首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
Systems of dynamical elements exhibiting spontaneous rhythms are found in various fields of science and engineering, including physics, chemistry, biology, physiology, and mechanical and electrical engineering. Such dynamical elements are often modelled as nonlinear limit-cycle oscillators. In this article, we briefly review phase reduction theory, which is a simple and powerful method for analysing the synchronisation properties of limit-cycle oscillators exhibiting rhythmic dynamics. Through phase reduction theory, we can systematically simplify the nonlinear multi-dimensional differential equations describing a limit-cycle oscillator to a one-dimensional phase equation, which is much easier to analyse. Classical applications of this theory, i.e. the phase locking of an oscillator to a periodic external forcing and the mutual synchronisation of interacting oscillators, are explained. Further, more recent applications of this theory to the synchronisation of non-interacting oscillators induced by common noise and the dynamics of coupled oscillators on complex networks are discussed. We also comment on some recent advances in phase reduction theory for noise-driven oscillators and rhythmic spatiotemporal patterns.  相似文献   

2.
We use the phase space position-velocity (x, v) to deal with the statistical properties of velocity dependent dynamical systems, like dissipative ones. Within this approach, we study the statistical properties of an ensemble of harmonic oscillators in a linear weak dissipative media. Using the Debye model of a crystal, we calculate at first order in the dissipative parameter the entropy, free energy, internal energy, equation of state and specific heat using the classical and quantum approaches. For the classical approach we found that the entropy, the equation of state, and the free energy depend on the dissipative parameter, but the internal energy and specific heat do not depend of it. For the quantum case, we found that all the thermodynamical quantities depend on this parameter. PACS: 05.20.Gg, 05.30.Ch, 05.20.-y, 05.30.-d  相似文献   

3.
We have sought to work with an approach to Noether symmetry analysis which uses the properties of infinitesimal point transformations in the space-time (q, t) variable to establish the association between symmetries and conservation laws of a dynamical system. In this approach symmetries are expressed in the form of generators. We have studied the variational or Noether symmetries of two uncoupled Harmonic oscillators and two such oscillators coupled by an interaction. Both these systems can have alternative Lagrangian representations. We have studied in detail how the association between symmetries and conservation laws changes as one alters the analytic or Lagrangian representation. This analysis is carried out with a view to explicitly demonstrate that the correlation between symmetry transformation and corresponding invariant quantity depends crucially on the choice of the analytic representation. PACS 45.20.Jj, 45.20.df, 45.20.dh  相似文献   

4.
Most networks found in social and biochemical systems have modular structures. An important question prompted by the modularity of these networks is whether nodes can be said to belong to a single group. If they cannot, we would need to consider the role of “overlapping communities.” Despite some efforts in this direction, the problem of detecting overlapping groups remains unsolved because there is neither a formal definition of overlapping community, nor an ensemble of networks with which to test the performance of group detection algorithms when nodes can belong to more than one group. Here, we introduce an ensemble of networks with overlapping groups. We then apply three group identification methods – modularity maximization, k-clique percolation, and modularity-landscape surveying – to these networks. We find that the modularity-landscape surveying method is the only one able to detect heterogeneities in node memberships, and that those heterogeneities are only detectable when the overlap is small. Surprisingly, we find that the k-clique percolation method is unable to detect node membership for the overlapping case.  相似文献   

5.
We construct complex networks from lévy noise (LN) using visibility algorithm proposed by Lucas lacasa el al. It is found that as the stability index α of the symmetric LN decreases, the corresponding complex network will transit from exponential network to long-tailed-degree-distribution one, and then to Gaussian one. The associated network for symmetric LN is the high clustering, hierarchy, and 18 community network. The properties of the associated networks for asymmetric LN except the skewness parameter β = −1 are similar with that for symmetric one. The associated network for the asymmetric LN with the skewness parameter β = −1 is always the exponential, high clustering, and hierarchy one with small k-clique communities.  相似文献   

6.
Xiaohua Wang  Licheng Jiao 《Physica A》2009,388(24):5045-5056
The investigation of community structures is one of the most important problems in the field of complex networks and has countless applications in different disciplines: biology, computer, social sciences, etc. Many community detection algorithms have been developed in various fields recently. The vast majority of these algorithms only find disjoint communities; however, in many real-world networks communities often overlap to some extent. In this paper, we propose an efficient method for adjusting these classical algorithms to match the requirement for discovering overlapping communities in complex networks, which is based on a local definition of community strength. The method can in principle be applied with any clustering algorithm. Tests on a set of computer generated and real-world networks give excellent results. In particular, we show that the method can also allow one to availably analyze the problem of unstable nodes in community detection, which is very helpful for understanding the structural properties of the networks correctly and comprehensively.  相似文献   

7.
Soft-constraint affinity propagation (SCAP) is a new statistical-physics based clustering technique [M. Leone, Sumedha, M. Weigt, Bioinformatics 23, 2708 (2007)]. First we give the derivation of a simplified version of the algorithm and discuss possibilities of time- and memory-efficient implementations. Later we give a detailed analysis of the performance of SCAP on artificial data, showing that the algorithm efficiently unveils clustered and hierarchical data structures. We generalize the algorithm to the problem of semi-supervised clustering, where data are already partially labeled, and clustering assigns labels to previously unlabeled points. SCAP uses both the geometrical organization of the data and the available labels assigned to few points in a computationally efficient way, as is shown on artificial and biological benchmark data.  相似文献   

8.
Recently, several complex network approaches to time series analysis have been developed and applied to study a wide range of model systems as well as real-world data, e.g., geophysical or financial time series. Among these techniques, recurrence-based concepts and prominently ε-recurrence networks, most faithfully represent the geometrical fine structure of the attractors underlying chaotic (and less interestingly non-chaotic) time series. In this paper we demonstrate that the well known graph theoretical properties local clustering coefficient and global (network) transitivity can meaningfully be exploited to define two new local and two new global measures of dimension in phase space: local upper and lower clustering dimension as well as global upper and lower transitivity dimension. Rigorous analytical as well as numerical results for self-similar sets and simple chaotic model systems suggest that these measures are well-behaved in most non-pathological situations and that they can be estimated reasonably well using ε-recurrence networks constructed from relatively short time series. Moreover, we study the relationship between clustering and transitivity dimensions on the one hand, and traditional measures like pointwise dimension or local Lyapunov dimension on the other hand. We also provide further evidence that the local clustering coefficients, or equivalently the local clustering dimensions, are useful for identifying unstable periodic orbits and other dynamically invariant objects from time series. Our results demonstrate that ε-recurrence networks exhibit an important link between dynamical systems and graph theory.  相似文献   

9.
高忠科  金宁德 《物理学报》2008,57(11):6909-6920
利用气液两相流电导波动信号构建了流型复杂网络. 基于K均值聚类的社团探寻算法对该网络的社团结构进行了分析,发现该网络存在分别对应于泡状流、段塞流及混状流的三个社团,并且两个社团间联系紧密的点分别对应于相应的过渡流型. 基于复杂网络理论从全新的角度探讨了两相流流型复杂网络社团结构及统计特性问题,并取得了满意的流型识别效果,与此同时,在对该网络特性进一步分析的基础上,发现了对两相流流动参数变化敏感的相关复杂网络统计量,为更好地理解两相流流型动力学特性提供了参考. 关键词: 两相流流型 复杂网络 社团探寻算法 网络统计特性  相似文献   

10.
Dynamical evolution of clustering in complex network of earthquakes   总被引:1,自引:0,他引:1  
The network approach plays a distinguished role in contemporary science of complex systems/phenomena. Such an approach has been introduced into seismology in a recent work [S. Abe, N. Suzuki, Europhys. Lett. 65, 581 (2004)]. Here, we discuss the dynamical property of the earthquake network constructed in California and report the discovery that the values of the clustering coefficient remain stationary before main shocks, suddenly jump up at the main shocks, and then slowly decay following a power law to become stationary again. Thus, the dynamical network approach characterizes main shocks in a peculiar manner.  相似文献   

11.
We interpret measurements of the Reynolds number dependence of the torque in Taylor-Couette flow by Lewis and Swinney [Phys. Rev. E 59, 5457 (1999)] and of the pressure drop in pipe flow by Smits and Zagarola [Phys. Fluids 10, 1045 (1998)] within the scaling theory of Grossmann and Lohse [J. Fluid Mech. 407, 27 (2000)], developed in the context of thermal convection. The main idea is to split the energy dissipation into contributions from a boundary layer and the turbulent bulk. This ansatz can account for the observed scaling in both cases if it is assumed that the internal wind velocity introduced through the rotational or pressure forcing is related to the external (imposed) velocity U, by with and for the Taylor-Couette (U inner cylinder velocity) and pipe flow (U mean flow velocity) case, respectively. In contrast to the Rayleigh-Bénard case the scaling exponents cannot (yet) be derived from the dynamical equations. Received 9 September 2000  相似文献   

12.
Many natural and engineered complex networks have intricate mesoscopic organization, e.g., the clustering of the constituent nodes into several communities or modules. Often, such modularity is manifested at several different hierarchical levels, where the clusters defined at one level appear as elementary entities at the next higher level. Using a simple model of a hierarchical modular network, we show that such a topological structure gives rise to characteristic time-scale separation between dynamics occurring at different levels of the hierarchy. This generalizes our earlier result for simple modular networks, where fast intramodular and slow intermodular processes were clearly distinguished. Investigating the process of synchronization of oscillators in a hierarchical modular network, we show the existence of as many distinct time-scales as there are hierarchical levels in the system. This suggests a possible functional role of such mesoscopic organization principle in natural systems, viz., in the dynamical separation of events occurring at different spatial scales.  相似文献   

13.
The thermal efficiency of the kinesin cycle at stalling is presently a matter of some debate, with published predictions ranging from 0 [Phys. Rev. Lett. 99, 158102 (2007); Phys. Rev. E 78, 011915 (2008)] to 100% [in Molecular Motors, edited by M. Schliwa (Wiley-VCH Verlag GmbH, Weinheim (2003), p. 207]. In this note we attemp to clarify the issues involved. We also find an upper bound on the kinesin efficiency by constructing an ideal kinesin cycle to which the real cycle may be compared. The ideal cycle has a thermal efficiency of less than one, and the real one is less efficient than the ideal one always, in compliance with Carnot’s theorem.  相似文献   

14.
In many networks, it is of great interest to identify communities, unusually densely knit groups of individuals. Such communities often shed light on the function of the networks or underlying properties of the individuals. Recently, Newman suggested modularity as a natural measure of the quality of a network partitioning into communities. Since then, various algorithms have been proposed for (approximately) maximizing the modularity of the partitioning determined. In this paper, we introduce the technique of rounding mathematical programs to the problem of modularity maximization, presenting two novel algorithms. More specifically, the algorithms round solutions to linear and vector programs. Importantly, the linear programing algorithm comes with an a posteriori approximation guarantee: by comparing the solution quality to the fractional solution of the linear program, a bound on the available “room for improvement” can be obtained. The vector programming algorithm provides a similar bound for the best partition into two communities. We evaluate both algorithms using experiments on several standard test cases for network partitioning algorithms, and find that they perform comparably or better than past algorithms, while being more efficient than exhaustive techniques.  相似文献   

15.
A simple system composed of electronic oscillators capable of emitting and detecting light-pulses is studied. The oscillators are biologically inspired, there are designed for keeping a desired light intensity, W, in the system. From another perspective, the system behaves like modified integrate and fire type neurons that are pulse-coupled with inhibitory type interactions: the firing of one oscillator delays the firing of all the others. Experimental and computational studies reveal that although no direct driving force favoring synchronization is considered, for a given interval of W phase-locking appears. This weak synchronization is sometimes accompanied by complex dynamical patterns in the flashing sequence of the oscillators.  相似文献   

16.
韦笃取  罗晓曙  张波 《中国物理 B》2011,20(12):128903-128903
We investigate how dynamical behaviours of complex motor networks depend on the Newman-Watts small-world (NWSW) connections. Network elements are described by the permanent magnet synchronous motor (PMSM) with the values of parameters at which each individual PMSM is stable. It is found that with the increase of connection probability p, the motor in networks becomes periodic and falls into chaotic motion as p further increases. These phenomena imply that NWSW connections can induce and enhance chaos in motor networks. The possible mechanism behind the action of NWSW connections is addressed based on stability theory.  相似文献   

17.
Systems of globally coupled logistic maps (GCLM) can display complex collective behaviour characterized by the formation of synchronous clusters. In the dynamical clustering regime, such systems possess a large number of coexisting attractors and might be viewed as dynamical glasses. Glass properties of GCLM in the thermodynamical limit of large system sizes N are investigated. Replicas, representing orbits that start from various initial conditions, are introduced and distributions of their overlaps are numerically determined. We show that for fixed-field ensembles of initial conditions all attractors of the system become identical in the thermodynamical limit up to variations of order 1/, and thus replica symmetry is recovered for N→∞. In contrast to this, when fluctuating-field ensembles of initial conditions are chosen, replica symmetry remains broken in the thermodynamical limit. Received 9 July 2001  相似文献   

18.
Some MIT researchers [Phys. Rev. A 75, 042327 (2007)] have recently claimed that their implementation of the Slutsky-Brandt attack [Phys. Rev. A 57, 2383 (1998); Phys. Rev. A 71, 042312 (2005)] to the BB84 quantum-key-distribution (QKD) protocol puts the security of this protocol “to the test” by simulating “the most powerful individual-photon attack” [Phys. Rev. A 73, 012315 (2006)]. A related unfortunate news feature by a scientific journal [G. Brumfiel, Quantum cryptography is hacked, News @ Nature (april 2007); Nature 447, 372 (2007)] has spurred some concern in the QKD community and among the general public by misinterpreting the implications of this work. The present article proves the existence of a stronger individual attack on QKD protocols with encrypted error correction, for which tight bounds are shown, and clarifies why the claims of the news feature incorrectly suggest a contradiction with the established “old-style” theory of BB84 individual attacks. The full implementation of a quantum cryptographic protocol includes a reconciliation and a privacy-amplification stage, whose choice alters in general both the maximum extractable secret and the optimal eavesdropping attack. The authors of [Phys. Rev. A 75, 042327 (2007)] are concerned only with the error-free part of the so-called sifted string, and do not consider faulty bits, which, in the version of their protocol, are discarded. When using the provably superior reconciliation approach of encrypted error correction (instead of error discard), the Slutsky-Brandt attack is no more optimal and does not “threaten” the security bound derived by Lütkenhaus [Phys. Rev. A 59, 3301 (1999)]. It is shown that the method of Slutsky and collaborators [Phys. Rev. A 57, 2383 (1998)] can be adapted to reconciliation with error correction, and that the optimal entangling probe can be explicitly found. Moreover, this attack fills Lütkenhaus bound, proving that it is tight (a fact which was not previously known).  相似文献   

19.
Mu Chen  Peng Xu  Jun Chen 《Physica A》2007,385(2):707-717
We introduce a new simple pseudo tree-like network model, deterministic complex network (DCN). The proposed DCN model may simulate the hierarchical structure nature of real networks appropriately and have the unique property of ‘skipping the levels’, which is ubiquitous in social networks. Our results indicate that the DCN model has a rather small average path length and large clustering coefficient, leading to the small-world effect. Strikingly, our DCN model obeys a discrete power-law degree distribution P(k)∝kγ, with exponent γ approaching 1.0. We also discover that the relationship between the clustering coefficient and degree follows the scaling law C(k)∼k−1, which quantitatively determines the DCN's hierarchical structure.  相似文献   

20.
We apply a semiclassical approach to express finite temperature dynamical correlation functions of gapped spin models analytically. We show that the approach of [á. Rapp, G. Zaránd, Phys. Rev. B 74, 014433 (2006)] can also be used for the S = 1 antiferromagnetic Heisenberg chain, whose lineshape can be measured experimentally. We generalize our calculations to O(N) quantum spin models and the sine-Gordon model in one dimension, and show that in all these models, the finite temperature decay of certain correlation functions is characterized by the same universal semiclassical relaxation function.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号