首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Diffusive capture processes are known to be an effective method for information search on complex networks. The biased NN lions–lamb model provides quick search time by attracting random walkers to high degree nodes, where most capture events take place. The price of the efficiency is extreme traffic concentration on top hubs. We propose traffic load balancing provided by type specific biased random walks. For that we introduce a multi-type scale-free graph generation model, which embeds homophily structure into the network by utilizing type dependent random walks. We show analytically and with simulations that by augmenting the biased random walk method with a simple type homophily rule, we can alleviate the traffic concentration on high degree nodes by spreading the load proportionally between hubs with different types of our generated multi-type scale-free topologies.  相似文献   

2.
Cun-Lai Pu  Wen-Jiang Pei 《Physica A》2010,389(3):4699-594
In this article, we derive the first passage time (FPT) distribution and the mean first passage time (MFPT) of random walks from multiple sources on networks. On the basis of analysis and simulation, we find that the MFPT drops substantially when particle number increases at the first stage, and converges to the shortest distance between the sources and the destination when particle number tends to infinite. Given the fact that a Brownian particle from a high-degree node often needs a large number of steps to reach an expected low-degree node, which is the bottleneck for a single random walk, we propose a mixing search model to improve the efficiency of search processes by using random walks from multiple sources to continue the searches from high-degree nodes to destinations. We compare our model with the mixing navigation model proposed by Zhou on complex networks and find that our model converges much faster with lower hardware cost than Zhou’s model. Moreover, simulations on scale-free networks show that the search efficiency of our model is much higher than that of a single random walk, and comparable to that of multiple random walks which have much higher hardware cost than our model. Finally, we discuss the traffic cost of our model, and propose an absorption strategy for our model to recover the additional walkers in networks. Simulations indicate that this strategy reduces the traffic cost of our model effectively.  相似文献   

3.
Spreading processes on networks are often analyzed to understand how the outcome of the process (e.g. the number of affected nodes) depends on structural properties of the underlying network. Most available results are ensemble averages over certain interesting graph classes such as random graphs or graphs with a particular degree distributions. In this paper, we focus instead on determining the expected spreading size and the probability of large spreadings for a single (but arbitrary) given network and study the computational complexity of these problems using reductions from well-known network reliability problems. We show that computing both quantities exactly is intractable, but that the expected spreading size can be efficiently approximated with Monte Carlo sampling. When nodes are weighted to reflect their importance, the problem becomes as hard as the s-t reliability problem, which is not known to yield an efficient randomized approximation scheme up to now. Finally, we give a formal complexity-theoretic argument why there is most likely no randomized constant-factor approximation for the probability of large spreadings, even for the unweighted case. A hybrid Monte Carlo sampling algorithm is proposed that resorts to specialized s-t reliability algorithms for accurately estimating the infection probability of those nodes that are rarely affected by the spreading process.  相似文献   

4.
红外无损探测中多宗量多热源反演问题的研究   总被引:1,自引:0,他引:1       下载免费PDF全文
张立广  屈惠明 《物理学报》2015,64(10):108104-108104
为研究红外无损探测稳态多热源反演逆问题, 建立不同形状的均质与非均质稳态热传导模型, 其中内热源个数、位置、强度、面积均为未知项. 基于数值算法中有限元算法对模型进行离散分析, 化简有限元矩阵方程, 最终转化为对Ax = b高度欠定方程的求解. 首次利用分段多项式谱截断奇异值分解法处理内热源逆问题, 并对算法进行改进, 有效改善了该算法在处理多热源反演时存在的严重的热源叠加效应. 根据反演出的内热源信息, 利用有限元算法计算重构出整个模型内所有节点的温度分布. 运用数值仿真Comsol软件和具体实物实验对算法进行有效性评估, 并验证算法在不同热传导模型中的表现. 结果表明, 算法能够准确反演出多热源各参量信息, 在非均质材料模型中仍能准确地反演出热源项, 并有效重构出模型内温度场. 该算法可应用于材料无损检测及人体红外医学成像等领域.  相似文献   

5.
Li Ding 《Physica A》2008,387(12):3008-3016
A critical issue in wireless sensor networks (WSNs) is represented by limited availability of energy within network nodes. Therefore, making good use of energy is necessary in modeling sensor networks. In this paper we proposed a new model of WSNs on a two-dimensional plane using site percolation model, a kind of random graph in which edges are formed only between neighbouring nodes. Then we investigated WSNs connectivity and energy consumption at percolation threshold when a so-called phase transition phenomena happen. Furthermore, we proposed an algorithm to improve the model; as a result the lifetime of networks is prolonged. We analyzed the energy consumption with Markov process and applied these results to simulation.  相似文献   

6.
Latent variable models (LVMs) for neural population spikes have revealed informative low-dimensional dynamics about the neural data and have become powerful tools for analyzing and interpreting neural activity. However, these approaches are unable to determine the neurophysiological meaning of the inferred latent dynamics. On the other hand, emerging evidence suggests that dynamic functional connectivities (DFC) may be responsible for neural activity patterns underlying cognition or behavior. We are interested in studying how DFC are associated with the low-dimensional structure of neural activities. Most existing LVMs are based on a point process and fail to model evolving relationships. In this work, we introduce a dynamic graph as the latent variable and develop a Variational Dynamic Graph Latent Variable Model (VDGLVM), a representation learning model based on the variational information bottleneck framework. VDGLVM utilizes a graph generative model and a graph neural network to capture dynamic communication between nodes that one has no access to from the observed data. The proposed computational model provides guaranteed behavior-decoding performance and improves LVMs by associating the inferred latent dynamics with probable DFC.  相似文献   

7.
Assessing where and how information is stored in biological networks (such as neuronal and genetic networks) is a central task both in neuroscience and in molecular genetics, but most available tools focus on the network’s structure as opposed to its function. Here, we introduce a new information-theoretic tool—information fragmentation analysis—that, given full phenotypic data, allows us to localize information in complex networks, determine how fragmented (across multiple nodes of the network) the information is, and assess the level of encryption of that information. Using information fragmentation matrices we can also create information flow graphs that illustrate how information propagates through these networks. We illustrate the use of this tool by analyzing how artificial brains that evolved in silico solve particular tasks, and show how information fragmentation analysis provides deeper insights into how these brains process information and “think”. The measures of information fragmentation and encryption that result from our methods also quantify complexity of information processing in these networks and how this processing complexity differs between primary exposure to sensory data (early in the lifetime) and later routine processing.  相似文献   

8.
康玲  项冰冰  翟素兰  鲍中奎  张海峰 《物理学报》2018,67(19):198901-198901
复杂网络多影响力节点的识别可以帮助理解网络的结构和功能,具有重要的理论意义和应用价值.本文提出一种基于网络区域密度曲线的多影响力节点的识别方法.应用两种不同的传播模型,在不同网络上与其他中心性指标进行了比较.结果表明,基于区域密度曲线的识别方法能够更好地识别网络中的多影响力节点,选中的影响力节点之间的分布较为分散,自身也比较重要.本文所提方法是基于网络的局部信息,计算的时间复杂度较低.  相似文献   

9.
In this paper we present a novel method to reconstruct global topological properties of a complex network starting from limited information. We assume to know for all the nodes a non-topological quantity that we interpret as fitness. In contrast, we assume to know the degree, i.e. the number of connections, only for a subset of the nodes in the network. We then use a fitness model, calibrated on the subset of nodes for which degrees are known, in order to generate ensembles of networks. Here, we focus on topological properties that are relevant for processes of contagion and distress propagation in networks, i.e. network density and k-core structure, and we study how well these properties can be estimated as a function of the size of the subset of nodes utilized for the calibration. Finally, we also study how well the resilience to distress propagation in the network can be estimated using our method. We perform a first test on ensembles of synthetic networks generated with the Exponential Random Graph model, which allows to apply common tools from statistical mechanics. We then perform a second test on empirical networks taken from economic and financial contexts. In both cases, we find that a subset as small as 10 % of nodes can be enough to estimate the properties of the network along with its resilience with an error of 5 %.  相似文献   

10.
苏臻  高超  李向华 《物理学报》2017,66(12):120201-120201
在众多的重要节点评估方法研究中,具有较高中心性的节点一直是关注的焦点,许多传播行为的研究也主要围绕高中心性节点展开,因此在一定程度上忽略了低中心性节点对传播行为的影响.本文从传播异构性角度,通过初始感染最大中心性节点和最小中心性节点揭示网络结构异构性对信息传播的影响.实验结果表明,传播过程中存在"链型"和"扇型"两种传播模式,在初始感染比例不断提升的情况下,两种传播模式的相互转换引发传播速率的变化,进一步促使非线性传播规模交叉现象的产生.这一现象说明,在宏观的信息传播过程中,最小中心性节点的影响力不容忽视,尤其在初始感染比例升高时,最小中心性节点比最大中心性节点更具传播优势.  相似文献   

11.
The neutrino capture reaction by 131Xe with the threshold of 352 keV is suggested for solar neutrinos detection. The most important feature of this process is its high sensitivity to beryllium neutrinos, that contribute approximately 40% to the total capture rate predicted in the Standard Solar Model (45 SNU). The expected counting rate of the xenon detector from the main solar neutrino sources predicted by the Standard Solar Model is ≈ 1500 events/yr.  相似文献   

12.
The interplay between topology changes and the redistribution of traffic plays a significant role in many real-world networks. In this paper we study how the load of the remaining network changes when nodes are removed. This removal operation can model attacks and errors in networks, or the planned control of network topology. We consider a scenario similar to the data communication networks, and measure the load of a node by its betweenness centrality. By analysis and simulations, we show that when a single node is removed, the change of the remaining network’s load is positively correlated with the degree of the removed node. In multiple-node removal, by comparing several node removal schemes, we show in detail how significantly different the change of the remaining network’s load will be between starting the removal from small degree/betweenness nodes and from large degree/betweenness nodes. Moreover, when starting the removal from small degree/betweenness nodes, we not only observe that the remaining network’s load decreases, which is consistent with previous studies, but also find that the load of hubs keeps decreasing. These results help us to make a deeper understanding about the dynamics after topology changes, and are useful in planned control of network topology.  相似文献   

13.
袁坚  任勇  山秀明 《中国物理》2000,9(9):641-648
Packet flow affects the behavior of Internet routers, which in return regulates the flow. Even a non-correlated uniform packet flow from a terminal will be modulated to show correlated fluctuations by going through the network nodes. In this paper, we study a simple model in an abstract level to describe intuitively the self-organized criticality in packet level, the emergence of collective behavior of packets, which causes the long-range dependence of congestion in computer networks. We find that the character of the jam lifetime is consistent with the measurement results, the packet delivery time appears the feature of 1/f noise, and the intervals between the packet arrivals are power-law distributed.  相似文献   

14.
Development of efficient business process models and determination of their characteristic properties are subject of intense interdisciplinary research. Here, we consider a business process model as a directed graph. Its nodes correspond to the units identified by the modeler and the link direction indicates the causal dependencies between units. It is of primary interest to obtain the stationary flow on such a directed graph, which corresponds to the steady-state of a firm during the business process. Following the ideas developed recently for the World Wide Web, we construct the Google matrix for our business process model and analyze its spectral properties. The importance of nodes is characterized by PageRank and recently proposed CheiRank and 2DRank, respectively. The results show that this two-dimensional ranking gives a significant information about the influence and communication properties of business model units. We argue that the Google matrix method, described here, provides a new efficient tool helping companies to make their decisions on how to evolve in the exceedingly dynamic global market.  相似文献   

15.
Random links between otherwise distant nodes can greatly facilitate the propagation of disease or information, provided contagion can be transmitted by a single active node. However, we show that when the propagation requires simultaneous exposure to multiple sources of activation, called complex propagation, the effect of random links can be just the opposite; it can make the propagation more difficult to achieve. We numerically calculate critical points for a threshold model using several classes of complex networks, including an empirical social network. We also provide an estimation of the critical values in terms of vulnerable nodes.  相似文献   

16.
We present recent results in the field of total binding energy calculations, Landщ factors, quantum electrodynamics corrections and lifetime that are of interest for ion traps and ion sources. We describe in detail MCDF and RMBPT calculation of ionic binding energies, which are needed for the determination of atomic masses from highly charged ion measurements. We also show new results concerning Landщ factor in 3-electron ions. Finally we describe how relativistic calculations can help understand the physics of heavy ion production ion sources. This revised version was published online in July 2006 with corrections to the Cover Date.  相似文献   

17.
郝晓辰  姚宁  汝小月  刘伟静  辛敏洁 《物理学报》2015,64(14):140101-140101
针对无线传感器网络中节点因干扰过大导致重传能耗增加, 进而节点过早失效、网络生命期缩短的问题, 根据网络拓扑信息和路由信息设计节点的负载模型, 从而构建了节点的生命期模型. 然后利用博弈论将路径增益、交叉干扰和节点生命期等性能参数融入到效益函数中, 构建信道分配博弈模型. 理论分析证明该博弈模型存在纳什均衡. 进而运用最佳回应策略, 在所构建的信道分配博弈模型的基础上, 设计了一种优化网络生命期的抗干扰信道分配算法. 该算法使节点在选择信道时避免与网络中交叉干扰较大的节点和生命期较小的节点使用相同信道, 实现干扰小、能耗低且均衡的信道选择. 理论分析与仿真结果证明该算法最终能够快速地收敛到纳什均衡, 且具有较小的信息复杂度, 从而减小算法本身的通信能耗. 同时, 该算法具有良好的抗干扰性和信道均衡性, 能够有效地延长网络生命期.  相似文献   

18.
We investigate the lifetime of two-electron spin states in a few-electron Si/SiGe double dot. At the transition between the (1,1) and (0,2) charge occupations, Pauli spin blockade provides a readout mechanism for the spin state. We use the statistics of repeated single-shot measurements to extract the lifetimes of multiple states simultaneously. When the magnetic field is zero, we find that all three triplet states have equal lifetimes, as expected, and this time is ~10 ms. When the field is nonzero, the T(0) lifetime is unchanged, whereas the T- lifetime increases monotonically with the field, reaching 3 sec at 1 T.  相似文献   

19.
We study the transport properties of model networks such as scale-free and Erd?s-Rényi networks as well as a real network. We consider few possibilities for the trnasport problem. We start by studying the conductance G between two arbitrarily chosen nodes where each link has the same unit resistance. Our theoretical analysis for scale-free networks predicts a broad range of values of G, with a power-law tail distribution $\Phi_{\rm SF}(G)\sim G^{-g_G}$ , where gG=2λ-1, and λ is the decay exponent for the scale-free network degree distribution. The power-law tail in ΦSF(G) leads to large values of G, thereby significantly improving the transport in scale-free networks, compared to Erd?s-Rényi networks where the tail of the conductivity distribution decays exponentially. We develop a simple physical picture of the transport to account for the results. The other model for transport is the max-flow model, where conductance is defined as the number of link-independent paths between the two nodes, and find that a similar picture holds. The effects of distance on the value of conductance are considered for both models, and some differences emerge. We then extend our study to the case of multiple sources ans sinks, where the transport is defined between two groups of nodes. We find a fundamental difference between the two forms of flow when considering the quality of the transport with respect to the number of sources, and find an optimal number of sources, or users, for the max-flow case. A qualitative (and partially quantitative) explanation is also given.  相似文献   

20.
Routing and path selection are crucial for many communication and logistic applications. We study the interaction between nodes and packets and establish a simple model for describing the attraction of the node to the packet in transmission process by using the gravitational field theory, considering the real and potential congestion of the nodes. On the basis of this model, we propose a gravitational field routing strategy that considers the attractions of all of the nodes on the travel path to the packet. In order to illustrate the efficiency of proposed routing algorithm, we introduce the order parameter to measure the throughput of the network by the critical value of phase transition from a free flow phase to a congested phase,and study the distribution of betweenness centrality and traffic jam. Simulations show that, compared with the shortest path routing strategy, the gravitational field routing strategy considerably enhances the throughput of the network and balances the traffic load, and nearly all of the nodes are used efficiently.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号