首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
A. Santiago 《Physica A》2009,388(14):2941-2948
In this paper we present a study of the influence of local affinity in heterogeneous preferential attachment (PA) networks. Heterogeneous PA models are a generalization of the Barabási-Albert model to heterogeneous networks, where the affinity between nodes biases the attachment probability of links. Threshold models are a class of heterogeneous PA models where the affinity between nodes is inversely related to the distance between their states. We propose a generalization of threshold models where network nodes have individual affinity functions, which are then combined to yield the affinity of each potential interaction. We analyze the influence of the affinity functions in the topological properties averaged over a network ensemble. The network topology is evaluated through the distributions of connectivity degrees, clustering coefficients and geodesic distances. We show that the relaxation of the criterion of a single global affinity still leads to a reasonable power-law scaling in the connectivity and clustering distributions under a wide spectrum of assumptions. We also show that the richer behavior of the model often exhibits a better agreement with the empirical observations on real networks.  相似文献   

2.
In this paper we present an analysis of the interplay between kernel nonlinearity and heterogeneity in preferential attachment (PA) based network models. We define an extended class of heterogeneous PA models where the attachment kernel is a nonlinear function of the connectivity degree of the existing network nodes. Like the original class of heterogeneous PA models, the attachment kernel is also biased by the affinity between the states of pairs of nodes involved in a potential interaction. We show that the class of models exhibit four kinetic regimes in their degree connectivities which are robust against the form of heterogeneity and low-level details of the functional form of the attachment kernel.  相似文献   

3.
A. Santiago 《Physica A》2009,388(11):2234-2242
In this paper we study the robustness of heterogeneous preferential attachment networks. The robustness of a network measures its structural tolerance to the random removal of nodes and links. We numerically analyze the influence of the affinity parameters on a set of ensemble-averaged robustness metrics. We show that the presence of heterogeneity does not fundamentally alter the smooth nature of the fragmentation process of the models. We also show that a moderate level of locality translates into slight improvements in the robustness metrics, which prompts us to conjecture an evolutionary argument for the existence of real networks with power-law scaling in their connectivity and clustering distributions.  相似文献   

4.
熊菲  刘云  司夏萌  丁飞 《物理学报》2010,59(10):6889-6895
模拟了Web2.0网络的发展过程并研究其拓扑结构,分析某门户网站实际博客数据的度分布、节点度时间变化,发现与先前的无标度网络模型有所差别.根据真实网络的生长特点,提出了边与节点同时增长的网络模型,包括随机连接及近邻互联的网络构造规则.仿真研究表明,模拟的网络更接近实际,在没有优先连接过程时,模型能得到幂率的度分布;并且网络有更大的聚类系数以及正的度相关性。  相似文献   

5.
We obtain closed form expressions for the expected conditional degree distribution and the joint degree distribution of the linear preferential attachment model for network growth in the steady state. We consider the multiple-destination preferential attachment growth model, where incoming nodes at each timestep attach to β existing nodes, selected by degree-proportional probabilities. By the conditional degree distribution p(?|k), we mean the degree distribution of nodes that are connected to a node of degree k. By the joint degree distribution p(k,?), we mean the proportion of links that connect nodes of degrees k and ?. In addition to this growth model, we consider the shifted-linear preferential growth model and solve for the same quantities, as well as a closed form expression for its steady-state degree distribution.  相似文献   

6.
The Watts-Strogatz algorithm of transferring the square lattice to a small world network is modified by introducing preferential rewiring constrained by connectivity demand. The evolution of the network is two-step: sequential preferential rewiring of edges controlled by p and updating the information about changes done. The evolving system self-organizes into stationary states. The topological transition in the graph structure is noticed with respect to p. Leafy phase – a graph formed by multiple connected vertices (graph skeleton) with plenty of leaves attached to each skeleton vertex emerges when p is small enough to pretend asynchronous evolution. Tangling phase where edges of a graph circulate frequently among low degree vertices occurs when p is large. There exist conditions at which the resulting stationary network ensemble provides networks which degree distribution exhibit power-law decay in large interval of degrees.  相似文献   

7.
Preferential attachment is one possible way to obtain a scale-free network. We develop a self-consistent method to determine whether preferential attachment occurs during the growth of a network, and to extract the preferential attachment rule using time-dependent data. Model networks are grown with known preferential attachment rules to test the method, which is seen to be robust. The method is then applied to a scale-free inherent structure (IS) network, which represents the connections between minima via transition states on a potential energy landscape. Even though this network is static, we can examine the growth of the network as a function of a threshold energy (rather than time), where only those transition states with energies lower than the threshold energy contribute to the network. For these networks we are able to detect the presence of preferential attachment, and this helps to explain the ubiquity of funnels on potential energy landscapes. However, the scale-free degree distribution shows some differences from that of a model network grown using the obtained preferential attachment rules, implying that other factors are also important in the growth process.  相似文献   

8.
Jian-Feng Zheng  Zi-You Gao 《Physica A》2008,387(24):6177-6182
In this paper, we propose a simple weighted network model that generalizes the complex network model evolution with traffic flow previously presented to investigate the relationship between traffic flow and network structure. In the model, the nodes in the network are represented by the traffic flow states, the links in the network are represented by the transform of the traffic flow states, and the traffic flow transported when performing the transform of the traffic flow states is considered as the weight of the link. Several topological features of this generalized weighted model, such as the degree distribution and strength distribution, have been numerically studied. A scaling behavior between the strength and degree sklogk is obtained. By introducing some constraints to the generalized weighted model, we study its subnetworks and find that the scaling behavior between the strength and degree is conserved, though the topology properties are quite sensitive to the constraints.  相似文献   

9.
Assortative/disassortative mixing is an important topological property of a network. A network is called assortative mixing if the nodes in the network tend to connect to their connectivity peers, or disassortative mixing if nodes with low degrees are more likely to connect with high-degree nodes. We have known that biological networks such as protein-protein interaction networks (PPI), gene regulatory networks, and metabolic networks tend to be disassortative. On the other hand, in biological evolution, duplication and divergence are two fundamental processes. In order to make the relationship between the property of disassortative mixing and the two basic biological principles clear and to study the cause of the disassortative mixing property in biological networks, we present a random duplication model and an anti-preference duplication model. Our results show that disassortative mixing networks can be obtained by both kinds of models from uncorrelated initial networks. Moreover, with the growth of the network size, the disassortative mixing property becomes more obvious.  相似文献   

10.
吴佳键  龚凯  王聪  王磊 《物理学报》2018,67(8):88901-088901
如何有效地应对和控制故障在相依网络上的级联扩散避免系统发生结构性破碎,对于相依网络抗毁性研究具有十分重要的理论价值和现实意义.最新的研究提出一种基于相依网络的恢复模型,该模型的基本思想是通过定义共同边界节点,在每轮恢复阶段找出符合条件的共同边界节点并以一定比例实施恢复.当前的做法是按照随机概率进行选择.这种方法虽然简单直观,却没有考虑现实世界中资源成本的有限性和择优恢复的必然性.为此,针对相依网络的恢复模型,本文利用共同边界节点在极大连通网络内外的连接边数计算边界节点的重要性,提出一种基于相连边的择优恢复算法(preferential recovery based on connectivity link,PRCL)算法.利用渗流理论的随机故障模型,通过ER随机网络和无标度网络构建的不同结构相依网络上的级联仿真结果表明,相比随机方法和度数优先以及局域影响力优先的恢复算法,PRCL算法具备恢复能力强、起效时间早且迭代步数少的优势,能够更有效、更及时地遏制故障在网络间的级联扩散,极大地提高了相依网络遭受随机故障时的恢复能力.  相似文献   

11.
基于在线社交网络的信息传播模型   总被引:11,自引:0,他引:11       下载免费PDF全文
张彦超  刘云  张海峰  程辉  熊菲 《物理学报》2011,60(5):50501-050501
本文构造了一个基于在线社交网络的信息传播模型.该模型考虑了节点度和传播机理的影响,结合复杂网络和传染病动力学理论,进一步建立了动力学演化方程组.该方程组刻画了不同类型节点随着时间的演化关系,反映了传播动力学过程受到网络拓扑结构和传播机理的影响.本文模拟了在线社交网络中的信息传播过程,并分析了不同类型节点在网络中的行为规律.仿真结果表明:由于在线社交网络的高度连通性,信息在网络中传播的门槛几乎为零;初始传播节点的度越大,信息越容易在网络中迅速传播;中心节点具有较大的社会影响力;具有不同度数的节点在网络中的变 关键词: 在线社交网络 信息传播 微分方程 传染病动力学  相似文献   

12.
Shudong Li  Lixiang Li  Yixian Yang 《Physica A》2011,390(6):1182-1191
In this paper, we present a novel local-world model of wireless sensor networks (WSN) with two kinds of nodes: sensor nodes and sink nodes, which is different from other models with identical nodes and links. The model balances energy consumption by limiting the connectivity of sink nodes to prolong the life of the network. How the proportion of sink nodes, different energy distribution and the local-world scale would affect the topological structure and network performance are investigated. We find that, using mean-field theory, the degree distribution is obtained as an integral with respect to the proportion of sink nodes and energy distribution. We also show that, the model exhibits a mixed connectivity correlation which is greatly distinct from general networks. Moreover, from the perspective of the efficiency and the average hops for data processing, we find some suitable range of the proportion p of sink nodes would make the network model have optimal performance for data processing.  相似文献   

13.
A maximum entropy (ME) method to generate typical scale-free networks has been recently introduced. We investigate the controllability of ME networks and Barabási–Albert preferential attachment networks. Our experimental results show that ME networks are significantly more easily controlled than BA networks of the same size and the same degree distribution. Moreover, the control profiles are used to provide insight into control properties of both classes of network. We identify and classify the driver nodes and analyze the connectivity of their neighbors. We find that driver nodes in ME networks have fewer mutual neighbors and that their neighbors have lower average degree. We conclude that the properties of the neighbors of driver node sensitively affect the network controllability. Hence, subtle and important structural differences exist between BA networks and typical scale-free networks of the same degree distribution.  相似文献   

14.
In this paper, we propose an evolutionary model for weighted networks by introducing an age-based mutual selection mechanism. Our model generates power-law distributions of degree, weight, and strength, which are confirmed by analytical predictions and are consistent with real observations. The investigation of the relationship between clustering and the connectivity of nodes suggests hierarchical organization in the weighted networks. Furthermore, both assortative and disassortative properties can be naturally obtained by tuning a parameter α, which controls the strength of age-based preferential attachments. Since the age information of nodes is easier to acquire than the degree and strength of nodes, and almost all empirically observed structural and weighted properties can be reproduced by the simple evolutionary regulation, our model may reveal some underlying mechanisms that are key for the evolution of weighted complex networks.  相似文献   

15.
Temporal effects in the growth of networks   总被引:1,自引:0,他引:1  
We show that to explain the growth of the citation network by preferential attachment (PA), one has to accept that individual nodes exhibit heterogeneous fitness values that decay with time. While previous PA-based models assumed either heterogeneity or decay in isolation, we propose a simple analytically treatable model that combines these two factors. Depending on the input assumptions, the resulting degree distribution shows an exponential, log-normal or power-law decay, which makes the model an apt candidate for modeling a wide range of real systems.  相似文献   

16.
《Physical Communication》2008,1(2):134-145
Applications for wireless sensor networks require widespread, highly reliable communications even in the face of adversarial influences. Maintaining connectivity and secure communications between entities are vital networking properties towards ensuring the successful and accurate completion of desired sensing tasks. We examine the required communication range for nodes in a wireless sensor network with respect to several parameters. Network properties such as key predistribution schemes and node compromise attacks are modelled with several network parameters and studied in terms of how they influence global network connectivity. These networks are physically vulnerable to malicious behavior by way of node compromise attacks that may affect global connectivity. We introduce a metric that determines the resilience of a network employing a key predistribution scheme with respect to node compromise attacks. In this work,we provide the first study of global network connectivity and its relationship to node compromise attacks. Existing work considers the relationship between the probability of node compromise and the probability of link compromise and the relationship of the probability of secure link establishment and overall network connectivity for the Erdős network model. Here, we present novel work which combines these two relationships to study the relationship between node compromise attacks and global network connectivity. Our analysis is performed with regard to large-scale networks; however, we provide simulation results for both large-scale and small-scale networks. First, we derive a single expression to determine the required communication radius for wireless sensor networks to include the effects of key predistribution schemes. From this, we derive an expression for determining required communication range after an adversary has compromised a fraction of the nodes in the network. The required communication range represents the resource usage of nodes in a network to cope with key distribution schemes and node compromise attacks. We introduce the Resiliency-Connectivity metric, which measures the resilience of a network in expending its resources to provide global connectivity in adverse situations.  相似文献   

17.
In this paper we study the degree distribution and the two-node degree correlations in growing networks generated via a general linear preferential attachment of new nodes together with a uniformly random deletion of nodes. By using a continuum approach we show that, under some suitable combinations of parameters (deletion rate and node attractiveness), the degree distribution not only loses its scale-free character but can even be supported on a small range of degrees. Moreover, we obtain new results on two-vertex degree correlations showing that, for degree distributions with finite variance, such correlations can change under a nonselective removal of nodes.  相似文献   

18.
虚拟社区网络的演化过程研究   总被引:4,自引:0,他引:4       下载免费PDF全文
张立  刘云 《物理学报》2008,57(9):5419-5424
模拟了虚拟社区网络的演化过程并研究其拓扑结构.发现虚拟社区网络在演化过程中,节点的加入、边的加入、网络中度分布、节点的度与其加入网络时间的关系、平均度随时间的变化等方面与传统的无标度网络有所不符.根据国内某论坛的实际网络数据统计与分析,提出了虚拟社区网络的演化机理——虚拟社区网络构造算法.仿真结果表明,模拟以互联网论坛为代表的虚拟社区网络时,该模型能够得到与真实网络相符的特性. 关键词: 复杂网络 虚拟社区 无标度网络  相似文献   

19.
T. Ochiai  J.C. Nacher 《Physica A》2009,388(23):4887-4892
In this work, we first formulate the Tsallis entropy in the context of complex networks. We then propose a network construction whose topology maximizes the Tsallis entropy. The growing network model has two main ingredients: copy process and random attachment mechanism (C-R model). We show that the resulting degree distribution exactly agrees with the required degree distribution that maximizes the Tsallis entropy. We also provide another example of network model using a combination of preferential and random attachment mechanisms (P-R model) and compare it with the distribution of the Tsallis entropy. In this case, we show that by adequately identifying the exponent factor q, the degree distribution can also be written in the q-exponential form. Taken together, our findings suggest that both mechanisms, copy process and preferential attachment, play a key role for the realization of networks with maximum Tsallis entropy. Finally, we discuss the interpretation of q parameter of the Tsallis entropy in the context of complex networks.  相似文献   

20.
We investigate the statistics of the most connected node in scale-free networks. For a scale-free network model with homogeneous nodes, we show by means of extensive simulations that the exponential truncation, due to the finite size of the network, of the degree distribution governs the scaling of the extreme values and that the distribution of maxima follows the Gumbel statistics. For a scale-free network model with heterogeneous nodes, we show that scaling no longer holds and that the truncation of the degree distribution no longer controls the maxima distribution.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号