure, a highly scalable wireless sensor network (WSN) architecture. Based on an analysis on the traffic load distribution in PMRC-based WSNs, we propose a novel load-similar node distribution strategy combined with the Minimum Overlapping Layers (MOL) scheme to address the energy hole problem in PMRC-based WSNs. In this strategy, sensor nodes are deployed in the network area according to the load distribution. That is, more nodes shall be deployed in the range where the average load is higher, and then the loads among different areas in the sensor network tend to be balanced. Simulation results demonstrate that the load-similar node distribution strategy prolongs network lifetime and reduces the average packet latency in comparison with existing nonuniform node distribution and uniform node distribution strategies. Note that, besides the PMRC structure, the analysis model and the proposed load-similar node distribution strategy are also applicable to other multi-hop WSN structures. PMID:22163809
Composing Music with Complex Networks
NASA Astrophysics Data System (ADS)
Liu, Xiaofan; Tse, Chi K.; Small, Michael
In this paper we study the network structure in music and attempt to compose music artificially. Networks are constructed with nodes and edges corresponding to musical notes and their co-occurrences. We analyze sample compositions from Bach, Mozart, Chopin, as well as other types of music including Chinese pop music. We observe remarkably similar properties in all networks constructed from the selected compositions. Power-law exponents of degree distributions, mean degrees, clustering coefficients, mean geodesic distances, etc. are reported. With the network constructed, music can be created by using a biased random walk algorithm, which begins with a randomly chosen note and selects the subsequent notes according to a simple set of rules that compares the weights of the edges, weights of the nodes, and/or the degrees of nodes. The newly created music from complex networks will be played in the presentation.
NASA Astrophysics Data System (ADS)
Zhu, Jiajing; Liu, Yongguo; Zhang, Yun; Liu, Xiaofeng; Xiao, Yonghua; Wang, Shidong; Wu, Xindong
2017-11-01
Community structure is one of the most important properties in networks, in which a node shares its most connections with the others in the same community. On the contrary, the anti-community structure means the nodes in the same group have few or no connections with each other. In Traditional Chinese Medicine (TCM), the incompatibility problem of herbs is a challenge to the clinical medication safety. In this paper, we propose a new anti-community detection algorithm, Random non-nEighboring nOde expansioN (REON), to find anti-communities in networks, in which a new evaluation criterion, anti-modularity, is designed to measure the quality of the obtained anti-community structure. In order to establish anti-communities in REON, we expand the node set by non-neighboring node expansion and regard the node set with the highest anti-modularity as an anti-community. Inspired by the phenomenon that the node with higher degree has greater contribution to the anti-modularity, an improved algorithm called REONI is developed by expanding node set by the non-neighboring node with the maximum degree, which greatly enhances the efficiency of REON. Experiments on synthetic and real-world networks demonstrate the superiority of the proposed algorithms over the existing methods. In addition, by applying REONI to the herb network, we find that it can discover incompatible herb combinations.
The Container Problem in Bubble-Sort Graphs
NASA Astrophysics Data System (ADS)
Suzuki, Yasuto; Kaneko, Keiichi
Bubble-sort graphs are variants of Cayley graphs. A bubble-sort graph is suitable as a topology for massively parallel systems because of its simple and regular structure. Therefore, in this study, we focus on n-bubble-sort graphs and propose an algorithm to obtain n-1 disjoint paths between two arbitrary nodes in time bounded by a polynomial in n, the degree of the graph plus one. We estimate the time complexity of the algorithm and the sum of the path lengths after proving the correctness of the algorithm. In addition, we report the results of computer experiments evaluating the average performance of the algorithm.
Temporal effects in trend prediction: identifying the most popular nodes in the future.
Zhou, Yanbo; Zeng, An; Wang, Wei-Hong
2015-01-01
Prediction is an important problem in different science domains. In this paper, we focus on trend prediction in complex networks, i.e. to identify the most popular nodes in the future. Due to the preferential attachment mechanism in real systems, nodes' recent degree and cumulative degree have been successfully applied to design trend prediction methods. Here we took into account more detailed information about the network evolution and proposed a temporal-based predictor (TBP). The TBP predicts the future trend by the node strength in the weighted network with the link weight equal to its exponential aging. Three data sets with time information are used to test the performance of the new method. We find that TBP have high general accuracy in predicting the future most popular nodes. More importantly, it can identify many potential objects with low popularity in the past but high popularity in the future. The effect of the decay speed in the exponential aging on the results is discussed in detail.
Methods and systems for detecting abnormal digital traffic
Goranson, Craig A [Kennewick, WA; Burnette, John R [Kennewick, WA
2011-03-22
Aspects of the present invention encompass methods and systems for detecting abnormal digital traffic by assigning characterizations of network behaviors according to knowledge nodes and calculating a confidence value based on the characterizations from at least one knowledge node and on weighting factors associated with the knowledge nodes. The knowledge nodes include a characterization model based on prior network information. At least one of the knowledge nodes should not be based on fixed thresholds or signatures. The confidence value includes a quantification of the degree of confidence that the network behaviors constitute abnormal network traffic.
Dynamics of epidemic diseases on a growing adaptive network
Demirel, Güven; Barter, Edmund; Gross, Thilo
2017-01-01
The study of epidemics on static networks has revealed important effects on disease prevalence of network topological features such as the variance of the degree distribution, i.e. the distribution of the number of neighbors of nodes, and the maximum degree. Here, we analyze an adaptive network where the degree distribution is not independent of epidemics but is shaped through disease-induced dynamics and mortality in a complex interplay. We study the dynamics of a network that grows according to a preferential attachment rule, while nodes are simultaneously removed from the network due to disease-induced mortality. We investigate the prevalence of the disease using individual-based simulations and a heterogeneous node approximation. Our results suggest that in this system in the thermodynamic limit no epidemic thresholds exist, while the interplay between network growth and epidemic spreading leads to exponential networks for any finite rate of infectiousness when the disease persists. PMID:28186146
Dynamics of epidemic diseases on a growing adaptive network.
Demirel, Güven; Barter, Edmund; Gross, Thilo
2017-02-10
The study of epidemics on static networks has revealed important effects on disease prevalence of network topological features such as the variance of the degree distribution, i.e. the distribution of the number of neighbors of nodes, and the maximum degree. Here, we analyze an adaptive network where the degree distribution is not independent of epidemics but is shaped through disease-induced dynamics and mortality in a complex interplay. We study the dynamics of a network that grows according to a preferential attachment rule, while nodes are simultaneously removed from the network due to disease-induced mortality. We investigate the prevalence of the disease using individual-based simulations and a heterogeneous node approximation. Our results suggest that in this system in the thermodynamic limit no epidemic thresholds exist, while the interplay between network growth and epidemic spreading leads to exponential networks for any finite rate of infectiousness when the disease persists.
Dynamics of epidemic diseases on a growing adaptive network
NASA Astrophysics Data System (ADS)
Demirel, Güven; Barter, Edmund; Gross, Thilo
2017-02-01
The study of epidemics on static networks has revealed important effects on disease prevalence of network topological features such as the variance of the degree distribution, i.e. the distribution of the number of neighbors of nodes, and the maximum degree. Here, we analyze an adaptive network where the degree distribution is not independent of epidemics but is shaped through disease-induced dynamics and mortality in a complex interplay. We study the dynamics of a network that grows according to a preferential attachment rule, while nodes are simultaneously removed from the network due to disease-induced mortality. We investigate the prevalence of the disease using individual-based simulations and a heterogeneous node approximation. Our results suggest that in this system in the thermodynamic limit no epidemic thresholds exist, while the interplay between network growth and epidemic spreading leads to exponential networks for any finite rate of infectiousness when the disease persists.
Modified methylene blue injection improves lymph node harvest in rectal cancer.
Liu, Jianpei; Huang, Pinjie; Zheng, Zongheng; Chen, Tufeng; Wei, Hongbo
2017-04-01
The presence of nodal metastases in rectal cancer plays an important role in accurate staging and prognosis, which depends on adequate lymph node harvest. The aim of this prospective study is to investigate the feasibility and survival benefit of improving lymph node harvest by a modified method with methylene blue injection in rectal cancer specimens. One hundred and thirty-one patients with rectal cancer were randomly assigned to the control group in which lymph nodes were harvested by palpation and sight, or to the methylene blue group using a modified method of injection into the superior rectal artery with methylene blue. Analysis of clinicopathologic records, including a long-term follow-up, was performed. In the methylene blue group, 678 lymph nodes were harvested by simple palpation and sight. Methylene blue injection added 853 lymph nodes to the total harvest as well as 32 additional metastatic lymph nodes, causing a shift to node-positive stage in four patients. The average number of lymph nodes harvested was 11.7 ± 3.4 in the control group and 23.2 ± 4.7 in the methylene blue group, respectively. The harvest of small lymph nodes (<5 mm) and the average number of metastatic nodes were both significantly higher in the methylene blue group. The modified method of injection with methylene blue had no impact on overall survival. The modified method with methylene blue injection improved lymph node harvest in rectal cancer, especially small node and metastatic node retrieval, which provided more accurate staging. However, it was not associated with overall survival. © 2014 Royal Australasian College of Surgeons.
Bridging: Locating Critical Connectors in a Network
Valente, Thomas W.; Fujimoto, Kayo
2010-01-01
This paper proposes several measures for bridging in networks derived from Granovetter's (1973) insight that links which reduce distances in a network are important structural bridges. Bridging is calculated by systematically deleting links and calculating the resultant changes in network cohesion (measured as the inverse average path length). The average change for each node's links provides an individual level measure of bridging. We also present a normalized version which controls for network size and a network level bridging index. Bridging properties are demonstrated on hypothetical networks, empirical networks, and a set of 100 randomly generated networks to show how the bridging measure correlates with existing network measures such as degree, personal network density, constraint, closeness centrality, betweenness centrality, and vitality. Bridging and the accompanying methodology provide a family of new network measures useful for studying network structure, network dynamics, and network effects on substantive behavioral phenomenon. PMID:20582157
Financial states of world financial and commodities markets around sovereign debt crisis
NASA Astrophysics Data System (ADS)
Nobi, Ashadun; Lee, Jae Woo
2017-11-01
We applied a threshold method to construct a complex network from cross-correlations coefficients of 46 daily time series comprised of 23 global indices and 23 commodity futures from 2010 - 2014. We identify financial states of both global indices and commodity futures based on the change of the network structure. The trend of the average correlation is decreasing except sharp peak during crises during the study period. The threshold networks are generated at a threshold value of θ = 0.1 and the change of degrees of each node over time is used to identify the financial state for each index. We observe that commodity futures, such as EU CO2 emission, live cattle, natural gas as well as the financial indices of Jakarta and Indonesia stock exchange (JKSE) and Kuala Lumpur stock exchange (KLSE) change states frequently. By the average change in links we identify the indices which are more reactive to crises.
Chou, Ming-Chung; Ko, Chih-Hung; Chang, Jer-Ming; Hsieh, Tsyh-Jyi
2018-05-04
End-stage renal disease (ESRD) patients on hemodialysis were demonstrated to exhibit silent and invisible white-matter alterations which would likely lead to disruptions of brain structural networks. Therefore, the purpose of this study was to investigate the disruptions of brain structural network in ESRD patients. Thiry-three ESRD patients with normal-appearing brain tissues and 29 age- and gender-matched healthy controls were enrolled in this study and underwent both cognitive ability screening instrument (CASI) assessment and diffusion tensor imaging (DTI) acquisition. Brain structural connectivity network was constructed using probabilistic tractography with automatic anatomical labeling template. Graph-theory analysis was performed to detect the alterations of node-strength, node-degree, node-local efficiency, and node-clustering coefficient in ESRD patients. Correlational analysis was performed to understand the relationship between network measures, CASI score, and dialysis duration. Structural connectivity, node-strength, node-degree, and node-local efficiency were significantly decreased, whereas node-clustering coefficient was significantly increased in ESRD patients as compared with healthy controls. The disrupted local structural networks were generally associated with common neurological complications of ESRD patients, but the correlational analysis did not reveal significant correlation between network measures, CASI score, and dialysis duration. Graph-theory analysis was helpful to investigate disruptions of brain structural network in ESRD patients with normal-appearing brain tissues. Copyright © 2018. Published by Elsevier Masson SAS.
Automatic mediastinal lymph node detection in chest CT
NASA Astrophysics Data System (ADS)
Feuerstein, Marco; Deguchi, Daisuke; Kitasaka, Takayuki; Iwano, Shingo; Imaizumi, Kazuyoshi; Hasegawa, Yoshinori; Suenaga, Yasuhito; Mori, Kensaku
2009-02-01
Computed tomography (CT) of the chest is a very common staging investigation for the assessment of mediastinal, hilar, and intrapulmonary lymph nodes in the context of lung cancer. In the current clinical workflow, the detection and assessment of lymph nodes is usually performed manually, which can be error-prone and timeconsuming. We therefore propose a method for the automatic detection of mediastinal, hilar, and intrapulmonary lymph node candidates in contrast-enhanced chest CT. Based on the segmentation of important mediastinal anatomy (bronchial tree, aortic arch) and making use of anatomical knowledge, we utilize Hessian eigenvalues to detect lymph node candidates. As lymph nodes can be characterized as blob-like structures of varying size and shape within a specific intensity interval, we can utilize these characteristics to reduce the number of false positive candidates significantly. We applied our method to 5 cases suspected to have lung cancer. The processing time of our algorithm did not exceed 6 minutes, and we achieved an average sensitivity of 82.1% and an average precision of 13.3%.
An improved PRoPHET routing protocol in delay tolerant network.
Han, Seung Deok; Chung, Yun Won
2015-01-01
In delay tolerant network (DTN), an end-to-end path is not guaranteed and packets are delivered from a source node to a destination node via store-carry-forward based routing. In DTN, a source node or an intermediate node stores packets in buffer and carries them while it moves around. These packets are forwarded to other nodes based on predefined criteria and finally are delivered to a destination node via multiple hops. In this paper, we improve the dissemination speed of PRoPHET (probability routing protocol using history of encounters and transitivity) protocol by employing epidemic protocol for disseminating message m, if forwarding counter and hop counter values are smaller than or equal to the threshold values. The performance of the proposed protocol was analyzed from the aspect of delivery probability, average delay, and overhead ratio. Numerical results show that the proposed protocol can improve the delivery probability, average delay, and overhead ratio of PRoPHET protocol by appropriately selecting the threshold forwarding counter and threshold hop counter values.
Control range: a controllability-based index for node significance in directed networks
NASA Astrophysics Data System (ADS)
Wang, Bingbo; Gao, Lin; Gao, Yong
2012-04-01
While a large number of methods for module detection have been developed for undirected networks, it is difficult to adapt them to handle directed networks due to the lack of consensus criteria for measuring the node significance in a directed network. In this paper, we propose a novel structural index, the control range, motivated by recent studies on the structural controllability of large-scale directed networks. The control range of a node quantifies the size of the subnetwork that the node can effectively control. A related index, called the control range similarity, is also introduced to measure the structural similarity between two nodes. When applying the index of control range to several real-world and synthetic directed networks, it is observed that the control range of the nodes is mainly influenced by the network's degree distribution and that nodes with a low degree may have a high control range. We use the index of control range similarity to detect and analyze functional modules in glossary networks and the enzyme-centric network of homo sapiens. Our results, as compared with other approaches to module detection such as modularity optimization algorithm, dynamic algorithm and clique percolation method, indicate that the proposed indices are effective and practical in depicting structural and modular characteristics of sparse directed networks.
Stability and Topology of Scale-Free Networks under Attack and Defense Strategies
NASA Astrophysics Data System (ADS)
Gallos, Lazaros K.; Cohen, Reuven; Argyrakis, Panos; Bunde, Armin; Havlin, Shlomo
2005-05-01
We study tolerance and topology of random scale-free networks under attack and defense strategies that depend on the degree k of the nodes. This situation occurs, for example, when the robustness of a node depends on its degree or in an intentional attack with insufficient knowledge of the network. We determine, for all strategies, the critical fraction pc of nodes that must be removed for disintegrating the network. We find that, for an intentional attack, little knowledge of the well-connected sites is sufficient to strongly reduce pc. At criticality, the topology of the network depends on the removal strategy, implying that different strategies may lead to different kinds of percolation transitions.
THEORY OF SOLAR MERIDIONAL CIRCULATION AT HIGH LATITUDES
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dikpati, Mausumi; Gilman, Peter A., E-mail: dikpati@ucar.edu, E-mail: gilman@ucar.edu
2012-02-10
We build a hydrodynamic model for computing and understanding the Sun's large-scale high-latitude flows, including Coriolis forces, turbulent diffusion of momentum, and gyroscopic pumping. Side boundaries of the spherical 'polar cap', our computational domain, are located at latitudes {>=} 60 Degree-Sign . Implementing observed low-latitude flows as side boundary conditions, we solve the flow equations for a Cartesian analog of the polar cap. The key parameter that determines whether there are nodes in the high-latitude meridional flow is {epsilon} = 2{Omega}n{pi}H{sup 2}/{nu}, where {Omega} is the interior rotation rate, n is the radial wavenumber of the meridional flow, H ismore » the depth of the convection zone, and {nu} is the turbulent viscosity. The smaller the {epsilon} (larger turbulent viscosity), the fewer the number of nodes in high latitudes. For all latitudes within the polar cap, we find three nodes for {nu} = 10{sup 12} cm{sup 2} s{sup -1}, two for 10{sup 13}, and one or none for 10{sup 15} or higher. For {nu} near 10{sup 14} our model exhibits 'node merging': as the meridional flow speed is increased, two nodes cancel each other, leaving no nodes. On the other hand, for fixed flow speed at the boundary, as {nu} is increased the poleward-most node migrates to the pole and disappears, ultimately for high enough {nu} leaving no nodes. These results suggest that primary poleward surface meridional flow can extend from 60 Degree-Sign to the pole either by node merging or by node migration and disappearance.« less
NASA Astrophysics Data System (ADS)
Zhang, Wenjun; Deng, Weibing; Li, Wei
2018-07-01
Node properties and node importance identification of networks have been vastly studied in the last decades. While in this work, we analyze the links' properties of networks by taking the Worldwide Marine Transport Network (WMTN) as an example, i.e., statistical properties of the shipping lines of WMTN have been investigated in various aspects: Firstly, we study the feature of loops in the shipping lines by defining the line saturability. It is found that the line saturability decays exponentially with the increase of line length. Secondly, to detect the geographical community structure of shipping lines, the Label Propagation Algorithm with compression of Flow (LPAF) and Multi-Dimensional Scaling (MDS) method are employed, which show rather consistent communities. Lastly, to analyze the redundancy property of shipping lines of different marine companies, the multilayer networks are constructed by aggregating the shipping lines of different marine companies. It is observed that the topological quantities, such as average degree, average clustering coefficient, etc., increase smoothly when marine companies are randomly merged (randomly choose two marine companies, then merge the shipping lines of them together), while the relative entropy decreases when the merging sequence is determined by the Jensen-Shannon distance (choose two marine companies when the Jensen-Shannon distance between them is the lowest). This indicates the low redundancy of shipping lines among different marine companies.
General formulation of long-range degree correlations in complex networks
NASA Astrophysics Data System (ADS)
Fujiki, Yuka; Takaguchi, Taro; Yakubo, Kousuke
2018-06-01
We provide a general framework for analyzing degree correlations between nodes separated by more than one step (i.e., beyond nearest neighbors) in complex networks. One joint and four conditional probability distributions are introduced to fully describe long-range degree correlations with respect to degrees k and k' of two nodes and shortest path length l between them. We present general relations among these probability distributions and clarify the relevance to nearest-neighbor degree correlations. Unlike nearest-neighbor correlations, some of these probability distributions are meaningful only in finite-size networks. Furthermore, as a baseline to determine the existence of intrinsic long-range degree correlations in a network other than inevitable correlations caused by the finite-size effect, the functional forms of these probability distributions for random networks are analytically evaluated within a mean-field approximation. The utility of our argument is demonstrated by applying it to real-world networks.
A growth model for directed complex networks with power-law shape in the out-degree distribution
Esquivel-Gómez, J.; Stevens-Navarro, E.; Pineda-Rico, U.; Acosta-Elias, J.
2015-01-01
Many growth models have been published to model the behavior of real complex networks. These models are able to reproduce several of the topological properties of such networks. However, in most of these growth models, the number of outgoing links (i.e., out-degree) of nodes added to the network is constant, that is all nodes in the network are born with the same number of outgoing links. In other models, the resultant out-degree distribution decays as a poisson or an exponential distribution. However, it has been found that in real complex networks, the out-degree distribution decays as a power-law. In order to obtain out-degree distribution with power-law behavior some models have been proposed. This work introduces a new model that allows to obtain out-degree distributions that decay as a power-law with an exponent in the range from 0 to 1. PMID:25567141
Yatabe, T; More, S J; Geoghegan, F; McManus, C; Hill, A E; Martínez-López, B
2015-11-01
Live fish movement is considered as having an important role in the transmission of infectious diseases. For that reason, interventions for cost-effective disease prevention and control rely on a sound understanding of the patterns of live fish movements in a region or country. Here, we characterize the network of live fish movements in the Irish salmonid farming industry during 2013, using social network analysis and spatial epidemiology methods, and identify interventions to limit the risk of disease introduction and spread. In the network there were 62 sites sending and/or receiving fish, with a total of 130 shipments (84 arcs) comprising approx. 17.2 million fish during the year. Atlantic salmon shipments covered longer distances than trout shipments, with some traversing the entire country. The average shipment of Atlantic salmon was 146,186 (SD 194,344) fish, compared to 77,928 (127,009) for trout, however, variability was high. There were 3 periods where shipments peaked (February-April, June-September, and November), which were related to specific stages of fish. The network was disconnected and had two major weak components, the first one with 39 nodes (mostly Atlantic salmon sites), and the second one with 10 nodes (exclusively trout sites). Correlation between in and out-degree at each site and assortativity coefficient were slightly low and non-significant: -0.08 (95% CI: -0.22, 0.06) and -0.13 (95% CI: -0.36, 0.08), respectively, indicating random mixing with regard to node degree. Although competing models also produced a good fit to degree distribution, it is likely that the network possesses both small-world and scale-free topology. This would facilitate the spread and persistence of infection in the salmon production system, but would also facilitate the design of risk-based surveillance strategies by targeting hubs, bridges or cut-points. Using Infomap community detection algorithms, 2 major communities were identified within the giant weak component, which were linked by only 4 nodes. Communities found had no correspondence with geographical zones within the country, which could potentially hinder the implementation of zoning strategies for disease control and eradication. Three significant spatial clusters of node centrality measures were detected, two in county Donegal (betweenness and outcloseness) and one in county Galway (incloseness), highlighting the importance of these locations as hot spots of highly central sites with a higher potential for both introduction and spread of infection. These results will assist in the design and implementation of measures to reduce the sanitary risks emerging from live fish trade within Ireland. Copyright © 2015 Elsevier B.V. All rights reserved.
Experimental study of {sup 99m}Tc-aluminum oxide use for sentinel lymph nodes detection
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chernov, V. I., E-mail: Chernov@oncology.tomsk.ru; Sinilkin, I. G.; Zelchan, R. V.
The purpose of the study was a comparative research in the possibility of using the radiopharmaceuticals {sup 99m}Tc-Al{sub 2}O{sub 3} and {sup 99m}Tc-Nanocis for visualizing sentinel lymph nodes. The measurement of the sizes of {sup 99m}Tc-Al{sub 2}O{sub 3} and {sup 99m}Tc-Nanocis colloidal particles was performed in seven series of radiopharmaceuticals. The pharmacokinetics of {sup 99m}Tc-Al{sub 2}O{sub 3} and {sup 99m}Tc-Nanocis was researched on 50 white male rats. The possibility of the use of {sup 99m}Tc-Al{sub 2}O{sub 3} and {sup 99m}Tc-Nanocis for lymphoscintigraphy was studied in the experiments on 12 white male rats. The average dynamic diameter of the sol particlemore » was 52–77 nm for {sup 99m}Tc-Al{sub 2}O{sub 3} and 16.7–24.5 nm for {sup 99m}Tc-Nanocis. Radiopharmaceuticals accumulated in the inguinal lymph node in 1 hour after administration; the average uptake of {sup 99}mTc-Al{sub 2}O{sub 3} was 8.6% in it, and the accumulation of {sup 99m}Tc-Nanocis was significantly lower—1.8% (p < 0.05). In all study points the average uptake of {sup 99m}Tc-Al{sub 2}O{sub 3} in the lymph node was significantly higher than {sup 99m}Tc-Nanocis accumulation. The results of dynamic scintigraphic studies in rats showed that {sup 99m}Tc-Al{sub 2}O{sub 3} and {sup 99m}Tc-Nanocis actively accumulated into the lymphatic system. By using {sup 99m}Tc-Al{sub 2}O{sub 3} inguinal lymph node was determined in 5 minutes after injection and clearly visualized in all the animals in the 15th minute, when the accumulation became more than 1% of the administered dose. Further observation indicated that the {sup 99m}Tc-Al{sub 2}O{sub 3} accumulation reached a plateau in a lymph node (average 10.5%) during 2-hour study and then its accumulation remained practically at the same level, slightly increasing to 12% in 24 hours. In case of {sup 99m}Tc-Nanocis inguinal lymph node was visualized in all animals for 15 min when it was accumulated on the average 1.03% of the administered dose. Plateau of {sup 99m}Tc-Nanocis accumulation in the lymph node (average 2.05%) occurred after 2 hours of the study and remained almost on the same level (in average 2.3%) for 24 hours. Thus, the experimental study of a new domestic radiopharmaceutical showed that the {sup 99m}Tc-Al{sub 2}O{sub 3} accumulates actively in the lymph nodes several times as compared to the imported analogue and its practical application will facilitate intraoperative identification of sentinel lymph nodes.« less
Napolitano, Jr., Leonard M.
1995-01-01
The Lambda network is a single stage, packet-switched interprocessor communication network for a distributed memory, parallel processor computer. Its design arises from the desired network characteristics of minimizing mean and maximum packet transfer time, local routing, expandability, deadlock avoidance, and fault tolerance. The network is based on fixed degree nodes and has mean and maximum packet transfer distances where n is the number of processors. The routing method is detailed, as are methods for expandability, deadlock avoidance, and fault tolerance.
Link prediction based on local community properties
NASA Astrophysics Data System (ADS)
Yang, Xu-Hua; Zhang, Hai-Feng; Ling, Fei; Cheng, Zhi; Weng, Guo-Qing; Huang, Yu-Jiao
2016-09-01
The link prediction algorithm is one of the key technologies to reveal the inherent rule of network evolution. This paper proposes a novel link prediction algorithm based on the properties of the local community, which is composed of the common neighbor nodes of any two nodes in the network and the links between these nodes. By referring to the node degree and the condition of assortativity or disassortativity in a network, we comprehensively consider the effect of the shortest path and edge clustering coefficient within the local community on node similarity. We numerically show the proposed method provide good link prediction results.
DoS detection in IEEE 802.11 with the presence of hidden nodes
Soryal, Joseph; Liu, Xijie; Saadawi, Tarek
2013-01-01
The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel’s bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) and the results are presented to validate the algorithm. PMID:25685510
DoS detection in IEEE 802.11 with the presence of hidden nodes.
Soryal, Joseph; Liu, Xijie; Saadawi, Tarek
2014-07-01
The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel's bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) and the results are presented to validate the algorithm.
2018-03-23
Unclassified Unlimited Unclassified Unlimited Unclassified Unlimited 23 Ira S. Moskowitz (202) 404-7930 This paper gives a description of the Node Ranking Tool...Disease, Virus, Expectation, Pandemic, Close- ness, Graph, Degree, Spectrum. I. INTRODUCTION THis paper gives a description of the Node Ranking Tool...is very much dependent upon which centrality measure we use. Therefore, following [6] and [3], we use TOPSIS to evaluate our decisions about the
[Relevance of the sentinel lymph node biopsy in breast multifocal and multicentric cancer].
Mosbah, R; Raimond, E; Pelissier, A; Hocedez, C; Graesslin, O
2015-05-01
The sentinel lymph node biopsy is a gold standard in the management of breast cancer. Its role in multifocal or multicentric tumors is still evolving. The aim of this study is to assess the feasibility and pertinence of sentinel lymph node biopsy in multifocal and multicentric tumors based on a systematic review of literature. A systematic review was conducted searching in the following electronic databases PubMed using "sentinel lymph node biopsy", "breast cancer", "multifocal tumor", "multicentric tumor" and "multiple tumor" as keywords. We included original articles published between 2000 and 2014, both French and English, studying feasibility of sentinel lymph node biopsy in invasive breast cancer, multicentric and/or multifocal tumors. The first end point was success rate and false negative rate. Twenty-six articles were included in this literature review, with 2212 cases (782 multifocal, 737 multicentric and 693 multiple tumors). Percentage of tumors whose stage was higher than stage T2 ranged from 0 to 86.3%. Success rate average was 83.1%. False negative average was 8.2%. False negative rate was less than 10% in 15 articles. Mean of sentinel lymph node biopsy was 2 (1-9). The average rate of sentinel lymph node positive was 50.6%. Axillary recurrence rate was 0.5%. Despite the methodological biases of the studies included in this review of literature, the false negative rate of sentinel node biopsy in multifocal and multicentric breast cancers are less than 10% with a low rate of axillary recurrence. Despite the lack of randomized study, this procedure can be routinely performed in accordance with rigorous technical process. Copyright © 2015 Elsevier Masson SAS. All rights reserved.
The role of CEUS in characterization of superficial lymph nodes: a single center prospective study
de Stefano, Giorgio; Scognamiglio, Umberto; Di Martino, Filomena; Parrella, Roberto; Scarano, Francesco; Signoriello, Giuseppe; Farella, Nunzia
2016-01-01
Accurate lymph node characterization is important in a large number of clinical settings. We evaluated the usefulness of Contrast Enhanced Ultrasound (CEUS) in distinguishing between benign and malignant lymph nodes compared with conventional ultrasonography in the differential diagnosis of superficial lymphadenopathy. We present our experience for 111 patients enrolled in a single center. 111 superficial lymph nodes were selected and only 1 lymph node per patient underwent CEUS. A definitive diagnosis for all lymph nodes was obtained by ultrasonographically guided biopsy and/or excision biopsy. The size of the lymph nodes, the site (neck, axilla, inguinal region) being easily accessible for biopsy, and the US and color Doppler US characteristics guided us in selecting the nodes to be evaluated by CEUS. In our study we identified different enhancement patterns in benign and malignant lymph nodes, with a high degree of diagnostic accuracy for superficial lymphadenopathy in comparison with conventional US. PMID:27191746
Mathematical Modeling Reveals Kinetics of Lymphocyte Recirculation in the Whole Organism
Ganusov, Vitaly V.; Auerbach, Jeremy
2014-01-01
The kinetics of recirculation of naive lymphocytes in the body has important implications for the speed at which local infections are detected and controlled by immune responses. With a help of a novel mathematical model, we analyze experimental data on migration of 51Cr-labeled thoracic duct lymphocytes (TDLs) via major lymphoid and nonlymphoid tissues of rats in the absence of systemic antigenic stimulation. We show that at any point of time, 95% of lymphocytes in the blood travel via capillaries in the lung or sinusoids of the liver and only 5% migrate to secondary lymphoid tissues such as lymph nodes, Peyer's patches, or the spleen. Interestingly, our analysis suggests that lymphocytes travel via lung capillaries and liver sinusoids at an extremely rapid rate with the average residence time in these tissues being less than 1 minute. The model also predicts a relatively short average residence time of TDLs in the spleen (2.5 hours) and a longer average residence time of TDLs in major lymph nodes and Peyer's patches (10 hours). Surprisingly, we find that the average residence time of lymphocytes is similar in lymph nodes draining the skin (subcutaneous LNs) or the gut (mesenteric LNs) or in Peyer's patches. Applying our model to an additional dataset on lymphocyte migration via resting and antigen-stimulated lymph nodes we find that enlargement of antigen-stimulated lymph nodes occurs mainly due to increased entrance rate of TDLs into the nodes and not due to decreased exit rate as has been suggested in some studies. Taken together, our analysis for the first time provides a comprehensive, systems view of recirculation kinetics of thoracic duct lymphocytes in the whole organism. PMID:24830705
Li, Nuo; Wang, Pang; Deng, Bin; Wei, Xi-le; Che, Yan-qiu; Jia, Chen-hui; Guo, Yi; Chao, Wang
2011-08-01
To observe the effect of acupuncture of Zusanli (ST 36) on electroencephalogram (EEG) so as to probe into its law in regulating the interconnectivity of brain functional network. A total of 9 healthy young volunteer students (6 male, 3 female) participated in the present study. They were asked to take a dorsal position on a test-bed. EEG signals were acquired from 22 surface scalp electrodes (Fp1, Fp2, F7, F3, F2, F4, F8, A1, T3, C3, C2, C4, T4, A2, T5, P3, P2, P4, T6, O2, O1 and O2) fixed on the subject's head. Acupuncture stimulation was applied to the right Zusanli (ST 36) by manipulating the filiform needle with uniform reducing-reinforcing method and at a frequency of about 50 cycles/min for 2 min. Then the stimulation was stopped for 10 min, and repeated once again (needle-twirling frequency: 150 and 200 cycles/min), 3 times altogether. The acquired EEG data were analyzed by using coherence estimation method, average path length, average clustering coefficient, and the average degree of the articulation points (nodes) for analyzing the synchronization of EEG signals before, during and after acupuncture. In comparison with pre-acupuncture, the coherence amplitude values of EEG-delta (1-4 Hz) and y (31-47 Hz) waves were increased significantly after acupuncture of ST 36. No significant changes were found in the amplitude values of EEG-theta (5-8 Hz), -alpha (9-13 Hz) and-beta (14-30 Hz) waves after acupuncture stimulation. During and after acupuncture, the synchronism values of EEG-delta waves of different leads and numbers of interconnectivity between every two brain functional regions in majority of the 9 volunteers were increased clearly. In all volunteers, the degree values of all nodes except A1 and A2, the average clustering coefficients along with the increase of the threshold (r), and the average path lengths of the brain functional network of EEG-delta waves during and after acupuncture were also increased evidently (the latter two items, P < 0.05), suggesting an increase of the information exchange and functional connectivity of different brain regions. Acupuncture of Zusanli (ST 36) can increase the amplitude and synchronization of EEG-delta waves of different leads, and potentiate the functional interconnectivity of brain functional network.
A probabilistic dynamic energy model for ad-hoc wireless sensors network with varying topology
NASA Astrophysics Data System (ADS)
Al-Husseini, Amal
In this dissertation we investigate the behavior of Wireless Sensor Networks (WSNs) from the degree distribution and evolution perspective. In specific, we focus on implementation of a scale-free degree distribution topology for energy efficient WSNs. WSNs is an emerging technology that finds its applications in different areas such as environment monitoring, agricultural crop monitoring, forest fire monitoring, and hazardous chemical monitoring in war zones. This technology allows us to collect data without human presence or intervention. Energy conservation/efficiency is one of the major issues in prolonging the active life WSNs. Recently, many energy aware and fault tolerant topology control algorithms have been presented, but there is dearth of research focused on energy conservation/efficiency of WSNs. Therefore, we study energy efficiency and fault-tolerance in WSNs from the degree distribution and evolution perspective. Self-organization observed in natural and biological systems has been directly linked to their degree distribution. It is widely known that scale-free distribution bestows robustness, fault-tolerance, and access efficiency to system. Fascinated by these properties, we propose two complex network theoretic self-organizing models for adaptive WSNs. In particular, we focus on adopting the Barabasi and Albert scale-free model to fit into the constraints and limitations of WSNs. We developed simulation models to conduct numerical experiments and network analysis. The main objective of studying these models is to find ways to reducing energy usage of each node and balancing the overall network energy disrupted by faulty communication among nodes. The first model constructs the wireless sensor network relative to the degree (connectivity) and remaining energy of every individual node. We observed that it results in a scale-free network structure which has good fault tolerance properties in face of random node failures. The second model considers additional constraints on the maximum degree of each node as well as the energy consumption relative to degree changes. This gives more realistic results from a dynamical network perspective. It results in balanced network-wide energy consumption. The results show that networks constructed using the proposed approach have good properties for different centrality measures. The outcomes of the presented research are beneficial to building WSN control models with greater self-organization properties which leads to optimal energy consumption.
Tabu Search enhances network robustness under targeted attacks
NASA Astrophysics Data System (ADS)
Sun, Shi-wen; Ma, Yi-lin; Li, Rui-qi; Wang, Li; Xia, Cheng-yi
2016-03-01
We focus on the optimization of network robustness with respect to intentional attacks on high-degree nodes. Given an existing network, this problem can be considered as a typical single-objective combinatorial optimization problem. Based on the heuristic Tabu Search optimization algorithm, a link-rewiring method is applied to reconstruct the network while keeping the degree of every node unchanged. Through numerical simulations, BA scale-free network and two real-world networks are investigated to verify the effectiveness of the proposed optimization method. Meanwhile, we analyze how the optimization affects other topological properties of the networks, including natural connectivity, clustering coefficient and degree-degree correlation. The current results can help to improve the robustness of existing complex real-world systems, as well as to provide some insights into the design of robust networks.
Link prediction based on nonequilibrium cooperation effect
NASA Astrophysics Data System (ADS)
Li, Lanxi; Zhu, Xuzhen; Tian, Hui
2018-04-01
Link prediction in complex networks has become a common focus of many researchers. But most existing methods concentrate on neighbors, and rarely consider degree heterogeneity of two endpoints. Node degree represents the importance or status of endpoints. We describe the large-degree heterogeneity as the nonequilibrium between nodes. This nonequilibrium facilitates a stable cooperation between endpoints, so that two endpoints with large-degree heterogeneity tend to connect stably. We name such a phenomenon as the nonequilibrium cooperation effect. Therefore, this paper proposes a link prediction method based on the nonequilibrium cooperation effect to improve accuracy. Theoretical analysis will be processed in advance, and at the end, experiments will be performed in 12 real-world networks to compare the mainstream methods with our indices in the network through numerical analysis.
NASA Technical Reports Server (NTRS)
Rengarajan, Govind; Aminpour, Mohammad A.; Knight, Norman F., Jr.
1992-01-01
An improved four-node quadrilateral assumed-stress hybrid shell element with drilling degrees of freedom is presented. The formulation is based on Hellinger-Reissner variational principle and the shape functions are formulated directly for the four-node element. The element has 12 membrane degrees of freedom and 12 bending degrees of freedom. It has nine independent stress parameters to describe the membrane stress resultant field and 13 independent stress parameters to describe the moment and transverse shear stress resultant field. The formulation encompasses linear stress, linear buckling, and linear free vibration problems. The element is validated with standard tests cases and is shown to be robust. Numerical results are presented for linear stress, buckling, and free vibration analyses.
Competing contact processes in the Watts-Strogatz network
NASA Astrophysics Data System (ADS)
Rybak, Marcin; Malarz, Krzysztof; Kułakowski, Krzysztof
2016-06-01
We investigate two competing contact processes on a set of Watts-Strogatz networks with the clustering coefficient tuned by rewiring. The base for network construction is one-dimensional chain of N sites, where each site i is directly linked to nodes labelled as i ± 1 and i ± 2. So initially, each node has the same degree k i = 4. The periodic boundary conditions are assumed as well. For each node i the links to sites i + 1 and i + 2 are rewired to two randomly selected nodes so far not-connected to node i. An increase of the rewiring probability q influences the nodes degree distribution and the network clusterization coefficient 𝓒. For given values of rewiring probability q the set 𝓝(q)={𝓝1,𝓝2,...,𝓝 M } of M networks is generated. The network's nodes are decorated with spin-like variables s i ∈ { S,D }. During simulation each S node having a D-site in its neighbourhood converts this neighbour from D to S state. Conversely, a node in D state having at least one neighbour also in state D-state converts all nearest-neighbours of this pair into D-state. The latter is realized with probability p. We plot the dependence of the nodes S final density n S T on initial nodes S fraction n S 0. Then, we construct the surface of the unstable fixed points in (𝓒, p, n S 0) space. The system evolves more often toward n S T for (𝓒, p, n S 0) points situated above this surface while starting simulation with (𝓒, p, n S 0) parameters situated below this surface leads system to n S T =0. The points on this surface correspond to such value of initial fraction n S * of S nodes (for fixed values 𝓒 and p) for which their final density is n S T=1/2.
Ferromagnetic transition in a simple variant of the Ising model on multiplex networks
NASA Astrophysics Data System (ADS)
Krawiecki, A.
2018-02-01
Multiplex networks consist of a fixed set of nodes connected by several sets of edges which are generated separately and correspond to different networks ("layers"). Here, a simple variant of the Ising model on multiplex networks with two layers is considered, with spins located in the nodes and edges corresponding to ferromagnetic interactions between them. Critical temperatures for the ferromagnetic transition are evaluated for the layers in the form of random Erdös-Rényi graphs or heterogeneous scale-free networks using the mean-field approximation and the replica method, from the replica symmetric solution. Both methods require the use of different "partial" magnetizations, associated with different layers of the multiplex network, and yield qualitatively similar results. If the layers are strongly heterogeneous the critical temperature differs noticeably from that for the Ising model on a network being a superposition of the two layers, evaluated in the mean-field approximation neglecting the effect of the underlying multiplex structure on the correlations between the degrees of nodes. The critical temperature evaluated from the replica symmetric solution depends sensitively on the correlations between the degrees of nodes in different layers and shows satisfactory quantitative agreement with that obtained from Monte Carlo simulations. The critical behavior of the magnetization for the model with strongly heterogeneous layers can depend on the distributions of the degrees of nodes and is then determined by the properties of the most heterogeneous layer.
Degree-constrained multicast routing for multimedia communications
NASA Astrophysics Data System (ADS)
Wang, Yanlin; Sun, Yugeng; Li, Guidan
2005-02-01
Multicast services have been increasingly used by many multimedia applications. As one of the key techniques to support multimedia applications, the rational and effective multicast routing algorithms are very important to networks performance. When switch nodes in networks have different multicast capability, multicast routing problem is modeled as the degree-constrained Steiner problem. We presented two heuristic algorithms, named BMSTA and BSPTA, for the degree-constrained case in multimedia communications. Both algorithms are used to generate degree-constrained multicast trees with bandwidth and end to end delay bound. Simulations over random networks were carried out to compare the performance of the two proposed algorithms. Experimental results show that the proposed algorithms have advantages in traffic load balancing, which can avoid link blocking and enhance networks performance efficiently. BMSTA has better ability in finding unsaturated links and (or) unsaturated nodes to generate multicast trees than BSPTA. The performance of BMSTA is affected by the variation of degree constraints.
Napolitano, L.M. Jr.
1995-11-28
The Lambda network is a single stage, packet-switched interprocessor communication network for a distributed memory, parallel processor computer. Its design arises from the desired network characteristics of minimizing mean and maximum packet transfer time, local routing, expandability, deadlock avoidance, and fault tolerance. The network is based on fixed degree nodes and has mean and maximum packet transfer distances where n is the number of processors. The routing method is detailed, as are methods for expandability, deadlock avoidance, and fault tolerance. 14 figs.
Braaten, B A; Spangrude, G J; Daynes, R A
1984-07-01
Lymphocyte migration from the blood into the lymph nodes in most species occurs across post-capillary high endothelial venules (HEV). In a previous study, we proposed that lymphocyte extravasation involves receptor-mediated binding followed by adenylate cyclase-dependent activation of lymphocyte motility. This hypothesis was, in part, based on observations of in vitro lymphocyte adherence to HEV by employing pertussigen, which is a known inhibitor of lymphocyte recirculation. In vitro lymphocyte-HEV binding requires a cold (6 degrees C) incubation step and binding is poor to nil if the assay is attempted at room (23 degrees C) or physiologic temperature. We decided to investigate why this assay is temperature restricted, because of the possibility that pertussigen or fucoidin -treated lymphocytes might interact with HEV differently at higher temperatures. We now report that O.C.T. compound (OCT), the embedding matrix generally used to cut frozen lymph node sections, is toxic to lymphocytes at temperatures above 6 degrees C. Exclusion of OCT from the assay system will allow lymphocyte-HEV binding to occur at 23 degrees C and to a lesser extent at 37 degrees C. With this modified protocol, lymphocytes treated with either pertussigen, fucoidin , or neuraminidase were tested for adherence to HEV at 23 degrees C. No essential difference in binding properties was observed from what had been reported at 6 degrees C. In contrast, trypsin-treated lymphocytes that did not bind to HEV with the standard technique at 6 degrees C did adhere to a minimal extent to HEV at 23 degrees C using the modified procedure. We also report some preliminary work, using the modified assay, on in vitro lymphocyte-HEV binding of rat, rabbit, and guinea pig lymphocytes to sections of lymph nodes from the respective species.
Quantized Average Consensus on Gossip Digraphs with Reduced Computation
NASA Astrophysics Data System (ADS)
Cai, Kai; Ishii, Hideaki
The authors have recently proposed a class of randomized gossip algorithms which solve the distributed averaging problem on directed graphs, with the constraint that each node has an integer-valued state. The essence of this algorithm is to maintain local records, called “surplus”, of individual state updates, thereby achieving quantized average consensus even though the state sum of all nodes is not preserved. In this paper we study a modified version of this algorithm, whose feature is primarily in reducing both computation and communication effort. Concretely, each node needs to update fewer local variables, and can transmit surplus by requiring only one bit. Under this modified algorithm we prove that reaching the average is ensured for arbitrary strongly connected graphs. The condition of arbitrary strong connection is less restrictive than those known in the literature for either real-valued or quantized states; in particular, it does not require the special structure on the network called balanced. Finally, we provide numerical examples to illustrate the convergence result, with emphasis on convergence time analysis.
Coherent exciton transport in dendrimers and continuous-time quantum walks
NASA Astrophysics Data System (ADS)
Mülken, Oliver; Bierbaum, Veronika; Blumen, Alexander
2006-03-01
We model coherent exciton transport in dendrimers by continuous-time quantum walks. For dendrimers up to the second generation the coherent transport shows perfect recurrences when the initial excitation starts at the central node. For larger dendrimers, the recurrence ceases to be perfect, a fact which resembles results for discrete quantum carpets. Moreover, depending on the initial excitation site, we find that the coherent transport to certain nodes of the dendrimer has a very low probability. When the initial excitation starts from the central node, the problem can be mapped onto a line which simplifies the computational effort. Furthermore, the long time average of the quantum mechanical transition probabilities between pairs of nodes shows characteristic patterns and allows us to classify the nodes into clusters with identical limiting probabilities. For the (space) average of the quantum mechanical probability to be still or to be again at the initial site, we obtain, based on the Cauchy-Schwarz inequality, a simple lower bound which depends only on the eigenvalue spectrum of the Hamiltonian.
Ad Hoc Access Gateway Selection Algorithm
NASA Astrophysics Data System (ADS)
Jie, Liu
With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. For mobile nodes in Ad Hoc network to internet, internet communications in the peer nodes must be achieved through the gateway. Therefore, the key Ad Hoc Access Networks will focus on the discovery gateway, as well as gateway selection in the case of multi-gateway and handover problems between different gateways. This paper considers the mobile node and the gateway, based on the average number of hops from an average access time and the stability of routes, improved gateway selection algorithm were proposed. An improved gateway selection algorithm, which mainly considers the algorithm can improve the access time of Ad Hoc nodes and the continuity of communication between the gateways, were proposed. This can improve the quality of communication across the network.
Bando, Silvia Yumi; Silva, Filipi Nascimento; Costa, Luciano da Fontoura; Silva, Alexandre V.; Pimentel-Silva, Luciana R.; Castro, Luiz HM.; Wen, Hung-Tzu; Amaro, Edson; Moreira-Filho, Carlos Alberto
2013-01-01
We previously described – studying transcriptional signatures of hippocampal CA3 explants – that febrile (FS) and afebrile (NFS) forms of refractory mesial temporal lobe epilepsy constitute two distinct genomic phenotypes. That network analysis was based on a limited number (hundreds) of differentially expressed genes (DE networks) among a large set of valid transcripts (close to two tens of thousands). Here we developed a methodology for complex network visualization (3D) and analysis that allows the categorization of network nodes according to distinct hierarchical levels of gene-gene connections (node degree) and of interconnection between node neighbors (concentric node degree). Hubs are highly connected nodes, VIPs have low node degree but connect only with hubs, and high-hubs have VIP status and high overall number of connections. Studying the whole set of CA3 valid transcripts we: i) obtained complete transcriptional networks (CO) for FS and NFS phenotypic groups; ii) examined how CO and DE networks are related; iii) characterized genomic and molecular mechanisms underlying FS and NFS phenotypes, identifying potential novel targets for therapeutic interventions. We found that: i) DE hubs and VIPs are evenly distributed inside the CO networks; ii) most DE hubs and VIPs are related to synaptic transmission and neuronal excitability whereas most CO hubs, VIPs and high hubs are related to neuronal differentiation, homeostasis and neuroprotection, indicating compensatory mechanisms. Complex network visualization and analysis is a useful tool for systems biology approaches to multifactorial diseases. Network centrality observed for hubs, VIPs and high hubs of CO networks, is consistent with the network disease model, where a group of nodes whose perturbation leads to a disease phenotype occupies a central position in the network. Conceivably, the chance for exerting therapeutic effects through the modulation of particular genes will be higher if these genes are highly interconnected in transcriptional networks. PMID:24278214
Temporal Effects in Trend Prediction: Identifying the Most Popular Nodes in the Future
Zhou, Yanbo; Zeng, An; Wang, Wei-Hong
2015-01-01
Prediction is an important problem in different science domains. In this paper, we focus on trend prediction in complex networks, i.e. to identify the most popular nodes in the future. Due to the preferential attachment mechanism in real systems, nodes’ recent degree and cumulative degree have been successfully applied to design trend prediction methods. Here we took into account more detailed information about the network evolution and proposed a temporal-based predictor (TBP). The TBP predicts the future trend by the node strength in the weighted network with the link weight equal to its exponential aging. Three data sets with time information are used to test the performance of the new method. We find that TBP have high general accuracy in predicting the future most popular nodes. More importantly, it can identify many potential objects with low popularity in the past but high popularity in the future. The effect of the decay speed in the exponential aging on the results is discussed in detail. PMID:25806810
Understanding the implementation of evidence-based care: a structural network approach.
Parchman, Michael L; Scoglio, Caterina M; Schumm, Phillip
2011-02-24
Recent study of complex networks has yielded many new insights into phenomenon such as social networks, the internet, and sexually transmitted infections. The purpose of this analysis is to examine the properties of a network created by the 'co-care' of patients within one region of the Veterans Health Affairs. Data were obtained for all outpatient visits from 1 October 2006 to 30 September 2008 within one large Veterans Integrated Service Network. Types of physician within each clinic were nodes connected by shared patients, with a weighted link representing the number of shared patients between each connected pair. Network metrics calculated included edge weights, node degree, node strength, node coreness, and node betweenness. Log-log plots were used to examine the distribution of these metrics. Sizes of k-core networks were also computed under multiple conditions of node removal. There were 4,310,465 encounters by 266,710 shared patients between 722 provider types (nodes) across 41 stations or clinics resulting in 34,390 edges. The number of other nodes to which primary care provider nodes have a connection (172.7) is 42% greater than that of general surgeons and two and one-half times as high as cardiology. The log-log plot of the edge weight distribution appears to be linear in nature, revealing a 'scale-free' characteristic of the network, while the distributions of node degree and node strength are less so. The analysis of the k-core network sizes under increasing removal of primary care nodes shows that about 10 most connected primary care nodes play a critical role in keeping the k-core networks connected, because their removal disintegrates the highest k-core network. Delivery of healthcare in a large healthcare system such as that of the US Department of Veterans Affairs (VA) can be represented as a complex network. This network consists of highly connected provider nodes that serve as 'hubs' within the network, and demonstrates some 'scale-free' properties. By using currently available tools to explore its topology, we can explore how the underlying connectivity of such a system affects the behavior of providers, and perhaps leverage that understanding to improve quality and outcomes of care.
Focus-based filtering + clustering technique for power-law networks with small world phenomenon
NASA Astrophysics Data System (ADS)
Boutin, François; Thièvre, Jérôme; Hascoët, Mountaz
2006-01-01
Realistic interaction networks usually present two main properties: a power-law degree distribution and a small world behavior. Few nodes are linked to many nodes and adjacent nodes are likely to share common neighbors. Moreover, graph structure usually presents a dense core that is difficult to explore with classical filtering and clustering techniques. In this paper, we propose a new filtering technique accounting for a user-focus. This technique extracts a tree-like graph with also power-law degree distribution and small world behavior. Resulting structure is easily drawn with classical force-directed drawing algorithms. It is also quickly clustered and displayed into a multi-level silhouette tree (MuSi-Tree) from any user-focus. We built a new graph filtering + clustering + drawing API and report a case study.
Social power and opinion formation in complex networks
NASA Astrophysics Data System (ADS)
Jalili, Mahdi
2013-02-01
In this paper we investigate the effects of social power on the evolution of opinions in model networks as well as in a number of real social networks. A continuous opinion formation model is considered and the analysis is performed through numerical simulation. Social power is given to a proportion of agents selected either randomly or based on their degrees. As artificial network structures, we consider scale-free networks constructed through preferential attachment and Watts-Strogatz networks. Numerical simulations show that scale-free networks with degree-based social power on the hub nodes have an optimal case where the largest number of the nodes reaches a consensus. However, given power to a random selection of nodes could not improve consensus properties. Introducing social power in Watts-Strogatz networks could not significantly change the consensus profile.
NASA Astrophysics Data System (ADS)
Katili, Irwan
1993-06-01
A new three-node nine-degree-of-freedom triangular plate bending element is proposed which is valid for the analysis of both thick and thin plates. The element, called the discrete Kirchhoff-Mindlin triangle (DKMT), has a proper rank, passes the patch test for thin and thick plates in an arbitrary mesh, and is free of shear locking. As an extension of the DKMT element, a four-node element with 3 degrees of freedom per node is developed. The element, referred to as DKMQ (discrete Kirchhoff-Mindlin quadrilateral) is found to provide good results for both thin and thick plates without any compatibility problems.
Bandwidth turbulence control based on flow community structure in the Internet
NASA Astrophysics Data System (ADS)
Wu, Xiaoyu; Gu, Rentao; Ji, Yuefeng
2016-10-01
Bursty flows vary rapidly in short period of time, and cause fierce bandwidth turbulence in the Internet. In this letter, we model the flow bandwidth turbulence process by constructing a flow interaction network (FIN network), with nodes representing flows and edges denoting bandwidth interactions among them. To restrain the bandwidth turbulence in FIN networks, an immune control strategy based on flow community structure is proposed. Flows in community boundary positions are immunized to cut off the inter-community turbulence spreading. By applying this control strategy in the first- and the second-level flow communities separately, 97.2% flows can effectively avoid bandwidth variations by immunizing 21% flows, and the average bandwidth variation degree reaches near zero. To achieve a similar result, about 70%-90% immune flows are needed with targeted control strategy based on flow degrees and random control strategy. Moreover, simulation results showed that the control effect of the proposed strategy improves significantly if the immune flow number is relatively smaller in each control step.
Research on centrality of urban transport network nodes
NASA Astrophysics Data System (ADS)
Wang, Kui; Fu, Xiufen
2017-05-01
Based on the actual data of urban transport in Guangzhou, 19,150 bus stations in Guangzhou (as of 2014) are selected as nodes. Based on the theory of complex network, the network model of Guangzhou urban transport is constructed. By analyzing the degree centrality index, betweenness centrality index and closeness centrality index of nodes in the network, the level of centrality of each node in the network is studied. From a different point of view to determine the hub node of Guangzhou urban transport network, corresponding to the city's key sites and major transfer sites. The reliability of the network is determined by the stability of some key nodes (transport hub station). The research of network node centralization can provide a theoretical basis for the rational allocation of urban transport network sites and public transport system planning.
NASA Astrophysics Data System (ADS)
Chen, Lei; Kou, Yingxin; Li, Zhanwu; Xu, An; Wu, Cheng
2018-01-01
We build a complex networks model of combat System-of-Systems (SoS) based on empirical data from a real war-game, this model is a combination of command & control (C2) subnetwork, sensors subnetwork, influencers subnetwork and logistical support subnetwork, each subnetwork has idiographic components and statistical characteristics. The C2 subnetwork is the core of whole combat SoS, it has a hierarchical structure with no modularity, of which robustness is strong enough to maintain normal operation after any two nodes is destroyed; the sensors subnetwork and influencers subnetwork are like sense organ and limbs of whole combat SoS, they are both flat modular networks of which degree distribution obey GEV distribution and power-law distribution respectively. The communication network is the combination of all subnetworks, it is an assortative Small-World network with core-periphery structure, the Intelligence & Communication Stations/Command Center integrated with C2 nodes in the first three level act as the hub nodes in communication network, and all the fourth-level C2 nodes, sensors, influencers and logistical support nodes have communication capability, they act as the periphery nodes in communication network, its degree distribution obeys exponential distribution in the beginning, Gaussian distribution in the middle, and power-law distribution in the end, and its path length obeys GEV distribution. The betweenness centrality distribution, closeness centrality distribution and eigenvector centrality are also been analyzed to measure the vulnerability of nodes.
Parasuraman, Ramviyas; Fabry, Thomas; Molinari, Luca; Kershaw, Keith; Di Castro, Mario; Masi, Alessandro; Ferre, Manuel
2014-12-12
The reliability of wireless communication in a network of mobile wireless robot nodes depends on the received radio signal strength (RSS). When the robot nodes are deployed in hostile environments with ionizing radiations (such as in some scientific facilities), there is a possibility that some electronic components may fail randomly (due to radiation effects), which causes problems in wireless connectivity. The objective of this paper is to maximize robot mission capabilities by maximizing the wireless network capacity and to reduce the risk of communication failure. Thus, in this paper, we consider a multi-node wireless tethering structure called the "server-relay-client" framework that uses (multiple) relay nodes in between a server and a client node. We propose a robust stochastic optimization (RSO) algorithm using a multi-sensor-based RSS sampling method at the relay nodes to efficiently improve and balance the RSS between the source and client nodes to improve the network capacity and to provide redundant networking abilities. We use pre-processing techniques, such as exponential moving averaging and spatial averaging filters on the RSS data for smoothing. We apply a receiver spatial diversity concept and employ a position controller on the relay node using a stochastic gradient ascent method for self-positioning the relay node to achieve the RSS balancing task. The effectiveness of the proposed solution is validated by extensive simulations and field experiments in CERN facilities. For the field trials, we used a youBot mobile robot platform as the relay node, and two stand-alone Raspberry Pi computers as the client and server nodes. The algorithm has been proven to be robust to noise in the radio signals and to work effectively even under non-line-of-sight conditions.
Parasuraman, Ramviyas; Fabry, Thomas; Molinari, Luca; Kershaw, Keith; Di Castro, Mario; Masi, Alessandro; Ferre, Manuel
2014-01-01
The reliability of wireless communication in a network of mobile wireless robot nodes depends on the received radio signal strength (RSS). When the robot nodes are deployed in hostile environments with ionizing radiations (such as in some scientific facilities), there is a possibility that some electronic components may fail randomly (due to radiation effects), which causes problems in wireless connectivity. The objective of this paper is to maximize robot mission capabilities by maximizing the wireless network capacity and to reduce the risk of communication failure. Thus, in this paper, we consider a multi-node wireless tethering structure called the “server-relay-client” framework that uses (multiple) relay nodes in between a server and a client node. We propose a robust stochastic optimization (RSO) algorithm using a multi-sensor-based RSS sampling method at the relay nodes to efficiently improve and balance the RSS between the source and client nodes to improve the network capacity and to provide redundant networking abilities. We use pre-processing techniques, such as exponential moving averaging and spatial averaging filters on the RSS data for smoothing. We apply a receiver spatial diversity concept and employ a position controller on the relay node using a stochastic gradient ascent method for self-positioning the relay node to achieve the RSS balancing task. The effectiveness of the proposed solution is validated by extensive simulations and field experiments in CERN facilities. For the field trials, we used a youBot mobile robot platform as the relay node, and two stand-alone Raspberry Pi computers as the client and server nodes. The algorithm has been proven to be robust to noise in the radio signals and to work effectively even under non-line-of-sight conditions. PMID:25615734
Effect of homophily on network formation
NASA Astrophysics Data System (ADS)
Kim, Kibae; Altmann, Jörn
2017-03-01
Although there is much research on network formation based on the preferential attachment rule, the research did not come up with a formula that, on the one hand, can reproduce shapes of cumulative degree distributions of empirical complex networks and, on the other hand, can represent intuitively theories on individual behavior. In this paper, we propose a formula that closes this gap by integrating into the formula for the preferential attachment rule (i.e., a node with higher degree is more likely to gain a new link) a representation of the theory of individual behavior with respect to nodes preferring to connect to other nodes with similar attributes (i.e., homophily). Based on this formula, we simulate the shapes of cumulative degree distributions for different levels of homophily and five different seed networks. Our simulation results suggest that homophily and the preferential attachment rule interact for all five types of seed networks. Surprisingly, the resulting cumulative degree distribution in log-log scale always shifts from a concave shape to a convex shape, as the level of homophily gets larger. Therefore, our formula can explain intuitively why some of the empirical complex networks show a linear cumulative degree distribution in log-log scale while others show either a concave or convex shape. Furthermore, another major finding indicates that homophily makes people of a group richer than people outside this group, which is a surprising and significant finding.
Optimal resource diffusion for suppressing disease spreading in multiplex networks
NASA Astrophysics Data System (ADS)
Chen, Xiaolong; Wang, Wei; Cai, Shimin; Stanley, H. Eugene; Braunstein, Lidia A.
2018-05-01
Resource diffusion is a ubiquitous phenomenon, but how it impacts epidemic spreading has received little study. We propose a model that couples epidemic spreading and resource diffusion in multiplex networks. The spread of disease in a physical contact layer and the recovery of the infected nodes are both strongly dependent upon resources supplied by their counterparts in the social layer. The generation and diffusion of resources in the social layer are in turn strongly dependent upon the state of the nodes in the physical contact layer. Resources diffuse preferentially or randomly in this model. To quantify the degree of preferential diffusion, a bias parameter that controls the resource diffusion is proposed. We conduct extensive simulations and find that the preferential resource diffusion can change phase transition type of the fraction of infected nodes. When the degree of interlayer correlation is below a critical value, increasing the bias parameter changes the phase transition from double continuous to single continuous. When the degree of interlayer correlation is above a critical value, the phase transition changes from multiple continuous to first discontinuous and then to hybrid. We find hysteresis loops in the phase transition. We also find that there is an optimal resource strategy at each fixed degree of interlayer correlation under which the threshold reaches a maximum and the disease can be maximally suppressed. In addition, the optimal controlling parameter increases as the degree of inter-layer correlation increases.
Network-based landscape of research strengths of universities in Mainland China
NASA Astrophysics Data System (ADS)
Liu, Zihua; Xiao, Qin; Zhan, Qian; Gu, Changgui; Yang, Huijie
2017-07-01
A landscape of a complex system presents a quantitative measure of its global state. The profile of research strength in Mainland China is investigated in detail, by which we illustrate a complex network based framework to extract a landscape from detailed records. First, a measure analogous to the Jaccard similarity is proposed to calculate from the presided funds similarities between the top-ranked universities. The neighbor threshold method is employed to reconstruct the similarity network of the universities. Second, the network is divided into communities. In each community the node with the largest degree and the smallest average shortest path length is taken as the representative of the community, called central node. The node bridging each pair of communities is defined to be a boundary. The central nodes and boundaries cooperatively give us a picture of the research strength landscape. Third, the evolutionary behavior is monitored by the fission and fusion probability matrices, elements of which are the percentage of a community at present time that joins into every community at the next time, and the percentage of a community at next time that comes from every present community, respectively. The landscapes in three successive 4-year durations are identified. It was found that some types of universities, such as the medicine&pharmacy and the finance&economy, conserve in single communities in the more than ten years, respectively. The agriculture&forest universities tend to cluster into one community. Meanwhile the engineering type distributes in different communities and tends to mix with the comprehension type. This framework can be used straightforwardly to analyze temporal networks. It provides also a new network-based method for multivariate time series analysis.
Limited-path-length entanglement percolation in quantum complex networks
NASA Astrophysics Data System (ADS)
Cuquet, Martí; Calsamiglia, John
2011-03-01
We study entanglement distribution in quantum complex networks where nodes are connected by bipartite entangled states. These networks are characterized by a complex structure, which dramatically affects how information is transmitted through them. For pure quantum state links, quantum networks exhibit a remarkable feature absent in classical networks: it is possible to effectively rewire the network by performing local operations on the nodes. We propose a family of such quantum operations that decrease the entanglement percolation threshold of the network and increase the size of the giant connected component. We provide analytic results for complex networks with an arbitrary (uncorrelated) degree distribution. These results are in good agreement with numerical simulations, which also show enhancement in correlated and real-world networks. The proposed quantum preprocessing strategies are not robust in the presence of noise. However, even when the links consist of (noisy) mixed-state links, one can send quantum information through a connecting path with a fidelity that decreases with the path length. In this noisy scenario, complex networks offer a clear advantage over regular lattices, namely, the fact that two arbitrary nodes can be connected through a relatively small number of steps, known as the small-world effect. We calculate the probability that two arbitrary nodes in the network can successfully communicate with a fidelity above a given threshold. This amounts to working out the classical problem of percolation with a limited path length. We find that this probability can be significant even for paths limited to few connections and that the results for standard (unlimited) percolation are soon recovered if the path length exceeds by a finite amount the average path length, which in complex networks generally scales logarithmically with the size of the network.
Behaviors of susceptible-infected epidemics on scale-free networks with identical infectivity
NASA Astrophysics Data System (ADS)
Zhou, Tao; Liu, Jian-Guo; Bai, Wen-Jie; Chen, Guanrong; Wang, Bing-Hong
2006-11-01
In this paper, we propose a susceptible-infected model with identical infectivity, in which, at every time step, each node can only contact a constant number of neighbors. We implemented this model on scale-free networks, and found that the infected population grows in an exponential form with the time scale proportional to the spreading rate. Furthermore, by numerical simulation, we demonstrated that the targeted immunization of the present model is much less efficient than that of the standard susceptible-infected model. Finally, we investigate a fast spreading strategy when only local information is available. Different from the extensively studied path-finding strategy, the strategy preferring small-degree nodes is more efficient than that preferring large-degree nodes. Our results indicate the existence of an essential relationship between network traffic and network epidemic on scale-free networks.
Multilayer network decoding versatility and trust
NASA Astrophysics Data System (ADS)
Sarkar, Camellia; Yadav, Alok; Jalan, Sarika
2016-01-01
In the recent years, the multilayer networks have increasingly been realized as a more realistic framework to understand emergent physical phenomena in complex real-world systems. We analyze massive time-varying social data drawn from the largest film industry of the world under a multilayer network framework. The framework enables us to evaluate the versatility of actors, which turns out to be an intrinsic property of lead actors. Versatility in dimers suggests that working with different types of nodes are more beneficial than with similar ones. However, the triangles yield a different relation between type of co-actor and the success of lead nodes indicating the importance of higher-order motifs in understanding the properties of the underlying system. Furthermore, despite the degree-degree correlations of entire networks being neutral, multilayering picks up different values of correlation indicating positive connotations like trust, in the recent years. The analysis of weak ties of the industry uncovers nodes from a lower-degree regime being important in linking Bollywood clusters. The framework and the tools used herein may be used for unraveling the complexity of other real-world systems.
Synchronization in Random Pulse Oscillator Networks
NASA Astrophysics Data System (ADS)
Brown, Kevin; Hermundstad, Ann
Motivated by synchronization phenomena in neural systems, we study synchronization of random networks of coupled pulse oscillators. We begin by considering binomial random networks whose nodes have intrinsic linear dynamics. We quantify order in the network spiking dynamics using a new measure: the normalized Lev-Zimpel complexity (LZC) of the nodes' spike trains. Starting from a globally-synchronized state, we see two broad classes of behaviors. In one (''temporally random''), the LZC is high and nodes spike independently with no coherent pattern. In another (''temporally regular''), the network does not globally synchronize but instead forms coherent, repeating population firing patterns with low LZC. No topological feature of the network reliably predicts whether an individual network will show temporally random or regular behavior; however, we find evidence that degree heterogeneity in binomial networks has a strong effect on the resulting state. To confirm these findings, we generate random networks with independently-adjustable degree mean and variance. We find that the likelihood of temporally-random behavior increases as degree variance increases. Our results indicate the subtle and complex relationship between network structure and dynamics.
Schumm, Phillip; Scoglio, Caterina; Zhang, Qian; Balcan, Duygu
2015-02-21
Through the characterization of a metapopulation cattle disease model on a directed network having source, transit, and sink nodes, we derive two global epidemic invasion thresholds. The first threshold defines the conditions necessary for an epidemic to successfully spread at the global scale. The second threshold defines the criteria that permit an epidemic to move out of the giant strongly connected component and to invade the populations of the sink nodes. As each sink node represents a final waypoint for cattle before slaughter, the existence of an epidemic among the sink nodes is a serious threat to food security. We find that the relationship between these two thresholds depends on the relative proportions of transit and sink nodes in the system and the distributions of the in-degrees of both node types. These analytic results are verified through numerical realizations of the metapopulation cattle model. Published by Elsevier Ltd.
Guo, Wei-Feng; Zhang, Shao-Wu; Shi, Qian-Qian; Zhang, Cheng-Ming; Zeng, Tao; Chen, Luonan
2018-01-19
The advances in target control of complex networks not only can offer new insights into the general control dynamics of complex systems, but also be useful for the practical application in systems biology, such as discovering new therapeutic targets for disease intervention. In many cases, e.g. drug target identification in biological networks, we usually require a target control on a subset of nodes (i.e., disease-associated genes) with minimum cost, and we further expect that more driver nodes consistent with a certain well-selected network nodes (i.e., prior-known drug-target genes). Therefore, motivated by this fact, we pose and address a new and practical problem called as target control problem with objectives-guided optimization (TCO): how could we control the interested variables (or targets) of a system with the optional driver nodes by minimizing the total quantity of drivers and meantime maximizing the quantity of constrained nodes among those drivers. Here, we design an efficient algorithm (TCOA) to find the optional driver nodes for controlling targets in complex networks. We apply our TCOA to several real-world networks, and the results support that our TCOA can identify more precise driver nodes than the existing control-fucus approaches. Furthermore, we have applied TCOA to two bimolecular expert-curate networks. Source code for our TCOA is freely available from http://sysbio.sibcb.ac.cn/cb/chenlab/software.htm or https://github.com/WilfongGuo/guoweifeng . In the previous theoretical research for the full control, there exists an observation and conclusion that the driver nodes tend to be low-degree nodes. However, for target control the biological networks, we find interestingly that the driver nodes tend to be high-degree nodes, which is more consistent with the biological experimental observations. Furthermore, our results supply the novel insights into how we can efficiently target control a complex system, and especially many evidences on the practical strategic utility of TCOA to incorporate prior drug information into potential drug-target forecasts. Thus applicably, our method paves a novel and efficient way to identify the drug targets for leading the phenotype transitions of underlying biological networks.
Distributed Sensor Fusion for Scalar Field Mapping Using Mobile Sensor Networks.
La, Hung Manh; Sheng, Weihua
2013-04-01
In this paper, autonomous mobile sensor networks are deployed to measure a scalar field and build its map. We develop a novel method for multiple mobile sensor nodes to build this map using noisy sensor measurements. Our method consists of two parts. First, we develop a distributed sensor fusion algorithm by integrating two different distributed consensus filters to achieve cooperative sensing among sensor nodes. This fusion algorithm has two phases. In the first phase, the weighted average consensus filter is developed, which allows each sensor node to find an estimate of the value of the scalar field at each time step. In the second phase, the average consensus filter is used to allow each sensor node to find a confidence of the estimate at each time step. The final estimate of the value of the scalar field is iteratively updated during the movement of the mobile sensors via weighted average. Second, we develop the distributed flocking-control algorithm to drive the mobile sensors to form a network and track the virtual leader moving along the field when only a small subset of the mobile sensors know the information of the leader. Experimental results are provided to demonstrate our proposed algorithms.
Scaling of load in communications networks.
Narayan, Onuttom; Saniee, Iraj
2010-09-01
We show that the load at each node in a preferential attachment network scales as a power of the degree of the node. For a network whose degree distribution is p(k)∼k{-γ} , we show that the load is l(k)∼k{η} with η=γ-1 , implying that the probability distribution for the load is p(l)∼1/l{2} independent of γ . The results are obtained through scaling arguments supported by finite size scaling studies. They contradict earlier claims, but are in agreement with the exact solution for the special case of tree graphs. Results are also presented for real communications networks at the IP layer, using the latest available data. Our analysis of the data shows relatively poor power-law degree distributions as compared to the scaling of the load versus degree. This emphasizes the importance of the load in network analysis.
Behavior of susceptible-infected-susceptible epidemics on heterogeneous networks with saturation
NASA Astrophysics Data System (ADS)
Joo, Jaewook; Lebowitz, Joel L.
2004-06-01
We investigate saturation effects in susceptible-infected-susceptible models of the spread of epidemics in heterogeneous populations. The structure of interactions in the population is represented by networks with connectivity distribution P(k) , including scale-free (SF) networks with power law distributions P(k)˜ k-γ . Considering cases where the transmission of infection between nodes depends on their connectivity, we introduce a saturation function C(k) which reduces the infection transmission rate λ across an edge going from a node with high connectivity k . A mean-field approximation with the neglect of degree-degree correlation then leads to a finite threshold λc >0 for SF networks with 2<γ⩽3 . We also find, in this approximation, the fraction of infected individuals among those with degree k for λ close to λc . We investigate via computer simulation the contact process on a heterogeneous regular lattice and compare the results with those obtained from mean-field theory with and without neglect of degree-degree correlations.
Percolation of localized attack on isolated and interdependent random networks
NASA Astrophysics Data System (ADS)
Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo
2014-03-01
Percolation properties of isolated and interdependent random networks have been investigated extensively. The focus of these studies has been on random attacks where each node in network is attacked with the same probability or targeted attack where each node is attacked with a probability being a function of its centrality, such as degree. Here we discuss a new type of realistic attacks which we call a localized attack where a group of neighboring nodes in the networks are attacked. We attack a randomly chosen node, its neighbors, and its neighbor of neighbors and so on, until removing a fraction (1 - p) of the network. This type of attack reflects damages due to localized disasters, such as earthquakes, floods and war zones in real-world networks. We study, both analytically and by simulations the impact of localized attack on percolation properties of random networks with arbitrary degree distributions and discuss in detail random regular (RR) networks, Erdős-Rényi (ER) networks and scale-free (SF) networks. We extend and generalize our theoretical and simulation results of single isolated networks to networks formed of interdependent networks.
An enhanced performance through agent-based secure approach for mobile ad hoc networks
NASA Astrophysics Data System (ADS)
Bisen, Dhananjay; Sharma, Sanjeev
2018-01-01
This paper proposes an agent-based secure enhanced performance approach (AB-SEP) for mobile ad hoc network. In this approach, agent nodes are selected through optimal node reliability as a factor. This factor is calculated on the basis of node performance features such as degree difference, normalised distance value, energy level, mobility and optimal hello interval of node. After selection of agent nodes, a procedure of malicious behaviour detection is performed using fuzzy-based secure architecture (FBSA). To evaluate the performance of the proposed approach, comparative analysis is done with conventional schemes using performance parameters such as packet delivery ratio, throughput, total packet forwarding, network overhead, end-to-end delay and percentage of malicious detection.
Optimization of robustness of interdependent network controllability by redundant design
2018-01-01
Controllability of complex networks has been a hot topic in recent years. Real networks regarded as interdependent networks are always coupled together by multiple networks. The cascading process of interdependent networks including interdependent failure and overload failure will destroy the robustness of controllability for the whole network. Therefore, the optimization of the robustness of interdependent network controllability is of great importance in the research area of complex networks. In this paper, based on the model of interdependent networks constructed first, we determine the cascading process under different proportions of node attacks. Then, the structural controllability of interdependent networks is measured by the minimum driver nodes. Furthermore, we propose a parameter which can be obtained by the structure and minimum driver set of interdependent networks under different proportions of node attacks and analyze the robustness for interdependent network controllability. Finally, we optimize the robustness of interdependent network controllability by redundant design including node backup and redundancy edge backup and improve the redundant design by proposing different strategies according to their cost. Comparative strategies of redundant design are conducted to find the best strategy. Results shows that node backup and redundancy edge backup can indeed decrease those nodes suffering from failure and improve the robustness of controllability. Considering the cost of redundant design, we should choose BBS (betweenness-based strategy) or DBS (degree based strategy) for node backup and HDF(high degree first) for redundancy edge backup. Above all, our proposed strategies are feasible and effective at improving the robustness of interdependent network controllability. PMID:29438426
A simple model of global cascades on random networks
NASA Astrophysics Data System (ADS)
Watts, Duncan J.
2002-04-01
The origin of large but rare cascades that are triggered by small initial shocks is a phenomenon that manifests itself as diversely as cultural fads, collective action, the diffusion of norms and innovations, and cascading failures in infrastructure and organizational networks. This paper presents a possible explanation of this phenomenon in terms of a sparse, random network of interacting agents whose decisions are determined by the actions of their neighbors according to a simple threshold rule. Two regimes are identified in which the network is susceptible to very large cascadesherein called global cascadesthat occur very rarely. When cascade propagation is limited by the connectivity of the network, a power law distribution of cascade sizes is observed, analogous to the cluster size distribution in standard percolation theory and avalanches in self-organized criticality. But when the network is highly connected, cascade propagation is limited instead by the local stability of the nodes themselves, and the size distribution of cascades is bimodal, implying a more extreme kind of instability that is correspondingly harder to anticipate. In the first regime, where the distribution of network neighbors is highly skewed, it is found that the most connected nodes are far more likely than average nodes to trigger cascades, but not in the second regime. Finally, it is shown that heterogeneity plays an ambiguous role in determining a system's stability: increasingly heterogeneous thresholds make the system more vulnerable to global cascades; but an increasingly heterogeneous degree distribution makes it less vulnerable.
Thermodynamic characterization of networks using graph polynomials
NASA Astrophysics Data System (ADS)
Ye, Cheng; Comin, César H.; Peron, Thomas K. DM.; Silva, Filipi N.; Rodrigues, Francisco A.; Costa, Luciano da F.; Torsello, Andrea; Hancock, Edwin R.
2015-09-01
In this paper, we present a method for characterizing the evolution of time-varying complex networks by adopting a thermodynamic representation of network structure computed from a polynomial (or algebraic) characterization of graph structure. Commencing from a representation of graph structure based on a characteristic polynomial computed from the normalized Laplacian matrix, we show how the polynomial is linked to the Boltzmann partition function of a network. This allows us to compute a number of thermodynamic quantities for the network, including the average energy and entropy. Assuming that the system does not change volume, we can also compute the temperature, defined as the rate of change of entropy with energy. All three thermodynamic variables can be approximated using low-order Taylor series that can be computed using the traces of powers of the Laplacian matrix, avoiding explicit computation of the normalized Laplacian spectrum. These polynomial approximations allow a smoothed representation of the evolution of networks to be constructed in the thermodynamic space spanned by entropy, energy, and temperature. We show how these thermodynamic variables can be computed in terms of simple network characteristics, e.g., the total number of nodes and node degree statistics for nodes connected by edges. We apply the resulting thermodynamic characterization to real-world time-varying networks representing complex systems in the financial and biological domains. The study demonstrates that the method provides an efficient tool for detecting abrupt changes and characterizing different stages in network evolution.
Lumping of degree-based mean-field and pair-approximation equations for multistate contact processes
NASA Astrophysics Data System (ADS)
Kyriakopoulos, Charalampos; Grossmann, Gerrit; Wolf, Verena; Bortolussi, Luca
2018-01-01
Contact processes form a large and highly interesting class of dynamic processes on networks, including epidemic and information-spreading networks. While devising stochastic models of such processes is relatively easy, analyzing them is very challenging from a computational point of view, particularly for large networks appearing in real applications. One strategy to reduce the complexity of their analysis is to rely on approximations, often in terms of a set of differential equations capturing the evolution of a random node, distinguishing nodes with different topological contexts (i.e., different degrees of different neighborhoods), such as degree-based mean-field (DBMF), approximate-master-equation (AME), or pair-approximation (PA) approaches. The number of differential equations so obtained is typically proportional to the maximum degree kmax of the network, which is much smaller than the size of the master equation of the underlying stochastic model, yet numerically solving these equations can still be problematic for large kmax. In this paper, we consider AME and PA, extended to cope with multiple local states, and we provide an aggregation procedure that clusters together nodes having similar degrees, treating those in the same cluster as indistinguishable, thus reducing the number of equations while preserving an accurate description of global observables of interest. We also provide an automatic way to build such equations and to identify a small number of degree clusters that give accurate results. The method is tested on several case studies, where it shows a high level of compression and a reduction of computational time of several orders of magnitude for large networks, with minimal loss in accuracy.
NASA Astrophysics Data System (ADS)
Eom, Young-Ho; Jo, Hang-Hyun
2015-05-01
Many complex networks in natural and social phenomena have often been characterized by heavy-tailed degree distributions. However, due to rapidly growing size of network data and concerns on privacy issues about using these data, it becomes more difficult to analyze complete data sets. Thus, it is crucial to devise effective and efficient estimation methods for heavy tails of degree distributions in large-scale networks only using local information of a small fraction of sampled nodes. Here we propose a tail-scope method based on local observational bias of the friendship paradox. We show that the tail-scope method outperforms the uniform node sampling for estimating heavy tails of degree distributions, while the opposite tendency is observed in the range of small degrees. In order to take advantages of both sampling methods, we devise the hybrid method that successfully recovers the whole range of degree distributions. Our tail-scope method shows how structural heterogeneities of large-scale complex networks can be used to effectively reveal the network structure only with limited local information.
Momeni, Naghmeh; Rabbat, Michael
2016-01-01
The friendship paradox is the phenomenon that in social networks, people on average have fewer friends than their friends do. The generalized friendship paradox is an extension to attributes other than the number of friends. The friendship paradox and its generalized version have gathered recent attention due to the information they provide about network structure and local inequalities. In this paper, we propose several measures of nodal qualities which capture different aspects of their activities and influence in online social networks. Using these measures we analyse the prevalence of the generalized friendship paradox over Twitter and we report high levels of prevalence (up to over 90% of nodes). We contend that this prevalence of the friendship paradox and its generalized version arise because of the hierarchical nature of the connections in the network. This hierarchy is nested as opposed to being star-like. We conclude that these paradoxes are collective phenomena not created merely by a minority of well-connected or high-attribute nodes. Moreover, our results show that a large fraction of individuals can experience the generalized friendship paradox even in the absence of a significant correlation between degrees and attributes.
Global spatio-temporal patterns in human migration: a complex network perspective.
Davis, Kyle F; D'Odorico, Paolo; Laio, Francesco; Ridolfi, Luca
2013-01-01
Migration is a powerful adaptive strategy for humans to navigate hardship and pursue a better quality of life. As a universal vehicle facilitating exchanges of ideas, culture, money and goods, international migration is a major contributor to globalization. Consisting of countries linked by multiple connections of human movements, global migration constitutes a network. Despite the important role of human migration in connecting various communities in different parts of the world, the topology and behavior of the international migration network and its changes through time remain poorly understood. Here we show that the global human migration network became more interconnected during the latter half of the twentieth century and that migrant destination choice partly reflects colonial and postcolonial histories, language, religion, and distances. From 1960 to 2000 we found a steady increase in network transitivity (i.e. connectivity between nodes connected to the same node), a decrease in average path length and an upward shift in degree distribution, all of which strengthened the 'small-world' behavior of the migration network. Furthermore, we found that distinct groups of countries preferentially interact to form migration communities based largely on historical, cultural and economic factors.
Calculation of unsteady airfoil loads with and without flap deflection at -90 degrees incidence
NASA Technical Reports Server (NTRS)
Stremel, Paul M.
1991-01-01
A method has been developed for calculating the viscous flow about airfoils with and without deflected flaps at -90 deg incidence. This unique method provides for the direct solution of the incompressible Navier-Stokes equations by means of a fully coupled implicit technique. The solution is calculated on a body-fitted computational mesh incorporating a staggered grid method. The vorticity is determined at the node points, and the velocity components are defined at the mesh-cell sides. The staggered-grid orientation provides for accurate representation of vorticity at the node points and for the conservation of mass at the mesh-cell centers. The method provides for the direct solution of the flow field and satisfies the conservation of mass to machine zero at each time-step. The results of the present analysis and experimental results obtained for a XV-15 airfoil are compared. The comparisons indicate that the calculated drag reduction caused by flap deflection and the calculated average surface pressure are in excellent agreement with the measured results. Comparisons of the numerical results of the present method for several airfoils demonstrate the significant influence of airfoil curvature and flap deflection on the predicted download.
Complex network study of Brazilian soccer players
NASA Astrophysics Data System (ADS)
Onody, Roberto N.; de Castro, Paulo A.
2004-09-01
Although being a very popular sport in many countries, soccer has not received much attention from the scientific community. In this paper, we study soccer from a complex network point of view. First, we consider a bipartite network with two kinds of vertices or nodes: the soccer players and the clubs. Real data were gathered from the 32 editions of the Brazilian soccer championship, in a total of 13411 soccer players and 127 clubs. We find a lot of interesting and perhaps unsuspected results. The probability that a Brazilian soccer player has worked at N clubs or played M games shows an exponential decay while the probability that he has scored G goals is power law. Now, if two soccer players who have worked at the same club at the same time are connected by an edge, then a new type of network arises (composed exclusively by soccer player nodes). Our analysis shows that for this network the degree distribution decays exponentially. We determine the exact values of the clustering coefficient, the assortativity coefficient and the average shortest path length and compare them with those of the Erdös-Rényi and configuration model. The time evolution of these quantities are calculated and the corresponding results discussed.
Network reconstruction via graph blending
NASA Astrophysics Data System (ADS)
Estrada, Rolando
2016-05-01
Graphs estimated from empirical data are often noisy and incomplete due to the difficulty of faithfully observing all the components (nodes and edges) of the true graph. This problem is particularly acute for large networks where the number of components may far exceed available surveillance capabilities. Errors in the observed graph can render subsequent analyses invalid, so it is vital to develop robust methods that can minimize these observational errors. Errors in the observed graph may include missing and spurious components, as well fused (multiple nodes are merged into one) and split (a single node is misinterpreted as many) nodes. Traditional graph reconstruction methods are only able to identify missing or spurious components (primarily edges, and to a lesser degree nodes), so we developed a novel graph blending framework that allows us to cast the full estimation problem as a simple edge addition/deletion problem. Armed with this framework, we systematically investigate the viability of various topological graph features, such as the degree distribution or the clustering coefficients, and existing graph reconstruction methods for tackling the full estimation problem. Our experimental results suggest that incorporating any topological feature as a source of information actually hinders reconstruction accuracy. We provide a theoretical analysis of this phenomenon and suggest several avenues for improving this estimation problem.
Clock Agreement Among Parallel Supercomputer Nodes
Jones, Terry R.; Koenig, Gregory A.
2014-04-30
This dataset presents measurements that quantify the clock synchronization time-agreement characteristics among several high performance computers including the current world's most powerful machine for open science, the U.S. Department of Energy's Titan machine sited at Oak Ridge National Laboratory. These ultra-fast machines derive much of their computational capability from extreme node counts (over 18000 nodes in the case of the Titan machine). Time-agreement is commonly utilized by parallel programming applications and tools, distributed programming application and tools, and system software. Our time-agreement measurements detail the degree of time variance between nodes and how that variance changes over time. The dataset includes empirical measurements and the accompanying spreadsheets.
Modeling Dynamic Evolution of Online Friendship Network
NASA Astrophysics Data System (ADS)
Wu, Lian-Ren; Yan, Qiang
2012-10-01
In this paper, we study the dynamic evolution of friendship network in SNS (Social Networking Site). Our analysis suggests that an individual joining a community depends not only on the number of friends he or she has within the community, but also on the friendship network generated by those friends. In addition, we propose a model which is based on two processes: first, connecting nearest neighbors; second, strength driven attachment mechanism. The model reflects two facts: first, in the social network it is a universal phenomenon that two nodes are connected when they have at least one common neighbor; second, new nodes connect more likely to nodes which have larger weights and interactions, a phenomenon called strength driven attachment (also called weight driven attachment). From the simulation results, we find that degree distribution P(k), strength distribution P(s), and degree-strength correlation are all consistent with empirical data.
Muetze, Tanja; Goenawan, Ivan H; Wiencko, Heather L; Bernal-Llinares, Manuel; Bryan, Kenneth; Lynn, David J
2016-01-01
Highly connected nodes (hubs) in biological networks are topologically important to the structure of the network and have also been shown to be preferentially associated with a range of phenotypes of interest. The relative importance of a hub node, however, can change depending on the biological context. Here, we report a Cytoscape app, the Contextual Hub Analysis Tool (CHAT), which enables users to easily construct and visualize a network of interactions from a gene or protein list of interest, integrate contextual information, such as gene expression or mass spectrometry data, and identify hub nodes that are more highly connected to contextual nodes (e.g. genes or proteins that are differentially expressed) than expected by chance. In a case study, we use CHAT to construct a network of genes that are differentially expressed in Dengue fever, a viral infection. CHAT was used to identify and compare contextual and degree-based hubs in this network. The top 20 degree-based hubs were enriched in pathways related to the cell cycle and cancer, which is likely due to the fact that proteins involved in these processes tend to be highly connected in general. In comparison, the top 20 contextual hubs were enriched in pathways commonly observed in a viral infection including pathways related to the immune response to viral infection. This analysis shows that such contextual hubs are considerably more biologically relevant than degree-based hubs and that analyses which rely on the identification of hubs solely based on their connectivity may be biased towards nodes that are highly connected in general rather than in the specific context of interest. CHAT is available for Cytoscape 3.0+ and can be installed via the Cytoscape App Store ( http://apps.cytoscape.org/apps/chat).
Network analysis of translocated Takahe populations to identify disease surveillance targets.
Grange, Zoë L; VAN Andel, Mary; French, Nigel P; Gartrell, Brett D
2014-04-01
Social network analysis is being increasingly used in epidemiology and disease modeling in humans, domestic animals, and wildlife. We investigated this tool in describing a translocation network (area that allows movement of animals between geographically isolated locations) used for the conservation of an endangered flightless rail, the Takahe (Porphyrio hochstetteri). We collated records of Takahe translocations within New Zealand and used social network principles to describe the connectivity of the translocation network. That is, networks were constructed and analyzed using adjacency matrices with values based on the tie weights between nodes. Five annual network matrices were created using the Takahe data set, each incremental year included records of previous years. Weights of movements between connected locations were assigned by the number of Takahe moved. We calculated the number of nodes (i(total)) and the number of ties (t(total)) between the nodes. To quantify the small-world character of the networks, we compared the real networks to random graphs of the equivalent size, weighting, and node strength. Descriptive analysis of cumulative annual Takahe movement networks involved determination of node-level characteristics, including centrality descriptors of relevance to disease modeling such as weighted measures of in degree (k(i)(in)), out degree (k(i)(out)), and betweenness (B(i)). Key players were assigned according to the highest node measure of k(i)(in), k(i)(out), and B(i) per network. Networks increased in size throughout the time frame considered. The network had some degree small-world characteristics. Nodes with the highest cumulative tie weights connecting them were the captive breeding center, the Murchison Mountains and 2 offshore islands. The key player fluctuated between the captive breeding center and the Murchison Mountains. The cumulative networks identified the captive breeding center every year as the hub of the network until the final network in 2011. Likewise, the wild Murchison Mountains population was consistently the sink of the network. Other nodes, such as the offshore islands and the wildlife hospital, varied in importance over time. Common network descriptors and measures of centrality identified key locations for targeting disease surveillance. The visual representation of movements of animals in a population that this technique provides can aid decision makers when they evaluate translocation proposals or attempt to control a disease outbreak. © 2014 Society for Conservation Biology.
The Dichotomy in Degree Correlation of Biological Networks
Hao, Dapeng; Li, Chuanxing
2011-01-01
Most complex networks from different areas such as biology, sociology or technology, show a correlation on node degree where the possibility of a link between two nodes depends on their connectivity. It is widely believed that complex networks are either disassortative (links between hubs are systematically suppressed) or assortative (links between hubs are enhanced). In this paper, we analyze a variety of biological networks and find that they generally show a dichotomous degree correlation. We find that many properties of biological networks can be explained by this dichotomy in degree correlation, including the neighborhood connectivity, the sickle-shaped clustering coefficient distribution and the modularity structure. This dichotomy distinguishes biological networks from real disassortative networks or assortative networks such as the Internet and social networks. We suggest that the modular structure of networks accounts for the dichotomy in degree correlation and vice versa, shedding light on the source of modularity in biological networks. We further show that a robust and well connected network necessitates the dichotomy of degree correlation, suggestive of an evolutionary motivation for its existence. Finally, we suggest that a dichotomous degree correlation favors a centrally connected modular network, by which the integrity of network and specificity of modules might be reconciled. PMID:22164269
Perceptual grouping effects on cursor movement expectations.
Dorneich, Michael C; Hamblin, Christopher J; Lancaster, Jeff A; Olofinboba, Olu
2014-05-01
Two studies were conducted to develop an understanding of factors that drive user expectations when navigating between discrete elements on a display via a limited degree-of-freedom cursor control device. For the Orion Crew Exploration Vehicle spacecraft, a free-floating cursor with a graphical user interface (GUI) would require an unachievable level of accuracy due to expected acceleration and vibration conditions during dynamic phases of flight. Therefore, Orion program proposed using a "caged" cursor to "jump" from one controllable element (node) on the GUI to another. However, nodes are not likely to be arranged on a rectilinear grid, and so movements between nodes are not obvious. Proximity between nodes, direction of nodes relative to each other, and context features may all contribute to user cursor movement expectations. In an initial study, we examined user expectations based on the nodes themselves. In a second study, we examined the effect of context features on user expectations. The studies established that perceptual grouping effects influence expectations to varying degrees. Based on these results, a simple rule set was developed to support users in building a straightforward mental model that closely matches their natural expectations for cursor movement. The results will help designers of display formats take advantage of the natural context-driven cursor movement expectations of users to reduce navigation errors, increase usability, and decrease access time. The rules set and guidelines tie theory to practice and can be applied in environments where vibration or acceleration are significant, including spacecraft, aircraft, and automobiles.
[Preliminary clinical experience of single incision laparoscopic colorectal surgery].
Wu, S D; Han, J Y
2016-06-01
Objective: To discuss the preliminary experience of single incision laparoscopic colorectal surgery. Methods: The clinical data and surgical outcomes of 104 selected patients who underwent single incision laparoscopic colorectal surgery in the 2 nd Department of General Surgery, Shengjing Hospital of China Medical University from January 2010 to September 2015 were retrospectively analyzed. There were 62 male and 42 female patients, aging from 21 to 87 years with a mean of (61±12) years. Eighty-five patients were diagnosed with malignancy while the rest 19 cases were benign diseases. All the procedures were performed by the same surgeon using the rigid laparoscopic instruments. Surgical and oncological outcomes were analyzed in 4 kinds of procedures which are over 5 cases respectively, including low anterior resection, abdominoperineal resection, radical right colon resection and radical sigmoidectomy. Results: Single incision laparoscopic colorectal surgery was performed in 104 selected patients and was successfully managed in 99 cases with a total conversion rate of 4.8%. Radical procedures for malignancy in cases with the number of patients more than 5 were performed for 74 cases. For low anterior resection, 35 cases with an average surgical time of (191±57) minutes, average estimated blood loss of (117±72) ml and average number of harvested lymph nodes of 14.6±1.1. For abdominoperineal resection, 9 cases with an average surgical time of (226±54) minutes, average estimated blood loss of (194±95) ml and average number of harvested lymph nodes of 14.1±1.5. For radical right colon resection, 16 cases with an average surgical time of (222±62) minutes, average estimated blood loss of (142±68) ml and average number of harvested lymph nodes of 15.4±2.4. For radical sigmoidectomy, 14 cases with an average surgical time of (159±32) minutes, average estimated blood loss of (94±33) ml and average number of harvested lymph nodes of 13.9±1.5. The overall intraoperative complication rate was 2.7% (2 cases) and postoperative complication rate was 8.1% (6 cases) in these 74 cases. Conclusion: Single incision laparoscopic colorectal surgery is safe and feasible with acceptable surgical outcomes and cosmetic benefits in the hands of skilled laparoscopic surgeon in well-selected patients.
Digital seismo-acoustic signal processing aboard a wireless sensor platform
NASA Astrophysics Data System (ADS)
Marcillo, O.; Johnson, J. B.; Lorincz, K.; Werner-Allen, G.; Welsh, M.
2006-12-01
We are developing a low power, low-cost wireless sensor array to conduct real-time signal processing of earthquakes at active volcanoes. The sensor array, which integrates data from both seismic and acoustic sensors, is based on Moteiv TMote Sky wireless sensor nodes (www.moteiv.com). The nodes feature a Texas Instruments MSP430 microcontroller, 48 Kbytes of program memory, 10 Kbytes of static RAM, 1 Mbyte of external flash memory, and a 2.4-GHz Chipcon CC2420 IEEE 802.15.4 radio. The TMote Sky is programmed in TinyOS. Basic signal processing occurs on an array of three peripheral sensor nodes. These nodes are tied into a dedicated GPS receiver node, which is focused on time synchronization, and a central communications node, which handles data integration and additional processing. The sensor nodes incorporate dual 12-bit digitizers sampling a seismic sensor and a pressure transducer at 100 samples per second. The wireless capabilities of the system allow flexible array geometry, with a maximum aperture of 200m. We have already developed the digital signal processing routines on board the Moteiv Tmote sensor nodes. The developed routines accomplish Real-time Seismic-Amplitude Measurement (RSAM), Seismic Spectral- Amplitude Measurement (SSAM), and a user-configured Short Term Averaging / Long Term Averaging (STA LTA ratio), which is used to calculate first arrivals. The processed data from individual nodes are transmitted back to a central node, where additional processing may be performed. Such processing will include back azimuth determination and other wave field analyses. Future on-board signal processing will focus on event characterization utilizing pattern recognition and spectral characterization. The processed data is intended as low bandwidth information which can be transmitted periodically and at low cost through satellite telemetry to a web server. The processing is limited by the computational capabilities (RAM, ROM) of the nodes. Nevertheless, we envision this product to be a useful tool for assessing the state of unrest at remote volcanoes.
Dynamical jumping real-time fault-tolerant routing protocol for wireless sensor networks.
Wu, Guowei; Lin, Chi; Xia, Feng; Yao, Lin; Zhang, He; Liu, Bing
2010-01-01
In time-critical wireless sensor network (WSN) applications, a high degree of reliability is commonly required. A dynamical jumping real-time fault-tolerant routing protocol (DMRF) is proposed in this paper. Each node utilizes the remaining transmission time of the data packets and the state of the forwarding candidate node set to dynamically choose the next hop. Once node failure, network congestion or void region occurs, the transmission mode will switch to jumping transmission mode, which can reduce the transmission time delay, guaranteeing the data packets to be sent to the destination node within the specified time limit. By using feedback mechanism, each node dynamically adjusts the jumping probabilities to increase the ratio of successful transmission. Simulation results show that DMRF can not only efficiently reduce the effects of failure nodes, congestion and void region, but also yield higher ratio of successful transmission, smaller transmission delay and reduced number of control packets.
Locating influential nodes in complex networks
Malliaros, Fragkiskos D.; Rossi, Maria-Evgenia G.; Vazirgiannis, Michalis
2016-01-01
Understanding and controlling spreading processes in networks is an important topic with many diverse applications, including information dissemination, disease propagation and viral marketing. It is of crucial importance to identify which entities act as influential spreaders that can propagate information to a large portion of the network, in order to ensure efficient information diffusion, optimize available resources or even control the spreading. In this work, we capitalize on the properties of the K-truss decomposition, a triangle-based extension of the core decomposition of graphs, to locate individual influential nodes. Our analysis on real networks indicates that the nodes belonging to the maximal K-truss subgraph show better spreading behavior compared to previously used importance criteria, including node degree and k-core index, leading to faster and wider epidemic spreading. We further show that nodes belonging to such dense subgraphs, dominate the small set of nodes that achieve the optimal spreading in the network. PMID:26776455
Preferential attachment in evolutionary earthquake networks
NASA Astrophysics Data System (ADS)
Rezaei, Soghra; Moghaddasi, Hanieh; Darooneh, Amir Hossein
2018-04-01
Earthquakes as spatio-temporal complex systems have been recently studied using complex network theory. Seismic networks are dynamical networks due to addition of new seismic events over time leading to establishing new nodes and links to the network. Here we have constructed Iran and Italy seismic networks based on Hybrid Model and testified the preferential attachment hypothesis for the connection of new nodes which states that it is more probable for newly added nodes to join the highly connected nodes comparing to the less connected ones. We showed that the preferential attachment is present in the case of earthquakes network and the attachment rate has a linear relationship with node degree. We have also found the seismic passive points, the most probable points to be influenced by other seismic places, using their preferential attachment values.
L-hop percolation on networks with arbitrary degree distributions and its applications
NASA Astrophysics Data System (ADS)
Shang, Yilun; Luo, Weiliang; Xu, Shouhuai
2011-09-01
Site percolation has been used to help understand analytically the robustness of complex networks in the presence of random node deletion (or failure). In this paper we move a further step beyond random node deletion by considering that a node can be deleted because it is chosen or because it is within some L-hop distance of a chosen node. Using the generating functions approach, we present analytic results on the percolation threshold as well as the mean size, and size distribution, of nongiant components of complex networks under such operations. The introduction of parameter L is both conceptually interesting because it accommodates a sort of nonindependent node deletion, which is often difficult to tackle analytically, and practically interesting because it offers useful insights for cybersecurity (such as botnet defense).
Laparoscopic completion radical cholecystectomy for T2 gallbladder cancer.
Gumbs, Andrew A; Hoffman, John P
2010-12-01
The role of minimally invasive surgery in the surgical management of gallbladder cancer is a matter of controversy. Because of the authors' growing experience with laparoscopic liver and pancreatic surgery, they have begun offering patients laparoscopic completion partial hepatectomies of the gallbladder bed with laparoscopic hepatoduodenal lymphadenectomy. The video shows the steps needed to perform laparoscopic resection of the residual gallbladder bed, the hepatoduodenal lymph node nodes, and the residual cystic duct stump in a setting with a positive cystic stump margin. The skin and fascia around the previous extraction site are resected, and this site is used for specimen retrieval during the second operation. To date, three patients have undergone laparoscopic radical cholecystectomy with hepatoduodenal lymph node dissection for gallbladder cancer. The average number of lymph nodes retrieved was 3 (range, 1-6), and the average estimated blood loss was 117 ml (range, 50-200 ml). The average operative time was 227 min (range, 120-360 min), and the average hospital length of stay was 4 days (range, 3-5 days). No morbidity or mortality was observed during 90 days of follow-up for each patient. Although controversy exists as to the best surgical approach for gallbladder cancer diagnosed after routine laparoscopic cholecystectomy, the minimally invasive approach seems feasible and safe, even after previous hepatobiliary surgery. If the previous extraction site cannot be ascertained, all port sites can be excised locally. Larger studies are needed to determine whether the minimally invasive approach to postoperatively diagnosed early-stage gallbladder cancer has any drawbacks.
Sampling networks with prescribed degree correlations
NASA Astrophysics Data System (ADS)
Del Genio, Charo; Bassler, Kevin; Erdos, Péter; Miklos, István; Toroczkai, Zoltán
2014-03-01
A feature of a network known to affect its structural and dynamical properties is the presence of correlations amongst the node degrees. Degree correlations are a measure of how much the connectivity of a node influences the connectivity of its neighbours, and they are fundamental in the study of processes such as the spreading of information or epidemics, the cascading failures of damaged systems and the evolution of social relations. We introduce a method, based on novel mathematical results, that allows the exact sampling of networks where the number of connections between nodes of any given connectivity is specified. Our algorithm provides a weight associated to each sample, thereby allowing network observables to be measured according to any desired distribution, and it is guaranteed to always terminate successfully in polynomial time. Thus, our new approach provides a preferred tool for scientists to model complex systems of current relevance, and enables researchers to precisely study correlated networks with broad societal importance. CIDG acknowledges support by the European Commission's FP7 through grant No. 288021. KEB acknowledges support from the NSF through grant DMR?1206839. KEB, PE, IM and ZT acknowledge support from AFSOR and DARPA through grant FA?9550-12-1-0405.
Microanalyses of lesions and lymph nodes from coalminers' lungs.
Chapman, J S; Ruckley, V A
1985-08-01
The dust content and composition of lesions and hilar lymph nodes from the lungs of British coalworkers have been examined. Samples of macules, fibrotic nodules, and massive fibrosis (both peripheral and central sites) were dissected from 49 lungs. The highest mean dust concentrations (about 20%) were found in nodules and massive fibrosis. Overall there were no significant differences between the selected lesion types and their respective whole lung dust composition, although the central sites of massive fibrosis were found to contain on average a higher proportion of coal and a lower proportion of ash and its measured constituents, quartz and kaolin plus mica, than the edge of the lesion (p less than 0.001 for each component). There were striking differences between recovered lung and lymph node dusts. An examination of 180 specimens showed a mean quartz in lymph node dust of 20.3% compared with 6.1% in lung dust. As expected the proportion of quartz was greater in lymph nodes and lungs from men who had worked "low" rank (high ash) coal. By contrast with the corresponding figures for lung dusts, however, the mean proportion of quartz in nodes did not increase over the pathological range of pneumoconiotic lung disease. On average the proportions of kaolin and mica in lymph nodes reflect those found in lungs. The lymphotrophic nature of quartz was clearly shown although it was not possible to show an association between this clearance pathway and any particular type of lesion.
A predictive index of axillary nodal involvement in operable breast cancer.
De Laurentiis, M.; Gallo, C.; De Placido, S.; Perrone, F.; Pettinato, G.; Petrella, G.; Carlomagno, C.; Panico, L.; Delrio, P.; Bianco, A. R.
1996-01-01
We investigated the association between pathological characteristics of primary breast cancer and degree of axillary nodal involvement and obtained a predictive index of the latter from the former. In 2076 cases, 17 histological features, including primary tumour and local invasion variables, were recorded. The whole sample was randomly split in a training (75% of cases) and a test sample. Simple and multiple correspondence analysis were used to select the variables to enter in a multinomial logit model to build an index predictive of the degree of nodal involvement. The response variable was axillary nodal status coded in four classes (N0, N1-3, N4-9, N > or = 10). The predictive index was then evaluated by testing goodness-of-fit and classification accuracy. Covariates significantly associated with nodal status were tumour size (P < 0.0001), tumour type (P < 0.0001), type of border (P = 0.048), multicentricity (P = 0.003), invasion of lymphatic and blood vessels (P < 0.0001) and nipple invasion (P = 0.006). Goodness-of-fit was validated by high concordance between observed and expected number of cases in each decile of predicted probability in both training and test samples. Classification accuracy analysis showed that true node-positive cases were well recognised (84.5%), but there was no clear distinction among the classes of node-positive cases. However, 10 year survival analysis showed a superimposible prognostic behaviour between predicted and observed nodal classes. Moreover, misclassified node-negative patients (i.e. those who are predicted positive) showed an outcome closer to patients with 1-3 metastatic nodes than to node-negative ones. In conclusion, the index cannot completely substitute for axillary node information, but it is a predictor of prognosis as accurate as nodal involvement and identifies a subgroup of node-negative patients with unfavourable prognosis. PMID:8630286
Rubaltelli, Leopoldo; Khadivi, Yeganeh; Tregnaghi, Alberto; Stramare, Roberto; Ferro, Federica; Borsato, Simonetta; Fiocco, Ugo; Adami, Fausto; Rossi, Carlo Riccardo
2004-06-01
To evaluate the contribution of continuous mode contrast-enhanced harmonic ultrasonography (CE-HUS) with a second-generation contrast agent to the characterization of superficial lymphadenopathies with respect to conventional ultrasonographic techniques (B-mode and power Doppler). Fifty-six lymph nodes from 45 patients were studied both by conventional techniques and by CE-HUS. The dimensions, intranodal architecture, margins, and location of vessels were evaluated. Subsequently, all the lymph nodes were examined by CE-HUS, and enhancement of echogenicity was evaluated. The diagnoses obtained by means of fine-needle aspiration cytologic examination, surgical biopsy, or both were compared with those obtained by ultrasonography. Of the lymph nodes examined, 30 were benign and 26 were malignant (18 metastases and 8 non-Hodgkin lymphomas). The study using CE-HUS showed intense homogeneous enhancement in 28 of 30 reactive lymph nodes; perfusion defects in 17, of which 15 were neoplastic and 2 were inflammatory; intense but inhomogeneous speckled enhancement in the early arterial phase in 5 cases of lymphoma; and, last, scarce or absent intranodal enhancement in 4 metastases. The specificity, sensitivity, and accuracy of conventional techniques in differentiation between benign and malignant lymph nodes were 76%, 80%, and 78% versus 93%, 92%, and 92.8% for CE-HUS. The increase in correct diagnoses was significant (P = .05) when conventional ultrasonography was tested against CE-HUS. Superficial lymph nodes can be characterized as being neoplastic or benign with a high degree of diagnostic accuracy on the basis of the perfusion characteristics evaluated by CE-HUS. This technique has been shown to afford a higher degree of accuracy than currently obtainable by any other ultrasonographic technique.
NASA Astrophysics Data System (ADS)
Wu, Zikai; Hou, Baoyu; Zhang, Hongjuan; Jin, Feng
2014-04-01
Deterministic network models have been attractive media for discussing dynamical processes' dependence on network structural features. On the other hand, the heterogeneity of weights affect dynamical processes taking place on networks. In this paper, we present a family of weighted expanded Koch networks based on Koch networks. They originate from a r-polygon, and each node of current generation produces m r-polygons including the node and whose weighted edges are scaled by factor w in subsequent evolutionary step. We derive closed-form expressions for average weighted shortest path length (AWSP). In large network, AWSP stays bounded with network order growing (0 < w < 1). Then, we focus on a special random walks and trapping issue on the networks. In more detail, we calculate exactly the average receiving time (ART). ART exhibits a sub-linear dependence on network order (0 < w < 1), which implies that nontrivial weighted expanded Koch networks are more efficient than un-weighted expanded Koch networks in receiving information. Besides, efficiency of receiving information at hub nodes is also dependent on parameters m and r. These findings may pave the way for controlling information transportation on general weighted networks.
Kyriakopoulos, Charalampos; Grossmann, Gerrit; Wolf, Verena; Bortolussi, Luca
2018-01-01
Contact processes form a large and highly interesting class of dynamic processes on networks, including epidemic and information-spreading networks. While devising stochastic models of such processes is relatively easy, analyzing them is very challenging from a computational point of view, particularly for large networks appearing in real applications. One strategy to reduce the complexity of their analysis is to rely on approximations, often in terms of a set of differential equations capturing the evolution of a random node, distinguishing nodes with different topological contexts (i.e., different degrees of different neighborhoods), such as degree-based mean-field (DBMF), approximate-master-equation (AME), or pair-approximation (PA) approaches. The number of differential equations so obtained is typically proportional to the maximum degree k_{max} of the network, which is much smaller than the size of the master equation of the underlying stochastic model, yet numerically solving these equations can still be problematic for large k_{max}. In this paper, we consider AME and PA, extended to cope with multiple local states, and we provide an aggregation procedure that clusters together nodes having similar degrees, treating those in the same cluster as indistinguishable, thus reducing the number of equations while preserving an accurate description of global observables of interest. We also provide an automatic way to build such equations and to identify a small number of degree clusters that give accurate results. The method is tested on several case studies, where it shows a high level of compression and a reduction of computational time of several orders of magnitude for large networks, with minimal loss in accuracy.
Enhanced reconstruction of weighted networks from strengths and degrees
NASA Astrophysics Data System (ADS)
Mastrandrea, Rossana; Squartini, Tiziano; Fagiolo, Giorgio; Garlaschelli, Diego
2014-04-01
Network topology plays a key role in many phenomena, from the spreading of diseases to that of financial crises. Whenever the whole structure of a network is unknown, one must resort to reconstruction methods that identify the least biased ensemble of networks consistent with the partial information available. A challenging case, frequently encountered due to privacy issues in the analysis of interbank flows and Big Data, is when there is only local (node-specific) aggregate information available. For binary networks, the relevant ensemble is one where the degree (number of links) of each node is constrained to its observed value. However, for weighted networks the problem is much more complicated. While the naïve approach prescribes to constrain the strengths (total link weights) of all nodes, recent counter-intuitive results suggest that in weighted networks the degrees are often more informative than the strengths. This implies that the reconstruction of weighted networks would be significantly enhanced by the specification of both strengths and degrees, a computationally hard and bias-prone procedure. Here we solve this problem by introducing an analytical and unbiased maximum-entropy method that works in the shortest possible time and does not require the explicit generation of reconstructed samples. We consider several real-world examples and show that, while the strengths alone give poor results, the additional knowledge of the degrees yields accurately reconstructed networks. Information-theoretic criteria rigorously confirm that the degree sequence, as soon as it is non-trivial, is irreducible to the strength sequence. Our results have strong implications for the analysis of motifs and communities and whenever the reconstructed ensemble is required as a null model to detect higher-order patterns.
Temporal-varying failures of nodes in networks
NASA Astrophysics Data System (ADS)
Knight, Georgie; Cristadoro, Giampaolo; Altmann, Eduardo G.
2015-08-01
We consider networks in which random walkers are removed because of the failure of specific nodes. We interpret the rate of loss as a measure of the importance of nodes, a notion we denote as failure centrality. We show that the degree of the node is not sufficient to determine this measure and that, in a first approximation, the shortest loops through the node have to be taken into account. We propose approximations of the failure centrality which are valid for temporal-varying failures, and we dwell on the possibility of externally changing the relative importance of nodes in a given network by exploiting the interference between the loops of a node and the cycles of the temporal pattern of failures. In the limit of long failure cycles we show analytically that the escape in a node is larger than the one estimated from a stochastic failure with the same failure probability. We test our general formalism in two real-world networks (air-transportation and e-mail users) and show how communities lead to deviations from predictions for failures in hubs.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Venencia, C; Garrigo, E; Castro Pena, P
Purpose: The elective irradiation of pelvis lymph node for prostate cancer is still controversial. Including pelvic lymph node as part of the planning target volume could increase the testicular scatter dose, which could have a clinical impact. The objective of this work was to measure testicular scatter dose for prostate SBRT treatment with and without pelvic lymph nodes using TLD dosimetry. Methods: A 6MV beam (1000UM/min) produce by a Novalis TX (BrainLAB-VARIAN) equipped HDMLC was used. Treatment plan were done using iPlan v4.5.3 (BrainLAB) treatment planning system with sliding windows IMRT technique. Prostate SBRT plan (PLAN-1) uses 9 beams withmore » a dose prescription (D95%) of 4000cGy in 5 fractions. Prostate with lymph nodes SBRT plan (PLAN-2) uses 11 beams with a dose prescription (D95%) of 4000cGy to the prostate and 2500cGy to the lymph node in 5 fractions. An anthropomorphic pelvic phantom with a testicular volume was used. Phantom was positioned using ExacTrac IGRT system. Phosphor TLDs LiF:Mg, Ti (TLD700 Harshaw) were positioned in the anterior, posterior and inferior portion of the testicle. Two set of TLD measurements was done for each treatment plan. TLD in vivo dosimetry was done in one patient for each treatment plan. Results: The average phantom scatter doses per fraction for the PLAN-1 were 10.9±1cGy (anterior), 7.8±1cGy (inferior) and 10.7±1cGy (posterior) which represent an average total dose of 48±1cGy (1.2% of prostate dose prescription). The doses for PLAN-2 plan were 17.7±1cGy (anterior), 11±1cGy (inferior) and 13.3±1cGy (posterior) which represent an average total dose of 70.1±1cGy (1.8% of prostate dose prescription). The average dose for in vivo patient dosimetry was 60±1cGy for PLAN-1 and 85±1cGy for PLAN-2. Conclusion: Phantom and in vivo dosimetry shows that the pelvic lymph node irradiation with SBRT slightly increases the testicular scatter dose, which could have a clinical impact.« less
An evolutionary game for the diffusion of rumor in complex networks
NASA Astrophysics Data System (ADS)
Li, Dandan; Ma, Jing; Tian, Zihao; Zhu, Hengmin
2015-09-01
In this paper, we investigate the rumor diffusion process according to the evolutionary game framework. By using three real social network datasets, we find that increasing the judgment ability of individuals could curb the diffusion of rumor effectively. Under the same level of punishment cost, there are more spreaders in the network that has larger average degree. Moreover, the punishment fraction has more significant impact than the risk coefficient on the controlling of rumor diffusion. There exist some optimal risk coefficients and punishment fractions that could help more people refusing to spread rumor. In addition, the effect of the tie strength on the final fraction of spreaders is investigated. The results indicate that the rumor can be suppressed soon if the individuals preferentially select the neighbor either weaker or stronger ties persistently to update their strategy. However, choosing neighbor blindly may promote the spread of rumor. Finally, by comparing three kinds of punishment mechanisms, we show that taking the lead in punishing the higher degree nodes is the most effective measure to reduce the coverage of rumor.
Review of the role of sentinel node biopsy in cutaneous head and neck melanoma.
Roy, Jennifer M; Whitfield, Robert J; Gill, P Grantley
2016-05-01
Sentinel node biopsy (SNB) is recommended for selected melanoma patients in many parts of the world. This review examines the evidence surrounding the accuracy and prognostic value of SNB and completion neck dissection in head and neck melanoma. Sentinel nodes were identified in an average of 94.7% of head and neck cases compared with 95.3-100% in all melanoma cases. More false-negative sentinel nodes were found in head and neck cases. A positive sentinel node was associated with both lower disease-free survival (53.4 versus 83.2%) and overall survival (40 versus 84%). We conclude that SNB should be offered to all patients with intermediate and high-risk melanomas in the head and neck area. To date, evidence does not exist to demonstrate the safety of avoiding completion lymph node dissection in sentinel node-positive patients with head and neck melanoma. © 2015 Royal Australasian College of Surgeons.
A dynamic routing strategy with limited buffer on scale-free network
NASA Astrophysics Data System (ADS)
Wang, Yufei; Liu, Feng
2016-04-01
In this paper, we propose an integrated routing strategy based on global static topology information and local dynamic data packet queue lengths to improve the transmission efficiency of scale-free networks. The proposed routing strategy is a combination of a global static routing strategy (based on the shortest path algorithm) and local dynamic queue length management, in which, instead of using an infinite buffer, the queue length of each node i in the proposed routing strategy is limited by a critical queue length Qic. When the network traffic is lower and the queue length of each node i is shorter than its critical queue length Qic, it forwards packets according to the global routing table. With increasing network traffic, when the buffers of the nodes with higher degree are full, they do not receive packets due to their limited buffers and the packets have to be delivered to the nodes with lower degree. The global static routing strategy can shorten the transmission time that it takes a packet to reach its destination, and the local limited queue length can balance the network traffic. The optimal critical queue lengths of nodes have been analysed. Simulation results show that the proposed routing strategy can get better performance than that of the global static strategy based on topology, and almost the same performance as that of the global dynamic routing strategy with less complexity.
Voter model with arbitrary degree dependence: clout, confidence and irreversibility
NASA Astrophysics Data System (ADS)
Fotouhi, Babak; Rabbat, Michael G.
2014-03-01
The voter model is widely used to model opinion dynamics in society. In this paper, we propose three modifications to incorporate heterogeneity into the model. We address the corresponding oversimplifications of the conventional voter model which are unrealistic. We first consider the voter model with popularity bias. The influence of each node on its neighbors depends on its degree. We find the consensus probabilities and expected consensus times for each of the states. We also find the fixation probability, which is the probability that a single node whose state differs from every other node imposes its state on the entire system. In addition, we find the expected fixation time. Then two other extensions to the model are proposed and the motivations behind them are discussed. The first one is confidence, where in addition to the states of neighbors, nodes take their own state into account at each update. We repeat the calculations for the augmented model and investigate the effects of adding confidence to the model. The second proposed extension is irreversibility, where one of the states is given the property that once nodes adopt it, they cannot switch back. This is motivated by applications where, agents take an irreversible action such as seeing a movie, purchasing a music album online, or buying a new product. The dynamics of densities, fixation times and consensus times are obtained.
Listing triangles in expected linear time on a class of power law graphs.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nordman, Daniel J.; Wilson, Alyson G.; Phillips, Cynthia Ann
Enumerating triangles (3-cycles) in graphs is a kernel operation for social network analysis. For example, many community detection methods depend upon finding common neighbors of two related entities. We consider Cohen's simple and elegant solution for listing triangles: give each node a 'bucket.' Place each edge into the bucket of its endpoint of lowest degree, breaking ties consistently. Each node then checks each pair of edges in its bucket, testing for the adjacency that would complete that triangle. Cohen presents an informal argument that his algorithm should run well on real graphs. We formalize this argument by providing an analysismore » for the expected running time on a class of random graphs, including power law graphs. We consider a rigorously defined method for generating a random simple graph, the erased configuration model (ECM). In the ECM each node draws a degree independently from a marginal degree distribution, endpoints pair randomly, and we erase self loops and multiedges. If the marginal degree distribution has a finite second moment, it follows immediately that Cohen's algorithm runs in expected linear time. Furthermore, it can still run in expected linear time even when the degree distribution has such a heavy tail that the second moment is not finite. We prove that Cohen's algorithm runs in expected linear time when the marginal degree distribution has finite 4/3 moment and no vertex has degree larger than {radical}n. In fact we give the precise asymptotic value of the expected number of edge pairs per bucket. A finite 4/3 moment is required; if it is unbounded, then so is the number of pairs. The marginal degree distribution of a power law graph has bounded 4/3 moment when its exponent {alpha} is more than 7/3. Thus for this class of power law graphs, with degree at most {radical}n, Cohen's algorithm runs in expected linear time. This is precisely the value of {alpha} for which the clustering coefficient tends to zero asymptotically, and it is in the range that is relevant for the degree distribution of the World-Wide Web.« less
Network Coding for Function Computation
ERIC Educational Resources Information Center
Appuswamy, Rathinakumar
2011-01-01
In this dissertation, the following "network computing problem" is considered. Source nodes in a directed acyclic network generate independent messages and a single receiver node computes a target function f of the messages. The objective is to maximize the average number of times f can be computed per network usage, i.e., the "computing…
NASA Astrophysics Data System (ADS)
Wang, Lei; Moltz, Jan H.; Bornemann, Lars; Hahn, Horst K.
2012-03-01
Precise size measurement of enlarged lymph nodes is a significant indicator for diagnosing malignancy, follow-up and therapy monitoring of cancer diseases. The presence of diverse sizes and shapes, inhomogeneous enhancement and the adjacency to neighboring structures with similar intensities, make the segmentation task challenging. We present a semi-automatic approach requiring minimal user interactions to fast and robustly segment the enlarged lymph nodes. First, a stroke approximating the largest diameter of a specific lymph node is drawn manually from which a volume of interest (VOI) is determined. Second, Based on the statistical analysis of the intensities on the dilated stroke area, a region growing procedure is utilized within the VOI to create an initial segmentation of the target lymph node. Third, a rotatable spiral-scanning technique is proposed to resample the 3D boundary surface of the lymph node to a 2D boundary contour in a transformed polar image. The boundary contour is found by seeking the optimal path in 2D polar image with dynamic programming algorithm and eventually transformed back to 3D. Ultimately, the boundary surface of the lymph node is determined using an interpolation scheme followed by post-processing steps. To test the robustness and efficiency of our method, a quantitative evaluation was conducted with a dataset of 315 lymph nodes acquired from 79 patients with lymphoma and melanoma. Compared to the reference segmentations, an average Dice coefficient of 0.88 with a standard deviation of 0.08, and an average absolute surface distance of 0.54mm with a standard deviation of 0.48mm, were achieved.
Liu, Jianpei; Huang, Pinjie; Huang, Jianglong; Chen, Tufeng; Wei, Hongbo
2015-06-09
To confirm the feasibility of improving lymph node harvest by injecting methylene blue into inferior mesenteric artery in rectal cancer after neoadjuvant therapy. Forty two ex vivo specimens were collected from rectal cancer patients with neoadjuvant therapy and radical operation at our hospital. Traditional method with palpation and injection of methylene blue into inferior mesenteric artery were employed. The data of lymph node harvest were analyzed by paired t and chi-square tests. The average number of detected lymph node in traditional method and methylene blue groups were 6.1 ± 4.3 and 15.2 ± 6.4 respectively (P<0.001). The proportions of lymph nodes <5 mm were 14.1% and 46.7% in traditional method and methylene blue groups respectively (P<0.001). And the injection of methylene blue added 13 extra metastatic lymph nodes and caused a shift to node-positive stage (P=0.89). Neoadjuvant therapy decrease lymph node retrieval in rectal cancer. Injecting methylene blue into inferior mesenteric artery improves lymph node harvest especially for small nodes and helps to acquire more metastatic nodes for accurate pathological staging.
Mucinous cystadenocarcinoma of the breast.
Koenig, C; Tavassoli, F A
1998-06-01
Four unusual cases of primary mammary mucinous cystadenocarcinoma composed predominantly of tall columnar cells with abundant intracytoplasmic mucin are reported; they were multicystic and appeared virtually identical to mucinous cystadenocarcinomas of the ovary and pancreas. Three of the women were white and one was black, they ranged in age from 49 to 67 years (average 58), and they had tumors that ranged from 0.8 to 19 cm in diameter. Microscopically, the tumors were characterized by cystic spaces lined by predominantly bland-appearing columnar mucinous cells with stratification, tufting, and papillary formations. Varying degrees of cytologic atypia were focally evident, with gradual loss of the intracytoplasmic mucin and transformation to an eosinophilic squamoid cell population. Multifocal invasion generally emanated from these eosinophilic, squamoid areas in all cases. All four tumors displayed immunoreactivity for MIB-1 (Ki-67) in a relatively high percentage of cells and failed to show immunoreactivity for estrogen receptors and progesterone receptors. All four stained positively with cytokeratin 7 (CK7) but were negative with cytokeratin 20 (CK20). Mastectomy and axillary lymph node dissection were performed in three cases and lumpectomy with lymph node dissection in the remaining case. Lymph node metastases, identified in only one patient, retained the distinctive morphology. Three of the patients are alive without evidence of disease 11, 22, and 24 months after the diagnosis; the fourth is a recent case. These tumors are a rare, clinicopathologically distinct type of primary breast carcinoma that should be distinguished from typical mucinous (colloid) carcinomas of the breast and, more importantly, metastases from other sites.
NASA Astrophysics Data System (ADS)
Abidin, Anas Zainul; D'Souza, Adora M.; Nagarajan, Mahesh B.; Wismüller, Axel
2016-03-01
About 50% of subjects infected with HIV present deficits in cognitive domains, which are known collectively as HIV associated neurocognitive disorder (HAND). The underlying synaptodendritic damage can be captured using resting state functional MRI, as has been demonstrated by a few earlier studies. Such damage may induce topological changes of brain connectivity networks. We test this hypothesis by capturing the functional interdependence of 90 brain network nodes using a Mutual Connectivity Analysis (MCA) framework with non-linear time series modeling based on Generalized Radial Basis function (GRBF) neural networks. The network nodes are selected based on the regions defined in the Automated Anatomic Labeling (AAL) atlas. Each node is represented by the average time series of the voxels of that region. The resulting networks are then characterized using graph-theoretic measures that quantify various network topology properties at a global as well as at a local level. We tested for differences in these properties in network graphs obtained for 10 subjects (6 male and 4 female, 5 HIV+ and 5 HIV-). Global network properties captured some differences between these subject cohorts, though significant differences were seen only with the clustering coefficient measure. Local network properties, such as local efficiency and the degree of connections, captured significant differences in regions of the frontal lobe, precentral and cingulate cortex amongst a few others. These results suggest that our method can be used to effectively capture differences occurring in brain network connectivity properties revealed by resting-state functional MRI in neurological disease states, such as HAND.
Hombach, V; Kebbel, U; Höpp, H W; Winter, U J; Braun, V; Deutsch, H; Hirche, H; Hilger, H H
1982-12-24
A new ECG-amplifier system for recording cardiac microvolt potentials from the body surface is described. The improvement in signal-to-noise ratio was achieved by using specially designed suction electrodes, which were isolated from each other; by applying parallel signal averaging from four electrode pairs via four low-noise amplifiers; and by conducting the registration in Faraday cage. in 14 normal subjects, 12 patients with coronary heart disease and one patient with surgically corrected ventricular septal defect and pulmonary stenosis, pre-P-potentials (possible sinus node activity), His bundle potentials and ventricular late potentials were recorded with differing degrees of success. Variations of the time intervals to the preceding QRS complex were observed within the S-T segment in six of nine patients with demonstrable ventricular late ventricular late potentials. The advantage of such continuously recording ECG system lies in the highly accurate registration of cardiac micropotentials, particularly with ventricular late potentials that are changing in time, whereas the signal-averaging technique does not provide such possibilities.
Koopman, Daniëlle; van Dalen, Jorn A; Arkies, Hester; Oostdijk, Ad H J; Francken, Anne Brecht; Bart, Jos; Slump, Cornelis H; Knollema, Siert; Jager, Pieter L
2018-01-16
We evaluated the diagnostic implications of a small-voxel reconstruction for lymph node characterization in breast cancer patients, using state-of-the-art FDG-PET/CT. We included 69 FDG-PET/CT scans from breast cancer patients. PET data were reconstructed using standard 4 × 4 × 4 mm 3 and small 2 × 2 × 2 mm 3 voxels. Two hundred thirty loco-regional lymph nodes were included, of which 209 nodes were visualised on PET/CT. All nodes were visually scored as benign or malignant, and SUV max and TB ratio (=SUV max /SUV background ) were measured. Final diagnosis was based on histological or imaging information. We determined the accuracy, sensitivity and specificity for both reconstruction methods and calculated optimal cut-off values to distinguish benign from malignant nodes. Sixty-one benign and 169 malignant lymph nodes were included. Visual evaluation accuracy was 73% (sensitivity 67%, specificity 89%) on standard-voxel images and 77% (sensitivity 78%, specificity 74%) on small-voxel images (p = 0.13). Across malignant nodes visualised on PET/CT, the small-voxel score was more often correct compared with the standard-voxel score (89 vs. 76%, p < 0.001). In benign nodes, the standard-voxel score was more often correct (89 vs. 74%, p = 0.04). Quantitative data were based on the 61 benign and 148 malignant lymph nodes visualised on PET/CT. SUVs and TB ratio were on average 3.0 and 1.6 times higher in malignant nodes compared to those in benign nodes (p < 0.001), on standard- and small-voxel PET images respectively. Small-voxel PET showed average increases in SUV max and TB ratio of typically 40% over standard-voxel PET. The optimal SUV max cut-off using standard-voxels was 1.8 (sensitivity 81%, specificity 95%, accuracy 85%) while for small-voxels, the optimal SUV max cut-off was 2.6 (sensitivity 78%, specificity 98%, accuracy 84%). Differences in accuracy were non-significant. Small-voxel PET/CT improves the sensitivity of visual lymph node characterization and provides a higher detection rate of malignant lymph nodes. However, small-voxel PET/CT also introduced more false-positive results in benign nodes. Across all nodes, differences in accuracy were non-significant. Quantitatively, small-voxel images require higher cut-off values. Readers have to adapt their reference standards.
Chinese Mainland Movie Network
NASA Astrophysics Data System (ADS)
Liu, Ai-Fen; Xue, Yu-Hua; He, Da-Ren
2008-03-01
We propose describing a large kind of cooperation-competition networks by bipartite graphs and their unipartite projections. In the graphs the topological structure describe the cooperation-competition configuration of the basic elements, and the vertex weight describe their different roles in cooperation or results of competition. This complex network description may be helpful for finding and understanding common properties of cooperation-competition systems. In order to show an example, we performed an empirical investigation on the movie cooperation-competition network within recent 80 years in the Chinese mainland. In the net the movies are defined as nodes, and two nodes are connected by a link if a common main movie actor performs in them. The edge represents the competition relationship between two movies for more audience among a special audience colony. We obtained the statistical properties, such as the degree distribution, act degree distribution, act size distribution, and distribution of the total node weight, and explored the influence factors of Chinese mainland movie competition intensity.
Association of tuberculosis with multimorbidity and social networks
Valenzuela-Jiménez, Hiram; Manrique-Hernández, Edgar Fabian; Idrovo, Alvaro Javier
2017-01-01
ABSTRACT The combination of tuberculosis with other diseases can affect tuberculosis treatment within populations. In the present study, social network analysis of data retrieved from the Mexican National Epidemiological Surveillance System was used in order to explore associations between the number of contacts and multimorbidity. The node degree was calculated for each individual with tuberculosis and included information from 242 contacts without tuberculosis. Multimorbidity was identified in 49.89% of individuals. The node degrees were highest for individuals with tuberculosis + HIV infection (p < 0.04) and lowest for those with tuberculosis + pulmonary edema (p < 0.07). Social network analysis should be used as a standard method for monitoring tuberculosis and tuberculosis-related syndemics. PMID:28125153
Emergence of scale-free close-knit friendship structure in online social networks.
Cui, Ai-Xiang; Zhang, Zi-Ke; Tang, Ming; Hui, Pak Ming; Fu, Yan
2012-01-01
Although the structural properties of online social networks have attracted much attention, the properties of the close-knit friendship structures remain an important question. Here, we mainly focus on how these mesoscale structures are affected by the local and global structural properties. Analyzing the data of four large-scale online social networks reveals several common structural properties. It is found that not only the local structures given by the indegree, outdegree, and reciprocal degree distributions follow a similar scaling behavior, the mesoscale structures represented by the distributions of close-knit friendship structures also exhibit a similar scaling law. The degree correlation is very weak over a wide range of the degrees. We propose a simple directed network model that captures the observed properties. The model incorporates two mechanisms: reciprocation and preferential attachment. Through rate equation analysis of our model, the local-scale and mesoscale structural properties are derived. In the local-scale, the same scaling behavior of indegree and outdegree distributions stems from indegree and outdegree of nodes both growing as the same function of the introduction time, and the reciprocal degree distribution also shows the same power-law due to the linear relationship between the reciprocal degree and in/outdegree of nodes. In the mesoscale, the distributions of four closed triples representing close-knit friendship structures are found to exhibit identical power-laws, a behavior attributed to the negligible degree correlations. Intriguingly, all the power-law exponents of the distributions in the local-scale and mesoscale depend only on one global parameter, the mean in/outdegree, while both the mean in/outdegree and the reciprocity together determine the ratio of the reciprocal degree of a node to its in/outdegree. Structural properties of numerical simulated networks are analyzed and compared with each of the four real networks. This work helps understand the interplay between structures on different scales in online social networks.
Emergence of Scale-Free Close-Knit Friendship Structure in Online Social Networks
Cui, Ai-Xiang; Zhang, Zi-Ke; Tang, Ming; Hui, Pak Ming; Fu, Yan
2012-01-01
Although the structural properties of online social networks have attracted much attention, the properties of the close-knit friendship structures remain an important question. Here, we mainly focus on how these mesoscale structures are affected by the local and global structural properties. Analyzing the data of four large-scale online social networks reveals several common structural properties. It is found that not only the local structures given by the indegree, outdegree, and reciprocal degree distributions follow a similar scaling behavior, the mesoscale structures represented by the distributions of close-knit friendship structures also exhibit a similar scaling law. The degree correlation is very weak over a wide range of the degrees. We propose a simple directed network model that captures the observed properties. The model incorporates two mechanisms: reciprocation and preferential attachment. Through rate equation analysis of our model, the local-scale and mesoscale structural properties are derived. In the local-scale, the same scaling behavior of indegree and outdegree distributions stems from indegree and outdegree of nodes both growing as the same function of the introduction time, and the reciprocal degree distribution also shows the same power-law due to the linear relationship between the reciprocal degree and in/outdegree of nodes. In the mesoscale, the distributions of four closed triples representing close-knit friendship structures are found to exhibit identical power-laws, a behavior attributed to the negligible degree correlations. Intriguingly, all the power-law exponents of the distributions in the local-scale and mesoscale depend only on one global parameter, the mean in/outdegree, while both the mean in/outdegree and the reciprocity together determine the ratio of the reciprocal degree of a node to its in/outdegree. Structural properties of numerical simulated networks are analyzed and compared with each of the four real networks. This work helps understand the interplay between structures on different scales in online social networks. PMID:23272067
Learnable Models for Information Diffusion and its Associated User Behavior in Micro-blogosphere
2012-08-30
According to the work of Even-Dar and Shapira (2007), we recall the definition of the ba- sic voter model on network G. In the model, each node of G...reason as follows. We started with the K distinct initial nodes and all the other nodes were neutral in the beginning. Recall that we set the average time... memory , running under Linux. Learning to predict opinion share and detect anti-majority opinionists in social networks 29 7 Conclusion Unlike the popular
The Design and Development of the SMEX-Lite Power System
NASA Technical Reports Server (NTRS)
Rakow, Glenn P.; Schnurr, Richard G., Jr.; Solly, Michael A.
1998-01-01
This paper describes the design and development of a 250W orbit average electrical power system electronic Power Node and software for use in Low Earth Orbit missions. The mass of the Power Node is 3.6 Kg (8 lb.). The dimensions of the Power Node are 30cm x 26cm x 7.9cm (11 in. x 10.25 in x 3.1 in.) The design was realized using software, Field Programmable Gate Array (FPGA) digital logic and surface mount technology. The design is generic enough to reduce the non-recurring engineering for different mission configurations. The Power Node charges one to five, low cost, 22-cell 4 AH D-cell battery packs independently. The battery charging algorithms are executed in the power software to reduce the mass and size of the power electronic. The Power Node implements a peak-power tracking algorithm using an innovative hardware/software approach. The power software task is hosted on the spacecraft processor. The power software task generates a MIL-STD-1553 command packet to update the Power Node control settings. The settings for the battery voltage and current limits, as well as minimum solar array voltage used to implement peak power tracking are contained in this packet. Several advanced topologies are used in the Power Node. These include synchronous rectification in the bus regulators, average current control in the battery chargers and quasi-resonant converters for the Field Effect Transistor (FET) transistor drive electronics. Lastly, the main bus regulator uses a feed-forward topology with the PWM implemented in an FPGA.
Ranking the spreading ability of nodes in network core
NASA Astrophysics Data System (ADS)
Tong, Xiao-Lei; Liu, Jian-Guo; Wang, Jiang-Pan; Guo, Qiang; Ni, Jing
2015-11-01
Ranking nodes by their spreading ability in complex networks is of vital significance to better understand the network structure and more efficiently spread information. The k-shell decomposition method could identify the most influential nodes, namely network core, with the same ks values regardless to their different spreading influence. In this paper, we present an improved method based on the k-shell decomposition method and closeness centrality (CC) to rank the node spreading influence of the network core. Experiment results on the data from the scientific collaboration network and U.S. aviation network show that the accuracy of the presented method could be increased by 31% and 45% than the one obtained by the degree k, 32% and 31% than the one by the betweenness.
Limits on relief through constrained exchange on random graphs
NASA Astrophysics Data System (ADS)
LaViolette, Randall A.; Ellebracht, Lory A.; Gieseler, Charles J.
2007-09-01
Agents are represented by nodes on a random graph (e.g., “small world”). Each agent is endowed with a zero-mean random value that may be either positive or negative. All agents attempt to find relief, i.e., to reduce the magnitude of that initial value, to zero if possible, through exchanges. The exchange occurs only between the agents that are linked, a constraint that turns out to dominate the results. The exchange process continues until Pareto equilibrium is achieved. Only 40-90% of the agents achieved relief on small-world graphs with mean degree between 2 and 40. Even fewer agents achieved relief on scale-free-like graphs with a truncated power-law degree distribution. The rate at which relief grew with increasing degree was slow, only at most logarithmic for all of the graphs considered; viewed in reverse, the fraction of nodes that achieve relief is resilient to the removal of links.
Surname complex network for Brazil and Portugal
NASA Astrophysics Data System (ADS)
Ferreira, G. D.; Viswanathan, G. M.; da Silva, L. R.; Herrmann, H. J.
2018-06-01
We present a study of social networks based on the analysis of Brazilian and Portuguese family names (surnames). We construct networks whose nodes are names of families and whose edges represent parental relations between two families. From these networks we extract the connectivity distribution, clustering coefficient, shortest path and centrality. We find that the connectivity distribution follows an approximate power law. We associate the number of hubs, centrality and entropy to the degree of miscegenation in the societies in both countries. Our results show that Portuguese society has a higher miscegenation degree than Brazilian society. All networks analyzed lead to approximate inverse square power laws in the degree distribution. We conclude that the thermodynamic limit is reached for small networks (3 or 4 thousand nodes). The assortative mixing of all networks is negative, showing that the more connected vertices are connected to vertices with lower connectivity. Finally, the network of surnames presents some small world characteristics.
Rea, Alan; Cederstrand, Joel R.
1994-01-01
The data sets on this compact disc are a compilation of several geographic reference data sets of interest to the global-change research community. The data sets were chosen with input from the Global Energy and Water Cycle Experiment (GEWEX) Continental-Scale International Project (GCIP) Data Committee and the GCIP Hydrometeorology and Atmospheric Subpanels. The data sets include: locations and periods of record for stream gages, reservoir gages, and meteorological stations; a 500-meter-resolution digital elevation model; grid-node locations for the Eta numerical weather-prediction model; and digital map data sets of geology, land use, streams, large reservoirs, average annual runoff, average annual precipitation, average annual temperature, average annual heating and cooling degree days, hydrologic units, and state and county boundaries. Also included are digital index maps for LANDSAT scenes, and for the U.S. Geological Survey 1:250,000, 1:100,000, and 1:24,000-scale map series. Most of the data sets cover the conterminous United States; the digital elevation model also includes part of southern Canada. The stream and reservoir gage and meteorological station files cover all states having area within the Mississippi River Basin plus that part of the Mississippi River Basin lying within Canada. Several data-base retrievals were processed by state, therefore many sites outside the Mississippi River Basin are included.
Cluster Based Location-Aided Routing Protocol for Large Scale Mobile Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Wang, Yi; Dong, Liang; Liang, Taotao; Yang, Xinyu; Zhang, Deyun
Routing algorithms with low overhead, stable link and independence of the total number of nodes in the network are essential for the design and operation of the large-scale wireless mobile ad hoc networks (MANET). In this paper, we develop and analyze the Cluster Based Location-Aided Routing Protocol for MANET (C-LAR), a scalable and effective routing algorithm for MANET. C-LAR runs on top of an adaptive cluster cover of the MANET, which can be created and maintained using, for instance, the weight-based distributed algorithm. This algorithm takes into consideration the node degree, mobility, relative distance, battery power and link stability of mobile nodes. The hierarchical structure stabilizes the end-to-end communication paths and improves the networks' scalability such that the routing overhead does not become tremendous in large scale MANET. The clusterheads form a connected virtual backbone in the network, determine the network's topology and stability, and provide an efficient approach to minimizing the flooding traffic during route discovery and speeding up this process as well. Furthermore, it is fascinating and important to investigate how to control the total number of nodes participating in a routing establishment process so as to improve the network layer performance of MANET. C-LAR is to use geographical location information provided by Global Position System to assist routing. The location information of destination node is used to predict a smaller rectangle, isosceles triangle, or circle request zone, which is selected according to the relative location of the source and the destination, that covers the estimated region in which the destination may be located. Thus, instead of searching the route in the entire network blindly, C-LAR confines the route searching space into a much smaller estimated range. Simulation results have shown that C-LAR outperforms other protocols significantly in route set up time, routing overhead, mean delay and packet collision, and simultaneously maintains low average end-to-end delay, high success delivery ratio, low control overhead, as well as low route discovery frequency.
Cooperative Learning for Distributed In-Network Traffic Classification
NASA Astrophysics Data System (ADS)
Joseph, S. B.; Loo, H. R.; Ismail, I.; Andromeda, T.; Marsono, M. N.
2017-04-01
Inspired by the concept of autonomic distributed/decentralized network management schemes, we consider the issue of information exchange among distributed network nodes to network performance and promote scalability for in-network monitoring. In this paper, we propose a cooperative learning algorithm for propagation and synchronization of network information among autonomic distributed network nodes for online traffic classification. The results show that network nodes with sharing capability perform better with a higher average accuracy of 89.21% (sharing data) and 88.37% (sharing clusters) compared to 88.06% for nodes without cooperative learning capability. The overall performance indicates that cooperative learning is promising for distributed in-network traffic classification.
Using LTI Dynamics to Identify the Influential Nodes in a Network
Jorswieck, Eduard; Scheunert, Christian
2016-01-01
Networks are used for modeling numerous technical, social or biological systems. In order to better understand the system dynamics, it is a matter of great interest to identify the most important nodes within the network. For a large set of problems, whether it is the optimal use of available resources, spreading information efficiently or even protection from malicious attacks, the most important node is the most influential spreader, the one that is capable of propagating information in the shortest time to a large portion of the network. Here we propose the Node Imposed Response (NiR), a measure which accurately evaluates node spreading power. It outperforms betweenness, degree, k-shell and h-index centrality in many cases and shows the similar accuracy to dynamics-sensitive centrality. We utilize the system-theoretic approach considering the network as a Linear Time-Invariant system. By observing the system response we can quantify the importance of each node. In addition, our study provides a robust tool set for various protective strategies. PMID:28030548
Energy Efficient and Stable Weight Based Clustering for Mobile Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Bouk, Safdar H.; Sasase, Iwao
Recently several weighted clustering algorithms have been proposed, however, to the best of our knowledge; there is none that propagates weights to other nodes without weight message for leader election, normalizes node parameters and considers neighboring node parameters to calculate node weights. In this paper, we propose an Energy Efficient and Stable Weight Based Clustering (EE-SWBC) algorithm that elects cluster heads without sending any additional weight message. It propagates node parameters to its neighbors through neighbor discovery message (HELLO Message) and stores these parameters in neighborhood list. Each node normalizes parameters and efficiently calculates its own weight and the weights of neighboring nodes from that neighborhood table using Grey Decision Method (GDM). GDM finds the ideal solution (best node parameters in neighborhood list) and calculates node weights in comparison to the ideal solution. The node(s) with maximum weight (parameters closer to the ideal solution) are elected as cluster heads. In result, EE-SWBC fairly selects potential nodes with parameters closer to ideal solution with less overhead. Different performance metrics of EE-SWBC and Distributed Weighted Clustering Algorithm (DWCA) are compared through simulations. The simulation results show that EE-SWBC maintains fewer average numbers of stable clusters with minimum overhead, less energy consumption and fewer changes in cluster structure within network compared to DWCA.
Rapid identifying high-influence nodes in complex networks
NASA Astrophysics Data System (ADS)
Song, Bo; Jiang, Guo-Ping; Song, Yu-Rong; Xia, Ling-Ling
2015-10-01
A tiny fraction of influential individuals play a critical role in the dynamics on complex systems. Identifying the influential nodes in complex networks has theoretical and practical significance. Considering the uncertainties of network scale and topology, and the timeliness of dynamic behaviors in real networks, we propose a rapid identifying method (RIM) to find the fraction of high-influential nodes. Instead of ranking all nodes, our method only aims at ranking a small number of nodes in network. We set the high-influential nodes as initial spreaders, and evaluate the performance of RIM by the susceptible-infected-recovered (SIR) model. The simulations show that in different networks, RIM performs well on rapid identifying high-influential nodes, which is verified by typical ranking methods, such as degree, closeness, betweenness, and eigenvector centrality methods. Project supported by the National Natural Science Foundation of China (Grant Nos. 61374180 and 61373136), the Ministry of Education Research in the Humanities and Social Sciences Planning Fund Project, China (Grant No. 12YJAZH120), and the Six Projects Sponsoring Talent Summits of Jiangsu Province, China (Grant No. RLD201212).
Measures of node centrality in mobile social networks
NASA Astrophysics Data System (ADS)
Gao, Zhenxiang; Shi, Yan; Chen, Shanzhi
2015-02-01
Mobile social networks exploit human mobility and consequent device-to-device contact to opportunistically create data paths over time. While links in mobile social networks are time-varied and strongly impacted by human mobility, discovering influential nodes is one of the important issues for efficient information propagation in mobile social networks. Although traditional centrality definitions give metrics to identify the nodes with central positions in static binary networks, they cannot effectively identify the influential nodes for information propagation in mobile social networks. In this paper, we address the problems of discovering the influential nodes in mobile social networks. We first use the temporal evolution graph model which can more accurately capture the topology dynamics of the mobile social network over time. Based on the model, we explore human social relations and mobility patterns to redefine three common centrality metrics: degree centrality, closeness centrality and betweenness centrality. We then employ empirical traces to evaluate the benefits of the proposed centrality metrics, and discuss the predictability of nodes' global centrality ranking by nodes' local centrality ranking. Results demonstrate the efficiency of the proposed centrality metrics.
Short paths in expander graphs
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kleinberg, J.; Rubinfeld, R.
Graph expansion has proved to be a powerful general tool for analyzing the behavior of routing algorithms and the interconnection networks on which they run. We develop new routing algorithms and structural results for bounded-degree expander graphs. Our results are unified by the fact that they are all based upon, and extend, a body of work asserting that expanders are rich in short, disjoint paths. In particular, our work has consequences for the disjoint paths problem, multicommodify flow, and graph minor containment. We show: (i) A greedy algorithm for approximating the maximum disjoint paths problem achieves a polylogarithmic approximation ratiomore » in bounded-degree expanders. Although our algorithm is both deterministic and on-line, its performance guarantee is an improvement over previous bounds in expanders. (ii) For a multicommodily flow problem with arbitrary demands on a bounded-degree expander, there is a (1 + {epsilon})-optimal solution using only flow paths of polylogarithmic length. It follows that the multicommodity flow algorithm of Awerbuch and Leighton runs in nearly linear time per commodity in expanders. Our analysis is based on establishing the following: given edge weights on an expander G, one can increase some of the weights very slightly so the resulting shortest-path metric is smooth - the min-weight path between any pair of nodes uses a polylogarithmic number of edges. (iii) Every bounded-degree expander on n nodes contains every graph with O(n/log{sup O(1)} n) nodes and edges as a minor.« less
Adjuvant radiation trials for high-risk breast cancer patients: adequacy of lymphadenectomy.
Silberman, A W; Sarna, G P; Palmer, D
2000-06-01
The recently published, widely publicized adjuvant radiation trials from Denmark and Canada concluded that the addition of postoperative radiotherapy (XRT) to modified radical mastectomy (MRM) and adjuvant chemotherapy reduces locoregional recurrences and prolongs survival in high-risk premenopausal patients with breast cancer. Our thesis is that adequate lymphadenectomies were not performed in either study. Consequently, the conclusion to these studies is not applicable to those patients who have undergone adequate surgery. To better assess adequate lymph node yield from an MRM, a retrospective review was performed on 215 consecutive patients treated surgically for invasive breast cancer. Data from this review were compared with the surgical data from the above-mentioned radiotherapy trials. In a group of 131 patients who had MRM, the average number of nodes removed was 26 (median, 25), and 75.5% of the specimens had 20 or more lymph nodes. In 73 patients who underwent segmental mastectomy with axillary lymph node dissection, both the average and the median number of lymph nodes removed were 24, and 68.9% had 20 or more nodes. These data compare to the Danish radiation trial in which a median of 7 lymph nodes were removed (with 76% of the patients having 9 or fewer lymph nodes in the specimen) and to the Canadian radiation trial in which a median of 11 lymph nodes were removed. In addition, in our breast cancer patients with positive nodes (84 of 204; 41.2%), 45.2.% (38 of 84) had more than three positive nodes compared with 29.8% in the Danish study and 35% in the Canadian study. Our surgical data are sufficiently different from those of the Danish and Canadian studies to indicate that, in those studies, incomplete lymph node dissections were performed and that residual disease was left behind in the axilla in some or all of the patients. The addition of XRT in the setting of residual axillary disease may compensate for an inadequate operation and yield an acceptable oncological result; however, these studies did not provide an adequate comparison with a well-performed MRM without XRT. In the absence of documented benefit, XRT should not be routinely added if a complete lymph node dissection has been performed.
Topological Structure of the Space of Phenotypes: The Case of RNA Neutral Networks
Aguirre, Jacobo; Buldú, Javier M.; Stich, Michael; Manrubia, Susanna C.
2011-01-01
The evolution and adaptation of molecular populations is constrained by the diversity accessible through mutational processes. RNA is a paradigmatic example of biopolymer where genotype (sequence) and phenotype (approximated by the secondary structure fold) are identified in a single molecule. The extreme redundancy of the genotype-phenotype map leads to large ensembles of RNA sequences that fold into the same secondary structure and can be connected through single-point mutations. These ensembles define neutral networks of phenotypes in sequence space. Here we analyze the topological properties of neutral networks formed by 12-nucleotides RNA sequences, obtained through the exhaustive folding of sequence space. A total of 412 sequences fragments into 645 subnetworks that correspond to 57 different secondary structures. The topological analysis reveals that each subnetwork is far from being random: it has a degree distribution with a well-defined average and a small dispersion, a high clustering coefficient, and an average shortest path between nodes close to its minimum possible value, i.e. the Hamming distance between sequences. RNA neutral networks are assortative due to the correlation in the composition of neighboring sequences, a feature that together with the symmetries inherent to the folding process explains the existence of communities. Several topological relationships can be analytically derived attending to structural restrictions and generic properties of the folding process. The average degree of these phenotypic networks grows logarithmically with their size, such that abundant phenotypes have the additional advantage of being more robust to mutations. This property prevents fragmentation of neutral networks and thus enhances the navigability of sequence space. In summary, RNA neutral networks show unique topological properties, unknown to other networks previously described. PMID:22028856
Scaling of Average Weighted Receiving Time on Double-Weighted Koch Networks
NASA Astrophysics Data System (ADS)
Dai, Meifeng; Ye, Dandan; Hou, Jie; Li, Xingyi
2015-03-01
In this paper, we introduce a model of the double-weighted Koch networks based on actual road networks depending on the two weight factors w,r ∈ (0, 1]. The double weights represent the capacity-flowing weight and the cost-traveling weight, respectively. Denote by wFij the capacity-flowing weight connecting the nodes i and j, and denote by wCij the cost-traveling weight connecting the nodes i and j. Let wFij be related to the weight factor w, and let wCij be related to the weight factor r. This paper assumes that the walker, at each step, starting from its current node, moves to any of its neighbors with probability proportional to the capacity-flowing weight of edge linking them. The weighted time for two adjacency nodes is the cost-traveling weight connecting the two nodes. We define the average weighted receiving time (AWRT) on the double-weighted Koch networks. The obtained result displays that in the large network, the AWRT grows as power-law function of the network order with the exponent, represented by θ(w,r) = ½ log2(1 + 3wr). We show that the AWRT exhibits a sublinear or linear dependence on network order. Thus, the double-weighted Koch networks are more efficient than classic Koch networks in receiving information.
Hyperbolicity measures democracy in real-world networks
NASA Astrophysics Data System (ADS)
Borassi, Michele; Chessa, Alessandro; Caldarelli, Guido
2015-09-01
In this work, we analyze the hyperbolicity of real-world networks, a geometric quantity that measures if a space is negatively curved. We provide two improvements in our understanding of this quantity: first of all, in our interpretation, a hyperbolic network is "aristocratic", since few elements "connect" the system, while a non-hyperbolic network has a more "democratic" structure with a larger number of crucial elements. The second contribution is the introduction of the average hyperbolicity of the neighbors of a given node. Through this definition, we outline an "influence area" for the vertices in the graph. We show that in real networks the influence area of the highest degree vertex is small in what we define "local" networks (i.e., social or peer-to-peer networks), and large in "global" networks (i.e., power grid, metabolic networks, or autonomous system networks).
A real-time robot arm collision detection system
NASA Technical Reports Server (NTRS)
Shaffer, Clifford A.; Herb, Gregory M.
1990-01-01
A data structure and update algorithm are presented for a prototype real time collision detection safety system for a multi-robot environment. The data structure is a variant of the octree, which serves as a spatial index. An octree recursively decomposes 3-D space into eight equal cubic octants until each octant meets some decomposition criteria. The octree stores cylspheres (cylinders with spheres on each end) and rectangular solids as primitives (other primitives can easily be added as required). These primitives make up the two seven degrees-of-freedom robot arms and environment modeled by the system. Octree nodes containing more than a predetermined number N of primitives are decomposed. This rule keeps the octree small, as the entire environment for the application can be modeled using a few dozen primitives. As robot arms move, the octree is updated to reflect their changed positions. During most update cycles, any given primitive does not change which octree nodes it is in. Thus, modification to the octree is rarely required. Incidents in which one robot arm comes too close to another arm or an object are reported. Cycle time for interpreting current joint angles, updating the octree, and detecting/reporting imminent collisions averages 30 milliseconds on an Intel 80386 processor running at 20 MHz.
Joint estimation of preferential attachment and node fitness in growing complex networks
NASA Astrophysics Data System (ADS)
Pham, Thong; Sheridan, Paul; Shimodaira, Hidetoshi
2016-09-01
Complex network growth across diverse fields of science is hypothesized to be driven in the main by a combination of preferential attachment and node fitness processes. For measuring the respective influences of these processes, previous approaches make strong and untested assumptions on the functional forms of either the preferential attachment function or fitness function or both. We introduce a Bayesian statistical method called PAFit to estimate preferential attachment and node fitness without imposing such functional constraints that works by maximizing a log-likelihood function with suitably added regularization terms. We use PAFit to investigate the interplay between preferential attachment and node fitness processes in a Facebook wall-post network. While we uncover evidence for both preferential attachment and node fitness, thus validating the hypothesis that these processes together drive complex network evolution, we also find that node fitness plays the bigger role in determining the degree of a node. This is the first validation of its kind on real-world network data. But surprisingly the rate of preferential attachment is found to deviate from the conventional log-linear form when node fitness is taken into account. The proposed method is implemented in the R package PAFit.
Joint estimation of preferential attachment and node fitness in growing complex networks
Pham, Thong; Sheridan, Paul; Shimodaira, Hidetoshi
2016-01-01
Complex network growth across diverse fields of science is hypothesized to be driven in the main by a combination of preferential attachment and node fitness processes. For measuring the respective influences of these processes, previous approaches make strong and untested assumptions on the functional forms of either the preferential attachment function or fitness function or both. We introduce a Bayesian statistical method called PAFit to estimate preferential attachment and node fitness without imposing such functional constraints that works by maximizing a log-likelihood function with suitably added regularization terms. We use PAFit to investigate the interplay between preferential attachment and node fitness processes in a Facebook wall-post network. While we uncover evidence for both preferential attachment and node fitness, thus validating the hypothesis that these processes together drive complex network evolution, we also find that node fitness plays the bigger role in determining the degree of a node. This is the first validation of its kind on real-world network data. But surprisingly the rate of preferential attachment is found to deviate from the conventional log-linear form when node fitness is taken into account. The proposed method is implemented in the R package PAFit. PMID:27601314
Optimal navigation for characterizing the role of the nodes in complex networks
NASA Astrophysics Data System (ADS)
Cajueiro, Daniel O.
2010-05-01
In this paper, we explore how the approach of optimal navigation (Cajueiro (2009) [33]) can be used to evaluate the centrality of a node and to characterize its role in a network. Using the subway network of Boston and the London rapid transit rail as proxies for complex networks, we show that the centrality measures inherited from the approach of optimal navigation may be considered if one desires to evaluate the centrality of the nodes using other pieces of information beyond the geometric properties of the network. Furthermore, evaluating the correlations between these inherited measures and classical measures of centralities such as the degree of a node and the characteristic path length of a node, we have found two classes of results. While for the London rapid transit rail, these inherited measures can be easily explained by these classical measures of centrality, for the Boston underground transportation system we have found nontrivial results.
Modeling Citation Networks Based on Vigorousness and Dormancy
NASA Astrophysics Data System (ADS)
Wang, Xue-Wen; Zhang, Li-Jie; Yang, Guo-Hong; Xu, Xin-Jian
2013-08-01
In citation networks, the activity of papers usually decreases with age and dormant papers may be discovered and become fashionable again. To model this phenomenon, a competition mechanism is suggested which incorporates two factors: vigorousness and dormancy. Based on this idea, a citation network model is proposed, in which a node has two discrete stage: vigorous and dormant. Vigorous nodes can be deactivated and dormant nodes may be activated and become vigorous. The evolution of the network couples addition of new nodes and state transitions of old ones. Both analytical calculation and numerical simulation show that the degree distribution of nodes in generated networks displays a good right-skewed behavior. Particularly, scale-free networks are obtained as the deactivated vertex is target selected and exponential networks are realized for the random-selected case. Moreover, the measurement of four real-world citation networks achieves a good agreement with the stochastic model.
A biologically inspired immunization strategy for network epidemiology.
Liu, Yang; Deng, Yong; Jusup, Marko; Wang, Zhen
2016-07-07
Well-known immunization strategies, based on degree centrality, betweenness centrality, or closeness centrality, either neglect the structural significance of a node or require global information about the network. We propose a biologically inspired immunization strategy that circumvents both of these problems by considering the number of links of a focal node and the way the neighbors are connected among themselves. The strategy thus measures the dependence of the neighbors on the focal node, identifying the ability of this node to spread the disease. Nodes with the highest ability in the network are the first to be immunized. To test the performance of our method, we conduct numerical simulations on several computer-generated and empirical networks, using the susceptible-infected-recovered (SIR) model. The results show that the proposed strategy largely outperforms the existing well-known strategies. Copyright © 2016 Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Liao, Zhiheng; Sun, Jiaren; Yao, Jialin; Liu, Li; Li, Haowen; Liu, Jian; Xie, Jielan; Wu, Dui; Fan, Shaojia
2018-05-01
Self-organizing maps (SOMs; a feature-extracting technique based on an unsupervised machine learning algorithm) are used to classify atmospheric boundary layer (ABL) meteorology over Beijing through detecting topological relationships among the 5-year (2013-2017) radiosonde-based virtual potential temperature profiles. The classified ABL types are then examined in relation to near-surface pollutant concentrations to understand the modulation effects of the changing ABL meteorology on Beijing's air quality. Nine ABL types (i.e., SOM nodes) are obtained through the SOM classification technique, and each is characterized by distinct dynamic and thermodynamic conditions. In general, the self-organized ABL types are able to distinguish between high and low loadings of near-surface pollutants. The average concentrations of PM2.5, NO2 and CO dramatically increased from the near neutral (i.e., Node 1) to strong stable conditions (i.e., Node 9) during all seasons except for summer. Since extremely strong stability can isolate the near-surface observations from the influence of elevated SO2 pollution layers, the highest average SO2 concentrations are typically observed in Node 3 (a layer with strong stability in the upper ABL) rather than Node 9. In contrast, near-surface O3 shows an opposite dependence on atmospheric stability, with the lowest average concentration in Node 9. Analysis of three typical pollution months (i.e., January 2013, December 2015 and December 2016) suggests that the ABL types are the primary drivers of day-to-day variations in Beijing's air quality. Assuming a fixed relationship between ABL type and PM2.5 loading for different years, the relative (absolute) contributions of the ABL anomaly to elevated PM2.5 levels are estimated to be 58.3 % (44.4 µg m-3) in January 2013, 46.4 % (22.2 µg m-3) in December 2015 and 73.3 % (34.6 µg m-3) in December 2016.
Chen, Yuhan; Wang, Shengjun; Hilgetag, Claus C.; Zhou, Changsong
2013-01-01
The formation of the complex network architecture of neural systems is subject to multiple structural and functional constraints. Two obvious but apparently contradictory constraints are low wiring cost and high processing efficiency, characterized by short overall wiring length and a small average number of processing steps, respectively. Growing evidence shows that neural networks are results from a trade-off between physical cost and functional value of the topology. However, the relationship between these competing constraints and complex topology is not well understood quantitatively. We explored this relationship systematically by reconstructing two known neural networks, Macaque cortical connectivity and C. elegans neuronal connections, from combinatory optimization of wiring cost and processing efficiency constraints, using a control parameter , and comparing the reconstructed networks to the real networks. We found that in both neural systems, the reconstructed networks derived from the two constraints can reveal some important relations between the spatial layout of nodes and the topological connectivity, and match several properties of the real networks. The reconstructed and real networks had a similar modular organization in a broad range of , resulting from spatial clustering of network nodes. Hubs emerged due to the competition of the two constraints, and their positions were close to, and partly coincided, with the real hubs in a range of values. The degree of nodes was correlated with the density of nodes in their spatial neighborhood in both reconstructed and real networks. Generally, the rebuilt network matched a significant portion of real links, especially short-distant ones. These findings provide clear evidence to support the hypothesis of trade-off between multiple constraints on brain networks. The two constraints of wiring cost and processing efficiency, however, cannot explain all salient features in the real networks. The discrepancy suggests that there are further relevant factors that are not yet captured here. PMID:23505352
[Results of an individualized surgical therapy of vulvar carcinoma from 1973-1993].
Köhler, U; Schöne, M; Pawlowitsch, T
1997-01-01
From 1973 through 1993, the University of Leipzig Women's Hospital treated 285 patients with primary vulvar malignancies. Of these, 269 cases (94.3%) were squamous cell carcinomas. The patients age averaged 69 years (25-95 years). 232 women (81.4%) were older than 60 years. Only 20 women (7%) were younger than 50 years. During the given time period, 266 patients (93.3%) underwent primary surgery. Standard operative treatment, performed in 105 cases (39.5%), was radical vulvectomy and bilateral superficial inguinal lymph node dissection. Rather than en bloc resection (Butterfly method), separate incisions were used during node dissection. Only 3 patients (2.9%) experienced a relapse within the remaining skin bridge. Irradiation with a focal doses of ca. 50 Gy followed postoperative-adjuvant in those cases involving the inguinal lymph nodes. In contrast, 161 patients received largely individualized surgical treatment. Local tumor extension and patient age-dependent operability influenced the choice of treatment. Partial vulvectomy was performed in 37 cases (13.9%). Simple vulvectomy without inguinal node dissection was performed in 115 cases (43.2%) and 9 patients underwent vulvectomy with vaginal-, urethral- and partial sphincter resection, accompanied by myocutaneous flap transposition (M. gluteus maximus lobe). The cumulative (corrected) 5-year survival rate for all patients with squamous cell carcinoma was 68.6%. No significant relationship between patient age (> 60 years vs. < or = 60 years) and prognosis could be seen. Factors of importance to the prognosis, however, were primary tumor size (FIGO stage I vs. II vs. III/IV), principal tumor site (significantly poorer survival rates characterize both clitoral and multifocal carcinomas), histological staging (G1 vs. G2/G3), inguinal lymph node involvement (pN+ vs. pN-) and degree of tumor resection in "healthy" (> or = 2 cm vs. < 2 cm). 5-year survival rates among those patients receiving individualized operative care did not differ significantly. Patient survival rates were 70.3% by partial vulvectomy, 78.2% by simple vulvectomy without inguinal node dissection and 67.6% by radical vulvectomy and bilateral inguinal node dissection with or without postoperative-adjuvant irradiation. These findings, therefore, justify the individualized operative treatment of patients with vulvar carcinoma according to each patient's initial prognostic situation. The relatively seldom vulvar carcinoma should only be treated by experienced surgeons in an appropriate hospital environment. Moreover, assessment of histological sections must be standardized, reproducible and above all, include the very accurate evaluation of all resection edges.
NASA Technical Reports Server (NTRS)
Martin, C. Wayne; Breiner, David M.; Gupta, Kajal K. (Technical Monitor)
2004-01-01
Mathematical development and some computed results are presented for Mindlin plate and shell elements, suitable for analysis of laminated composite and sandwich structures. These elements use the conventional 3 (plate) or 5 (shell) nodal degrees of freedom, have no communicable mechanisms, have no spurious shear energy (no shear locking), have no spurious membrane energy (no membrane locking) and do not require arbitrary reduction of out-of-plane shear moduli or under-integration. Artificial out-of-plane rotational stiffnesses are added at the element level to avoid convergence problems or singularity due to flat spots in shells. This report discusses a 6-node curved triangular element and a 4-node quadrilateral element. Findings show that in regular rectangular meshes, the Martin-Breiner 6-node triangular curved shell (MB6) is approximately equivalent to the conventional 8-node quadrilateral with integration. The 4-node quadrilateral (MB4) has very good accuracy for a 4-node element, and may be preferred in vibration analysis because of narrower bandwidth. The mathematical developments used in these elements, those discussed in the seven appendices, have been applied to elements with 3, 4, 6, and 10 nodes and can be applied to other nodal configurations.
Determining average path length and average trapping time on generalized dual dendrimer
NASA Astrophysics Data System (ADS)
Li, Ling; Guan, Jihong
2015-03-01
Dendrimer has wide number of important applications in various fields. In some cases during transport or diffusion process, it transforms into its dual structure named Husimi cactus. In this paper, we study the structure properties and trapping problem on a family of generalized dual dendrimer with arbitrary coordination numbers. We first calculate exactly the average path length (APL) of the networks. The APL increases logarithmically with the network size, indicating that the networks exhibit a small-world effect. Then we determine the average trapping time (ATT) of the trapping process in two cases, i.e., the trap placed on a central node and the trap is uniformly distributed in all the nodes of the network. In both case, we obtain explicit solutions of ATT and show how they vary with the networks size. Besides, we also discuss the influence of the coordination number on trapping efficiency.
A Group Neighborhood Average Clock Synchronization Protocol for Wireless Sensor Networks
Lin, Lin; Ma, Shiwei; Ma, Maode
2014-01-01
Clock synchronization is a very important issue for the applications of wireless sensor networks. The sensors need to keep a strict clock so that users can know exactly what happens in the monitoring area at the same time. This paper proposes a novel internal distributed clock synchronization solution using group neighborhood average. Each sensor node collects the offset and skew rate of the neighbors. Group averaging of offset and skew rate value are calculated instead of conventional point-to-point averaging method. The sensor node then returns compensated value back to the neighbors. The propagation delay is considered and compensated. The analytical analysis of offset and skew compensation is presented. Simulation results validate the effectiveness of the protocol and reveal that the protocol allows sensor networks to quickly establish a consensus clock and maintain a small deviation from the consensus clock. PMID:25120163
Abdel Razek, Ahmed Abdel Khalek; Nada, Nadia
2018-05-01
The prognostic parameters of head and neck squamous cell carcinoma (HNSCC) include the pathological degree of tumor differentiation, clinical staging, and presence of metastatic cervical lymph nodes. To correlate tumor blood flow (TBF) acquired from arterial spin labeling (ASL) perfusion-weighted MR imaging with pathological degree of tumor differentiation, clinical stage, and nodal metastasis of HNSCC. Retrospective analysis of 43 patients (31 male, 12 female with a mean age of 65 years) with HNSCC that underwent ASL of head and neck and TBF of HNSCC was calculated. Tumor staging and metastatic lymph nodes were determined. The stages of HNSCC were stage 1 (n = 7), stage II (n = 12), stage III (n = 11) and stage IV (n = 13). Metastatic cervical lymph nodes were seen in 24 patients. The degree of tumor differentiation was determined through pathological examination. The mean TBF of poorly and undifferentiated HNSCC (157.4 ± 6.7 mL/100 g/min) was significantly different (P = 0.001) than that of well-to-moderately differentiated (142.5 ± 5.7 mL/100 g/min) HNSCC. The cut-off TBF used to differentiate well-moderately differentiated from poorly and undifferentiated HNSCC was 152 mL/100 g/min with an area under the curve of 0.658 and accuracy of 88.4%. The mean TBF of stages I, II (146.10 ± 9.1 mL/100 g/min) was significantly different (P = 0.014) than that of stages III, IV (153.33 ± 9.3 mL/100 g/min) HNSCC. The cut-off TBF used to differentiate stages I, II from stages III and IV was 148 mL/100 g/min with an area under the curve of 0.701 and accuracy of 69.8%. The TBF was higher in patients with metastatic cervical lymph nodes. The cut-off TBF suspect metastatic node was 147 mL/100 g/min with an area under the curve of 0.671 and accuracy of 67.4%. TBF is a non-invasive imaging parameter that well correlated with pathological degree of tumor differentiation, clinical stage of tumor and nodal metastasis of HNSCC.
Hu, Wei; Shi, Jun-Yi; Sheng, Yuan; Ll, Li
2008-03-01
The treatment for papillary thyroid carcinoma (PTC) without cervical lymph node metastasis (cN0) is controversial. This study was to explore a suitable method to dissect cervical lymph nodes for stage cN0 PTC patients. Eighty-four stage cN0 PTC patients, diagnosed by B ultrasound or cervical MRI from 2005--2006, were randomly divided into two groups. Thyroidectomy and ipsilateral central lymph node dissection were performed in Group A, while only thyroidectomy was performed in Group B. Each group contained 42 patients. Both groups took thyroxin tablets after operation. An average of 3 lymph nodes were found in each case of Group A, and the lymph node metastasis rate was 47.62%. The occurrence rates of complications were not significantly different between the two groups (P<0.05). Thyroidectomy plus ipsilateral central lymph node dissection is recommended for the treatment of stage cN0 PTC. It can also avoid damage of recurrent laryngeal nerve in re-dissection.
Identifying influential spreaders in complex networks based on kshell hybrid method
NASA Astrophysics Data System (ADS)
Namtirtha, Amrita; Dutta, Animesh; Dutta, Biswanath
2018-06-01
Influential spreaders are the key players in maximizing or controlling the spreading in a complex network. Identifying the influential spreaders using kshell decomposition method has become very popular in the recent time. In the literature, the core nodes i.e. with the largest kshell index of a network are considered as the most influential spreaders. We have studied the kshell method and spreading dynamics of nodes using Susceptible-Infected-Recovered (SIR) epidemic model to understand the behavior of influential spreaders in terms of its topological location in the network. From the study, we have found that every node in the core area is not the most influential spreader. Even a strategically placed lower shell node can also be a most influential spreader. Moreover, the core area can also be situated at the periphery of the network. The existing indexing methods are only designed to identify the most influential spreaders from core nodes and not from lower shells. In this work, we propose a kshell hybrid method to identify highly influential spreaders not only from the core but also from lower shells. The proposed method comprises the parameters such as kshell power, node's degree, contact distance, and many levels of neighbors' influence potential. The proposed method is evaluated using nine real world network datasets. In terms of the spreading dynamics, the experimental results show the superiority of the proposed method over the other existing indexing methods such as the kshell method, the neighborhood coreness centrality, the mixed degree decomposition, etc. Furthermore, the proposed method can also be applied to large-scale networks by considering the three levels of neighbors' influence potential.
Optimal topology to minimizing congestion in connected communication complex network
NASA Astrophysics Data System (ADS)
Benyoussef, M.; Ez-Zahraouy, H.; Benyoussef, A.
In this paper, a new model of the interdependent complex network is proposed, based on two assumptions that (i) the capacity of a node depends on its degree, and (ii) the traffic load depends on the distribution of the links in the network. Based on these assumptions, the presented model proposes a method of connection not based on the node having a higher degree but on the region containing hubs. It is found that the final network exhibits two kinds of degree distribution behavior, depending on the kind and the way of the connection. This study reveals a direct relation between network structure and traffic flow. It is found that pc the point of transition between the free flow and the congested phase depends on the network structure and the degree distribution. Moreover, this new model provides an improvement in the traffic compared to the results found in a single network. The same behavior of degree distribution found in a BA network and observed in the real world is obtained; except for this model, the transition point between the free phase and congested phase is much higher than the one observed in a network of BA, for both static and dynamic protocols.
Spreading in online social networks: the role of social reinforcement.
Zheng, Muhua; Lü, Linyuan; Zhao, Ming
2013-07-01
Some epidemic spreading models are usually applied to analyze the propagation of opinions or news. However, the dynamics of epidemic spreading and information or behavior spreading are essentially different in many aspects. Centola's experiments [Science 329, 1194 (2010)] on behavior spreading in online social networks showed that the spreading is faster and broader in regular networks than in random networks. This result contradicts with the former understanding that random networks are preferable for spreading than regular networks. To describe the spreading in online social networks, a unknown-known-approved-exhausted four-status model was proposed, which emphasizes the effect of social reinforcement and assumes that the redundant signals can improve the probability of approval (i.e., the spreading rate). Performing the model on regular and random networks, it is found that our model can well explain the results of Centola's experiments on behavior spreading and some former studies on information spreading in different parameter space. The effects of average degree and network size on behavior spreading process are further analyzed. The results again show the importance of social reinforcement and are accordant with Centola's anticipation that increasing the network size or decreasing the average degree will enlarge the difference of the density of final approved nodes between regular and random networks. Our work complements the former studies on spreading dynamics, especially the spreading in online social networks where the information usually requires individuals' confirmations before being transmitted to others.
Chaotic Bohmian trajectories for stationary states
NASA Astrophysics Data System (ADS)
Cesa, Alexandre; Martin, John; Struyve, Ward
2016-09-01
In Bohmian mechanics, the nodes of the wave function play an important role in the generation of chaos. However, so far, most of the attention has been on moving nodes; little is known about the possibility of chaos in the case of stationary nodes. We address this question by considering stationary states, which provide the simplest examples of wave functions with stationary nodes. We provide examples of stationary wave functions for which there is chaos, as demonstrated by numerical computations, for one particle moving in three spatial dimensions and for two and three entangled particles in two dimensions. Our conclusion is that the motion of the nodes is not necessary for the generation of chaos. What is important is the overall complexity of the wave function. That is, if the wave function, or rather its phase, has a complex spatial variation, it will lead to complex Bohmian trajectories and hence to chaos. Another aspect of our work concerns the average Lyapunov exponent, which quantifies the overall amount of chaos. Since it is very hard to evaluate the average Lyapunov exponent analytically, which is often computed numerically, it is useful to have simple quantities that agree well with the average Lyapunov exponent. We investigate possible correlations with quantities such as the participation ratio and different measures of entanglement, for different systems and different families of stationary wave functions. We find that these quantities often tend to correlate to the amount of chaos. However, the correlation is not perfect, because, in particular, these measures do not depend on the form of the basis states used to expand the wave function, while the amount of chaos does.
Influence maximization in complex networks through optimal percolation
NASA Astrophysics Data System (ADS)
Morone, Flaviano; Makse, Hernán A.
2015-08-01
The whole frame of interconnections in complex networks hinges on a specific set of structural nodes, much smaller than the total size, which, if activated, would cause the spread of information to the whole network, or, if immunized, would prevent the diffusion of a large scale epidemic. Localizing this optimal, that is, minimal, set of structural nodes, called influencers, is one of the most important problems in network science. Despite the vast use of heuristic strategies to identify influential spreaders, the problem remains unsolved. Here we map the problem onto optimal percolation in random networks to identify the minimal set of influencers, which arises by minimizing the energy of a many-body system, where the form of the interactions is fixed by the non-backtracking matrix of the network. Big data analyses reveal that the set of optimal influencers is much smaller than the one predicted by previous heuristic centralities. Remarkably, a large number of previously neglected weakly connected nodes emerges among the optimal influencers. These are topologically tagged as low-degree nodes surrounded by hierarchical coronas of hubs, and are uncovered only through the optimal collective interplay of all the influencers in the network. The present theoretical framework may hold a larger degree of universality, being applicable to other hard optimization problems exhibiting a continuous transition from a known phase.
Influence maximization in complex networks through optimal percolation.
Morone, Flaviano; Makse, Hernán A
2015-08-06
The whole frame of interconnections in complex networks hinges on a specific set of structural nodes, much smaller than the total size, which, if activated, would cause the spread of information to the whole network, or, if immunized, would prevent the diffusion of a large scale epidemic. Localizing this optimal, that is, minimal, set of structural nodes, called influencers, is one of the most important problems in network science. Despite the vast use of heuristic strategies to identify influential spreaders, the problem remains unsolved. Here we map the problem onto optimal percolation in random networks to identify the minimal set of influencers, which arises by minimizing the energy of a many-body system, where the form of the interactions is fixed by the non-backtracking matrix of the network. Big data analyses reveal that the set of optimal influencers is much smaller than the one predicted by previous heuristic centralities. Remarkably, a large number of previously neglected weakly connected nodes emerges among the optimal influencers. These are topologically tagged as low-degree nodes surrounded by hierarchical coronas of hubs, and are uncovered only through the optimal collective interplay of all the influencers in the network. The present theoretical framework may hold a larger degree of universality, being applicable to other hard optimization problems exhibiting a continuous transition from a known phase.
Mean-field approach to evolving spatial networks, with an application to osteocyte network formation
NASA Astrophysics Data System (ADS)
Taylor-King, Jake P.; Basanta, David; Chapman, S. Jonathan; Porter, Mason A.
2017-07-01
We consider evolving networks in which each node can have various associated properties (a state) in addition to those that arise from network structure. For example, each node can have a spatial location and a velocity, or it can have some more abstract internal property that describes something like a social trait. Edges between nodes are created and destroyed, and new nodes enter the system. We introduce a "local state degree distribution" (LSDD) as the degree distribution at a particular point in state space. We then make a mean-field assumption and thereby derive an integro-partial differential equation that is satisfied by the LSDD. We perform numerical experiments and find good agreement between solutions of the integro-differential equation and the LSDD from stochastic simulations of the full model. To illustrate our theory, we apply it to a simple model for osteocyte network formation within bones, with a view to understanding changes that may take place during cancer. Our results suggest that increased rates of differentiation lead to higher densities of osteocytes, but with a smaller number of dendrites. To help provide biological context, we also include an introduction to osteocytes, the formation of osteocyte networks, and the role of osteocytes in bone metastasis.
Trending of SNPP Ephemeris and Its Implications on VIIRS Geometric Performance
NASA Technical Reports Server (NTRS)
Lin, Guoqing (Gary); Wolfe, Robert E.; Tilton, James C.
2016-01-01
This paper describes trends in the Suomi National Polar-orbiting Partnership (SNPP) spacecraft ephemeris data over the four and half years of on-orbit operations. It then discusses the implications of these trends on the geometric performance of the Visible Infrared Imaging Radiometer Suite (VIIRS), one of the instruments onboard SNPP. The SNPP ephemeris data includes time stamped spacecraft positions and velocities that are used to calculate the spacecraft altitude and sub-satellite locations. Through drag make-up maneuvers (DMUs) the orbital mean altitude (spacecraft altitude averaged over an orbit) has been maintained at 838.8 kilometers to within plus or minus 0.2 kilometers and the orbital period at 101.5 minutes to within plus or minus 0.2 seconds. The corresponding orbital mean velocity in the terrestrial frame of reference has been maintained at 7524 meters per second to within plus or minus 0.5 meters per second. Within an orbit, the altitude varies from 828 kilometers near 15 degrees North latitude to 856 kilometers near the South Pole. Inclination adjust maneuvers (IAMs) have maintained the orbit inclination angle at 98.67 degrees to within plus or minus 0.07 degrees and the sun-synchronous local time at ascending node (LTAN) at 13:28 to within plus or minus 5 minutes. Besides these trends, it is interesting to observe that the orbit's elliptic shape has its major axis linking the perigee and apogee shorter than the line linking the ascending node and the descending node. This effect is caused by the Earth's oblate spheroid shape and deviates from a Keplerian orbit theory in which the two orbiting bodies are point masses. VIIRS has 5 imagery resolution bands, 16 moderate resolution bands and a day-night band, with 32, 16 and 16 detectors, respectively, aligned in the spacecraft flight (also known as track) direction. For each band's sample within a scan, the detectors sample the Earth's surface simultaneously in the track direction in the Earth Centered Inertial frame of reference. The distance between the center of the area sensed by the trailing detectors of one scan and the leading detectors of the next includes a component caused by earth rotation. This earth rotation component is relatively small (approximately 70 meters per second) for an orbit like SNPP, but must be taken into account in the design of low-Earth orbit scanning sensors similar to VIIRS to ensure contiguous coverage at nadir.
Dynamics of influence on hierarchical structures
NASA Astrophysics Data System (ADS)
Fotouhi, Babak; Rabbat, Michael G.
2013-08-01
Dichotomous spin dynamics on a pyramidal hierarchical structure (the Bethe lattice) are studied. The system embodies a number of classes, where a class comprises nodes that are equidistant from the root (head node). Weighted links exist between nodes from the same and different classes. The spin (hereafter state) of the head node is fixed. We solve for the dynamics of the system for different boundary conditions. We find necessary conditions so that the classes eventually repudiate or acquiesce in the state imposed by the head node. The results indicate that to reach unanimity across the hierarchy, it suffices that the bottommost class adopts the same state as the head node. Then the rest of the hierarchy will inevitably comply. This also sheds light on the importance of mass media as a means of synchronization between the topmost and bottommost classes. Surprisingly, in the case of discord between the head node and the bottommost classes, the average state over all nodes inclines towards that of the bottommost class regardless of the link weights and intraclass configurations. Hence the role of the bottommost class is signified.
Collaborative Localization Algorithms for Wireless Sensor Networks with Reduced Localization Error
Sahoo, Prasan Kumar; Hwang, I-Shyan
2011-01-01
Localization is an important research issue in Wireless Sensor Networks (WSNs). Though Global Positioning System (GPS) can be used to locate the position of the sensors, unfortunately it is limited to outdoor applications and is costly and power consuming. In order to find location of sensor nodes without help of GPS, collaboration among nodes is highly essential so that localization can be accomplished efficiently. In this paper, novel localization algorithms are proposed to find out possible location information of the normal nodes in a collaborative manner for an outdoor environment with help of few beacons and anchor nodes. In our localization scheme, at most three beacon nodes should be collaborated to find out the accurate location information of any normal node. Besides, analytical methods are designed to calculate and reduce the localization error using probability distribution function. Performance evaluation of our algorithm shows that there is a tradeoff between deployed number of beacon nodes and localization error, and average localization time of the network can be increased with increase in the number of normal nodes deployed over a region. PMID:22163738
Crichton, Gamal; Guo, Yufan; Pyysalo, Sampo; Korhonen, Anna
2018-05-21
Link prediction in biomedical graphs has several important applications including predicting Drug-Target Interactions (DTI), Protein-Protein Interaction (PPI) prediction and Literature-Based Discovery (LBD). It can be done using a classifier to output the probability of link formation between nodes. Recently several works have used neural networks to create node representations which allow rich inputs to neural classifiers. Preliminary works were done on this and report promising results. However they did not use realistic settings like time-slicing, evaluate performances with comprehensive metrics or explain when or why neural network methods outperform. We investigated how inputs from four node representation algorithms affect performance of a neural link predictor on random- and time-sliced biomedical graphs of real-world sizes (∼ 6 million edges) containing information relevant to DTI, PPI and LBD. We compared the performance of the neural link predictor to those of established baselines and report performance across five metrics. In random- and time-sliced experiments when the neural network methods were able to learn good node representations and there was a negligible amount of disconnected nodes, those approaches outperformed the baselines. In the smallest graph (∼ 15,000 edges) and in larger graphs with approximately 14% disconnected nodes, baselines such as Common Neighbours proved a justifiable choice for link prediction. At low recall levels (∼ 0.3) the approaches were mostly equal, but at higher recall levels across all nodes and average performance at individual nodes, neural network approaches were superior. Analysis showed that neural network methods performed well on links between nodes with no previous common neighbours; potentially the most interesting links. Additionally, while neural network methods benefit from large amounts of data, they require considerable amounts of computational resources to utilise them. Our results indicate that when there is enough data for the neural network methods to use and there are a negligible amount of disconnected nodes, those approaches outperform the baselines. At low recall levels the approaches are mostly equal but at higher recall levels and average performance at individual nodes, neural network approaches are superior. Performance at nodes without common neighbours which indicate more unexpected and perhaps more useful links account for this.
A generalized approach to complex networks
NASA Astrophysics Data System (ADS)
Costa, L. Da F.; da Rocha, L. E. C.
2006-03-01
This work describes how the formalization of complex network concepts in terms of discrete mathematics, especially mathematical morphology, allows a series of generalizations and important results ranging from new measurements of the network topology to new network growth models. First, the concepts of node degree and clustering coefficient are extended in order to characterize not only specific nodes, but any generic subnetwork. Second, the consideration of distance transform and rings are used to further extend those concepts in order to obtain a signature, instead of a single scalar measurement, ranging from the single node to whole graph scales. The enhanced discriminative potential of such extended measurements is illustrated with respect to the identification of correspondence between nodes in two complex networks, namely a protein-protein interaction network and a perturbed version of it.
NASA Astrophysics Data System (ADS)
Wang, Xiao Juan; Guo, Shi Ze; Jin, Lei; Chen, Mo
We study the structural robustness of the scale free network against the cascading failure induced by overload. In this paper, a failure mechanism based on betweenness-degree ratio distribution is proposed. In the cascading failure model we built the initial load of an edge which is proportional to the node betweenness of its ends. During the edge random deletion, we find a phase transition. Then based on the phase transition, we divide the process of the cascading failure into two parts: the robust area and the vulnerable area, and define the corresponding indicator to measure the performance of the networks in both areas. From derivation, we find that the vulnerability of the network is determined by the distribution of betweenness-degree ratio. After that we use the connection between the node ability coefficient and distribution of betweenness-degree ratio to explain the cascading failure mechanism. In simulations, we verify the correctness of our derivations. By changing connecting preferences, we find scale free networks with a slight assortativity, which performs better both in robust area and vulnerable area.
Community Detection on the GPU
DOE Office of Scientific and Technical Information (OSTI.GOV)
Naim, Md; Manne, Fredrik; Halappanavar, Mahantesh
We present and evaluate a new GPU algorithm based on the Louvain method for community detection. Our algorithm is the first for this problem that parallelizes the access to individual edges. In this way we can fine tune the load balance when processing networks with nodes of highly varying degrees. This is achieved by scaling the number of threads assigned to each node according to its degree. Extensive experiments show that we obtain speedups up to a factor of 270 compared to the sequential algorithm. The algorithm consistently outperforms other recent shared memory implementations and is only one order ofmore » magnitude slower than the current fastest parallel Louvain method running on a Blue Gene/Q supercomputer using more than 500K threads.« less
Assortative Mating: Encounter-Network Topology and the Evolution of Attractiveness
Dipple, S.; Jia, T.; Caraco, T.; Korniss, G.; Szymanski, B. K.
2017-01-01
We model a social-encounter network where linked nodes match for reproduction in a manner depending probabilistically on each node’s attractiveness. The developed model reveals that increasing either the network’s mean degree or the “choosiness” exercised during pair formation increases the strength of positive assortative mating. That is, we note that attractiveness is correlated among mated nodes. Their total number also increases with mean degree and selectivity during pair formation. By iterating over the model’s mapping of parents onto offspring across generations, we study the evolution of attractiveness. Selection mediated by exclusion from reproduction increases mean attractiveness, but is rapidly balanced by skew in the offspring distribution of highly attractive mated pairs. PMID:28345625
Dynamic weight evolution network with preferential attachment
NASA Astrophysics Data System (ADS)
Dai, Meifeng; Xie, Qi; Li, Lei
2014-12-01
A dynamic weight evolution network with preferential attachment is introduced. The network includes two significant characteristics. (i) Topological growth: triggered by newly added node with M links at each time step, each new edge carries an initial weight growing nonlinearly with time. (ii) Weight dynamics: the weight between two existing nodes experiences increasing or decreasing in a nonlinear way. By using continuum theory and mean-field method, we study the strength, the degree, the weight and their distributions. We find that the distributions exhibit a power-law feature. In particular, the relationship between the degree and the strength is nonlinear, and the power-law exponents of the three are the same. All the theoretical predictions are successfully contrasted with numerical simulations.
Soybean (Glycine max) transformation using mature cotyledonary node explants.
Olhoft, Paula M; Donovan, Christopher M; Somers, David A
2006-01-01
Agrobacterium tumefaciens-mediated transformation of soybeans has been steadily improved since its development in 1988. Soybean transformation is now possible in a range of genotypes from different maturity groups using different explants as sources of regenerable cells, various selectable marker genes and selective agents, and different A. tumefaciens strains. The cotyledonary-node method has been extensively investigated and across a number of laboratories yields on average greater than 1% transformation efficiency (one Southern-positive, independent event per 100 cotyledonary-node explants). Continued improvements in the cotyledonary-node method concomitant with further increases in transformation efficiency will enhance broader adoption of this already productive transformation method for use in crop improvement and functional genomics research efforts.
3D Model of Cytokinetic Contractile Ring Assembly: Node-Mediated and Backup Pathways
NASA Astrophysics Data System (ADS)
Bidone, Tamara; Vavylonis, Dimitrios
Cytokinetic ring assembly in model organism fission yeast is a dynamic process, involving condensation of a network of actin filaments and myosin motors bound to the cell membrane through cortical nodes. A 3D computational model of ring assembly illustrates how the combined activities of myosin motors, filament crosslinkers and actin turnover lead to robust ring formation [Bidone et al. Biophys. J, 2014]. We modeled the importance of the physical properties of node movement along the cell membrane and of myosin recruitment to nodes. Experiments by D. Zhang (Temasek Life Sciences) show that tethering of the cortical endoplasmic reticulum (ER) to the plasma membrane modulates the speed of node condensation and the degree of node clumping. We captured the trend observed in these experiments by changes in the node drag coefficient and initial node distribution in simulations PM. The model predicted that reducing crosslinking activities in ER tethering mutants with faster node speed enhances actomyosin clumping. We developed a model of how tilted and/or misplaced rings assemble in cells that lack the node structural component anillin-like Mid1 and thus fail to recruit myosin II to nodes independently of actin. If actin-dependent binding of diffusive myosin to the cortex is incorporated into the model, it generates progressively elongating cortical actomyosin strands with fluctuating actin bundles at the tails. These stands often close into a ring, similar to observations by the group of J.Q. Wu (The Ohio State University). NIH R01GM098430.
A bipartite fitness model for online music streaming services
NASA Astrophysics Data System (ADS)
Pongnumkul, Suchit; Motohashi, Kazuyuki
2018-01-01
This paper proposes an evolution model and an analysis of the behavior of music consumers on online music streaming services. While previous studies have observed power-law degree distributions of usage in online music streaming services, the underlying behavior of users has not been well understood. Users and songs can be described using a bipartite network where an edge exists between a user node and a song node when the user has listened that song. The growth mechanism of bipartite networks has been used to understand the evolution of online bipartite networks Zhang et al. (2013). Existing bipartite models are based on a preferential attachment mechanism László Barabási and Albert (1999) in which the probability that a user listens to a song is proportional to its current popularity. This mechanism does not allow for two types of real world phenomena. First, a newly released song with high quality sometimes quickly gains popularity. Second, the popularity of songs normally decreases as time goes by. Therefore, this paper proposes a new model that is more suitable for online music services by adding fitness and aging functions to the song nodes of the bipartite network proposed by Zhang et al. (2013). Theoretical analyses are performed for the degree distribution of songs. Empirical data from an online streaming service, Last.fm, are used to confirm the degree distribution of the object nodes. Simulation results show improvements from a previous model. Finally, to illustrate the application of the proposed model, a simplified royalty cost model for online music services is used to demonstrate how the changes in the proposed parameters can affect the costs for online music streaming providers. Managerial implications are also discussed.
Multi-attribute integrated measurement of node importance in complex networks.
Wang, Shibo; Zhao, Jinlou
2015-11-01
The measure of node importance in complex networks is very important to the research of networks stability and robustness; it also can ensure the security of the whole network. Most researchers have used a single indicator to measure the networks node importance, so that the obtained measurement results only reflect certain aspects of the networks with a loss of information. Meanwhile, because of the difference of networks topology, the nodes' importance should be described by combining the character of the networks topology. Most of the existing evaluation algorithms cannot completely reflect the circumstances of complex networks, so this paper takes into account the degree of centrality, the relative closeness centrality, clustering coefficient, and topology potential and raises an integrated measuring method to measure the nodes' importance. This method can reflect nodes' internal and outside attributes and eliminate the influence of network structure on the node importance. The experiments of karate network and dolphin network show that networks topology structure integrated measure has smaller range of metrical result than a single indicator and more universal. Experiments show that attacking the North American power grid and the Internet network with the method has a faster convergence speed than other methods.
Active Low Intrusion Hybrid Monitor for Wireless Sensor Networks
Navia, Marlon; Campelo, Jose C.; Bonastre, Alberto; Ors, Rafael; Capella, Juan V.; Serrano, Juan J.
2015-01-01
Several systems have been proposed to monitor wireless sensor networks (WSN). These systems may be active (causing a high degree of intrusion) or passive (low observability inside the nodes). This paper presents the implementation of an active hybrid (hardware and software) monitor with low intrusion. It is based on the addition to the sensor node of a monitor node (hardware part) which, through a standard interface, is able to receive the monitoring information sent by a piece of software executed in the sensor node. The intrusion on time, code, and energy caused in the sensor nodes by the monitor is evaluated as a function of data size and the interface used. Then different interfaces, commonly available in sensor nodes, are evaluated: serial transmission (USART), serial peripheral interface (SPI), and parallel. The proposed hybrid monitor provides highly detailed information, barely disturbed by the measurement tool (interference), about the behavior of the WSN that may be used to evaluate many properties such as performance, dependability, security, etc. Monitor nodes are self-powered and may be removed after the monitoring campaign to be reused in other campaigns and/or WSNs. No other hardware-independent monitoring platforms with such low interference have been found in the literature. PMID:26393604
McLaughlin, Eamon J; Miller, Lauren; Shin, Thuzar M; Sobanko, Joseph F; Cannady, Steven B; Miller, Christopher J; Newman, Jason G
Immunosuppressed solid organ transplant recipients (SOTRs) have an increased risk of developing cutaneous squamous cell carcinomas (cSCCs) with metastatic potential. This study sought to determine the rate of regional lymph node involvement in a large cohort of solid organ transplant patients with cutaneous head and neck squamous cell carcinoma. A retrospective chart review was performed on solid organ transplant patients with head and neck cutaneous squamous cell carcinoma treated at a tertiary academic medical center from 2005 to 2015. 130 solid organ transplant patients underwent resection of 383 head and neck cutaneous squamous cell carcinomas. The average age of the patient was 63. Seven patients (5%) developed regional lymph node metastases (3 parotid, 4 cervical lymph nodes). The mean time from primary tumor resection to diagnosis of regional lymphatic disease was 6.7months. Six of these patients underwent definitive surgical resection followed by adjuvant radiation; one patient underwent definitive chemoradiation. 6 of the 7 patients died of disease progression with a mean survival of 15months. The average follow up time was 3years (minimum 6months). Solid organ transplant recipients with cutaneous squamous cell carcinoma of the head and neck develop regional lymph node metastasis at a rate of 5%. Regional lymph node metastasis in this population has a poor prognosis and requires aggressive management and surveillance. Copyright © 2017 Elsevier Inc. All rights reserved.
A Markovian model of evolving world input-output network
Isacchini, Giulio
2017-01-01
The initial theoretical connections between Leontief input-output models and Markov chains were established back in 1950s. However, considering the wide variety of mathematical properties of Markov chains, so far there has not been a full investigation of evolving world economic networks with Markov chain formalism. In this work, using the recently available world input-output database, we investigated the evolution of the world economic network from 1995 to 2011 through analysis of a time series of finite Markov chains. We assessed different aspects of this evolving system via different known properties of the Markov chains such as mixing time, Kemeny constant, steady state probabilities and perturbation analysis of the transition matrices. First, we showed how the time series of mixing times and Kemeny constants could be used as an aggregate index of globalization. Next, we focused on the steady state probabilities as a measure of structural power of the economies that are comparable to GDP shares of economies as the traditional index of economies welfare. Further, we introduced two measures of systemic risk, called systemic influence and systemic fragility, where the former is the ratio of number of influenced nodes to the total number of nodes, caused by a shock in the activity of a node, and the latter is based on the number of times a specific economic node is affected by a shock in the activity of any of the other nodes. Finally, focusing on Kemeny constant as a global indicator of monetary flow across the network, we showed that there is a paradoxical effect of a change in activity levels of economic nodes on the overall flow of the world economic network. While the economic slowdown of the majority of nodes with high structural power results to a slower average monetary flow over the network, there are some nodes, where their slowdowns improve the overall quality of the network in terms of connectivity and the average flow of the money. PMID:29065145
Fuzzy-Logic Based Distributed Energy-Efficient Clustering Algorithm for Wireless Sensor Networks.
Zhang, Ying; Wang, Jun; Han, Dezhi; Wu, Huafeng; Zhou, Rundong
2017-07-03
Due to the high-energy efficiency and scalability, the clustering routing algorithm has been widely used in wireless sensor networks (WSNs). In order to gather information more efficiently, each sensor node transmits data to its Cluster Head (CH) to which it belongs, by multi-hop communication. However, the multi-hop communication in the cluster brings the problem of excessive energy consumption of the relay nodes which are closer to the CH. These nodes' energy will be consumed more quickly than the farther nodes, which brings the negative influence on load balance for the whole networks. Therefore, we propose an energy-efficient distributed clustering algorithm based on fuzzy approach with non-uniform distribution (EEDCF). During CHs' election, we take nodes' energies, nodes' degree and neighbor nodes' residual energies into consideration as the input parameters. In addition, we take advantage of Takagi, Sugeno and Kang (TSK) fuzzy model instead of traditional method as our inference system to guarantee the quantitative analysis more reasonable. In our scheme, each sensor node calculates the probability of being as CH with the help of fuzzy inference system in a distributed way. The experimental results indicate EEDCF algorithm is better than some current representative methods in aspects of data transmission, energy consumption and lifetime of networks.
NASA Astrophysics Data System (ADS)
Choi, Y.; Piasecki, M.
2008-12-01
The objective of this study is the preparation and indexing of rainfall data products for ingestion into the Chesapeake Bay Environmental Observatory (CBEO) node of the CUAHSI/WATERs network. Rainfall products (which are obtained and then processed based on the WSR-88D NEXRAD network) are obtained from the NOAA/NWS Advanced Hydrologic Prediction Service that combines the Multi-sensor Precipitation Estimate (MPE) data generated by the Regional River Forecast Centers and Hydro-NEXRAD rainfall data generated as a service by the University of Iowa. The former is collected on 4*4 km grid (HRAP) with a daily average temporal resolution and the latter on a 1minute*1minute degree grid with hourly values. We have generated a cut-out for the Chesapeake Bay Basin that contains about 9,300 nodes (sites) for the MPE data and about 300,000 nodes (sites) for the Hydro-NEXRAD product. Automated harvesting services have been implemented for both data products. The MPE data is harvested from its download site using ArcGIS which in turn is used to extract the data for the Chesapeake Bay watershed before a scripting program is used to scatter the data into the ODM. The Hydro-NEXRAD is downloaded from a web-based system at the University of Iowa which permits downloads for large scale watersheds organized by Hydraulic Unit Codes (HUC). The resulting ASCII is then automatically parsed and the information stored alongside the MPE data. The two data products stored side-by-side then allows a comparison between them addressing the accuracy and agreement between the methods used to arrive at rainfall data as both use the raw reflectivity data from the WSD-88D system.
Node Survival in Networks under Correlated Attacks
Hao, Yan; Armbruster, Dieter; Hütt, Marc-Thorsten
2015-01-01
We study the interplay between correlations, dynamics, and networks for repeated attacks on a socio-economic network. As a model system we consider an insurance scheme against disasters that randomly hit nodes, where a node in need receives support from its network neighbors. The model is motivated by gift giving among the Maasai called Osotua. Survival of nodes under different disaster scenarios (uncorrelated, spatially, temporally and spatio-temporally correlated) and for different network architectures are studied with agent-based numerical simulations. We find that the survival rate of a node depends dramatically on the type of correlation of the disasters: Spatially and spatio-temporally correlated disasters increase the survival rate; purely temporally correlated disasters decrease it. The type of correlation also leads to strong inequality among the surviving nodes. We introduce the concept of disaster masking to explain some of the results of our simulations. We also analyze the subsets of the networks that were activated to provide support after fifty years of random disasters. They show qualitative differences for the different disaster scenarios measured by path length, degree, clustering coefficient, and number of cycles. PMID:25932635
Spreading dynamics in complex networks
NASA Astrophysics Data System (ADS)
Pei, Sen; Makse, Hernán A.
2013-12-01
Searching for influential spreaders in complex networks is an issue of great significance for applications across various domains, ranging from epidemic control, innovation diffusion, viral marketing, and social movement to idea propagation. In this paper, we first display some of the most important theoretical models that describe spreading processes, and then discuss the problem of locating both the individual and multiple influential spreaders respectively. Recent approaches in these two topics are presented. For the identification of privileged single spreaders, we summarize several widely used centralities, such as degree, betweenness centrality, PageRank, k-shell, etc. We investigate the empirical diffusion data in a large scale online social community—LiveJournal. With this extensive dataset, we find that various measures can convey very distinct information of nodes. Of all the users in the LiveJournal social network, only a small fraction of them are involved in spreading. For the spreading processes in LiveJournal, while degree can locate nodes participating in information diffusion with higher probability, k-shell is more effective in finding nodes with a large influence. Our results should provide useful information for designing efficient spreading strategies in reality.
An Effective Cuckoo Search Algorithm for Node Localization in Wireless Sensor Network.
Cheng, Jing; Xia, Linyuan
2016-08-31
Localization is an essential requirement in the increasing prevalence of wireless sensor network (WSN) applications. Reducing the computational complexity, communication overhead in WSN localization is of paramount importance in order to prolong the lifetime of the energy-limited sensor nodes and improve localization performance. This paper proposes an effective Cuckoo Search (CS) algorithm for node localization. Based on the modification of step size, this approach enables the population to approach global optimal solution rapidly, and the fitness of each solution is employed to build mutation probability for avoiding local convergence. Further, the approach restricts the population in the certain range so that it can prevent the energy consumption caused by insignificant search. Extensive experiments were conducted to study the effects of parameters like anchor density, node density and communication range on the proposed algorithm with respect to average localization error and localization success ratio. In addition, a comparative study was conducted to realize the same localization task using the same network deployment. Experimental results prove that the proposed CS algorithm can not only increase convergence rate but also reduce average localization error compared with standard CS algorithm and Particle Swarm Optimization (PSO) algorithm.
An Effective Cuckoo Search Algorithm for Node Localization in Wireless Sensor Network
Cheng, Jing; Xia, Linyuan
2016-01-01
Localization is an essential requirement in the increasing prevalence of wireless sensor network (WSN) applications. Reducing the computational complexity, communication overhead in WSN localization is of paramount importance in order to prolong the lifetime of the energy-limited sensor nodes and improve localization performance. This paper proposes an effective Cuckoo Search (CS) algorithm for node localization. Based on the modification of step size, this approach enables the population to approach global optimal solution rapidly, and the fitness of each solution is employed to build mutation probability for avoiding local convergence. Further, the approach restricts the population in the certain range so that it can prevent the energy consumption caused by insignificant search. Extensive experiments were conducted to study the effects of parameters like anchor density, node density and communication range on the proposed algorithm with respect to average localization error and localization success ratio. In addition, a comparative study was conducted to realize the same localization task using the same network deployment. Experimental results prove that the proposed CS algorithm can not only increase convergence rate but also reduce average localization error compared with standard CS algorithm and Particle Swarm Optimization (PSO) algorithm. PMID:27589756
Tuset-Peiro, Pere; Vazquez-Gallego, Francisco; Alonso-Zarate, Jesus; Alonso, Luis; Vilajosana, Xavier
2014-07-24
Data collection is a key scenario for the Internet of Things because it enables gathering sensor data from distributed nodes that use low-power and long-range wireless technologies to communicate in a single-hop approach. In this kind of scenario, the network is composed of one coordinator that covers a particular area and a large number of nodes, typically hundreds or thousands, that transmit data to the coordinator upon request. Considering this scenario, in this paper we experimentally validate the energy consumption of two Medium Access Control (MAC) protocols, Frame Slotted ALOHA (FSA) and Distributed Queuing (DQ). We model both protocols as a state machine and conduct experiments to measure the average energy consumption in each state and the average number of times that a node has to be in each state in order to transmit a data packet to the coordinator. The results show that FSA is more energy efficient than DQ if the number of nodes is known a priori because the number of slots per frame can be adjusted accordingly. However, in such scenarios the number of nodes cannot be easily anticipated, leading to additional packet collisions and a higher energy consumption due to retransmissions. Contrarily, DQ does not require to know the number of nodes in advance because it is able to efficiently construct an ad hoc network schedule for each collection round. This kind of a schedule ensures that there are no packet collisions during data transmission, thus leading to an energy consumption reduction above 10% compared to FSA.
Accumulate repeat accumulate codes
NASA Technical Reports Server (NTRS)
Abbasfar, Aliazam; Divsalar, Dariush; Yao, Kung
2004-01-01
In this paper we propose an innovative channel coding scheme called 'Accumulate Repeat Accumulate codes' (ARA). This class of codes can be viewed as serial turbo-like codes, or as a subclass of Low Density Parity Check (LDPC) codes, thus belief propagation can be used for iterative decoding of ARA codes on a graph. The structure of encoder for this class can be viewed as precoded Repeat Accumulate (RA) code or as precoded Irregular Repeat Accumulate (IRA) code, where simply an accumulator is chosen as a precoder. Thus ARA codes have simple, and very fast encoder structure when they representing LDPC codes. Based on density evolution for LDPC codes through some examples for ARA codes, we show that for maximum variable node degree 5 a minimum bit SNR as low as 0.08 dB from channel capacity for rate 1/2 can be achieved as the block size goes to infinity. Thus based on fixed low maximum variable node degree, its threshold outperforms not only the RA and IRA codes but also the best known LDPC codes with the dame maximum node degree. Furthermore by puncturing the accumulators any desired high rate codes close to code rate 1 can be obtained with thresholds that stay close to the channel capacity thresholds uniformly. Iterative decoding simulation results are provided. The ARA codes also have projected graph or protograph representation that allows for high speed decoder implementation.
A real-time robot arm collision avoidance system
NASA Technical Reports Server (NTRS)
Shaffer, Clifford A.; Herb, Gregory M.
1992-01-01
A data structure and update algorithm are presented for a prototype real-time collision avoidance safety system simulating a multirobot workspace. The data structure is a variant of the octree, which serves as a spatial index. An octree recursively decomposes 3D space into eight equal cubic octants until each octant meets some decomposition criteria. The N-objects octree, which indexes a collection of 3D primitive solids is used. These primitives make up the two (seven-degrees-of-freedom) robot arms and workspace modeled by the system. As robot arms move, the octree is updated to reflect their changed positions. During most update cycles, any given primitive does not change which octree nodes it is in. Thus, modification to the octree is rarely required. Cycle time for interpreting current arm joint angles, updating the octree to reflect new positions, and detecting/reporting imminent collisions averages 30 ms on an Intel 80386 processor running at 20 MHz.
Evolution of the social network of scientific collaborations
NASA Astrophysics Data System (ADS)
Barabasi, Albert-Laszlo; Jeong, Hawoong; Neda, Zoltan; Ravasz, Erzsebet; Schubert, Andras; Vicsek, Tamas
2002-03-01
The co-authorship network of scientists represents a prototype of complex evolving networks. By mapping the electronic database containing all relevant journals in mathematics and neuro-science for an eight-year period (1991-98), we infer the dynamic and the structural mechanisms that govern the evolution and topology of this complex system. First, empirical measurements allow us to uncover the topological measures that characterize the network at a given moment, as well as the time evolution of these quantities. The results indicate that the network is scale-free, and that the network evolution is governed by preferential attachment, affecting both internal and external links. However, in contrast with most model predictions the average degree increases in time, and the node separation decreases. Second, we propose a simple model that captures the network's time evolution. Third, numerical simulations are used to uncover the behavior of quantities that could not be predicted analytically.
Finding influential nodes for integration in brain networks using optimal percolation theory.
Del Ferraro, Gino; Moreno, Andrea; Min, Byungjoon; Morone, Flaviano; Pérez-Ramírez, Úrsula; Pérez-Cervera, Laura; Parra, Lucas C; Holodny, Andrei; Canals, Santiago; Makse, Hernán A
2018-06-11
Global integration of information in the brain results from complex interactions of segregated brain networks. Identifying the most influential neuronal populations that efficiently bind these networks is a fundamental problem of systems neuroscience. Here, we apply optimal percolation theory and pharmacogenetic interventions in vivo to predict and subsequently target nodes that are essential for global integration of a memory network in rodents. The theory predicts that integration in the memory network is mediated by a set of low-degree nodes located in the nucleus accumbens. This result is confirmed with pharmacogenetic inactivation of the nucleus accumbens, which eliminates the formation of the memory network, while inactivations of other brain areas leave the network intact. Thus, optimal percolation theory predicts essential nodes in brain networks. This could be used to identify targets of interventions to modulate brain function.
Link prediction based on local weighted paths for complex networks
NASA Astrophysics Data System (ADS)
Yao, Yabing; Zhang, Ruisheng; Yang, Fan; Yuan, Yongna; Hu, Rongjing; Zhao, Zhili
As a significant problem in complex networks, link prediction aims to find the missing and future links between two unconnected nodes by estimating the existence likelihood of potential links. It plays an important role in understanding the evolution mechanism of networks and has broad applications in practice. In order to improve prediction performance, a variety of structural similarity-based methods that rely on different topological features have been put forward. As one topological feature, the path information between node pairs is utilized to calculate the node similarity. However, many path-dependent methods neglect the different contributions of paths for a pair of nodes. In this paper, a local weighted path (LWP) index is proposed to differentiate the contributions between paths. The LWP index considers the effect of the link degrees of intermediate links and the connectivity influence of intermediate nodes on paths to quantify the path weight in the prediction procedure. The experimental results on 12 real-world networks show that the LWP index outperforms other seven prediction baselines.
Underwater Sensor Network Redeployment Algorithm Based on Wolf Search
Jiang, Peng; Feng, Yang; Wu, Feng
2016-01-01
This study addresses the optimization of node redeployment coverage in underwater wireless sensor networks. Given that nodes could easily become invalid under a poor environment and the large scale of underwater wireless sensor networks, an underwater sensor network redeployment algorithm was developed based on wolf search. This study is to apply the wolf search algorithm combined with crowded degree control in the deployment of underwater wireless sensor networks. The proposed algorithm uses nodes to ensure coverage of the events, and it avoids the prematurity of the nodes. The algorithm has good coverage effects. In addition, considering that obstacles exist in the underwater environment, nodes are prevented from being invalid by imitating the mechanism of avoiding predators. Thus, the energy consumption of the network is reduced. Comparative analysis shows that the algorithm is simple and effective in wireless sensor network deployment. Compared with the optimized artificial fish swarm algorithm, the proposed algorithm exhibits advantages in network coverage, energy conservation, and obstacle avoidance. PMID:27775659
Han, Guangjie; Liu, Li; Jiang, Jinfang; Shu, Lei; Rodrigues, Joel J.P.C.
2016-01-01
Localization is one of the hottest research topics in Underwater Wireless Sensor Networks (UWSNs), since many important applications of UWSNs, e.g., event sensing, target tracking and monitoring, require location information of sensor nodes. Nowadays, a large number of localization algorithms have been proposed for UWSNs. How to improve location accuracy are well studied. However, few of them take location reliability or security into consideration. In this paper, we propose a Collaborative Secure Localization algorithm based on Trust model (CSLT) for UWSNs to ensure location security. Based on the trust model, the secure localization process can be divided into the following five sub-processes: trust evaluation of anchor nodes, initial localization of unknown nodes, trust evaluation of reference nodes, selection of reference node, and secondary localization of unknown node. Simulation results demonstrate that the proposed CSLT algorithm performs better than the compared related works in terms of location security, average localization accuracy and localization ratio. PMID:26891300
An adaptive density-based routing protocol for flying Ad Hoc networks
NASA Astrophysics Data System (ADS)
Zheng, Xueli; Qi, Qian; Wang, Qingwen; Li, Yongqiang
2017-10-01
An Adaptive Density-based Routing Protocol (ADRP) for Flying Ad Hoc Networks (FANETs) is proposed in this paper. The main objective is to calculate forwarding probability adaptively in order to increase the efficiency of forwarding in FANETs. ADRP dynamically fine-tunes the rebroadcasting probability of a node for routing request packets according to the number of neighbour nodes. Indeed, it is more interesting to privilege the retransmission by nodes with little neighbour nodes. We describe the protocol, implement it and evaluate its performance using NS-2 network simulator. Simulation results reveal that ADRP achieves better performance in terms of the packet delivery fraction, average end-to-end delay, normalized routing load, normalized MAC load and throughput, which is respectively compared with AODV.
Penile Cancer: Contemporary Lymph Node Management.
O'Brien, Jonathan S; Perera, Marlon; Manning, Todd; Bozin, Mike; Cabarkapa, Sonja; Chen, Emily; Lawrentschuk, Nathan
2017-06-01
In penile cancer, the optimal diagnostics and management of metastatic lymph nodes are not clear. Advances in minimally invasive staging, including dynamic sentinel lymph node biopsy, have widened the diagnostic repertoire of the urologist. We aimed to provide an objective update of the recent trends in the management of penile squamous cell carcinoma, and inguinal and pelvic lymph node metastases. We systematically reviewed several medical databases, including the Web of Science® (with MEDLINE®), Embase® and Cochrane databases, according to PRISMA (Preferred Reporting Items for Systematic Review and Meta-Analyses) guidelines. The search terms used were penile cancer, lymph node, sentinel node, minimally invasive, surgery and outcomes, alone and in combination. Articles pertaining to the management of lymph nodes in penile cancer were reviewed, including original research, reviews and clinical guidelines published between 1980 and 2016. Accurate and minimally invasive lymph node staging is of the utmost importance in the surgical management of penile squamous cell carcinoma. In patients with clinically node negative disease, a growing body of evidence supports the use of sentinel lymph node biopsies. Dynamic sentinel lymph node biopsy exposes the patient to minimal risk, and results in superior sensitivity and specificity profiles compared to alternate nodal staging techniques. In the presence of locoregional disease, improvements in inguinal or pelvic lymphadenectomy have reduced morbidity and improved oncologic outcomes. A multimodal approach of chemotherapy and surgery has demonstrated a survival benefit for patients with advanced disease. Recent developments in lymph node management have occurred in penile cancer, such as minimally invasive lymph node diagnosis and intervention strategies. These advances have been met with a degree of controversy in the contemporary literature. Current data suggest that dynamic sentinel lymph node biopsy provides excellent sensitivity and specificity for detecting lymph node metastases. More robust long-term data on multicenter patient cohorts are required to determine the optimal management of lymph nodes in penile cancer. Copyright © 2017 American Urological Association Education and Research, Inc. Published by Elsevier Inc. All rights reserved.
Multiple-predators-based capture process on complex networks
NASA Astrophysics Data System (ADS)
Ramiz Sharafat, Rajput; Pu, Cunlai; Li, Jie; Chen, Rongbin; Xu, Zhongqi
2017-03-01
The predator/prey (capture) problem is a prototype of many network-related applications. We study the capture process on complex networks by considering multiple predators from multiple sources. In our model, some lions start from multiple sources simultaneously to capture the lamb by biased random walks, which are controlled with a free parameter $\\alpha$. We derive the distribution of the lamb's lifetime and the expected lifetime $\\left\\langle T\\right\\rangle $. Through simulation, we find that the expected lifetime drops substantially with the increasing number of lions. We also study how the underlying topological structure affects the capture process, and obtain that locating on small-degree nodes is better than large-degree nodes to prolong the lifetime of the lamb. Moreover, dense or homogeneous network structures are against the survival of the lamb.
A Scalable Heuristic for Viral Marketing Under the Tipping Model
2013-09-01
removal of high-degree nodes. The rest of the paper is organized as follows. In Section 2, we provide formal definitions of the tipping model. This is...that must be activated for it to become activate as well. A Scalable Heuristic for Viral Marketing Under the Tipping Model 3 Definition 1 (Threshold...returns a set of active nodes after one time step. Definition 2 (Activation Function) Given a threshold function, θ, an ac- tivation function Aθ maps
Interacting epidemics on overlay networks
NASA Astrophysics Data System (ADS)
Funk, Sebastian; Jansen, Vincent A. A.
2010-03-01
The interaction between multiple pathogens spreading on networks connecting a given set of nodes presents an ongoing theoretical challenge. Here, we aim to understand such interactions by studying bond percolation of two different processes on overlay networks of arbitrary joint degree distribution. We find that an outbreak of a first pathogen providing immunity to another one spreading subsequently on a second network connecting the same set of nodes does so most effectively if the degrees on the two networks are positively correlated. In that case, the protection is stronger the more heterogeneous the degree distributions of the two networks are. If, on the other hand, the degrees are uncorrelated or negatively correlated, increasing heterogeneity reduces the potential of the first process to prevent the second one from reaching epidemic proportions. We generalize these results to cases where the edges of the two networks overlap to arbitrary amount, or where the immunity granted is only partial. If both processes grant immunity to each other, we find a wide range of possible situations of coexistence or mutual exclusion, depending on the joint degree distribution of the underlying networks and the amount of immunity granted mutually. These results generalize the concept of a coexistence threshold and illustrate the impact of large-scale network structure on the interaction between multiple spreading agents.
Feng, Renjian; Xu, Xiaofeng; Zhou, Xiang; Wan, Jiangwen
2011-01-01
For wireless sensor networks (WSNs), many factors, such as mutual interference of wireless links, battlefield applications and nodes exposed to the environment without good physical protection, result in the sensor nodes being more vulnerable to be attacked and compromised. In order to address this network security problem, a novel trust evaluation algorithm defined as NBBTE (Node Behavioral Strategies Banding Belief Theory of the Trust Evaluation Algorithm) is proposed, which integrates the approach of nodes behavioral strategies and modified evidence theory. According to the behaviors of sensor nodes, a variety of trust factors and coefficients related to the network application are established to obtain direct and indirect trust values through calculating weighted average of trust factors. Meanwhile, the fuzzy set method is applied to form the basic input vector of evidence. On this basis, the evidence difference is calculated between the indirect and direct trust values, which link the revised D-S evidence combination rule to finally synthesize integrated trust value of nodes. The simulation results show that NBBTE can effectively identify malicious nodes and reflects the characteristic of trust value that 'hard to acquire and easy to lose'. Furthermore, it is obvious that the proposed scheme has an outstanding advantage in terms of illustrating the real contribution of different nodes to trust evaluation.
Heterogeneous delivering capability promotes traffic efficiency in complex networks
NASA Astrophysics Data System (ADS)
Zhu, Yan-Bo; Guan, Xiang-Min; Zhang, Xue-Jun
2015-12-01
Traffic is one of the most fundamental dynamical processes in networked systems. With the homogeneous delivery capability of nodes, the global dynamic routing strategy proposed by Ling et al. [Phys. Rev. E81, 016113 (2010)] adequately uses the dynamic information during the process and thus it can reach a quite high network capacity. In this paper, based on the global dynamic routing strategy, we proposed a heterogeneous delivery allocation strategy of nodes on scale-free networks with consideration of nodes degree. It is found that the network capacity as well as some other indexes reflecting transportation efficiency are further improved. Our work may be useful for the design of more efficient routing strategies in communication or transportation systems.
Winding numbers of nodal points in Fe-based superconductors
NASA Astrophysics Data System (ADS)
Chichinadze, Dmitry V.; Chubukov, Andrey V.
2018-03-01
We analyze the nodal points in multiorbital Fe-based superconductors from a topological perspective. We consider the s+- gap structure with accidental nodes, and the d -wave gap with nodes along the symmetry directions. In both cases, the nodal points can be moved by varying an external parameter, e.g., a degree of interpocket pairing. Eventually, the nodes merge and annihilate via a Lifshitz-type transition. We discuss the Lifshitz transition in Fe-based superconductors from a topological point of view. We show, both analytically and numerically, that the merging nodal points have winding numbers of opposite sign. This is consistent with the general reasoning that the total winding number is a conserved quantity in the Lifshitz transition.
Identifying the starting point of a spreading process in complex networks.
Comin, Cesar Henrique; Costa, Luciano da Fontoura
2011-11-01
When dealing with the dissemination of epidemics, one important question that can be asked is the location where the contamination began. In this paper, we analyze three spreading schemes and propose and validate an effective methodology for the identification of the source nodes. The method is based on the calculation of the centrality of the nodes on the sampled network, expressed here by degree, betweenness, closeness, and eigenvector centrality. We show that the source node tends to have the highest measurement values. The potential of the methodology is illustrated with respect to three theoretical complex network models as well as a real-world network, the email network of the University Rovira i Virgili.
Prediction model of sinoatrial node field potential using high order partial least squares.
Feng, Yu; Cao, Hui; Zhang, Yanbin
2015-01-01
High order partial least squares (HOPLS) is a novel data processing method. It is highly suitable for building prediction model which has tensor input and output. The objective of this study is to build a prediction model of the relationship between sinoatrial node field potential and high glucose using HOPLS. The three sub-signals of the sinoatrial node field potential made up the model's input. The concentration and the actuation duration of high glucose made up the model's output. The results showed that on the premise of predicting two dimensional variables, HOPLS had the same predictive ability and a lower dispersion degree compared with partial least squares (PLS).
High-order finite difference formulations for the incompressible Navier-Stokes equations on the CM-5
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tafti, D.
1995-12-01
The paper describes the features and implementation of a general purpose high-order accurate finite difference computer program for direct and large-eddy simulations of turbulence on the CM-5 in the data parallel mode. Benchmarking studies for a direct simulation of turbulent channel flow are discussed. Performance of up to 8.8 GFLOPS is obtained for the high-order formulations on 512 processing nodes of the CM-5. The execution time for a simulation with 24 million nodes in a domain with two periodic directions is in the range of 0.2 {mu}secs/time-step/degree of freedom on 512 processing nodes of the CM-5.
NASA Technical Reports Server (NTRS)
Wielicki, Bruce A. (Principal Investigator)
The Monthly TOA/Surface Averages (SRBAVG) product contains a month of space and time averaged Clouds and the Earth's Radiant Energy System (CERES) data for a single scanner instrument. The SRBAVG is also produced for combinations of scanner instruments. The monthly average regional flux is estimated using diurnal models and the 1-degree regional fluxes at the hour of observation from the CERES SFC product. A second set of monthly average fluxes are estimated using concurrent diurnal information from geostationary satellites. These fluxes are given for both clear-sky and total-sky scenes and are spatially averaged from 1-degree regions to 1-degree zonal averages and a global average. For each region, the SRBAVG also contains hourly average fluxes for the month and an overall monthly average. The cloud properties from SFC are column averaged and are included on the SRBAVG. [Location=GLOBAL] [Temporal_Coverage: Start_Date=1998-02-01; Stop_Date=2003-02-28] [Spatial_Coverage: Southernmost_Latitude=-90; Northernmost_Latitude=90; Westernmost_Longitude=-180; Easternmost_Longitude=180] [Data_Resolution: Latitude_Resolution=1 degree; Longitude_Resolution=1 degree; Horizontal_Resolution_Range=100 km - < 250 km or approximately 1 degree - < 2.5 degrees; Temporal_Resolution=1 month; Temporal_Resolution_Range=Monthly - < Annual].
NASA Technical Reports Server (NTRS)
Wielicki, Bruce A. (Principal Investigator)
The Monthly TOA/Surface Averages (SRBAVG) product contains a month of space and time averaged Clouds and the Earth's Radiant Energy System (CERES) data for a single scanner instrument. The SRBAVG is also produced for combinations of scanner instruments. The monthly average regional flux is estimated using diurnal models and the 1-degree regional fluxes at the hour of observation from the CERES SFC product. A second set of monthly average fluxes are estimated using concurrent diurnal information from geostationary satellites. These fluxes are given for both clear-sky and total-sky scenes and are spatially averaged from 1-degree regions to 1-degree zonal averages and a global average. For each region, the SRBAVG also contains hourly average fluxes for the month and an overall monthly average. The cloud properties from SFC are column averaged and are included on the SRBAVG. [Location=GLOBAL] [Temporal_Coverage: Start_Date=1998-02-01; Stop_Date=2000-03-31] [Spatial_Coverage: Southernmost_Latitude=-90; Northernmost_Latitude=90; Westernmost_Longitude=-180; Easternmost_Longitude=180] [Data_Resolution: Latitude_Resolution=1 degree; Longitude_Resolution=1 degree; Horizontal_Resolution_Range=100 km - < 250 km or approximately 1 degree - < 2.5 degrees; Temporal_Resolution=1 month; Temporal_Resolution_Range=Monthly - < Annual].
NASA Technical Reports Server (NTRS)
Wielicki, Bruce A. (Principal Investigator)
The Monthly TOA/Surface Averages (SRBAVG) product contains a month of space and time averaged Clouds and the Earth's Radiant Energy System (CERES) data for a single scanner instrument. The SRBAVG is also produced for combinations of scanner instruments. The monthly average regional flux is estimated using diurnal models and the 1-degree regional fluxes at the hour of observation from the CERES SFC product. A second set of monthly average fluxes are estimated using concurrent diurnal information from geostationary satellites. These fluxes are given for both clear-sky and total-sky scenes and are spatially averaged from 1-degree regions to 1-degree zonal averages and a global average. For each region, the SRBAVG also contains hourly average fluxes for the month and an overall monthly average. The cloud properties from SFC are column averaged and are included on the SRBAVG. [Location=GLOBAL] [Temporal_Coverage: Start_Date=1998-02-01; Stop_Date=2003-02-28] [Spatial_Coverage: Southernmost_Latitude=-90; Northernmost_Latitude=90; Westernmost_Longitude=-180; Easternmost_Longitude=180] [Data_Resolution: Latitude_Resolution=1 degree; Longitude_Resolution=1 degree; Horizontal_Resolution_Range=100 km - < 250 km or approximately 1 degree - < 2.5 degrees; Temporal_Resolution=1 month; Temporal_Resolution_Range=Monthly - < Annual].
NASA Technical Reports Server (NTRS)
Wielicki, Bruce A. (Principal Investigator)
The Monthly TOA/Surface Averages (SRBAVG) product contains a month of space and time averaged Clouds and the Earth's Radiant Energy System (CERES) data for a single scanner instrument. The SRBAVG is also produced for combinations of scanner instruments. The monthly average regional flux is estimated using diurnal models and the 1-degree regional fluxes at the hour of observation from the CERES SFC product. A second set of monthly average fluxes are estimated using concurrent diurnal information from geostationary satellites. These fluxes are given for both clear-sky and total-sky scenes and are spatially averaged from 1-degree regions to 1-degree zonal averages and a global average. For each region, the SRBAVG also contains hourly average fluxes for the month and an overall monthly average. The cloud properties from SFC are column averaged and are included on the SRBAVG. [Location=GLOBAL] [Temporal_Coverage: Start_Date=1998-02-01; Stop_Date=2004-05-31] [Spatial_Coverage: Southernmost_Latitude=-90; Northernmost_Latitude=90; Westernmost_Longitude=-180; Easternmost_Longitude=180] [Data_Resolution: Latitude_Resolution=1 degree; Longitude_Resolution=1 degree; Horizontal_Resolution_Range=100 km - < 250 km or approximately 1 degree - < 2.5 degrees; Temporal_Resolution=1 month; Temporal_Resolution_Range=Monthly - < Annual].
Dense volumetric detection and segmentation of mediastinal lymph nodes in chest CT images
NASA Astrophysics Data System (ADS)
Oda, Hirohisa; Roth, Holger R.; Bhatia, Kanwal K.; Oda, Masahiro; Kitasaka, Takayuki; Iwano, Shingo; Homma, Hirotoshi; Takabatake, Hirotsugu; Mori, Masaki; Natori, Hiroshi; Schnabel, Julia A.; Mori, Kensaku
2018-02-01
We propose a novel mediastinal lymph node detection and segmentation method from chest CT volumes based on fully convolutional networks (FCNs). Most lymph node detection methods are based on filters for blob-like structures, which are not specific for lymph nodes. The 3D U-Net is a recent example of the state-of-the-art 3D FCNs. The 3D U-Net can be trained to learn appearances of lymph nodes in order to output lymph node likelihood maps on input CT volumes. However, it is prone to oversegmentation of each lymph node due to the strong data imbalance between lymph nodes and the remaining part of the CT volumes. To moderate the balance of sizes between the target classes, we train the 3D U-Net using not only lymph node annotations but also other anatomical structures (lungs, airways, aortic arches, and pulmonary arteries) that can be extracted robustly in an automated fashion. We applied the proposed method to 45 cases of contrast-enhanced chest CT volumes. Experimental results showed that 95.5% of lymph nodes were detected with 16.3 false positives per CT volume. The segmentation results showed that the proposed method can prevent oversegmentation, achieving an average Dice score of 52.3 +/- 23.1%, compared to the baseline method with 49.2 +/- 23.8%, respectively.
Randomizing growing networks with a time-respecting null model
NASA Astrophysics Data System (ADS)
Ren, Zhuo-Ming; Mariani, Manuel Sebastian; Zhang, Yi-Cheng; Medo, Matúš
2018-05-01
Complex networks are often used to represent systems that are not static but grow with time: People make new friendships, new papers are published and refer to the existing ones, and so forth. To assess the statistical significance of measurements made on such networks, we propose a randomization methodology—a time-respecting null model—that preserves both the network's degree sequence and the time evolution of individual nodes' degree values. By preserving the temporal linking patterns of the analyzed system, the proposed model is able to factor out the effect of the system's temporal patterns on its structure. We apply the model to the citation network of Physical Review scholarly papers and the citation network of US movies. The model reveals that the two data sets are strikingly different with respect to their degree-degree correlations, and we discuss the important implications of this finding on the information provided by paradigmatic node centrality metrics such as indegree and Google's PageRank. The randomization methodology proposed here can be used to assess the significance of any structural property in growing networks, which could bring new insights into the problems where null models play a critical role, such as the detection of communities and network motifs.
Ivković, Miloš; Kuceyeski, Amy; Raj, Ashish
2012-01-01
Whole brain weighted connectivity networks were extracted from high resolution diffusion MRI data of 14 healthy volunteers. A statistically robust technique was proposed for the removal of questionable connections. Unlike most previous studies our methods are completely adapted for networks with arbitrary weights. Conventional statistics of these weighted networks were computed and found to be comparable to existing reports. After a robust fitting procedure using multiple parametric distributions it was found that the weighted node degree of our networks is best described by the normal distribution, in contrast to previous reports which have proposed heavy tailed distributions. We show that post-processing of the connectivity weights, such as thresholding, can influence the weighted degree asymptotics. The clustering coefficients were found to be distributed either as gamma or power-law distribution, depending on the formula used. We proposed a new hierarchical graph clustering approach, which revealed that the brain network is divided into a regular base-2 hierarchical tree. Connections within and across this hierarchy were found to be uncommonly ordered. The combined weight of our results supports a hierarchically ordered view of the brain, whose connections have heavy tails, but whose weighted node degrees are comparable. PMID:22761649
Ivković, Miloš; Kuceyeski, Amy; Raj, Ashish
2012-01-01
Whole brain weighted connectivity networks were extracted from high resolution diffusion MRI data of 14 healthy volunteers. A statistically robust technique was proposed for the removal of questionable connections. Unlike most previous studies our methods are completely adapted for networks with arbitrary weights. Conventional statistics of these weighted networks were computed and found to be comparable to existing reports. After a robust fitting procedure using multiple parametric distributions it was found that the weighted node degree of our networks is best described by the normal distribution, in contrast to previous reports which have proposed heavy tailed distributions. We show that post-processing of the connectivity weights, such as thresholding, can influence the weighted degree asymptotics. The clustering coefficients were found to be distributed either as gamma or power-law distribution, depending on the formula used. We proposed a new hierarchical graph clustering approach, which revealed that the brain network is divided into a regular base-2 hierarchical tree. Connections within and across this hierarchy were found to be uncommonly ordered. The combined weight of our results supports a hierarchically ordered view of the brain, whose connections have heavy tails, but whose weighted node degrees are comparable.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schaake, Eva E.; Department of Radiation Oncology, The Netherlands Cancer Institute, Amsterdam; Rossi, Maddalena M.G.
2014-11-15
Purpose/Objective: In patients with locally advanced lung cancer, planning target volume margins for mediastinal lymph nodes and tumor after a correction protocol based on bony anatomy registration typically range from 1 to 1.5 cm. Detailed information about lymph node motion variability and differential motion with the primary tumor, however, is lacking from large series. In this study, lymph node and tumor position variability were analyzed in detail and correlated to the main carina to evaluate possible margin reduction. Methods and Materials: Small gold fiducial markers (0.35 × 5 mm) were placed in the mediastinal lymph nodes of 51 patients with non-small cell lung cancermore » during routine diagnostic esophageal or bronchial endoscopic ultrasonography. Four-dimensional (4D) planning computed tomographic (CT) and daily 4D cone beam (CB) CT scans were acquired before and during radical radiation therapy (66 Gy in 24 fractions). Each CBCT was registered in 3-dimensions (bony anatomy) and 4D (tumor, marker, and carina) to the planning CT scan. Subsequently, systematic and random residual misalignments of the time-averaged lymph node and tumor position relative to the bony anatomy and carina were determined. Additionally, tumor and lymph node respiratory amplitude variability was quantified. Finally, required margins were quantified by use of a recipe for dual targets. Results: Relative to the bony anatomy, systematic and random errors ranged from 0.16 to 0.32 cm for the markers and from 0.15 to 0.33 cm for the tumor, but despite similar ranges there was limited correlation (0.17-0.71) owing to differential motion. A large variability in lymph node amplitude between patients was observed, with an average motion of 0.56 cm in the cranial-caudal direction. Margins could be reduced by 10% (left-right), 27% (cranial-caudal), and 10% (anteroposterior) for the lymph nodes and −2%, 15%, and 7% for the tumor if an online carina registration protocol replaced a protocol based on bony anatomy registration. Conclusions: Detailed analysis revealed considerable lymph node position variability, differential motion, and respiratory motion. Planning target volume margins can be reduced up to 27% in lung cancer patients when the carina registration replaces bony anatomy registration.« less
Kogashiwa, Yasunao; Sakurai, Hiroyuki; Akimoto, Yoshihiro; Sato, Dai; Ikeda, Tetsuya; Matsumoto, Yoshifumi; Moro, Yorihisa; Kimura, Toru; Hamanoue, Yasuhiro; Nakamura, Takehiro; Yamauchi, Koichi; Saito, Koichiro; Sugasawa, Masashi; Kohno, Naoyuki
2015-01-01
Sentinel node navigation surgery is gaining popularity in oral cancer. We assessed application of sentinel lymph node navigation surgery to pharyngeal and laryngeal cancers by evaluating the combination of contrast-enhanced ultrasonography and indocyanine green fluorescence in animal models. This was a prospective, nonrandomized, experimental study in rabbit and swine animal models. A mixture of indocyanine green and Sonazoid was used as the tracer. The tracer mixture was injected into the tongue, larynx, or pharynx. The sentinel lymph nodes were identified transcutaneously by infra-red camera and contrast-enhanced ultrasonography. Detection time and extraction time of the sentinel lymph nodes were measured. The safety of the tracer mixture in terms of mucosal reaction was evaluated macroscopically and microscopically. Sentinel lymph nodes were detected transcutaneously by contrast-enhanced ultrasonography alone. The number of sentinel lymph nodes detected was one or two. Despite observation of contrast enhancement of Sonazoid for at least 90 minutes, the number of sentinel lymph nodes detected did not change. The average extraction time of sentinel lymph nodes was 4.8 minutes. Indocyanine green fluorescence offered visual information during lymph node biopsy. The safety of the tracer was confirmed by absence of laryngeal edema both macro and microscopically. The combination method of indocyanine green fluorescence and contrast-enhanced ultrasonography for detecting sentinel lymph nodes during surgery for head and neck cancer seems promising, especially for pharyngeal and laryngeal cancer. Further clinical studies to confirm this are warranted.
Cascading failures in complex networks with community structure
NASA Astrophysics Data System (ADS)
Lin, Guoqiang; di, Zengru; Fan, Ying
2014-12-01
Much empirical evidence shows that when attacked with cascading failures, scale-free or even random networks tend to collapse more extensively when the initially deleted node has higher betweenness. Meanwhile, in networks with strong community structure, high-betweenness nodes tend to be bridge nodes that link different communities, and the removal of such nodes will reduce only the connections among communities, leaving the networks fairly stable. Understanding what will affect cascading failures and how to protect or attack networks with strong community structure is therefore of interest. In this paper, we have constructed scale-free Community Networks (SFCN) and Random Community Networks (RCN). We applied these networks, along with the Lancichinett-Fortunato-Radicchi (LFR) benchmark, to the cascading-failure scenario to explore their vulnerability to attack and the relationship between cascading failures and the degree distribution and community structure of a network. The numerical results show that when the networks are of a power-law distribution, a stronger community structure will result in the failure of fewer nodes. In addition, the initial removal of the node with the highest betweenness will not lead to the worst cascading, i.e. the largest avalanche size. The Betweenness Overflow (BOF), an index that we developed, is an effective indicator of this tendency. The RCN, however, display a different result. In addition, the avalanche size of each node can be adopted as an index to evaluate the importance of the node.
Effectiveness of closure of public places with time delay in disease control.
Wang, Zhenggang; Szeto, Kwok Yip; Leung, Frederick Chi-Ching
2008-08-25
A theoretical basis for the evaluation of the effciency of quarantine measure is developed in a SIR model with time delay. In this model, the effectiveness of the closure of public places such as schools in disease control, modeled as a high degree node in a social network, is evaluated by considering the effect of the time delay in the identification of the infected. In the context of the SIR model, the relation between the number of infectious individuals who are identified with time delay and then quarantined and those who are not identified and continue spreading the virus are investigated numerically. The social network for the simulation is modeled by a scale free network. Closure measures are applied to those infected nodes with high degrees. The effectiveness of the measure can be controlled by the present value of the critical degree K(C): only those nodes with degree higher than K(C) will be quarantined. The cost C(Q) incurred for the closure measure is assumed to be proportional to the total links rendered inactive as a result of the measure, and generally decreases with K(C), while the medical cost C(Q) incurred for virus spreading increases with K(C). The total social cost (C(M) + C(Q)) will have a minimum at a critical K(*), which depends on the ratio of medical cost coeffcient alpha(M) and closure cost coeffcient alpha(Q). Our simulation results demonstrate a mathematical procedure to evaluate the effciency of quarantine measure. Although the numerical work is based on a scale free network, the procedure can be readily generalized and applied to a more realistic social network to determine the proper closure measure in future epidemics.
A Tree Based Broadcast Scheme for (m, k)-firm Real-Time Stream in Wireless Sensor Networks.
Park, HoSung; Kim, Beom-Su; Kim, Kyong Hoon; Shah, Babar; Kim, Ki-Il
2017-11-09
Recently, various unicast routing protocols have been proposed to deliver measured data from the sensor node to the sink node within the predetermined deadline in wireless sensor networks. In parallel with their approaches, some applications demand the specific service, which is based on broadcast to all nodes within the deadline, the feasible real-time traffic model and improvements in energy efficiency. However, current protocols based on either flooding or one-to-one unicast cannot meet the above requirements entirely. Moreover, as far as the authors know, there is no study for the real-time broadcast protocol to support the application-specific traffic model in WSN yet. Based on the above analysis, in this paper, we propose a new ( m , k )-firm-based Real-time Broadcast Protocol (FRBP) by constructing a broadcast tree to satisfy the ( m , k )-firm, which is applicable to the real-time model in resource-constrained WSNs. The broadcast tree in FRBP is constructed by the distance-based priority scheme, whereas energy efficiency is improved by selecting as few as nodes on a tree possible. To overcome the unstable network environment, the recovery scheme invokes rapid partial tree reconstruction in order to designate another node as the parent on a tree according to the measured ( m , k )-firm real-time condition and local states monitoring. Finally, simulation results are given to demonstrate the superiority of FRBP compared to the existing schemes in terms of average deadline missing ratio, average throughput and energy consumption.
Unsupervised segmentation of MRI knees using image partition forests
NASA Astrophysics Data System (ADS)
Marčan, Marija; Voiculescu, Irina
2016-03-01
Nowadays many people are affected by arthritis, a condition of the joints with limited prevention measures, but with various options of treatment the most radical of which is surgical. In order for surgery to be successful, it can make use of careful analysis of patient-based models generated from medical images, usually by manual segmentation. In this work we show how to automate the segmentation of a crucial and complex joint -- the knee. To achieve this goal we rely on our novel way of representing a 3D voxel volume as a hierarchical structure of partitions which we have named Image Partition Forest (IPF). The IPF contains several partition layers of increasing coarseness, with partitions nested across layers in the form of adjacency graphs. On the basis of a set of properties (size, mean intensity, coordinates) of each node in the IPF we classify nodes into different features. Values indicating whether or not any particular node belongs to the femur or tibia are assigned through node filtering and node-based region growing. So far we have evaluated our method on 15 MRI knee images. Our unsupervised segmentation compared against a hand-segmented gold standard has achieved an average Dice similarity coefficient of 0.95 for femur and 0.93 for tibia, and an average symmetric surface distance of 0.98 mm for femur and 0.73 mm for tibia. The paper also discusses ways to introduce stricter morphological and spatial conditioning in the bone labelling process.
Visibility graph network analysis of natural gas price: The case of North American market
NASA Astrophysics Data System (ADS)
Sun, Mei; Wang, Yaqi; Gao, Cuixia
2016-11-01
Fluctuations in prices of natural gas significantly affect global economy. Therefore, the research on the characteristics of natural gas price fluctuations, turning points and its influencing cycle on the subsequent price series is of great significance. Global natural gas trade concentrates on three regional markets: the North American market, the European market and the Asia-Pacific market, with North America having the most developed natural gas financial market. In addition, perfect legal supervision and coordinated regulations make the North American market more open and more competitive. This paper focuses on the North American natural gas market specifically. The Henry Hub natural gas spot price time series is converted to a visibility graph network which provides a new direction for macro analysis of time series, and several indicators are investigated: degree and degree distribution, the average shortest path length and community structure. The internal mechanisms underlying price fluctuations are explored through the indicators. The results show that the natural gas prices visibility graph network (NGP-VGN) is of small-world and scale-free properties simultaneously. After random rearrangement of original price time series, the degree distribution of network becomes exponential distribution, different from the original ones. This means that, the original price time series is of long-range negative correlation fractal characteristic. In addition, nodes with large degree correspond to significant geopolitical or economic events. Communities correspond to time cycles in visibility graph network. The cycles of time series and the impact scope of hubs can be found by community structure partition.
Weak signal transmission in complex networks and its application in detecting connectivity.
Liang, Xiaoming; Liu, Zonghua; Li, Baowen
2009-10-01
We present a network model of coupled oscillators to study how a weak signal is transmitted in complex networks. Through both theoretical analysis and numerical simulations, we find that the response of other nodes to the weak signal decays exponentially with their topological distance to the signal source and the coupling strength between two neighboring nodes can be figured out by the responses. This finding can be conveniently used to detect the topology of unknown network, such as the degree distribution, clustering coefficient and community structure, etc., by repeatedly choosing different nodes as the signal source. Through four typical networks, i.e., the regular one dimensional, small world, random, and scale-free networks, we show that the features of network can be approximately given by investigating many fewer nodes than the network size, thus our approach to detect the topology of unknown network may be efficient in practical situations with large network size.
A Distributed and Energy-Efficient Algorithm for Event K-Coverage in Underwater Sensor Networks.
Jiang, Peng; Xu, Yiming; Liu, Jun
2017-01-19
For event dynamic K-coverage algorithms, each management node selects its assistant node by using a greedy algorithm without considering the residual energy and situations in which a node is selected by several events. This approach affects network energy consumption and balance. Therefore, this study proposes a distributed and energy-efficient event K-coverage algorithm (DEEKA). After the network achieves 1-coverage, the nodes that detect the same event compete for the event management node with the number of candidate nodes and the average residual energy, as well as the distance to the event. Second, each management node estimates the probability of its neighbor nodes' being selected by the event it manages with the distance level, the residual energy level, and the number of dynamic coverage event of these nodes. Third, each management node establishes an optimization model that uses expectation energy consumption and the residual energy variance of its neighbor nodes and detects the performance of the events it manages as targets. Finally, each management node uses a constrained non-dominated sorting genetic algorithm (NSGA-II) to obtain the Pareto set of the model and the best strategy via technique for order preference by similarity to an ideal solution (TOPSIS). The algorithm first considers the effect of harsh underwater environments on information collection and transmission. It also considers the residual energy of a node and a situation in which the node is selected by several other events. Simulation results show that, unlike the on-demand variable sensing K-coverage algorithm, DEEKA balances and reduces network energy consumption, thereby prolonging the network's best service quality and lifetime.
Inference for dynamics of continuous variables: the extended Plefka expansion with hidden nodes
NASA Astrophysics Data System (ADS)
Bravi, B.; Sollich, P.
2017-06-01
We consider the problem of a subnetwork of observed nodes embedded into a larger bulk of unknown (i.e. hidden) nodes, where the aim is to infer these hidden states given information about the subnetwork dynamics. The biochemical networks underlying many cellular and metabolic processes are important realizations of such a scenario as typically one is interested in reconstructing the time evolution of unobserved chemical concentrations starting from the experimentally more accessible ones. We present an application to this problem of a novel dynamical mean field approximation, the extended Plefka expansion, which is based on a path integral description of the stochastic dynamics. As a paradigmatic model we study the stochastic linear dynamics of continuous degrees of freedom interacting via random Gaussian couplings. The resulting joint distribution is known to be Gaussian and this allows us to fully characterize the posterior statistics of the hidden nodes. In particular the equal-time hidden-to-hidden variance—conditioned on observations—gives the expected error at each node when the hidden time courses are predicted based on the observations. We assess the accuracy of the extended Plefka expansion in predicting these single node variances as well as error correlations over time, focussing on the role of the system size and the number of observed nodes.
Traffic-driven epidemic spreading on scale-free networks with tunable degree distribution
NASA Astrophysics Data System (ADS)
Yang, Han-Xin; Wang, Bing-Hong
2016-04-01
We study the traffic-driven epidemic spreading on scale-free networks with tunable degree distribution. The heterogeneity of networks is controlled by the exponent γ of power-law degree distribution. It is found that the epidemic threshold is minimized at about γ=2.2. Moreover, we find that nodes with larger algorithmic betweenness are more likely to be infected. We expect our work to provide new insights in to the effect of network structures on traffic-driven epidemic spreading.
Connectivity, Coverage and Placement in Wireless Sensor Networks
Li, Ji; Andrew, Lachlan L.H.; Foh, Chuan Heng; Zukerman, Moshe; Chen, Hsiao-Hwa
2009-01-01
Wireless communication between sensors allows the formation of flexible sensor networks, which can be deployed rapidly over wide or inaccessible areas. However, the need to gather data from all sensors in the network imposes constraints on the distances between sensors. This survey describes the state of the art in techniques for determining the minimum density and optimal locations of relay nodes and ordinary sensors to ensure connectivity, subject to various degrees of uncertainty in the locations of the nodes. PMID:22408474
Energy Harvesting Chip and the Chip Based Power Supply Development for a Wireless Sensor Network.
Lee, Dasheng
2008-12-02
In this study, an energy harvesting chip was developed to scavenge energy from artificial light to charge a wireless sensor node. The chip core is a miniature transformer with a nano-ferrofluid magnetic core. The chip embedded transformer can convert harvested energy from its solar cell to variable voltage output for driving multiple loads. This chip system yields a simple, small, and more importantly, a battery-less power supply solution. The sensor node is equipped with multiple sensors that can be enabled by the energy harvesting power supply to collect information about the human body comfort degree. Compared with lab instruments, the nodes with temperature, humidity and photosensors driven by harvested energy had variation coefficient measurement precision of less than 6% deviation under low environmental light of 240 lux. The thermal comfort was affected by the air speed. A flow sensor equipped on the sensor node was used to detect airflow speed. Due to its high power consumption, this sensor node provided 15% less accuracy than the instruments, but it still can meet the requirement of analysis for predicted mean votes (PMV) measurement. The energy harvesting wireless sensor network (WSN) was deployed in a 24-hour convenience store to detect thermal comfort degree from the air conditioning control. During one year operation, the sensor network powered by the energy harvesting chip retained normal functions to collect the PMV index of the store. According to the one month statistics of communication status, the packet loss rate (PLR) is 2.3%, which is as good as the presented results of those WSNs powered by battery. Referring to the electric power records, almost 54% energy can be saved by the feedback control of an energy harvesting sensor network. These results illustrate that, scavenging energy not only creates a reliable power source for electronic devices, such as wireless sensor nodes, but can also be an energy source by building an energy efficient program.
Energy Harvesting Chip and the Chip Based Power Supply Development for a Wireless Sensor Network
Lee, Dasheng
2008-01-01
In this study, an energy harvesting chip was developed to scavenge energy from artificial light to charge a wireless sensor node. The chip core is a miniature transformer with a nano-ferrofluid magnetic core. The chip embedded transformer can convert harvested energy from its solar cell to variable voltage output for driving multiple loads. This chip system yields a simple, small, and more importantly, a battery-less power supply solution. The sensor node is equipped with multiple sensors that can be enabled by the energy harvesting power supply to collect information about the human body comfort degree. Compared with lab instruments, the nodes with temperature, humidity and photosensors driven by harvested energy had variation coefficient measurement precision of less than 6% deviation under low environmental light of 240 lux. The thermal comfort was affected by the air speed. A flow sensor equipped on the sensor node was used to detect airflow speed. Due to its high power consumption, this sensor node provided 15% less accuracy than the instruments, but it still can meet the requirement of analysis for predicted mean votes (PMV) measurement. The energy harvesting wireless sensor network (WSN) was deployed in a 24-hour convenience store to detect thermal comfort degree from the air conditioning control. During one year operation, the sensor network powered by the energy harvesting chip retained normal functions to collect the PMV index of the store. According to the one month statistics of communication status, the packet loss rate (PLR) is 2.3%, which is as good as the presented results of those WSNs powered by battery. Referring to the electric power records, almost 54% energy can be saved by the feedback control of an energy harvesting sensor network. These results illustrate that, scavenging energy not only creates a reliable power source for electronic devices, such as wireless sensor nodes, but can also be an energy source by building an energy efficient program. PMID:27873953
Toward two-dimensional search engines
NASA Astrophysics Data System (ADS)
Ermann, L.; Chepelianskii, A. D.; Shepelyansky, D. L.
2012-07-01
We study the statistical properties of various directed networks using ranking of their nodes based on the dominant vectors of the Google matrix known as PageRank and CheiRank. On average PageRank orders nodes proportionally to a number of ingoing links, while CheiRank orders nodes proportionally to a number of outgoing links. In this way, the ranking of nodes becomes two dimensional which paves the way for the development of two-dimensional search engines of a new type. Statistical properties of information flow on the PageRank-CheiRank plane are analyzed for networks of British, French and Italian universities, Wikipedia, Linux Kernel, gene regulation and other networks. A special emphasis is done for British universities networks using the large database publicly available in the UK. Methods of spam links control are also analyzed.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Qi, Junjian; Pfenninger, Stefan
In this paper, we propose a strategy to control the self-organizing dynamics of the Bak-Tang-Wiesenfeld (BTW) sandpile model on complex networks by allowing some degree of failure tolerance for the nodes and introducing additional active dissipation while taking the risk of possible node damage. We show that the probability for large cascades significantly increases or decreases respectively when the risk for node damage outweighs the active dissipation and when the active dissipation outweighs the risk for node damage. By considering the potential additional risk from node damage, a non-trivial optimal active dissipation control strategy which minimizes the total cost inmore » the system can be obtained. Under some conditions the introduced control strategy can decrease the total cost in the system compared to the uncontrolled model. Moreover, when the probability of damaging a node experiencing failure tolerance is greater than the critical value, then no matter how successful the active dissipation control is, the total cost of the system will have to increase. This critical damage probability can be used as an indicator of the robustness of a network or system. Copyright (C) EPLA, 2015« less
Irradiation of the prostate and pelvic lymph nodes with an adaptive algorithm
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hwang, A. B.; Chen, J.; Nguyen, T. B.
2012-02-15
Purpose: The simultaneous treatment of pelvic lymph nodes and the prostate in radiotherapy for prostate cancer is complicated by the independent motion of these two target volumes. In this work, the authors study a method to adapt intensity modulated radiation therapy (IMRT) treatment plans so as to compensate for this motion by adaptively morphing the multileaf collimator apertures and adjusting the segment weights. Methods: The study used CT images, tumor volumes, and normal tissue contours from patients treated in our institution. An IMRT treatment plan was then created using direct aperture optimization to deliver 45 Gy to the pelvic lymphmore » nodes and 50 Gy to the prostate and seminal vesicles. The prostate target volume was then shifted in either the anterior-posterior direction or in the superior-inferior direction. The treatment plan was adapted by adjusting the aperture shapes with or without re-optimizing the segment weighting. The dose to the target volumes was then determined for the adapted plan. Results: Without compensation for prostate motion, 1 cm shifts of the prostate resulted in an average decrease of 14% in D-95%. If the isocenter is simply shifted to match the prostate motion, the prostate receives the correct dose but the pelvic lymph nodes are underdosed by 14% {+-} 6%. The use of adaptive morphing (with or without segment weight optimization) reduces the average change in D-95% to less than 5% for both the pelvic lymph nodes and the prostate. Conclusions: Adaptive morphing with and without segment weight optimization can be used to compensate for the independent motion of the prostate and lymph nodes when combined with daily imaging or other methods to track the prostate motion. This method allows the delivery of the correct dose to both the prostate and lymph nodes with only small changes to the dose delivered to the target volumes.« less
Dynamic model of time-dependent complex networks.
Hill, Scott A; Braha, Dan
2010-10-01
The characterization of the "most connected" nodes in static or slowly evolving complex networks has helped in understanding and predicting the behavior of social, biological, and technological networked systems, including their robustness against failures, vulnerability to deliberate attacks, and diffusion properties. However, recent empirical research of large dynamic networks (characterized by irregular connections that evolve rapidly) has demonstrated that there is little continuity in degree centrality of nodes over time, even when their degree distributions follow a power law. This unexpected dynamic centrality suggests that the connections in these systems are not driven by preferential attachment or other known mechanisms. We present an approach to explain real-world dynamic networks and qualitatively reproduce these dynamic centrality phenomena. This approach is based on a dynamic preferential attachment mechanism, which exhibits a sharp transition from a base pure random walk scheme.
Salim, Shelly; Moh, Sangman; Choi, Dongmin; Chung, Ilyong
2014-08-11
A cognitive radio sensor network (CRSN) is a wireless sensor network whose sensor nodes are equipped with cognitive radio capability. Clustering is one of the most challenging issues in CRSNs, as all sensor nodes, including the cluster head, have to use the same frequency band in order to form a cluster. However, due to the nature of heterogeneous channels in cognitive radio, it is difficult for sensor nodes to find a cluster head. This paper proposes a novel energy-efficient and compact clustering scheme named clustering with temporary support nodes (CENTRE). CENTRE efficiently achieves a compact cluster formation by adopting two-phase cluster formation with fixed duration. By introducing a novel concept of temporary support nodes to improve the cluster formation, the proposed scheme enables sensor nodes in a network to find a cluster head efficiently. The performance study shows that not only is the clustering process efficient and compact but it also results in remarkable energy savings that prolong the overall network lifetime. In addition, the proposed scheme decreases both the clustering overhead and the average distance between cluster heads and their members.
Salim, Shelly; Moh, Sangman; Choi, Dongmin; Chung, Ilyong
2014-01-01
A cognitive radio sensor network (CRSN) is a wireless sensor network whose sensor nodes are equipped with cognitive radio capability. Clustering is one of the most challenging issues in CRSNs, as all sensor nodes, including the cluster head, have to use the same frequency band in order to form a cluster. However, due to the nature of heterogeneous channels in cognitive radio, it is difficult for sensor nodes to find a cluster head. This paper proposes a novel energy-efficient and compact clustering scheme named clustering with temporary support nodes (CENTRE). CENTRE efficiently achieves a compact cluster formation by adopting two-phase cluster formation with fixed duration. By introducing a novel concept of temporary support nodes to improve the cluster formation, the proposed scheme enables sensor nodes in a network to find a cluster head efficiently. The performance study shows that not only is the clustering process efficient and compact but it also results in remarkable energy savings that prolong the overall network lifetime. In addition, the proposed scheme decreases both the clustering overhead and the average distance between cluster heads and their members. PMID:25116905
Kato, Hidenori; Todo, Yukiharu; Minobe, Shin-Ichiro; Suzuki, Yoshihiro; Nakatani, Makiko; Ohba, Yoko; Yamashiro, Katsusige; Okamoto, Kazuhira
2011-11-01
Sentinel lymph node (SLN) detection has been accepted as a common strategy to preserve the quality of life of the patients with gynecologic cancers. However, the feasibility of SLN detection after conization is not yet clarified. Accuracy of SLN after conization was evaluated. Eighteen cases with prior conization (cone group) and 32 cases without conization (noncone group), all of which belonged to IB1 except 1 case in IA stage, underwent SLN detection. Systemic pelvic and para-aortic lymphadenectomy was coincidently performed for the estimation of negative and positive predictive values. Detection rate in which at least unilateral nodes were identified or bilaterally identified was 100% and 72.2% in the cone group, 90.6% and 71.9% in the noncone group, respectively. The average number of the detected SLN was 2.4 in the cone group and 2.1 in the noncone group. Negative and positive predictive value was 100% in both groups. On the distribution of sentinel node stations, most of the detected nodes were internal iliac and obturator node in both groups. Less frequent detection was observed in superficial common iliac node (5.4% in the cone group, 3.1% in the noncone group), external iliac node (2.7% and 9.5%), and parauterine artery node (5.4% and 1.6%).In both groups, no other lymph nodes were identified as SLN except 1 case in the cone group with the node in cardinal ligament. No significant difference was observed on detection rate, predictive value, and the distribution of sentinel node between the cone and noncone groups. Sentinel lymph node detection after conization can be performed with a certain reliability.
A Distributed and Energy-Efficient Algorithm for Event K-Coverage in Underwater Sensor Networks
Jiang, Peng; Xu, Yiming; Liu, Jun
2017-01-01
For event dynamic K-coverage algorithms, each management node selects its assistant node by using a greedy algorithm without considering the residual energy and situations in which a node is selected by several events. This approach affects network energy consumption and balance. Therefore, this study proposes a distributed and energy-efficient event K-coverage algorithm (DEEKA). After the network achieves 1-coverage, the nodes that detect the same event compete for the event management node with the number of candidate nodes and the average residual energy, as well as the distance to the event. Second, each management node estimates the probability of its neighbor nodes’ being selected by the event it manages with the distance level, the residual energy level, and the number of dynamic coverage event of these nodes. Third, each management node establishes an optimization model that uses expectation energy consumption and the residual energy variance of its neighbor nodes and detects the performance of the events it manages as targets. Finally, each management node uses a constrained non-dominated sorting genetic algorithm (NSGA-II) to obtain the Pareto set of the model and the best strategy via technique for order preference by similarity to an ideal solution (TOPSIS). The algorithm first considers the effect of harsh underwater environments on information collection and transmission. It also considers the residual energy of a node and a situation in which the node is selected by several other events. Simulation results show that, unlike the on-demand variable sensing K-coverage algorithm, DEEKA balances and reduces network energy consumption, thereby prolonging the network’s best service quality and lifetime. PMID:28106837
Direct trust-based security scheme for RREQ flooding attack in mobile ad hoc networks
NASA Astrophysics Data System (ADS)
Kumar, Sunil; Dutta, Kamlesh
2017-06-01
The routing algorithms in MANETs exhibit distributed and cooperative behaviour which makes them easy target for denial of service (DoS) attacks. RREQ flooding attack is a flooding-type DoS attack in context to Ad hoc On Demand Distance Vector (AODV) routing protocol, where the attacker broadcasts massive amount of bogus Route Request (RREQ) packets to set up the route with the non-existent or existent destination in the network. This paper presents direct trust-based security scheme to detect and mitigate the impact of RREQ flooding attack on the network, in which, every node evaluates the trust degree value of its neighbours through analysing the frequency of RREQ packets originated by them over a short period of time. Taking the node's trust degree value as the input, the proposed scheme is smoothly extended for suppressing the surplus RREQ and bogus RREQ flooding packets at one-hop neighbours during the route discovery process. This scheme distinguishes itself from existing techniques by not directly blocking the service of a normal node due to increased amount of RREQ packets in some unusual conditions. The results obtained throughout the simulation experiments clearly show the feasibility and effectiveness of the proposed defensive scheme.
Complex networks with scale-free nature and hierarchical modularity
NASA Astrophysics Data System (ADS)
Shekatkar, Snehal M.; Ambika, G.
2015-09-01
Generative mechanisms which lead to empirically observed structure of networked systems from diverse fields like biology, technology and social sciences form a very important part of study of complex networks. The structure of many networked systems like biological cell, human society and World Wide Web markedly deviate from that of completely random networks indicating the presence of underlying processes. Often the main process involved in their evolution is the addition of links between existing nodes having a common neighbor. In this context we introduce an important property of the nodes, which we call mediating capacity, that is generic to many networks. This capacity decreases rapidly with increase in degree, making hubs weak mediators of the process. We show that this property of nodes provides an explanation for the simultaneous occurrence of the observed scale-free structure and hierarchical modularity in many networked systems. This also explains the high clustering and small-path length seen in real networks as well as non-zero degree-correlations. Our study also provides insight into the local process which ultimately leads to emergence of preferential attachment and hence is also important in understanding robustness and control of real networks as well as processes happening on real networks.
ERIC Educational Resources Information Center
Wu, Wentao
2012-01-01
The objective of this thesis is two-fold: (1) to investigate the degree distribution property of community-based social networks (CSNs) and (2) to provide solutions to a pertinent problem, the Key Player Problem. In the first part of this thesis, we consider a growing community-based network in which the ability of nodes competing for links to new…
1979-10-01
the lngituddV .a rh - L .\\tJd f lh1. ;I,.s( , n n node crossing of the satellite, XANX , repeats evvry Q rev(,lutions,, or 2N7T a (t NP) + X -Qu( NP)2...7 at ANX 0 Q with N 0, 1, 2 ....... to =epoch time when the ascending node crossing occurs at longitude XANX P = nodal period aG = right ascension of...Greenwich S2 right ascension of the ascending node UPPER m BOUND XANX ANX LOWER axANX BOUND to tI t2 t4 Fig. 11 Schematic Drawing of the Time
Inoue, Tomoo; Nishi, Toshio; Nakano, Yoshiaki; Nishimae, Ayaka; Sawai, Yuka; Yamasaki, Masaru; Inaji, Hideo
2016-03-01
There is limited information on indocyanine green (ICG) fluorescence and blue dye for detecting sentinel lymph node (SLN) in early breast cancer. A retrospective study was conducted to assess the feasibility of an SLN biopsy using the combination of ICG fluorescence and the blue dye method. Seven hundred and fourteen patients with clinically node-negative breast cancer were included in this study. They underwent SLN biopsy using a combination of ICG fluorescence and the blue dye method from March 2007 to February 2014. The ICG (a fluorescence-emitting source) and patent blue (the blue dye) were injected into the patients' subareolar region. The removed lymph nodes that had ICG fluorescence and/or blue dye uptake were defined as SLNs. The results of the SLN biopsies and follow-up results of patients who underwent SLN biopsy alone were investigated. In 711 out of 714 patients, SLNs were identified by a combination of ICG fluorescence and the blue dye method (detection rate, 99.6 %). The average number of SLNs was 2.4 (range 1-7), and the average number of resected swollen para-SLNs was 0.4 (range 0-5). Ninety-nine patients with an SLN and/or para-SLN involvement during the intraoperative pathological diagnosis underwent axillary lymph node resection (ALND). In addition, two of three patients whose SLN was not identified also underwent ALND. In 46 of 101 patients with an ALND, non-SLN involvement was not found. Follow-up results were analyzed in 464 patients with invasive carcinoma excluding those with ductal carcinoma in situ (n = 148) and those who underwent ALND (n = 101). During the follow-up period (range 4.4-87.7 months; median, 38 months), two patients (0.4 %) developed axillary lymph node recurrence. They were successfully salvaged, and to date, no further locoregional recurrence has been observed. A high rate of SLN detection and low rate of axillary lymph node recurrence were confirmed by an SLN biopsy using a combination of ICG fluorescence and the blue dye method. Therefore, it is suggested that this method may replace the combination of dye and radioisotope methods.
Jammer Localization Using Wireless Devices with Mitigation by Self-Configuration
Ashraf, Qazi Mamoon; Habaebi, Mohamed Hadi; Islam, Md. Rafiqul
2016-01-01
Communication abilities of a wireless network decrease significantly in the presence of a jammer. This paper presents a reactive technique, to detect and locate the position of a jammer using a distributed collection of wireless sensor devices. We employ the theory of autonomic computing as a framework to design the same. Upon detection of a jammer, the affected nodes self-configure their power consumption which stops unnecessary waste of battery resources. The scheme then proceeds to determine the approximate location of the jammer by analysing the location of active nodes as well as the affected nodes. This is done by employing a circular curve fitting algorithm. Results indicate a high degree of accuracy in localizing a jammer has been achieved. PMID:27583378
Sawai, K; Hagiwara, A; Shimotsuma, M; Sakakibara, T; Imanishi, T; Takemoto, Y; Takahashi, T
1996-03-01
In order to rationalize lymph node dissection for breast cancer, we reviewed regional lymphatic flow from the mesial and outer half of the breast using intra-tumoral injection of activated carbon particles (CH40). Seventy patients with breast cancer were included in this study. Cancers were located in the mesial half of the breast in 25 cases and in its outer half in 41 cases. Since regional lymph nodes were blackened by CH40, lymph node dissection was performed easily and small lymph nodes could be readily examined. The average number of resected nodes in each case was 29.4. When CH40 was injected into the mesial half of the breast, the rates of blackened nodes (number of macroscopically blackened lymph nodes/number of total removed lymph nodes) in the stations were 46.6% (No. 1a), 41.4% (No. 1b), 62.1% (No. 1c), 61.8% (No. 2), 69.2.% (No. 2h), and 65.6% (No. 3). When CH40 was injected into outer half of the breast, those were 62.0% (No. 1a), 64.3% (No. 1b), 68.7% (No. 1c), 75.3% (No. 2), and 67.8% (No. 2h). Regardless of tumor location, the rates of blackened nodes were high in each station. In conclusion, regardless of tumor location it is impossible to determine the level of axillary dissection for breast cancer. It should be all or nothing.
Wu, Zheng-Chun; Xiong, Li; Wang, Ling-Xiang; Miao, Xiong-Ying; Liu, Zi-Ru; Li, Dai-Qiang; Zou, Qiong; Liu, Kui-Jie; Zhao, Hua; Yang, Zhu-Lin
2017-01-01
AIM To investigate the expression and clinical pathological significance of ROR2 and WNT5a in gallbladder squamous/adenosquamous carcinoma (SC/ASC) and adenocarcinoma (AC). METHODS EnVision immunohistochemistry was used to stain for ROR2 and WNT5a in 46 SC/ASC patients and 80 AC patients. RESULTS Poorly differentiated AC among AC patients aged > 45 years were significantly more frequent compared with SC/ASC patients, while tumors with a maximal diameter > 3 cm in the SC/ASC group were significantly more frequent compared with the AC group. Positive ROR2 and WNT5a expression was significantly lower in SC/ASC or AC with a maximal mass diameter ≤ 3 cm, a TNM stage of I + II, no lymph node metastasis, no surrounding invasion, and radical resection than in patients with a maximal mass diameter > 3 cm, TNM stage IV, lymph node metastasis, surrounding invasion, and no resection. Positive ROR2 expression in patients with highly differentiated SC/ASC was significantly lower than in patients with poorly differentiated SC/ASC. Positive ROR2 and WNT5a expression levels in highly differentiated AC were significantly lower than in poorly differentiated AC. Kaplan-Meier survival analysis showed that differentiation degree, maximal mass diameter, TNM stage, lymph node metastasis, surrounding invasion, surgical procedure and the ROR2 and WNT5a expression levels were closely related to average survival of SC/ASC or AC. The survival of SC/ASC or AC patients with positive expression of ROR2 and WNT5a was significantly shorter than that of patients with negative expression results. Cox multivariate analysis revealed that poor differentiation, a maximal diameter of the mass ≥ 3 cm, TNM stage III or IV, lymph node metastasis, surrounding invasion, unresected surgery and positive ROR2 or WNT5a expression in the SC/ASC or AC patients were negatively correlated with the postoperative survival rate and positively correlated with mortality, which are risk factors and independent prognostic predictors. CONCLUSION SC/ASC or AC patients with positive ROR2 or WNT5a expression generally have a poor prognosis. PMID:28465645
Uncovering Randomness and Success in Society
Jalan, Sarika; Sarkar, Camellia; Madhusudanan, Anagha; Dwivedi, Sanjiv Kumar
2014-01-01
An understanding of how individuals shape and impact the evolution of society is vastly limited due to the unavailability of large-scale reliable datasets that can simultaneously capture information regarding individual movements and social interactions. We believe that the popular Indian film industry, “Bollywood”, can provide a social network apt for such a study. Bollywood provides massive amounts of real, unbiased data that spans more than 100 years, and hence this network has been used as a model for the present paper. The nodes which maintain a moderate degree or widely cooperate with the other nodes of the network tend to be more fit (measured as the success of the node in the industry) in comparison to the other nodes. The analysis carried forth in the current work, using a conjoined framework of complex network theory and random matrix theory, aims to quantify the elements that determine the fitness of an individual node and the factors that contribute to the robustness of a network. The authors of this paper believe that the method of study used in the current paper can be extended to study various other industries and organizations. PMID:24533073
A framework for detecting communities of unbalanced sizes in networks
NASA Astrophysics Data System (ADS)
Žalik, Krista Rizman; Žalik, Borut
2018-01-01
Community detection in large networks has been a focus of recent research in many of fields, including biology, physics, social sciences, and computer science. Most community detection methods partition the entire network into communities, groups of nodes that have many connections within communities and few connections between them and do not identify different roles that nodes can have in communities. We propose a community detection model that integrates more different measures that can fast identify communities of different sizes and densities. We use node degree centrality, strong similarity with one node from community, maximal similarity of node to community, compactness of communities and separation between communities. Each measure has its own strength and weakness. Thus, combining different measures can benefit from the strengths of each one and eliminate encountered problems of using an individual measure. We present a fast local expansion algorithm for uncovering communities of different sizes and densities and reveals rich information on input networks. Experimental results show that the proposed algorithm is better or as effective as the other community detection algorithms for both real-world and synthetic networks while it requires less time.
Uncovering randomness and success in society.
Jalan, Sarika; Sarkar, Camellia; Madhusudanan, Anagha; Dwivedi, Sanjiv Kumar
2014-01-01
An understanding of how individuals shape and impact the evolution of society is vastly limited due to the unavailability of large-scale reliable datasets that can simultaneously capture information regarding individual movements and social interactions. We believe that the popular Indian film industry, "Bollywood", can provide a social network apt for such a study. Bollywood provides massive amounts of real, unbiased data that spans more than 100 years, and hence this network has been used as a model for the present paper. The nodes which maintain a moderate degree or widely cooperate with the other nodes of the network tend to be more fit (measured as the success of the node in the industry) in comparison to the other nodes. The analysis carried forth in the current work, using a conjoined framework of complex network theory and random matrix theory, aims to quantify the elements that determine the fitness of an individual node and the factors that contribute to the robustness of a network. The authors of this paper believe that the method of study used in the current paper can be extended to study various other industries and organizations.
Attack Vulnerability of Network Controllability
2016-01-01
Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability. PMID:27588941
Attack Vulnerability of Network Controllability.
Lu, Zhe-Ming; Li, Xin-Feng
2016-01-01
Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability.
Communication efficiency and congestion of signal traffic in large-scale brain networks.
Mišić, Bratislav; Sporns, Olaf; McIntosh, Anthony R
2014-01-01
The complex connectivity of the cerebral cortex suggests that inter-regional communication is a primary function. Using computational modeling, we show that anatomical connectivity may be a major determinant for global information flow in brain networks. A macaque brain network was implemented as a communication network in which signal units flowed between grey matter nodes along white matter paths. Compared to degree-matched surrogate networks, information flow on the macaque brain network was characterized by higher loss rates, faster transit times and lower throughput, suggesting that neural connectivity may be optimized for speed rather than fidelity. Much of global communication was mediated by a "rich club" of hub regions: a sub-graph comprised of high-degree nodes that are more densely interconnected with each other than predicted by chance. First, macaque communication patterns most closely resembled those observed for a synthetic rich club network, but were less similar to those seen in a synthetic small world network, suggesting that the former is a more fundamental feature of brain network topology. Second, rich club regions attracted the most signal traffic and likewise, connections between rich club regions carried more traffic than connections between non-rich club regions. Third, a number of rich club regions were significantly under-congested, suggesting that macaque connectivity actively shapes information flow, funneling traffic towards some nodes and away from others. Together, our results indicate a critical role of the rich club of hub nodes in dynamic aspects of global brain communication.
Power iteration ranking via hybrid diffusion for vital nodes identification
NASA Astrophysics Data System (ADS)
Wu, Tao; Xian, Xingping; Zhong, Linfeng; Xiong, Xi; Stanley, H. Eugene
2018-09-01
One of the most interesting challenges in network science is to understand the relation between network structure and dynamics on it, and many topological properties, including degree distribution, community strength and clustering coefficient, have been proposed in the last decade. Prominent in this context is the centrality measures, which aim at quantifying the relative importance of individual nodes in the overall topology with regard to network organization and function. However, most of the previous centrality measures have been proposed based on different concepts and each of them focuses on a specific structural feature of networks. Thus, the straightforward and standard methods may lead to some bias against node importance measure. In this paper, we introduce two physical processes with potential complementarity between them. Then we propose to combine them as an elegant integration with the classic eigenvector centrality framework to improve the accuracy of node ranking. To test the produced power iteration ranking (PIRank) algorithm, we apply it to the selection of attack targets in network optimal attack problem. Extensive experimental results on synthetic networks and real-world networks suggest that the proposed centrality performs better than other well-known measures. Moreover, comparing with the eigenvector centrality, the PIRank algorithm can achieve about thirty percent performance improvement while keeping similar running time. Our experiment on random networks also shows that PIRank algorithm can avoid the localization phenomenon of eigenvector centrality, in particular for the networks with high-degree hubs.
Communication Efficiency and Congestion of Signal Traffic in Large-Scale Brain Networks
Mišić, Bratislav; Sporns, Olaf; McIntosh, Anthony R.
2014-01-01
The complex connectivity of the cerebral cortex suggests that inter-regional communication is a primary function. Using computational modeling, we show that anatomical connectivity may be a major determinant for global information flow in brain networks. A macaque brain network was implemented as a communication network in which signal units flowed between grey matter nodes along white matter paths. Compared to degree-matched surrogate networks, information flow on the macaque brain network was characterized by higher loss rates, faster transit times and lower throughput, suggesting that neural connectivity may be optimized for speed rather than fidelity. Much of global communication was mediated by a “rich club” of hub regions: a sub-graph comprised of high-degree nodes that are more densely interconnected with each other than predicted by chance. First, macaque communication patterns most closely resembled those observed for a synthetic rich club network, but were less similar to those seen in a synthetic small world network, suggesting that the former is a more fundamental feature of brain network topology. Second, rich club regions attracted the most signal traffic and likewise, connections between rich club regions carried more traffic than connections between non-rich club regions. Third, a number of rich club regions were significantly under-congested, suggesting that macaque connectivity actively shapes information flow, funneling traffic towards some nodes and away from others. Together, our results indicate a critical role of the rich club of hub nodes in dynamic aspects of global brain communication. PMID:24415931
Lu, Yan; Wei, Jin-Ying; Yao, De-Sheng; Pan, Zhong-Mian; Yao, Yao
2017-01-01
To investigate the value of carbon nanoparticles in identifying sentinel lymph nodes in early-stage cervical cancer. From January 2014 to January 2016, 40 patients with cervical cancer stage IA2-IIA, based on the International Federation of Gynecology and Obstetrics (FIGO) 2009 criteria, were included in this study. The normal cervix around the tumor was injected with a total of 1 mL of carbon nanoparticles (CNP)at 3 and 9 o'clock. All patients then underwent laparoscopic pelvic lymph node dissection and radical hysterectomy. The black-dyed sentinel lymph nodes were removed for routine pathological examination and immunohistochemical staining. Among the 40 patients, 38 patients had at least one sentinel lymph node (SLN). The detection rate was 95% (38/40). One hundred seventy-three SLNs were detected with an average of 3.9 SLNs per side. 25 positive lymph nodes, which included 21 positive SLNs, were detected in 8 (20%) patients. Sentinel lymph nodes were localized in the obturator (47.97%), internal lilac (13.87%), external lilac (26.59%), parametrial (1.16%), and common iliac (8.67%) regions. The sensitivity of the SLN detection was 100% (5/5), the accuracy was 97.37% (37/38), and the negative predictive value was 100. 0% and the false negative rate was 0%. Sentinel lymph nodes can be used to accurately predict the pathological state of pelvic lymph nodes in early cervical cancer. The detection rates and accuracy of sentinel lymph node were high. Carbon nanoparticles can be used to trace the sentinel lymph node in early cervical cancer.
Garami, Zoltán; Benkó, Klára; Kósa, Csaba; Fülöp, Balázs; Lukács, Géza
2006-10-01
Breast cancer is the most frequent malignant tumor in women in Hungary. Significant reduction of mortality has been brought about not only by the increasing efficiency of complex therapy but also by regular mammographic screening. Of the histopathological data of 633 patients operated with primary breast tumor at the 1st Surgical Clinic of the Debrecen Medical University between January 1st 2000 and December 31st 2004, the authors analyzed tumor diameter, axillary node status and the degree of histologic anaplasia and compared them with the data of mammographic screening. Of the "screened"patients, 70.7% were diagnosed with T1 size tumors, 28.5% with T2 size, and 0.8% with tumors bigger than that. In the "unscreened" patients, our findings were 44.3%, 45.9% and 9.8% respectively. Within T1 tumors, Tla tumors were found in 11%, TIb in 37.6% and T1c in 51.4% in the "screened" group of patients, while the "unscreened" group's results were 2.3%, 12.6% and 85% respectively. 72.7% of the "screened" patients and 56.2% of the "unscreened" patients were found to be axillary node-negative. A study of the degree of histologic anaplasia showed G-I tumors in 15.6%, G-IIs in 62.1% and G-IIIs in 22.3% of the "screened" patients. The corresponding values for the "unscreened" patients were 6.1%, 53.8% and 40.1%, respectively. The differences were highly significant (p < 0.001) in all the parameters investigated. The authors have found a significant increase in the proportion of node-negative patients and patients with smaller tumors even after the first round of mammographic screening and at less than 50% participation. It is to be hoped that a 20% reduction in mortality can be achieved by further increasing the rate of participation.
Modelling of information diffusion on social networks with applications to WeChat
NASA Astrophysics Data System (ADS)
Liu, Liang; Qu, Bo; Chen, Bin; Hanjalic, Alan; Wang, Huijuan
2018-04-01
Traces of user activities recorded in online social networks open new possibilities to systematically understand the information diffusion process on social networks. From the online social network WeChat, we collected a large number of information cascade trees, each of which tells the spreading trajectory of a message/information such as which user creates the information and which users view or forward the information shared by which neighbours. In this work, we propose two heterogeneous non-linear models, one for the topologies of the information cascade trees and the other for the stochastic process of information diffusion on a social network. Both models are validated by the WeChat data in reproducing and explaining key features of cascade trees. Specifically, we apply the Random Recursive Tree (RRT) to model the growth of cascade trees. The RRT model could capture key features, i.e. the average path length and degree variance of a cascade tree in relation to the number of nodes (size) of the tree. Its single identified parameter quantifies the relative depth or broadness of the cascade trees and indicates that information propagates via a star-like broadcasting or viral-like hop by hop spreading. The RRT model explains the appearance of hubs, thus a possibly smaller average path length as the cascade size increases, as observed in WeChat. We further propose the stochastic Susceptible View Forward Removed (SVFR) model to depict the dynamic user behaviour including creating, viewing, forwarding and ignoring a message on a given social network. Beside the average path length and degree variance of the cascade trees in relation to their sizes, the SVFR model could further explain the power-law cascade size distribution in WeChat and unravel that a user with a large number of friends may actually have a smaller probability to read a message (s)he receives due to limited attention.
CSR: Constrained Selfish Routing in Ad-Hoc Networks
NASA Astrophysics Data System (ADS)
Bassem, Christine; Bestavros, Azer
Routing protocols for ad-hoc networks assume that the nodes forming the network are either under a single authority, or else that they would be altruistically forwarding data for other nodes with no expectation of a return. These assumptions are unrealistic since in ad-hoc networks, nodes are likely to be autonomous and rational (selfish), and thus unwilling to help unless they have an incentive to do so. Providing such incentives is an important aspect that should be considered when designing ad-hoc routing protocols. In this paper, we propose a dynamic, decentralized routing protocol for ad-hoc networks that provides incentives in the form of payments to intermediate nodes used to forward data for others. In our Constrained Selfish Routing (CSR) protocol, game-theoretic approaches are used to calculate payments (incentives) that ensure both the truthfulness of participating nodes and the fairness of the CSR protocol. We show through simulations that CSR is an energy efficient protocol and that it provides lower communication overhead in the best and average cases compared to existing approaches.
Improved knowledge diffusion model based on the collaboration hypernetwork
NASA Astrophysics Data System (ADS)
Wang, Jiang-Pan; Guo, Qiang; Yang, Guang-Yong; Liu, Jian-Guo
2015-06-01
The process for absorbing knowledge becomes an essential element for innovation in firms and in adapting to changes in the competitive environment. In this paper, we present an improved knowledge diffusion hypernetwork (IKDH) model based on the idea that knowledge will spread from the target node to all its neighbors in terms of the hyperedge and knowledge stock. We apply the average knowledge stock V(t) , the variable σ2(t) , and the variance coefficient c(t) to evaluate the performance of knowledge diffusion. By analyzing different knowledge diffusion ways, selection ways of the highly knowledgeable nodes, hypernetwork sizes and hypernetwork structures for the performance of knowledge diffusion, results show that the diffusion speed of IKDH model is 3.64 times faster than that of traditional knowledge diffusion (TKDH) model. Besides, it is three times faster to diffuse knowledge by randomly selecting "expert" nodes than that by selecting large-hyperdegree nodes as "expert" nodes. Furthermore, either the closer network structure or smaller network size results in the faster knowledge diffusion.
Interplay between topology and disorder in a two-dimensional semi-Dirac material
NASA Astrophysics Data System (ADS)
Sriluckshmy, P. V.; Saha, Kush; Moessner, Roderich
2018-01-01
We investigate the role of disorder in a two-dimensional semi-Dirac material characterized by a linear dispersion in one direction and a parabolic dispersion in the orthogonal direction. Using the self-consistent Born approximation, we show that disorder can drive a topological Lifshitz transition from an insulator to a semimetal, as it generates a momentum-independent off-diagonal contribution to the self-energy. Breaking time-reversal symmetry enriches the topological phase diagram with three distinct regimes—single-node trivial, two-node trivial, and two-node Chern. We find that disorder can drive topological transitions from both the single- and two-node trivial to the two-node Chern regime. We further analyze these transitions in an appropriate tight-binding Hamiltonian of an anisotropic hexagonal lattice by calculating the real-space Chern number. Additionally, we compute the disorder-averaged entanglement entropy which signals both the topological Lifshitz and Chern transition as a function of the anisotropy of the hexagonal lattice. Finally, we discuss experimental aspects of our results.
Near infrared imaging to identify sentinel lymph nodes in invasive urinary bladder cancer
NASA Astrophysics Data System (ADS)
Knapp, Deborah W.; Adams, Larry G.; Niles, Jacqueline D.; Lucroy, Michael D.; Ramos-Vara, Jose; Bonney, Patty L.; deGortari, Amalia E.; Frangioni, John V.
2006-02-01
Approximately 12,000 people are diagnosed with invasive transitional cell carcinoma of the urinary bladder (InvTCC) each year in the United States. Surgical removal of the bladder (cystectomy) and regional lymph node dissection are considered frontline therapy. Cystectomy causes extensive acute morbidity, and 50% of patients with InvTCC have occult metastases at the time of diagnosis. Better staging procedures for InvTCC are greatly needed. This study was performed to evaluate an intra-operative near infrared fluorescence imaging (NIRF) system (Frangioni laboratory) for identifying sentinel lymph nodes draining InvTCC. NIRF imaging was used to map lymph node drainage from specific quadrants of the urinary bladder in normal dogs and pigs, and to map lymph node drainage from naturally-occurring InvTCC in pet dogs where the disease closely mimics the human condition. Briefly, during surgery NIR fluorophores (human serum albumen-fluorophore complex, or quantum dots) were injected directly into the bladder wall, and fluorescence observed in lymphatics and regional nodes. Conditions studied to optimize the procedure including: type of fluorophore, depth of injection, volume of fluorophore injected, and degree of bladder distention at the time of injection. Optimal imaging occurred with very superficial injection of the fluorophore in the serosal surface of the moderately distended bladder. Considerable variability was noted from dog to dog in the pattern of lymph node drainage. NIR fluorescence was noted in lymph nodes with metastases in dogs with InvTCC. In conclusion, intra-operative NIRF imaging is a promising approach to improve sentinel lymph node mapping in invasive urinary bladder cancer.
Becker, Tyson E; Ellsworth, Rachel E; Deyarmin, Brenda; Patney, Heather L; Jordan, Rick M; Hooke, Jeffrey A; Shriver, Craig D; Ellsworth, Darrell L
2008-04-01
Metastatic breast cancer is an aggressive disease associated with recurrence and decreased survival. To improve outcomes and develop more effective treatment strategies for patients with breast cancer, it is important to understand the molecular mechanisms underlying metastasis. We used allelic imbalance (AI) to determine the molecular heritage of primary breast tumors and corresponding metastases to the axillary lymph nodes. Paraffin-embedded samples from primary breast tumors and matched metastases (n = 146) were collected from 26 patients with node-positive breast cancer involving multiple axillary nodes. Hierarchical clustering was used to assess overall differences in the patterns of AI, and phylogenetic analysis inferred the molecular heritage of axillary lymph node metastases. Overall frequencies of AI were significantly higher (P < 0.01) in primary breast tumors (23%) than in lymph node metastases (15%), and there was a high degree of discordance in patterns of AI between primary breast carcinomas and the metastases. Metastatic tumors in the axillary nodes showed different patterns of chromosomal changes, suggesting that multiple molecular mechanisms may govern the process of metastasis in individual patients. Some metastases progressed with few genomic alterations, while others harbored many chromosomal alterations present in the primary tumor. The extent of genomic heterogeneity in axillary lymph node metastases differs markedly among individual patients. Genomic diversity may be associated with response to adjuvant therapy, recurrence, and survival, and thus may be important in improving clinical management of breast cancer patients.
Hong, Q; Wang, Y; Wang, J J; Hu, C G; Fang, Y J; Fan, X X; Liu, T; Tong, Q
2017-01-10
Objective: To evaluate the application value of carbon lymph node tracing technique by preoperative endoscopic subserosal injection in laparoscopic radical gastrectomy. Methods: From June 2013 to February 2015, seventy eight patients with gastric cancer were enrolled and randomly divided into trial group and control group. Subserosal injection of carbon nanoparticles around the tumor was performed by preoperative endoscopic subserosal injection one day before the operation in trial group, while the patients routinely underwent laparoscopic gastrectomy in control group. Results of harvested lymph nodes, postoperative complications were compared between the two groups. Carbon nanoparticle-related side effect was also evaluated. Results: The average number of harvested lymph node in trial group was significantly higher than that in control group (35.5±8.5 vs 29.5±6.5, P <0.05). The rate of overall black-dyed harvested lymph node was 74.7% (1 035/1 386) in trial group, the black-dyed lymph node rate in D1 lymph node was 80.1%, which was significantly higher than that in D2 lymph node (69.8%, χ 2 =19.38, P <0.01). When comparing the lymph node with and without black-dyed in trial group, the rate of metastasis lymph node was significantly higher in lymph node with black-dyed (17.3% vs 4.0%, χ 2 =38.67, P <0.01). There was no significant difference in postoperative complications rate between two group (trial group 10.2%; control group 12.8%, χ 2 =0.00, P >0.05), and no carbon nanoparticle-related side effect was observed. Conclusion: Given a higher harvested lymph node number and a similar rate of complications, preoperative endoscopic subserosal injection of carbon nanoparticles was safe and feasible.
Fridman, Mikhail; Krasko, Olga; Lam, Alfred King-Yin
2018-06-01
There is lack of data to predict lymph node metastases in pediatric thyroid cancer. The aims are to study (1) the factors affecting the lymph node metastases in children and adolescence with papillary thyroid carcinoma in region exposed to radiation and (2) to evaluate the predictive significance of these factors for lateral compartment lymphadenectomy. Five hundred and nine patients with papillary thyroid carcinoma underwent total thyroidectomy and lymph nodes resection (central and lateral compartments of the neck) surgery during the period of 1991-2010 in Belarus were recruited. The factors related to lymph node metastases were studied in these patients. In the patients with papillary thyroid carcinoma, increase number of cancer-positive lymph nodes in the central neck compartment were associated with a risk to develop lateral nodal disease as well as bilateral nodal disease. Futhermore, positive lateral compartment nodal metastases are associated with age and gender of the patients, tumour size, minimal extra-thyroidal extension, solid architectonic, extensive desmoplasia in carcinoma, presence of psammoma bodies, extensive involvement of the thyroid and metastatic ratio index revealed after examination of the central cervical chain lymph nodes. The presence of nodal disease, degree of lymph node involvement and the distribution of lymph node metastases significantly increase the recurrence rates of patients with papillary thyroid carcinoma. To conclude, the lymph nodes metastases in young patients with papillary thyroid carcinoma in post-Chernobyl exposed region are common and the pattern could be predicted by many clinical and pathological factors. Copyright © 2018 Elsevier Ltd, BASO ~ The Association for Cancer Surgery, and the European Society of Surgical Oncology. All rights reserved.
Ji, Yinan; Luo, Ningbin; Jiang, Yi; Li, Qiuyun; Wei, Wei; Yang, Huawei; Liu, Jianlun
2017-07-01
Indocyanine green (ICG) is widely used as a tracer in sentinel lymph node biopsy (SLNB) of patients with breast cancer. Whether SLNB performance can be improved by supplementing ICG with methylene blue dye remains controversial. This study compared the performance of SLNB when ICG was used alone or with blue dye. Consecutive patients with T1-3 primary breast cancer at our hospital were recruited into our study and randomized to undergo SLNB with ICG alone (n = 62) or with the combination of ICG and blue dye (n = 65). We compared the two methods in terms of identification rate, number and detection time of sentinel lymph nodes (SLNs) removed. SLN identification rate were similar in the absence (95.2%) or presence of blue dye (98.5%, P = 0.578) but significantly, more average nodes were removed when blue dye was used (3.8 ± 1.5 versus 2.7 ± 1.2, P = 0.000), and the average time for detecting each SLN was significantly shorter (3.91 ± 1.87 versus 5.65 ± 2.95 min; P = 0.000). No patient in the study experienced severe adverse reactions or complications. Recurrence of axillary node was detected in one patient (1.6%) using ICG alone but not in any patients using ICG and blue dye. The efficiency and sensitivity of SLNB can be improved by combining ICG with blue dye. Copyright © 2017 Elsevier Inc. All rights reserved.
A Tree Based Broadcast Scheme for (m, k)-firm Real-Time Stream in Wireless Sensor Networks
Park, HoSung; Kim, Beom-Su; Kim, Kyong Hoon; Shah, Babar; Kim, Ki-Il
2017-01-01
Recently, various unicast routing protocols have been proposed to deliver measured data from the sensor node to the sink node within the predetermined deadline in wireless sensor networks. In parallel with their approaches, some applications demand the specific service, which is based on broadcast to all nodes within the deadline, the feasible real-time traffic model and improvements in energy efficiency. However, current protocols based on either flooding or one-to-one unicast cannot meet the above requirements entirely. Moreover, as far as the authors know, there is no study for the real-time broadcast protocol to support the application-specific traffic model in WSN yet. Based on the above analysis, in this paper, we propose a new (m, k)-firm-based Real-time Broadcast Protocol (FRBP) by constructing a broadcast tree to satisfy the (m, k)-firm, which is applicable to the real-time model in resource-constrained WSNs. The broadcast tree in FRBP is constructed by the distance-based priority scheme, whereas energy efficiency is improved by selecting as few as nodes on a tree possible. To overcome the unstable network environment, the recovery scheme invokes rapid partial tree reconstruction in order to designate another node as the parent on a tree according to the measured (m, k)-firm real-time condition and local states monitoring. Finally, simulation results are given to demonstrate the superiority of FRBP compared to the existing schemes in terms of average deadline missing ratio, average throughput and energy consumption. PMID:29120404
DOE Office of Scientific and Technical Information (OSTI.GOV)
Matsunuma, Ryoichi, E-mail: r-matsunuma@nifty.com; First Department of Surgery, Hamamatsu University School of Medicine, Shizuoka; Oguchi, Masahiko
2012-07-01
Purpose: The indication for postmastectomy radiotherapy (PMRT) in breast cancer patients with one to three positive lymph nodes has been in discussion. The purpose of this study was to identify patient groups for whom PMRT may be indicated, focusing on varied locoregional recurrence rates depending on lymphatic invasion (ly) status. Methods and Materials: Retrospective analysis of 1,994 node-positive patients who had undergone mastectomy without postoperative radiotherapy between January 1990 and December 2000 at our hospital was performed. Patient groups for whom PMRT should be indicated were assessed using statistical tests based on the relationship between locoregional recurrence rate and lymore » status. Results: Multivariate analysis showed that the ly status affected the locoregional recurrence rate to as great a degree as the number of positive lymph nodes (p < 0.001). Especially for patients with one to three positive nodes, extensive ly was a more significant factor than stage T3 in the TNM staging system for locoregional recurrence (p < 0.001 vs. p = 0.295). Conclusion: Among postmastectomy patients with one to three positive lymph nodes, patients with extensive ly seem to require local therapy regimens similar to those used for patients with four or more positive nodes and also seem to require consideration of the use of PMRT.« less
NASA Astrophysics Data System (ADS)
Cogoni, Marco; Busonera, Giovanni; Anedda, Paolo; Zanetti, Gianluigi
2015-01-01
We generalize previous studies on critical phenomena in communication networks [1,2] by adding computational capabilities to the nodes. In our model, a set of tasks with random origin, destination and computational structure is distributed on a computational network, modeled as a graph. By varying the temperature of a Metropolis Montecarlo, we explore the global latency for an optimal to suboptimal resource assignment at a given time instant. By computing the two-point correlation function for the local overload, we study the behavior of the correlation distance (both for links and nodes) while approaching the congested phase: a transition from peaked to spread g(r) is seen above a critical (Montecarlo) temperature Tc. The average latency trend of the system is predicted by averaging over several network traffic realizations while maintaining a spatially detailed information for each node: a sharp decrease of performance is found over Tc independently of the workload. The globally optimized computational resource allocation and network routing defines a baseline for a future comparison of the transition behavior with respect to existing routing strategies [3,4] for different network topologies.
Free Oscillations of the Facula Node at the Stage of Slow Dissipation
NASA Astrophysics Data System (ADS)
Solov'ev, A. A.; Kirichek, E. A.; Efremov, V. I.
2017-12-01
A solar faculae having an appearance of quite long-lived magnetic nodes can perform (as well as sunspots, chromospheric filaments, coronal loops) free oscillations, i.e., they can oscillate about the stable equilibrium position as a single whole, changing quasi-periodically magnetic field averaged over the section with periods from 1 to 4 hours. Kolotkov et al. (2017) described the case in which the average magnetic field strength of the facula node considerably decreased during observations of SDO magnetograms (13 hours), and, at the same time, its oscillations acquired a specific character: the fundamental mode of free oscillations of the facula considerably increased in amplitude (by approximately two times), while the period of oscillations increased by three times. At the end of the process, the system dissipated. In this work, we present the exact solution of the equation of small-amplitude oscillations of the system with a time-variable rigidity, describing the oscillation behavior at which the elasticity of the system decreases with time, while the period and amplitude of oscillations grow.
Parrondo's games based on complex networks and the paradoxical effect.
Ye, Ye; Wang, Lu; Xie, Nenggang
2013-01-01
Parrondo's games were first constructed using a simple tossing scenario, which demonstrates the following paradoxical situation: in sequences of games, a winning expectation may be obtained by playing the games in a random order, although each game (game A or game B) in the sequence may result in losing when played individually. The available Parrondo's games based on the spatial niche (the neighboring environment) are applied in the regular networks. The neighbors of each node are the same in the regular graphs, whereas they are different in the complex networks. Here, Parrondo's model based on complex networks is proposed, and a structure of game B applied in arbitrary topologies is constructed. The results confirm that Parrondo's paradox occurs. Moreover, the size of the region of the parameter space that elicits Parrondo's paradox depends on the heterogeneity of the degree distributions of the networks. The higher heterogeneity yields a larger region of the parameter space where the strong paradox occurs. In addition, we use scale-free networks to show that the network size has no significant influence on the region of the parameter space where the strong or weak Parrondo's paradox occurs. The region of the parameter space where the strong Parrondo's paradox occurs reduces slightly when the average degree of the network increases.
Effects of the distance among multiple spreaders on the spreading
NASA Astrophysics Data System (ADS)
Hu, Z.-L.; Liu, J.-G.; Yang, G.-Y.; Ren, Z.-M.
2014-04-01
It is very important to investigate the multiple spreaders' effects since the spreading phenomenon is ubiquitous in many complex systems. In this letter, we investigate the effects of the distance among the initial multiple spreaders for regular networks and WS (Watts-Strogatz) small-world networks based on the SIR (Susceptible-Infected-Recovered) model. Assuming the epidemics can spread over the network, the theoretical and experimental results show that for regular networks the larger the distance between spreaders is, the more effective the spreading is. For WS networks, the spreading efficiency will decrease when the distance exceeds a certain value, and a larger connection probability and average degree will result in a smaller distance of the most effective spreading. A better spreading strategy using n spreaders is to choose either the highest k or ks nodes with the condition that there are not any pairs of the n spreaders linked directly (Kitsak M. et al., Nat. Phys., 6 (2010) 888). However, we find that the spreading will be more effective when the distances among the largest-degree spreaders increase. All these results are independent of the network size for the two initial spreaders case. This work may give new insights to explore more effective methods to inhibit the epidemic spreading or increase the information diffusion.
Heterogeneity of allocation promotes cooperation in public goods games
NASA Astrophysics Data System (ADS)
Lei, Chuang; Wu, Te; Jia, Jian-Yuan; Cong, Rui; Wang, Long
2010-11-01
We investigate the effects of heterogeneous investment and distribution on the evolution of cooperation in the context of the public goods games. To do this, we develop a simple model in which each individual allocates differing funds to his direct neighbors based upon their difference in connectivity, because of the heterogeneity of real social ties. This difference is characterized by the weight of the link between paired individuals, with an adjustable parameter precisely controlling the heterogeneous level of ties. By numerical simulations, it is found that allocating both too much and too little funds to diverse neighbors can remarkably improve the cooperation level. However, there exists a worst mode of funds allocation leading to the most unfavorable cooperation induced by the moderate values of the parameter. In order to better reveal the potential causes behind these nontrivial phenomena we probe the microscopic characteristics including the average payoff and the cooperator density for individuals of different degrees. It demonstrates rather different dynamical behaviors between the modes of these two types of cooperation promoter. Besides, we also investigate the total link weights of individuals numerically and theoretically for negative values of the parameter, and conclude that the payoff magnitude of middle-degree nodes plays a crucial role in determining the cooperators’ fate.
Maximizing synchronizability of duplex networks
NASA Astrophysics Data System (ADS)
Wei, Xiang; Emenheiser, Jeffrey; Wu, Xiaoqun; Lu, Jun-an; D'Souza, Raissa M.
2018-01-01
We study the synchronizability of duplex networks formed by two randomly generated network layers with different patterns of interlayer node connections. According to the master stability function, we use the smallest nonzero eigenvalue and the eigenratio between the largest and the second smallest eigenvalues of supra-Laplacian matrices to characterize synchronizability on various duplexes. We find that the interlayer linking weight and linking fraction have a profound impact on synchronizability of duplex networks. The increasingly large inter-layer coupling weight is found to cause either decreasing or constant synchronizability for different classes of network dynamics. In addition, negative node degree correlation across interlayer links outperforms positive degree correlation when most interlayer links are present. The reverse is true when a few interlayer links are present. The numerical results and understanding based on these representative duplex networks are illustrative and instructive for building insights into maximizing synchronizability of more realistic multiplex networks.
Critical temperatures of hybrid laminates using finite elements
NASA Astrophysics Data System (ADS)
Chockalingam, S.; Mathew, T. C.; Singh, G.; Rao, G. V.
1992-06-01
Thermal buckling of antisymmetric cross-ply hybrid laminates is investigated. A one-dimensional finite element based on first-order shear deformation theory, having two nodes and six degrees of freedom per node, namely axial displacement, transverse displacements and rotation of the normal to the beam axis and their derivatives with respect to beam coordinate axis, is employed for this purpose. Various types of hybrid laminates with different combination of glass/epoxy, Kevlar/epoxy and carbon/epoxy are considered. Effects of slenderness ratio, boundary conditions and lay-ups are studied in detail.
Local or distributed activation? The view from biology
NASA Astrophysics Data System (ADS)
Reimers, Mark
2011-06-01
There is considerable disagreement among connectionist modellers over whether to represent distinct properties by distinct nodes of a network or whether properties should be represented by patterns of activity across all nodes. This paper draws on the literature of neuroscience to say that a more subtle way of describing how different brain regions contribute to a behaviour, in terms of individual learning and in terms of degrees of importance, may render the current debate moot: both sides of the 'localist' versus 'distributed' debate emphasise different aspects of biology.
Chimera-like states in structured heterogeneous networks
NASA Astrophysics Data System (ADS)
Li, Bo; Saad, David
2017-04-01
Chimera-like states are manifested through the coexistence of synchronous and asynchronous dynamics and have been observed in various systems. To analyze the role of network topology in giving rise to chimera-like states, we study a heterogeneous network model comprising two groups of nodes, of high and low degrees of connectivity. The architecture facilitates the analysis of the system, which separates into a densely connected coherent group of nodes, perturbed by their sparsely connected drifting neighbors. It describes a synchronous behavior of the densely connected group and scaling properties of the induced perturbations.
Goel, Atul; Jain, Sonal; Shah, Abhidha
2018-02-01
To evaluate the musculoskeletal and soft tissue neural alterations in cases with group A basilar invagination. Between January 2007 and August 2016, 510 patients with group A basilar invagination were surgically treated. The radiologic images of these patients were reviewed retrospectively. The patients were divided into 4 groups: group A1, comprising 60 patients with syringomyelia; group A2, comprising 354 patients with "external syrinx," marked by excessive cerebrospinal fluid (CSF) in the extramedullary space; group A3, comprising 51 patients with both syringomyelia and external syrinx; and group A4, comprising 45 patients with no abnormality of CSF cavitation in the spinal canal. A number of musculoskeletal and neural parameters, including the extent of basilar invagination, degree of angulation of the odontoid process, and facet malalignment, were evaluated in each of the 4 groups. The degree of basilar invagination was 6-27.4 mm (average, 15.85 mm) in group A1, 4.3-24.5 mm (average, 12.56 mm) in group A2, 5.6-17.6 mm (average 10.8 mm) in group A3, and 5.2-17.3 mm (average, 11.74 mm) in group A4. The angle of inclination of the odontoid process was 61.1-90.7 degrees (average, 71.4 degrees) in group A1, 30.5-79.8 degrees (average, 60.05 degrees) in group A2, 68.5-78.3 degrees (average, 73.4 degrees) in group A3, and 62.2-87.4 degrees (average, 71.2 degrees) in group A4. The nature of bone malformations directly influences the presence or absence of external syrinx and syringomyelia. Copyright © 2017 Elsevier Inc. All rights reserved.
Optimal power allocation and joint source-channel coding for wireless DS-CDMA visual sensor networks
NASA Astrophysics Data System (ADS)
Pandremmenou, Katerina; Kondi, Lisimachos P.; Parsopoulos, Konstantinos E.
2011-01-01
In this paper, we propose a scheme for the optimal allocation of power, source coding rate, and channel coding rate for each of the nodes of a wireless Direct Sequence Code Division Multiple Access (DS-CDMA) visual sensor network. The optimization is quality-driven, i.e. the received quality of the video that is transmitted by the nodes is optimized. The scheme takes into account the fact that the sensor nodes may be imaging scenes with varying levels of motion. Nodes that image low-motion scenes will require a lower source coding rate, so they will be able to allocate a greater portion of the total available bit rate to channel coding. Stronger channel coding will mean that such nodes will be able to transmit at lower power. This will both increase battery life and reduce interference to other nodes. Two optimization criteria are considered. One that minimizes the average video distortion of the nodes and one that minimizes the maximum distortion among the nodes. The transmission powers are allowed to take continuous values, whereas the source and channel coding rates can assume only discrete values. Thus, the resulting optimization problem lies in the field of mixed-integer optimization tasks and is solved using Particle Swarm Optimization. Our experimental results show the importance of considering the characteristics of the video sequences when determining the transmission power, source coding rate and channel coding rate for the nodes of the visual sensor network.
A note on subtrees rooted along the primary path of a binary tree
Troutman, B.M.; Karlinger, M.R.
1993-01-01
Let Fn denote the set of rooted binary plane trees with n external nodes, for given T???Fn let ui(T) be the altitude i node along the primary path of T, and let ??i(T) denote the number of external nodes in the induced subtree rooted at ui(T). We set ??i(T) = 0 if i is greater than the length of the primary path of T. We prove limn?????? ???i???x/n En{??i}/???i?? En{??i} = G(x), where En denotes the average over trees T???Fn and where the distribution function G is determined by its moments, for which we present an explicit expression. ?? 1993.
Sentinel lymph node biopsy in endometrial cancer-Feasibility, safety and lymphatic complications.
Geppert, Barbara; Lönnerfors, Céline; Bollino, Michele; Persson, Jan
2018-03-01
To compare the rate of lymphatic complications in women with endometrial cancer undergoing sentinel lymph node biopsy versus a full pelvic and infrarenal paraaortic lymphadenectomy, and to examine the overall feasibility and safety of the former. A prospective study of 188 patients with endometrial cancer planned for robotic surgery. Indocyanine green was used to identify the sentinel lymph nodes. In low-risk patients the lymphadenectomy was restricted to removal of sentinel lymph nodes whereas in high-risk patients also a full lymphadenectomy was performed. The impact of the extent of the lymphadenectomy on the rate of complications was evaluated. The bilateral detection rate of sentinel lymph nodes was 96% after cervical tracer injection. No intraoperative complication was associated with the sentinel lymph node biopsy per se. Compared with hysterectomy alone, the additional average operative time for removal of sentinel lymph nodes was 33min whereas 91min were saved compared with a full pelvic and paraaortic lymphadenectomy. Sentinel lymph node biopsy alone resulted in a lower incidence of leg lymphedema than infrarenal paraaortic and pelvic lymphadenectomy (1.3% vs 18.1%, p=0.0003). The high feasibility, the absence of intraoperative complications and the low risk of lymphatic complications supports implementing detection of sentinel lymph nodes in low-risk endometrial cancer patients. Given that available preliminary data on sensitivity and false negative rates in high-risk patients are confirmed in further studies, we also believe that the reduction in lymphatic complications and operative time strongly motivates the sentinel lymph node concept in high-risk endometrial cancer. Copyright © 2017. Published by Elsevier Inc.
High northern latitude temperature extremes, 1400-1999
NASA Astrophysics Data System (ADS)
Tingley, M. P.; Huybers, P.; Hughen, K. A.
2009-12-01
There is often an interest in determining which interval features the most extreme value of a reconstructed climate field, such as the warmest year or decade in a temperature reconstruction. Previous approaches to this type of question have not fully accounted for the spatial and temporal covariance in the climate field when assessing the significance of extreme values. Here we present results from applying BARSAT, a new, Bayesian approach to reconstructing climate fields, to a 600 year multiproxy temperature data set that covers land areas between 45N and 85N. The end result of the analysis is an ensemble of spatially and temporally complete realizations of the temperature field, each of which is consistent with the observations and the estimated values of the parameters that define the assumed spatial and temporal covariance functions. In terms of the spatial average temperature, 1990-1999 was the warmest decade in the 1400-1999 interval in each of 2000 ensemble members, while 1995 was the warmest year in 98% of the ensemble members. A similar analysis at each node of a regular 5 degree grid gives insight into the spatial distribution of warm temperatures, and reveals that 1995 was anomalously warm in Eurasia, whereas 1998 featured extreme warmth in North America. In 70% of the ensemble members, 1601 featured the coldest spatial average, indicating that the eruption of Huaynaputina in Peru in 1600 (with a volcanic explosivity index of 6) had a major cooling impact on the high northern latitudes. Repeating this analysis at each node reveals the varying impacts of major volcanic eruptions on the distribution of extreme cooling. Finally, we use the ensemble to investigate extremes in the time evolution of centennial temperature trends, and find that in more than half the ensemble members, the greatest rate of change in the spatial mean time series was a cooling centered at 1600. The largest rate of centennial scale warming, however, occurred in the 20th Century in more than 98% of the ensemble members.
An optimal routing strategy on scale-free networks
NASA Astrophysics Data System (ADS)
Yang, Yibo; Zhao, Honglin; Ma, Jinlong; Qi, Zhaohui; Zhao, Yongbin
Traffic is one of the most fundamental dynamical processes in networked systems. With the traditional shortest path routing (SPR) protocol, traffic congestion is likely to occur on the hub nodes on scale-free networks. In this paper, we propose an improved optimal routing (IOR) strategy which is based on the betweenness centrality and the degree centrality of nodes in the scale-free networks. With the proposed strategy, the routing paths can accurately bypass hub nodes in the network to enhance the transport efficiency. Simulation results show that the traffic capacity as well as some other indexes reflecting transportation efficiency are further improved with the IOR strategy. Owing to the significantly improved traffic performance, this study is helpful to design more efficient routing strategies in communication or transportation systems.
Control of epidemics on complex networks: Effectiveness of delayed isolation
NASA Astrophysics Data System (ADS)
Pereira, Tiago; Young, Lai-Sang
2015-08-01
We study isolation as a means to control epidemic outbreaks in complex networks, focusing on the consequences of delays in isolating infected nodes. Our analysis uncovers a tipping point: if infected nodes are isolated before a critical day dc, the disease is effectively controlled, whereas for longer delays the number of infected nodes climbs steeply. We show that dc can be estimated explicitly in terms of network properties and disease parameters, connecting lowered values of dc explicitly to heterogeneity in degree distribution. Our results reveal also that initial delays in the implementation of isolation protocols can have catastrophic consequences in heterogeneous networks. As our study is carried out in a general framework, it has the potential to offer insight and suggest proactive strategies for containing outbreaks of a range of serious infectious diseases.
Hopping in the Crowd to Unveil Network Topology.
Asllani, Malbor; Carletti, Timoteo; Di Patti, Francesca; Fanelli, Duccio; Piazza, Francesco
2018-04-13
We introduce a nonlinear operator to model diffusion on a complex undirected network under crowded conditions. We show that the asymptotic distribution of diffusing agents is a nonlinear function of the nodes' degree and saturates to a constant value for sufficiently large connectivities, at variance with standard diffusion in the absence of excluded-volume effects. Building on this observation, we define and solve an inverse problem, aimed at reconstructing the a priori unknown connectivity distribution. The method gathers all the necessary information by repeating a limited number of independent measurements of the asymptotic density at a single node, which can be chosen randomly. The technique is successfully tested against both synthetic and real data and is also shown to estimate with great accuracy the total number of nodes.
Hopping in the Crowd to Unveil Network Topology
NASA Astrophysics Data System (ADS)
Asllani, Malbor; Carletti, Timoteo; Di Patti, Francesca; Fanelli, Duccio; Piazza, Francesco
2018-04-01
We introduce a nonlinear operator to model diffusion on a complex undirected network under crowded conditions. We show that the asymptotic distribution of diffusing agents is a nonlinear function of the nodes' degree and saturates to a constant value for sufficiently large connectivities, at variance with standard diffusion in the absence of excluded-volume effects. Building on this observation, we define and solve an inverse problem, aimed at reconstructing the a priori unknown connectivity distribution. The method gathers all the necessary information by repeating a limited number of independent measurements of the asymptotic density at a single node, which can be chosen randomly. The technique is successfully tested against both synthetic and real data and is also shown to estimate with great accuracy the total number of nodes.
Rate-compatible protograph LDPC code families with linear minimum distance
NASA Technical Reports Server (NTRS)
Divsalar, Dariush (Inventor); Dolinar, Jr., Samuel J. (Inventor); Jones, Christopher R. (Inventor)
2012-01-01
Digital communication coding methods are shown, which generate certain types of low-density parity-check (LDPC) codes built from protographs. A first method creates protographs having the linear minimum distance property and comprising at least one variable node with degree less than 3. A second method creates families of protographs of different rates, all structurally identical for all rates except for a rate-dependent designation of certain variable nodes as transmitted or non-transmitted. A third method creates families of protographs of different rates, all structurally identical for all rates except for a rate-dependent designation of the status of certain variable nodes as non-transmitted or set to zero. LDPC codes built from the protographs created by these methods can simultaneously have low error floors and low iterative decoding thresholds.
Liang, Ming-Tai; Chen, Clayton Chi-Chang; Wang, Ching-Ping; Wang, Chen-Chi; Lin, Whe-Dar; Liu, Shih-An
2009-06-01
The aim of this study was to determine if volume of cervical lymph node measured via computed tomography (CT) could differentiate metastatic from benign lesions in head and neck cancer patients. We conducted a retrospective review of chart and images in a tertiary referring center in Taiwan. Patients with head and neck cancers underwent radical, modified radical or functional neck dissection were enrolled. The CT images before operation were reassessed by a radiologist and were compared with the results of pathological examination. A total of 102 patients were included for final analyses. Most patients were male (n = 96, 94%) and average age was 50.1 years. Although the average nodal volume in patients with cervical metastases was higher than those of patients without cervical metastases, it was not an independent factor associated with cervical metastasis after controlling for other variables; however, central nodal necrosis on enhanced CT image [odds ratio (OR) 18.95, P = 0.008) and minimal axial diameter >7.5 mm (OR 6.868, P = 0.001) were independent factors correlated with cervical metastasis. Therefore, the volume of cervical lymph node measured from CT images cannot predict cervical metastases in head and neck cancer patients. Measurement of minimal axial diameter of the largest lymph node is a simple and more accurate way to predict cervical metastasis instead.
Service discovery with routing protocols for MANETs
NASA Astrophysics Data System (ADS)
Gu, Xuemai; Shi, Shuo
2005-11-01
Service discovery is becoming an important topic as its use throughout the Internet becomes more widespread. In Mobile Ad hoc Networks (MANETs), the routing protocol is very important because it is special network. To find a path for data, and destination nodes, nodes send packets to each node, creating substantial overhead traffic and consuming much time. Even though a variety of routing protocols have been developed for use in MANETs, they are insufficient for reducing overhead traffic and time. In this paper, we propose SDRP: a new service discovery protocol combined with routing policies in MANETs. The protocol is performed upon a distributed network. We describe a service by a unique ID number and use a group-cast routing policy in advertisement and request. The group-cast routing policy decreases the traffic in networks, and it is efficient to find destination node. In addition, the nodes included in the reply path also cache the advertisement information, and it means when each node finds a node next time, they can know where it is as soon as possible, so they minimize the time. Finally, we compare SDRP with both Flood and MAODV in terms of overload, and average delay. Simulation results show SDRP can spend less response time and accommodate even high mobility network environments.
Critical tipping point distinguishing two types of transitions in modular network structures
NASA Astrophysics Data System (ADS)
Shai, Saray; Kenett, Dror Y.; Kenett, Yoed N.; Faust, Miriam; Dobson, Simon; Havlin, Shlomo
2015-12-01
Modularity is a key organizing principle in real-world large-scale complex networks. The relatively sparse interactions between modules are critical to the functionality of the system and are often the first to fail. We model such failures as site percolation targeting interconnected nodes, those connecting between modules. We find, using percolation theory and simulations, that they lead to a "tipping point" between two distinct regimes. In one regime, removal of interconnected nodes fragments the modules internally and causes the system to collapse. In contrast, in the other regime, while only attacking a small fraction of nodes, the modules remain but become disconnected, breaking the entire system. We show that networks with broader degree distribution might be highly vulnerable to such attacks since only few nodes are needed to interconnect the modules, consequently putting the entire system at high risk. Our model has the potential to shed light on many real-world phenomena, and we briefly consider its implications on recent advances in the understanding of several neurocognitive processes and diseases.
Percolation of networks with directed dependency links
NASA Astrophysics Data System (ADS)
Niu, Dunbiao; Yuan, Xin; Du, Minhui; Stanley, H. Eugene; Hu, Yanqing
2016-04-01
The self-consistent probabilistic approach has proven itself powerful in studying the percolation behavior of interdependent or multiplex networks without tracking the percolation process through each cascading step. In order to understand how directed dependency links impact criticality, we employ this approach to study the percolation properties of networks with both undirected connectivity links and directed dependency links. We find that when a random network with a given degree distribution undergoes a second-order phase transition, the critical point and the unstable regime surrounding the second-order phase transition regime are determined by the proportion of nodes that do not depend on any other nodes. Moreover, we also find that the triple point and the boundary between first- and second-order transitions are determined by the proportion of nodes that depend on no more than one node. This implies that it is maybe general for multiplex network systems, some important properties of phase transitions can be determined only by a few parameters. We illustrate our findings using Erdős-Rényi networks.
Kim, Minji; Choi, Mona; Youm, Yoosik
2017-12-01
As comprehensive nursing care service has gradually expanded, it has become necessary to explore the various opinions about it. The purpose of this study is to explore the large amount of text data regarding comprehensive nursing care service extracted from online news and social media by applying a semantic network analysis. The web pages of the Korean Nurses Association (KNA) News, major daily newspapers, and Twitter were crawled by searching the keyword 'comprehensive nursing care service' using Python. A morphological analysis was performed using KoNLPy. Nodes on a 'comprehensive nursing care service' cluster were selected, and frequency, edge weight, and degree centrality were calculated and visualized with Gephi for the semantic network. A total of 536 news pages and 464 tweets were analyzed. In the KNA News and major daily newspapers, 'nursing workforce' and 'nursing service' were highly rated in frequency, edge weight, and degree centrality. On Twitter, the most frequent nodes were 'National Health Insurance Service' and 'comprehensive nursing care service hospital.' The nodes with the highest edge weight were 'national health insurance,' 'wards without caregiver presence,' and 'caregiving costs.' 'National Health Insurance Service' was highest in degree centrality. This study provides an example of how to use atypical big data for a nursing issue through semantic network analysis to explore diverse perspectives surrounding the nursing community through various media sources. Applying semantic network analysis to online big data to gather information regarding various nursing issues would help to explore opinions for formulating and implementing nursing policies. © 2017 Korean Society of Nursing Science
SpectralNET – an application for spectral graph analysis and visualization
Forman, Joshua J; Clemons, Paul A; Schreiber, Stuart L; Haggarty, Stephen J
2005-01-01
Background Graph theory provides a computational framework for modeling a variety of datasets including those emerging from genomics, proteomics, and chemical genetics. Networks of genes, proteins, small molecules, or other objects of study can be represented as graphs of nodes (vertices) and interactions (edges) that can carry different weights. SpectralNET is a flexible application for analyzing and visualizing these biological and chemical networks. Results Available both as a standalone .NET executable and as an ASP.NET web application, SpectralNET was designed specifically with the analysis of graph-theoretic metrics in mind, a computational task not easily accessible using currently available applications. Users can choose either to upload a network for analysis using a variety of input formats, or to have SpectralNET generate an idealized random network for comparison to a real-world dataset. Whichever graph-generation method is used, SpectralNET displays detailed information about each connected component of the graph, including graphs of degree distribution, clustering coefficient by degree, and average distance by degree. In addition, extensive information about the selected vertex is shown, including degree, clustering coefficient, various distance metrics, and the corresponding components of the adjacency, Laplacian, and normalized Laplacian eigenvectors. SpectralNET also displays several graph visualizations, including a linear dimensionality reduction for uploaded datasets (Principal Components Analysis) and a non-linear dimensionality reduction that provides an elegant view of global graph structure (Laplacian eigenvectors). Conclusion SpectralNET provides an easily accessible means of analyzing graph-theoretic metrics for data modeling and dimensionality reduction. SpectralNET is publicly available as both a .NET application and an ASP.NET web application from . Source code is available upon request. PMID:16236170
SpectralNET--an application for spectral graph analysis and visualization.
Forman, Joshua J; Clemons, Paul A; Schreiber, Stuart L; Haggarty, Stephen J
2005-10-19
Graph theory provides a computational framework for modeling a variety of datasets including those emerging from genomics, proteomics, and chemical genetics. Networks of genes, proteins, small molecules, or other objects of study can be represented as graphs of nodes (vertices) and interactions (edges) that can carry different weights. SpectralNET is a flexible application for analyzing and visualizing these biological and chemical networks. Available both as a standalone .NET executable and as an ASP.NET web application, SpectralNET was designed specifically with the analysis of graph-theoretic metrics in mind, a computational task not easily accessible using currently available applications. Users can choose either to upload a network for analysis using a variety of input formats, or to have SpectralNET generate an idealized random network for comparison to a real-world dataset. Whichever graph-generation method is used, SpectralNET displays detailed information about each connected component of the graph, including graphs of degree distribution, clustering coefficient by degree, and average distance by degree. In addition, extensive information about the selected vertex is shown, including degree, clustering coefficient, various distance metrics, and the corresponding components of the adjacency, Laplacian, and normalized Laplacian eigenvectors. SpectralNET also displays several graph visualizations, including a linear dimensionality reduction for uploaded datasets (Principal Components Analysis) and a non-linear dimensionality reduction that provides an elegant view of global graph structure (Laplacian eigenvectors). SpectralNET provides an easily accessible means of analyzing graph-theoretic metrics for data modeling and dimensionality reduction. SpectralNET is publicly available as both a .NET application and an ASP.NET web application from http://chembank.broad.harvard.edu/resources/. Source code is available upon request.
Statistical mechanics of scale-free gene expression networks
NASA Astrophysics Data System (ADS)
Gross, Eitan
2012-12-01
The gene co-expression networks of many organisms including bacteria, mice and man exhibit scale-free distribution. This heterogeneous distribution of connections decreases the vulnerability of the network to random attacks and thus may confer the genetic replication machinery an intrinsic resilience to such attacks, triggered by changing environmental conditions that the organism may be subject to during evolution. This resilience to random attacks comes at an energetic cost, however, reflected by the lower entropy of the scale-free distribution compared to the more homogenous, random network. In this study we found that the cell cycle-regulated gene expression pattern of the yeast Saccharomyces cerevisiae obeys a power-law distribution with an exponent α = 2.1 and an entropy of 1.58. The latter is very close to the maximal value of 1.65 obtained from linear optimization of the entropy function under the constraint of a constant cost function, determined by the average degree connectivity
Self-adaptive trust based ABR protocol for MANETs using Q-learning.
Kumar, Anitha Vijaya; Jeyapal, Akilandeswari
2014-01-01
Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation.
Self-Adaptive Trust Based ABR Protocol for MANETs Using Q-Learning
Jeyapal, Akilandeswari
2014-01-01
Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation. PMID:25254243
Centralized Routing and Scheduling Using Multi-Channel System Single Transceiver in 802.16d
NASA Astrophysics Data System (ADS)
Al-Hemyari, A.; Noordin, N. K.; Ng, Chee Kyun; Ismail, A.; Khatun, S.
This paper proposes a cross-layer optimized strategy that reduces the effect of interferences from neighboring nodes within a mesh networks. This cross-layer design relies on the routing information in network layer and the scheduling table in medium access control (MAC) layer. A proposed routing algorithm in network layer is exploited to find the best route for all subscriber stations (SS). Also, a proposed centralized scheduling algorithm in MAC layer is exploited to assign a time slot for each possible node transmission. The cross-layer optimized strategy is using multi-channel single transceiver and single channel single transceiver systems for WiMAX mesh networks (WMNs). Each node in WMN has a transceiver that can be tuned to any available channel for eliminating the secondary interference. Among the considered parameters in the performance analysis are interference from the neighboring nodes, hop count to the base station (BS), number of children per node, slot reuse, load balancing, quality of services (QoS), and node identifier (ID). Results show that the proposed algorithms significantly improve the system performance in terms of length of scheduling, channel utilization ratio (CUR), system throughput, and average end to end transmission delay.
Adaptive Peer Sampling with Newscast
NASA Astrophysics Data System (ADS)
Tölgyesi, Norbert; Jelasity, Márk
The peer sampling service is a middleware service that provides random samples from a large decentralized network to support gossip-based applications such as multicast, data aggregation and overlay topology management. Lightweight gossip-based implementations of the peer sampling service have been shown to provide good quality random sampling while also being extremely robust to many failure scenarios, including node churn and catastrophic failure. We identify two problems with these approaches. The first problem is related to message drop failures: if a node experiences a higher-than-average message drop rate then the probability of sampling this node in the network will decrease. The second problem is that the application layer at different nodes might request random samples at very different rates which can result in very poor random sampling especially at nodes with high request rates. We propose solutions for both problems. We focus on Newscast, a robust implementation of the peer sampling service. Our solution is based on simple extensions of the protocol and an adaptive self-control mechanism for its parameters, namely—without involving failure detectors—nodes passively monitor local protocol events using them as feedback for a local control loop for self-tuning the protocol parameters. The proposed solution is evaluated by simulation experiments.
NASA Astrophysics Data System (ADS)
Long, Yin; Zhang, Xiao-Jun; Wang, Kui
2018-05-01
In this paper, convergence and approximate calculation of average degree under different network sizes for decreasing random birth-and-death networks (RBDNs) are studied. First, we find and demonstrate that the average degree is convergent in the form of power law. Meanwhile, we discover that the ratios of the back items to front items of convergent reminder are independent of network link number for large network size, and we theoretically prove that the limit of the ratio is a constant. Moreover, since it is difficult to calculate the analytical solution of the average degree for large network sizes, we adopt numerical method to obtain approximate expression of the average degree to approximate its analytical solution. Finally, simulations are presented to verify our theoretical results.
Cao, Xinyi; Zhao, Dayong; Xu, Huimin; Huang, Rui; Zeng, Jin; Yu, Zhongbo
2018-06-11
To investigate the differences in the interactions of microbial communities in two regions in Taihu Lake with different nutrient loadings [Meiliang Bay (MLB) and Xukou Bay (XKB)], water samples were collected and both intra- and inter-kingdom microbial community interactions were examined with network analysis. It is demonstrated that all of the bacterioplankton, microeukaryotes and inter-kingdom communities networks in Taihu Lake were non-random. For the networks of bacterioplankton and inter-kingdom community in XKB, higher clustering coefficient and average degree but lower average path length indexes were observed, indicating the nodes in XKB were more clustered and closely connected with plenty edges than those of MLB. The bacterioplankton and inter-kingdom networks were considerably larger and more complex with more module hubs and connectors in XKB compared with those of MLB, whereas the microeukaryotes networks were comparable and had no module hubs or connectors in the two lake zones. The phyla of Acidobacteria, Cyanobacteria and Planctomycetes maintained greater cooperation with other phyla in XKB, rather than competition. The relationships between microbial communities and environmental factors in MLB were weaker. Compared with the microbial community networks of XKB, less modules in networks of MLB were significantly correlated with total phosphorous and total nitrogen.
An IUR evolutionary game model on the patent cooperate of Shandong China
NASA Astrophysics Data System (ADS)
Liu, Mengmeng; Ma, Yinghong; Liu, Zhiyuan; You, Xuemei
2017-06-01
Organizations of industries and university & research institutes cooperate to meet their respective needs based on social contacts, trust and share complementary resources. From the perspective of complex network together with the patent data of Shandong province in China, a novel evolutionary game model on patent cooperation network is presented. Two sides in the game model are industries and universities & research institutes respectively. The cooperation is represented by a connection when a new patent is developed together by the two sides. The optimal strategy of the evolutionary game model is quantified by the average positive cooperation probability p ¯ and the average payoff U ¯ . The feasibility of this game model is simulated on the parameters such as the knowledge spillover, the punishment, the development cost and the distribution coefficient of the benefit. The numerical simulations show that the cooperative behaviors are affected by the variation of parameters. The knowledge spillover displays different behaviors when the punishment is larger than the development cost or less than it. Those results indicate that reasonable punishment would improve the positive cooperation. The appropriate punishment will be useful to enhance the big degree nodes positively cooperate with industries and universities & research institutes. And an equitable plan for the distribution of cooperative profits is half-and-half distribution strategy for the two sides in game.
Poolkhet, C; Chairatanayuth, P; Thongratsakul, S; Yatbantoong, N; Kasemsuwan, S; Damchoey, D; Rukkwamsuk, T
2013-09-01
The aim of this study is to explain the social networks of the backyard chicken in Ratchaburi, Suphan Buri and Nakhon Pathom Provinces. In this study, we designed the nodes as groups of persons or places involved in activities relating to backyard chickens. The ties are all activities related to the nodes. The study applied a partial network approach to assess the spreading pattern of avian influenza. From 557 questionnaires collected from the nodes, the researchers found that the degree (the numbers of ties that a node has) and closeness (the distance from one node to the others) centralities of Nakhon Pathom were significantly higher than those of the others (P<0.001). The results show that compared with the remaining areas, this area is more quickly connected to many links. If the avian influenza virus subtype H5N1 was released into the network, the disease would spread throughout this province more rapidly than in Ratchaburi and Suphan Buri. The betweenness centrality in each of these provinces showed no differences (P>0.05). In this study, the nodes that play an important role in all networks are farmers who raise consumable chicken, farmers who raise both consumable chicken and fighting cocks, farmers' households that connect with dominant nodes, and the owners and observers of fighting cocks at arenas and training fields. In this study, we did not find cut points or blocks in the network. Moreover, we detected a random network in all provinces. Thus, connectivity between the nodes covers long or short distances, with less predictable behaviour. Finally, this study suggests that activities between the important nodes must receive special attention for disease control during future disease outbreaks. © 2012 Blackwell Verlag GmbH.
Tartaglione, Girolamo; Vigili, Maurizio G; Rahimi, Siavash; Celebrini, Alessandra; Pagan, Marco; Lauro, Luigi; Al-Nahhas, Adil; Rubello, Domenico
2008-04-01
To evaluate the role of dynamic lymphoscintigraphy with a same-day protocol for sentinel node biopsy in oral cavity cancer. Twenty-two consecutive patients affected by cT1-2N0 squamous cell carcinoma of the oral cavity were enrolled between September 2001 and November 2005. After a local anaesthetic (10% lidocaine spray), a dose of 30-50 MBq of Tc human serum albumin nanocolloid, in ml saline, was injected superficially (1-2 mm subendothelial injection) into four points around the lesion. Dynamic lymphoscintigraphy was acquired immediately (256x256 matrix, 5 min pre-set time, LEGP collimator) in lateral and anterior projections. The imaging was prolonged until the lymph nodes of at least two neck levels were visualized (time required min). About 3 h later (same-day protocol) the patients had a radioguided sentinel node biopsy. Elective neck dissection was performed in the first 13 patients; whereas the last nine patients had elective neck dissection only if the sentinel node was positive. Sentinel nodes were dissected into 1 mm thick block sections and studied by haematoxylin & eosin staining and immunohistochemistry (anticytokeratin antibody). The sentinel nodes were found on the 1st neck level in 13 cases, on the 2nd neck level in eight cases, and on the 3rd neck level in one case (100% sensitivity). The average number of sentinel nodes was 2.2 for each patient. The sentinel node was positive in eight patients (36%); with six of them having the sentinel node as the exclusive site of metastasis. No skip metastases were found in the 14 patients with negative sentinel node (100% specificity). Our preliminary data indicate that superficial injections of radiocolloid and dynamic lymphoscintigraphy provide a high success rate in sentinel node identification in oral cavity cancers. Dynamic lymphoscintigraphy helps in distinguishing sentinel node from second-tier lymph nodes. The same-day protocol is advisable in order to correctly identify the first sentinel node, avoiding multiple and unnecessary node biopsies, without reducing sensitivity.
A Family of Algorithms for Computing Consensus about Node State from Network Data
Brush, Eleanor R.; Krakauer, David C.; Flack, Jessica C.
2013-01-01
Biological and social networks are composed of heterogeneous nodes that contribute differentially to network structure and function. A number of algorithms have been developed to measure this variation. These algorithms have proven useful for applications that require assigning scores to individual nodes–from ranking websites to determining critical species in ecosystems–yet the mechanistic basis for why they produce good rankings remains poorly understood. We show that a unifying property of these algorithms is that they quantify consensus in the network about a node's state or capacity to perform a function. The algorithms capture consensus by either taking into account the number of a target node's direct connections, and, when the edges are weighted, the uniformity of its weighted in-degree distribution (breadth), or by measuring net flow into a target node (depth). Using data from communication, social, and biological networks we find that that how an algorithm measures consensus–through breadth or depth– impacts its ability to correctly score nodes. We also observe variation in sensitivity to source biases in interaction/adjacency matrices: errors arising from systematic error at the node level or direct manipulation of network connectivity by nodes. Our results indicate that the breadth algorithms, which are derived from information theory, correctly score nodes (assessed using independent data) and are robust to errors. However, in cases where nodes “form opinions” about other nodes using indirect information, like reputation, depth algorithms, like Eigenvector Centrality, are required. One caveat is that Eigenvector Centrality is not robust to error unless the network is transitive or assortative. In these cases the network structure allows the depth algorithms to effectively capture breadth as well as depth. Finally, we discuss the algorithms' cognitive and computational demands. This is an important consideration in systems in which individuals use the collective opinions of others to make decisions. PMID:23874167
Chai, Bian-fang; Yu, Jian; Jia, Cai-Yan; Yang, Tian-bao; Jiang, Ya-wen
2013-07-01
Latent community discovery that combines links and contents of a text-associated network has drawn more attention with the advance of social media. Most of the previous studies aim at detecting densely connected communities and are not able to identify general structures, e.g., bipartite structure. Several variants based on the stochastic block model are more flexible for exploring general structures by introducing link probabilities between communities. However, these variants cannot identify the degree distributions of real networks due to a lack of modeling of the differences among nodes, and they are not suitable for discovering communities in text-associated networks because they ignore the contents of nodes. In this paper, we propose a popularity-productivity stochastic block (PPSB) model by introducing two random variables, popularity and productivity, to model the differences among nodes in receiving links and producing links, respectively. This model has the flexibility of existing stochastic block models in discovering general community structures and inherits the richness of previous models that also exploit popularity and productivity in modeling the real scale-free networks with power law degree distributions. To incorporate the contents in text-associated networks, we propose a combined model which combines the PPSB model with a discriminative model that models the community memberships of nodes by their contents. We then develop expectation-maximization (EM) algorithms to infer the parameters in the two models. Experiments on synthetic and real networks have demonstrated that the proposed models can yield better performances than previous models, especially on networks with general structures.
NASA Astrophysics Data System (ADS)
Chai, Bian-fang; Yu, Jian; Jia, Cai-yan; Yang, Tian-bao; Jiang, Ya-wen
2013-07-01
Latent community discovery that combines links and contents of a text-associated network has drawn more attention with the advance of social media. Most of the previous studies aim at detecting densely connected communities and are not able to identify general structures, e.g., bipartite structure. Several variants based on the stochastic block model are more flexible for exploring general structures by introducing link probabilities between communities. However, these variants cannot identify the degree distributions of real networks due to a lack of modeling of the differences among nodes, and they are not suitable for discovering communities in text-associated networks because they ignore the contents of nodes. In this paper, we propose a popularity-productivity stochastic block (PPSB) model by introducing two random variables, popularity and productivity, to model the differences among nodes in receiving links and producing links, respectively. This model has the flexibility of existing stochastic block models in discovering general community structures and inherits the richness of previous models that also exploit popularity and productivity in modeling the real scale-free networks with power law degree distributions. To incorporate the contents in text-associated networks, we propose a combined model which combines the PPSB model with a discriminative model that models the community memberships of nodes by their contents. We then develop expectation-maximization (EM) algorithms to infer the parameters in the two models. Experiments on synthetic and real networks have demonstrated that the proposed models can yield better performances than previous models, especially on networks with general structures.
Li, Huaqing; Chen, Guo; Huang, Tingwen; Dong, Zhaoyang; Zhu, Wei; Gao, Lan
2016-12-01
In this paper, we consider the event-triggered distributed average-consensus of discrete-time first-order multiagent systems with limited communication data rate and general directed network topology. In the framework of digital communication network, each agent has a real-valued state but can only exchange finite-bit binary symbolic data sequence with its neighborhood agents at each time step due to the digital communication channels with energy constraints. Novel event-triggered dynamic encoder and decoder for each agent are designed, based on which a distributed control algorithm is proposed. A scheme that selects the number of channel quantization level (number of bits) at each time step is developed, under which all the quantizers in the network are never saturated. The convergence rate of consensus is explicitly characterized, which is related to the scale of network, the maximum degree of nodes, the network structure, the scaling function, the quantization interval, the initial states of agents, the control gain and the event gain. It is also found that under the designed event-triggered protocol, by selecting suitable parameters, for any directed digital network containing a spanning tree, the distributed average consensus can be always achieved with an exponential convergence rate based on merely one bit information exchange between each pair of adjacent agents at each time step. Two simulation examples are provided to illustrate the feasibility of presented protocol and the correctness of the theoretical results.
Alcalde Cuesta, Fernando; González Sequeiros, Pablo; Lozano Rojo, Álvaro
2016-02-10
For a network, the accomplishment of its functions despite perturbations is called robustness. Although this property has been extensively studied, in most cases, the network is modified by removing nodes. In our approach, it is no longer perturbed by site percolation, but evolves after site invasion. The process transforming resident/healthy nodes into invader/mutant/diseased nodes is described by the Moran model. We explore the sources of robustness (or its counterpart, the propensity to spread favourable innovations) of the US high-voltage power grid network, the Internet2 academic network, and the C. elegans connectome. We compare them to three modular and non-modular benchmark networks, and samples of one thousand random networks with the same degree distribution. It is found that, contrary to what happens with networks of small order, fixation probability and robustness are poorly correlated with most of standard statistics, but they depend strongly on the degree distribution. While community detection techniques are able to detect the existence of a central core in Internet2, they are not effective in detecting hierarchical structures whose topological complexity arises from the repetition of a few rules. Box counting dimension and Rent's rule are applied to show a subtle trade-off between topological and wiring complexity.
The data-driven null models for information dissemination tree in social networks
NASA Astrophysics Data System (ADS)
Zhang, Zhiwei; Wang, Zhenyu
2017-10-01
For the purpose of detecting relatedness and co-occurrence between users, as well as the distribution features of nodes in spreading path of a social network, this paper explores topological characteristics of information dissemination trees (IDT) that can be employed indirectly to probe the information dissemination laws within social networks. Hence, three different null models of IDT are presented in this article, including the statistical-constrained 0-order IDT null model, the random-rewire-broken-edge 0-order IDT null model and the random-rewire-broken-edge 2-order IDT null model. These null models firstly generate the corresponding randomized copy of an actual IDT; then the extended significance profile, which is developed by adding the cascade ratio of information dissemination path, is exploited not only to evaluate degree correlation of two nodes associated with an edge, but also to assess the cascade ratio of different length of information dissemination paths. The experimental correspondences of the empirical analysis for several SinaWeibo IDTs and Twitter IDTs indicate that the IDT null models presented in this paper perform well in terms of degree correlation of nodes and dissemination path cascade ratio, which can be better to reveal the features of information dissemination and to fit the situation of real social networks.
Alcalde Cuesta, Fernando; González Sequeiros, Pablo; Lozano Rojo, Álvaro
2016-01-01
For a network, the accomplishment of its functions despite perturbations is called robustness. Although this property has been extensively studied, in most cases, the network is modified by removing nodes. In our approach, it is no longer perturbed by site percolation, but evolves after site invasion. The process transforming resident/healthy nodes into invader/mutant/diseased nodes is described by the Moran model. We explore the sources of robustness (or its counterpart, the propensity to spread favourable innovations) of the US high-voltage power grid network, the Internet2 academic network, and the C. elegans connectome. We compare them to three modular and non-modular benchmark networks, and samples of one thousand random networks with the same degree distribution. It is found that, contrary to what happens with networks of small order, fixation probability and robustness are poorly correlated with most of standard statistics, but they depend strongly on the degree distribution. While community detection techniques are able to detect the existence of a central core in Internet2, they are not effective in detecting hierarchical structures whose topological complexity arises from the repetition of a few rules. Box counting dimension and Rent’s rule are applied to show a subtle trade-off between topological and wiring complexity. PMID:26861189
Average weighted receiving time on the non-homogeneous double-weighted fractal networks
NASA Astrophysics Data System (ADS)
Ye, Dandan; Dai, Meifeng; Sun, Yu; Su, Weiyi
2017-05-01
In this paper, based on actual road networks, a model of the non-homogeneous double-weighted fractal networks is introduced depending on the number of copies s and two kinds of weight factors wi ,ri(i = 1 , 2 , … , s) . The double-weights represent the capacity-flowing weights and the cost-traveling weights, respectively. Denote by wijF the capacity-flowing weight connecting the nodes i and j, and denote by wijC the cost-traveling weight connecting the nodes i and j. Let wijF be related to the weight factors w1 ,w2 , … ,ws, and let wijC be related to the weight factors r1 ,r2 , … ,rs. Assuming that the walker, at each step, starting from its current node, moves to any of its neighbors with probability proportional to the capacity-flowing weight of edge linking them. The weighted time for two adjacency nodes is the cost-traveling weight connecting the two nodes. The average weighted receiving time (AWRT) is defined on the non-homogeneous double-weighted fractal networks. AWRT depends on the relationships of the number of copies s and two kinds of weight factors wi ,ri(i = 1 , 2 , … , s) . The obtained remarkable results display that in the large network, the AWRT grows as a power-law function of the network size Ng with the exponent, represented by θ =logs(w1r1 +w2r2 + ⋯ +wsrs) < 1 when w1r1 +w2r2 + ⋯ +wsrs ≠ 1, which means that the smaller the value of w1r1 +w2r2 + ⋯ +wsrs is, the more efficient the process of receiving information is. Especially when w1r1 +w2r2 + ⋯ +wsrs = 1, AWRT grows with increasing order Ng as logNg or (logNg) 2 . In the classic fractal networks, the average receiving time (ART) grows with linearly with the network size Ng. Thus, the non-homogeneous double-weighted fractal networks are more efficient than classic fractal networks in term of receiving information.
Numerical modelling of flow through foam's node.
Anazadehsayed, Abdolhamid; Rezaee, Nastaran; Naser, Jamal
2017-10-15
In this work, for the first time, a three-dimensional model to describe the dynamics of flow through geometric Plateau border and node components of foam is presented. The model involves a microscopic-scale structure of one interior node and four Plateau borders with an angle of 109.5 from each other. The majority of the surfaces in the model make a liquid-gas interface where the boundary condition of stress balance between the surface and bulk is applied. The three-dimensional Navier-Stoke equation, along with continuity equation, is solved using the finite volume approach. The numerical results are validated against the available experimental results for the flow velocity and resistance in the interior nodes and Plateau borders. A qualitative illustration of flow in a node in different orientations is shown. The scaled resistance against the flow for different liquid-gas interface mobility is studied and the geometrical characteristics of the node and Plateau border components of the system are compared to investigate the Plateau border and node dominated flow regimes numerically. The findings show the values of the resistance in each component, in addition to the exact point where the flow regimes switch. Furthermore, a more accurate effect of the liquid-gas interface on the foam flow, particularly in the presence of a node in the foam network is obtained. The comparison of the available numerical results with our numerical results shows that the velocity of the node-PB system is lower than the velocity of single PB system for mobile interfaces. That is owing to the fact that despite the more relaxed geometrical structure of the node, constraining effect of merging and mixing of flow and increased viscous damping in the node component result in the node-dominated regime. Moreover, we obtain an accurate updated correlation for the dependence of the scaled average velocity of the node-Plateau border system on the liquid-gas interface mobility described by Boussinesq number. Copyright © 2017 Elsevier Inc. All rights reserved.
Ajmani, Gaurav S; Wang, Chi-Hsiung; Kim, Ki Wan; Howington, John A; Krantz, Seth B
2018-07-01
Very few studies have examined the quality of wedge resection in patients with non-small cell lung cancer. Using the National Cancer Database, we evaluated whether the quality of wedge resection affects overall survival in patients with early disease and how these outcomes compare with those of patients who receive stereotactic radiation. We identified 14,328 patients with cT1 to T2, N0, M0 disease treated with wedge resection (n = 10,032) or stereotactic radiation (n = 4296) from 2005 to 2013 and developed a subsample of propensity-matched wedge and radiation patients. Wedge quality was grouped as high (negative margins, >5 nodes), average (negative margins, ≤5 nodes), and poor (positive margins). Overall survival was compared between patients who received wedge resection of different quality and those who received radiation, adjusting for demographic and clinical variables. Among patients who underwent wedge resection, 94.6% had negative margins, 44.3% had 0 nodes examined, 17.1% had >5 examined, and 3.0% were nodally upstaged; 16.7% received a high-quality wedge, which was associated with a lower risk of death compared with average-quality resection (adjusted hazard ratio [aHR], 0.74; 95% confidence interval [CI], 0.67-0.82). Compared with stereotactic radiation, wedge patients with negative margins had significantly reduced hazard of death (>5 nodes: aHR, 0.50; 95% CI, 0.43-0.58; ≤5 nodes: aHR, 0.65; 95% CI, 0.60-0.70). There was no significant survival difference between margin-positive wedge and radiation. Lymph nodes examined and margins obtained are important quality metrics in wedge resection. A high-quality wedge appears to confer a significant survival advantage over lower-quality wedge and stereotactic radiation. A margin-positive wedge appears to offer no benefit compared with radiation. Copyright © 2018 The American Association for Thoracic Surgery. Published by Elsevier Inc. All rights reserved.
Lin, Yuan; Zhang, Zhongzhi
2013-03-07
The trapping process in polymer systems constitutes a fundamental mechanism for various other dynamical processes taking place in these systems. In this paper, we study the trapping problem in two representative polymer networks, Cayley trees and Vicsek fractals, which separately model dendrimers and regular hyperbranched polymers. Our goal is to explore the impact of trap location on the efficiency of trapping in these two important polymer systems, with the efficiency being measured by the average trapping time (ATT) that is the average of source-to-trap mean first-passage time over every staring point in the whole networks. For Cayley trees, we derive an exact analytic formula for the ATT to an arbitrary trap node, based on which we further obtain the explicit expression of ATT for the case that the trap is uniformly distributed. For Vicsek fractals, we provide the closed-form solution for ATT to a peripheral node farthest from the central node, as well as the numerical solutions for the case when the trap is placed on other nodes. Moreover, we derive the exact formula for the ATT corresponding to the trapping problem when the trap has a uniform distribution over all nodes. Our results show that the influence of trap location on the trapping efficiency is completely different for the two polymer networks. In Cayley trees, the leading scaling of ATT increases with the shortest distance between the trap and the central node, implying that trap's position has an essential impact on the trapping efficiency; while in Vicsek fractals, the effect of location of the trap is negligible, since the dominant behavior of ATT is identical, respective of the location where the trap is placed. We also present that for all cases of trapping problems being studied, the trapping process is more efficient in Cayley trees than in Vicsek fractals. We demonstrate that all differences related to trapping in the two polymer systems are rooted in their underlying topological structures.
Complex Network Simulation of Forest Network Spatial Pattern in Pearl River Delta
NASA Astrophysics Data System (ADS)
Zeng, Y.
2017-09-01
Forest network-construction uses for the method and model with the scale-free features of complex network theory based on random graph theory and dynamic network nodes which show a power-law distribution phenomenon. The model is suitable for ecological disturbance by larger ecological landscape Pearl River Delta consistent recovery. Remote sensing and GIS spatial data are available through the latest forest patches. A standard scale-free network node distribution model calculates the area of forest network's power-law distribution parameter value size; The recent existing forest polygons which are defined as nodes can compute the network nodes decaying index value of the network's degree distribution. The parameters of forest network are picked up then make a spatial transition to GIS real world models. Hence the connection is automatically generated by minimizing the ecological corridor by the least cost rule between the near nodes. Based on scale-free network node distribution requirements, select the number compared with less, a huge point of aggregation as a future forest planning network's main node, and put them with the existing node sequence comparison. By this theory, the forest ecological projects in the past avoid being fragmented, scattered disorderly phenomena. The previous regular forest networks can be reduced the required forest planting costs by this method. For ecological restoration of tropical and subtropical in south China areas, it will provide an effective method for the forest entering city project guidance and demonstration with other ecological networks (water, climate network, etc.) for networking a standard and base datum.
Efficient weighting strategy for enhancing synchronizability of complex networks
NASA Astrophysics Data System (ADS)
Wang, Youquan; Yu, Feng; Huang, Shucheng; Tu, Juanjuan; Chen, Yan
2018-04-01
Networks with high propensity to synchronization are desired in many applications ranging from biology to engineering. In general, there are two ways to enhance the synchronizability of a network: link rewiring and/or link weighting. In this paper, we propose a new link weighting strategy based on the concept of the neighborhood subgroup. The neighborhood subgroup of a node i through node j in a network, i.e. Gi→j, means that node u belongs to Gi→j if node u belongs to the first-order neighbors of j (not include i). Our proposed weighting schema used the local and global structural properties of the networks such as the node degree, betweenness centrality and closeness centrality measures. We applied the method on scale-free and Watts-Strogatz networks of different structural properties and show the good performance of the proposed weighting scheme. Furthermore, as model networks cannot capture all essential features of real-world complex networks, we considered a number of undirected and unweighted real-world networks. To the best of our knowledge, the proposed weighting strategy outperformed the previously published weighting methods by enhancing the synchronizability of these real-world networks.
Distributed solar radiation fast dynamic measurement for PV cells
NASA Astrophysics Data System (ADS)
Wan, Xuefen; Yang, Yi; Cui, Jian; Du, Xingjing; Zheng, Tao; Sardar, Muhammad Sohail
2017-10-01
To study the operating characteristics about PV cells, attention must be given to the dynamic behavior of the solar radiation. The dynamic behaviors of annual, monthly, daily and hourly averages of solar radiation have been studied in detail. But faster dynamic behaviors of solar radiation need more researches. The solar radiation random fluctuations in minute-long or second-long range, which lead to alternating radiation and cool down/warm up PV cell frequently, decrease conversion efficiency. Fast dynamic processes of solar radiation are mainly relevant to stochastic moving of clouds. Even in clear sky condition, the solar irradiations show a certain degree of fast variation. To evaluate operating characteristics of PV cells under fast dynamic irradiation, a solar radiation measuring array (SRMA) based on large active area photodiode, LoRa spread spectrum communication and nanoWatt MCU is proposed. This cross photodiodes structure tracks fast stochastic moving of clouds. To compensate response time of pyranometer and reduce system cost, the terminal nodes with low-cost fast-responded large active area photodiode are placed besides positions of tested PV cells. A central node, consists with pyranometer, large active area photodiode, wind detector and host computer, is placed in the center of the central topologies coordinate to scale temporal envelope of solar irradiation and get calibration information between pyranometer and large active area photodiodes. In our SRMA system, the terminal nodes are designed based on Microchip's nanoWatt XLP PIC16F1947. FDS-100 is adopted for large active area photodiode in terminal nodes and host computer. The output current and voltage of each PV cell are monitored by I/V measurement. AS62-T27/SX1278 LoRa communication modules are used for communicating between terminal nodes and host computer. Because the LoRa LPWAN (Low Power Wide Area Network) specification provides seamless interoperability among Smart Things without the need of complex local installations, configuring of our SRMA system is very easy. Lora also provides SRMA a means to overcome the short communication distance and weather signal propagation decline such as in ZigBee and WiFi. The host computer in SRMA system uses the low power single-board PC EMB-3870 which was produced by NORCO. Wind direction sensor SM5386B and wind-force sensor SM5387B are installed to host computer through RS-485 bus for wind reference data collection. And Davis 6450 solar radiation sensor, which is a precision instrument that detects radiation at wavelengths of 300 to 1100 nanometers, allow host computer to follow real-time solar radiation. A LoRa polling scheme is adopt for the communication between host computer and terminal nodes in SRMA. An experimental SRMA has been established. This system was tested in Ganyu, Jiangshu province from May to August, 2016. In the test, the distances between the nodes and the host computer were between 100m and 1900m. At work, SRMA system showed higher reliability. Terminal nodes could follow the instructions from host computer and collect solar radiation data of distributed PV cells effectively. And the host computer managed the SRAM and achieves reference parameters well. Communications between the host computer and terminal nodes were almost unaffected by the weather. In conclusion, the testing results show that SRMA could be a capable method for fast dynamic measuring about solar radiation and related PV cell operating characteristics.
Cervical lymph node diseases in children
Lang, Stephan; Kansy, Benjamin
2014-01-01
The lymph nodes are an essential part of the body’s immune system and as such are affected in many infectious, autoimmune, metabolic and malignant diseases. The cervical lymph nodes are particularly important because they are the first drainage stations for key points of contact with the outside world (mouth/throat/nose/eyes/ears/respiratory system) – a critical aspect especially among children – and can represent an early clinical sign in their exposed position on a child’s slim neck. Involvement of the lymph nodes in multiple conditions is accompanied by a correspondingly large number of available diagnostic procedures. In the interests of time, patient wellbeing and cost, a careful choice of these must be made to permit appropriate treatment. The basis of diagnostic decisions is a detailed anamnesis and clinical examination. Sonography also plays an important role in differential diagnosis of lymph node swelling in children and is useful in answering one of the critical diagnostic questions: is there a suspicion of malignancy? If so, full dissection of the most conspicuous lymph node may be necessary to obtain histological confirmation. Diagnosis and treatment of childhood cervical lymph node disorders present the attending pediatric and ENT physicians with some particular challenges. The spectrum of differential diagnoses and the varying degrees of clinical relevance – from banal infections to malignant diseases – demand a clear and considered approach to the child’s individual clinical presentation. Such an approach is described in the following paper. PMID:25587368
Network geometry inference using common neighbors
NASA Astrophysics Data System (ADS)
Papadopoulos, Fragkiskos; Aldecoa, Rodrigo; Krioukov, Dmitri
2015-08-01
We introduce and explore a method for inferring hidden geometric coordinates of nodes in complex networks based on the number of common neighbors between the nodes. We compare this approach to the HyperMap method, which is based only on the connections (and disconnections) between the nodes, i.e., on the links that the nodes have (or do not have). We find that for high degree nodes, the common-neighbors approach yields a more accurate inference than the link-based method, unless heuristic periodic adjustments (or "correction steps") are used in the latter. The common-neighbors approach is computationally intensive, requiring O (t4) running time to map a network of t nodes, versus O (t3) in the link-based method. But we also develop a hybrid method with O (t3) running time, which combines the common-neighbors and link-based approaches, and we explore a heuristic that reduces its running time further to O (t2) , without significant reduction in the mapping accuracy. We apply this method to the autonomous systems (ASs) Internet, and we reveal how soft communities of ASs evolve over time in the similarity space. We further demonstrate the method's predictive power by forecasting future links between ASs. Taken altogether, our results advance our understanding of how to efficiently and accurately map real networks to their latent geometric spaces, which is an important necessary step toward understanding the laws that govern the dynamics of nodes in these spaces, and the fine-grained dynamics of network connections.
NASA Astrophysics Data System (ADS)
Tsiotas, Dimitrios; Polyzos, Serafeim
2018-02-01
This article studies the topological consistency of spatial networks due to node aggregation, examining the changes captured between different network representations that result from nodes' grouping and they refer to the same socioeconomic system. The main purpose of this study is to evaluate what kind of topological information remains unalterable due to node aggregation and, further, to develop a framework for linking the data of an empirical network with data of its socioeconomic environment, when the latter are available for hierarchically higher levels of aggregation, in an effort to promote the interdisciplinary research in the field of complex network analysis. The research question is empirically tested on topological and socioeconomic data extracted from the Greek Maritime Network (GMN) that is modeled as a non-directed multilayer (bilayer) graph consisting of a port-layer, where nodes represent ports, and a prefecture-layer, where nodes represent coastal and insular prefectural groups of ports. The analysis highlights that the connectivity (degree) of the GMN is the most consistent aspect of this multilayer network, which preserves both the topological and the socioeconomic information through node aggregation. In terms of spatial analysis and regional science, such effects illustrate the effectiveness of the prefectural administrative division for the functionality of the Greek maritime transportation system. Overall, this approach proposes a methodological framework that can enjoy further applications about the grouping effects induced on the network topology, providing physical, technical, socioeconomic, strategic or political insights.
A self-optimizing scheme for energy balanced routing in Wireless Sensor Networks using SensorAnt.
Shamsan Saleh, Ahmed M; Ali, Borhanuddin Mohd; Rasid, Mohd Fadlee A; Ismail, Alyani
2012-01-01
Planning of energy-efficient protocols is critical for Wireless Sensor Networks (WSNs) because of the constraints on the sensor nodes' energy. The routing protocol should be able to provide uniform power dissipation during transmission to the sink node. In this paper, we present a self-optimization scheme for WSNs which is able to utilize and optimize the sensor nodes' resources, especially the batteries, to achieve balanced energy consumption across all sensor nodes. This method is based on the Ant Colony Optimization (ACO) metaheuristic which is adopted to enhance the paths with the best quality function. The assessment of this function depends on multi-criteria metrics such as the minimum residual battery power, hop count and average energy of both route and network. This method also distributes the traffic load of sensor nodes throughout the WSN leading to reduced energy usage, extended network life time and reduced packet loss. Simulation results show that our scheme performs much better than the Energy Efficient Ant-Based Routing (EEABR) in terms of energy consumption, balancing and efficiency.
Time Series Analysis for Spatial Node Selection in Environment Monitoring Sensor Networks
Bhandari, Siddhartha; Jurdak, Raja; Kusy, Branislav
2017-01-01
Wireless sensor networks are widely used in environmental monitoring. The number of sensor nodes to be deployed will vary depending on the desired spatio-temporal resolution. Selecting an optimal number, position and sampling rate for an array of sensor nodes in environmental monitoring is a challenging question. Most of the current solutions are either theoretical or simulation-based where the problems are tackled using random field theory, computational geometry or computer simulations, limiting their specificity to a given sensor deployment. Using an empirical dataset from a mine rehabilitation monitoring sensor network, this work proposes a data-driven approach where co-integrated time series analysis is used to select the number of sensors from a short-term deployment of a larger set of potential node positions. Analyses conducted on temperature time series show 75% of sensors are co-integrated. Using only 25% of the original nodes can generate a complete dataset within a 0.5 °C average error bound. Our data-driven approach to sensor position selection is applicable for spatiotemporal monitoring of spatially correlated environmental parameters to minimize deployment cost without compromising data resolution. PMID:29271880
A Game-Theoretic Response Strategy for Coordinator Attack in Wireless Sensor Networks
Liu, Jianhua; Yue, Guangxue; Shang, Huiliang; Li, Hongjie
2014-01-01
The coordinator is a specific node that controls the whole network and has a significant impact on the performance in cooperative multihop ZigBee wireless sensor networks (ZWSNs). However, the malicious node attacks coordinator nodes in an effort to waste the resources and disrupt the operation of the network. Attacking leads to a failure of one round of communication between the source nodes and destination nodes. Coordinator selection is a technique that can considerably defend against attack and reduce the data delivery delay, and increase network performance of cooperative communications. In this paper, we propose an adaptive coordinator selection algorithm using game and fuzzy logic aiming at both minimizing the average number of hops and maximizing network lifetime. The proposed game model consists of two interrelated formulations: a stochastic game for dynamic defense and a best response policy using evolutionary game formulation for coordinator selection. The stable equilibrium best policy to response defense is obtained from this game model. It is shown that the proposed scheme can improve reliability and save energy during the network lifetime with respect to security. PMID:25105171