首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
We study the property of certain complex networks of being both sparse and highly connected, which is known as “good expansion” (GE). A network has GE properties if every subset S of nodes (up to 50% of the nodes) has a neighborhood that is larger than some “expansion factor” φ multiplied by the number of nodes in S. Using a graph spectral method we introduce here a new parameter measuring the good expansion character of a network. By means of this parameter we are able to classify 51 real-world complex networks — technological, biological, informational, biological and social — as GENs or non-GENs. Combining GE properties and node degree distribution (DD) we classify these complex networks in four different groups, which have different resilience to intentional attacks against their nodes. The simultaneous existence of GE properties and uniform degree distribution contribute significantly to the robustness in complex networks. These features appear solely in 14% of the 51 real-world networks studied here. At the other extreme we find that ∼40% of all networks are very vulnerable to targeted attacks. They lack GE properties, display skewed DD — exponential or power-law — and their topologies are changed more dramatically by targeted attacks directed at bottlenecks than by the removal of network hubs.  相似文献   

2.
Maximum entropy network ensembles have been very successful in modelling sparse network topologies and in solving challenging inference problems. However the sparse maximum entropy network models proposed so far have fixed number of nodes and are typically not exchangeable. Here we consider hierarchical models for exchangeable networks in the sparse limit, i.e., with the total number of links scaling linearly with the total number of nodes. The approach is grand canonical, i.e., the number of nodes of the network is not fixed a priori: it is finite but can be arbitrarily large. In this way the grand canonical network ensembles circumvent the difficulties in treating infinite sparse exchangeable networks which according to the Aldous-Hoover theorem must vanish. The approach can treat networks with given degree distribution or networks with given distribution of latent variables. When only a subgraph induced by a subset of nodes is known, this model allows a Bayesian estimation of the network size and the degree sequence (or the sequence of latent variables) of the entire network which can be used for network reconstruction.  相似文献   

3.
It has been shown that synchronizability of a network is determined by the local structure rather than the global properties. With the same global properties, networks may have very different synchronizability. In this paper, we numerically studied, through the spectral properties, the synchronizability of ensembles of networks with prescribed statistical properties. Given a degree sequence, it is found that the eigenvalues and eigenratios characterizing network synchronizability have well-defined distributions, and statistically, the networks with extremely poor synchronizability are rare. Moreover, we compared the synchronizability of three network ensembles that have the same nodes and average degree. Our work reveals that the synchronizability of a network can be significantly affected by the local pattern of connections, and the homogeneity of degree can greatly enhance network synchronizability for networks of a random nature.  相似文献   

4.
《Physical Communication》2008,1(2):134-145
Applications for wireless sensor networks require widespread, highly reliable communications even in the face of adversarial influences. Maintaining connectivity and secure communications between entities are vital networking properties towards ensuring the successful and accurate completion of desired sensing tasks. We examine the required communication range for nodes in a wireless sensor network with respect to several parameters. Network properties such as key predistribution schemes and node compromise attacks are modelled with several network parameters and studied in terms of how they influence global network connectivity. These networks are physically vulnerable to malicious behavior by way of node compromise attacks that may affect global connectivity. We introduce a metric that determines the resilience of a network employing a key predistribution scheme with respect to node compromise attacks. In this work,we provide the first study of global network connectivity and its relationship to node compromise attacks. Existing work considers the relationship between the probability of node compromise and the probability of link compromise and the relationship of the probability of secure link establishment and overall network connectivity for the Erdős network model. Here, we present novel work which combines these two relationships to study the relationship between node compromise attacks and global network connectivity. Our analysis is performed with regard to large-scale networks; however, we provide simulation results for both large-scale and small-scale networks. First, we derive a single expression to determine the required communication radius for wireless sensor networks to include the effects of key predistribution schemes. From this, we derive an expression for determining required communication range after an adversary has compromised a fraction of the nodes in the network. The required communication range represents the resource usage of nodes in a network to cope with key distribution schemes and node compromise attacks. We introduce the Resiliency-Connectivity metric, which measures the resilience of a network in expending its resources to provide global connectivity in adverse situations.  相似文献   

5.
Transport properties of a complex network can be reflected by the two-point resistance between any pair of two nodes. We systematically investigate a variety of typical complex networks encountered in nature and technology, in which we assume each link has unit resistance, and we find for non-sparse network connections a universal relation exists that the two-point resistance is equal to the sum of the inverse degree of two nodes up to a constant. We interpret our observations by the localization property of the network's Laplacian eigenvectors. The findings in this work can possibly be applied to probe transport properties of general non-sparse complex networks.  相似文献   

6.
In this Letter we study networks that have been optimized to realize a trade-off between communication efficiency and dynamical resilience. While the first is related to the average shortest pathlength, we argue that the second can be measured by the largest eigenvalue of the adjacency matrix of the network. Best efficiency is realized in star-like configurations, while enhanced resilience is related to the avoidance of short loops and degree homogeneity. Thus crucially, very efficient networks are not resilient while very resilient networks lack in efficiency. Networks that realize a trade-off between both limiting cases exhibit core-periphery structures, where the average degree of core nodes decreases but core size increases as the weight is gradually shifted from a strong requirement for efficiency and limited resilience towards a smaller requirement for efficiency and a strong demand for resilience. We argue that both, efficiency and resilience are important requirements for network design and highlight how networks can be constructed that allow for both.  相似文献   

7.
吴佳键  龚凯  王聪  王磊 《物理学报》2018,67(8):88901-088901
如何有效地应对和控制故障在相依网络上的级联扩散避免系统发生结构性破碎,对于相依网络抗毁性研究具有十分重要的理论价值和现实意义.最新的研究提出一种基于相依网络的恢复模型,该模型的基本思想是通过定义共同边界节点,在每轮恢复阶段找出符合条件的共同边界节点并以一定比例实施恢复.当前的做法是按照随机概率进行选择.这种方法虽然简单直观,却没有考虑现实世界中资源成本的有限性和择优恢复的必然性.为此,针对相依网络的恢复模型,本文利用共同边界节点在极大连通网络内外的连接边数计算边界节点的重要性,提出一种基于相连边的择优恢复算法(preferential recovery based on connectivity link,PRCL)算法.利用渗流理论的随机故障模型,通过ER随机网络和无标度网络构建的不同结构相依网络上的级联仿真结果表明,相比随机方法和度数优先以及局域影响力优先的恢复算法,PRCL算法具备恢复能力强、起效时间早且迭代步数少的优势,能够更有效、更及时地遏制故障在网络间的级联扩散,极大地提高了相依网络遭受随机故障时的恢复能力.  相似文献   

8.
《Physica A》2006,368(2):607-614
Network's resilience to the malfunction of its components has been of great concern. The goal of this work is to determine the network design guidelines, which maximizes the network efficiency while keeping the cost of the network (that is the average connectivity) constant. With a global optimization method, memory tabu search (MTS), we get the optimal network structure with the approximately best efficiency. We analyze the statistical characters of the network and find that a network with a small quantity of hub nodes, high degree of clustering may be much more resilient to perturbations than a random network and the optimal network is one kind of highly heterogeneous networks. The results strongly suggest that networks with higher efficiency are more robust to random failures. In addition, we propose a simple model to describe the statistical properties of the optimal network and investigate the synchronizability of this model.  相似文献   

9.
Scale-free network growth by ranking   总被引:2,自引:0,他引:2  
Network growth is currently explained through mechanisms that rely on node prestige measures, such as degree or fitness. In many real networks, those who create and connect nodes do not know the prestige values of existing nodes but only their ranking by prestige. We propose a criterion of network growth that explicitly relies on the ranking of the nodes according to any prestige measure, be it topological or not. The resulting network has a scale-free degree distribution when the probability to link a target node is any power-law function of its rank, even when one has only partial information of node ranks. Our criterion may explain the frequency and robustness of scale-free degree distributions in real networks, as illustrated by the special case of the Web graph.  相似文献   

10.
A new family of networks, called entangled, has recently been proposed in the literature. These networks have optimal properties in terms of synchronization, robustness against errors and attacks, and efficient communication. They are built with an algorithm which uses modified simulated annealing to enhance a well-known measure of networks’ ability to reach synchronization among nodes. In this work, we suggest that a class of networks similar to entangled networks can be produced by changing some of the connections in a given network, or by just adding a few connections. We call this class of networks weak-entangled. Although entangled networks can be considered as a subset of weak-entangled networks, we show that both classes share similar properties, especially with respect to synchronization and robustness, and that they have similar structural properties.  相似文献   

11.
We present a comparative network-theoretic analysis of the two largest global transportation networks: the worldwide air-transportation network (WAN) and the global cargo-ship network (GCSN). We show that both networks exhibit surprising statistical similarities despite significant differences in topology and connectivity. Both networks exhibit a discontinuity in node and link betweenness distributions which implies that these networks naturally segregate into two different classes of nodes and links. We introduce a technique based on effective distances, shortest paths and shortest path trees for strongly weighted symmetric networks and show that in a shortest path tree representation the most significant features of both networks can be readily seen. We show that effective shortest path distance, unlike conventional geographic distance measures, strongly correlates with node centrality measures. Using the new technique we show that network resilience can be investigated more precisely than with contemporary techniques that are based on percolation theory. We extract a functional relationship between node characteristics and resilience to network disruption. Finally we discuss the results, their implications and conclude that dynamic processes that evolve on both networks are expected to share universal dynamic characteristics.  相似文献   

12.
Rumor propagation is a typical form of social communication and plays a significant role in social life. In this paper, we studied the process of rumor propagation by accounting for the mechanism of forgetting in Barrat–Barthelemy–Vespignani (BBV) networks. First, we derived mean-field equations for rumor propagation based on the strength of the nodes in the propagation network. We then analyzed the stability of the model to determine whether a propagation threshold existed in the BBV networks. We also conducted numerical simulations of the BBV networks and found that rumors propagate more slowly in BBV networks than in unweighted networks. The numerical simulation results also demonstrated that as the forgetting rate increases, the rumor’s influence decreases in both BBV networks and unweighted networks. Finally, the simulation results confirmed that a threshold exists for rumor propagation in BBV networks, but that it was independent of the value of the stifling rate.  相似文献   

13.
Evolution of canalizing Boolean networks   总被引:1,自引:0,他引:1  
Boolean networks with canalizing functions are used to model gene regulatory networks. In order to learn how such networks may behave under evolutionary forces, we simulate the evolution of a single Boolean network by means of an adaptive walk, which allows us to explore the fitness landscape. Mutations change the connections and the functions of the nodes. Our fitness criterion is the robustness of the dynamical attractors against small perturbations. We find that with this fitness criterion the global maximum is always reached and that there is a huge neutral space of 100% fitness. Furthermore, in spite of having such a high degree of robustness, the evolved networks still share many features with “chaotic” networks.  相似文献   

14.
We consider the use of random linear network coding in lossy packet networks. In particular, we consider the following simple strategy: nodes store the packets that they receive and, whenever they have a transmission opportunity, they send out coded packets formed from random linear combinations of stored packets. In such a strategy, intermediate nodes perform additional coding yet do not decode nor wait for a block of packets before sending out coded packets. Moreover, all coding and decoding operations have polynomial complexity.We show that, provided packet headers can be used to carry an amount of side-information that grows arbitrarily large (but independently of payload size), random linear network coding achieves packet-level capacity for both single unicast and single multicast connections and for both wireline and wireless networks. This result holds as long as packets received on links arrive according to processes that have average rates. Thus packet losses on links may exhibit correlations in time or with losses on other links. In the special case of Poisson traffic with i.i.d. losses, we give error exponents that quantify the rate of decay of the probability of error with coding delay. Our analysis of random linear network coding shows not only that it achieves packet-level capacity, but also that the propagation of packets carrying “innovative” information follows the propagation of jobs through a queueing network, thus implying that fluid flow models yield good approximations.  相似文献   

15.
邢琦彬  张元标  梁志宁  张帆 《中国物理 B》2011,20(12):120201-37
We study the dynamics of an epidemic-like model for the spread of a rumor on a connecting multi-small-world-network (CM-SWN) model, which represents organizational communication in the real world. It has been shown that this model exhibits a transition between regimes of localization and propagation at a finite value of network randomness. Here, by numerical means, we perform a quantitative characterization of the evolution in the three groups under two evolution rules, namely the conformity and obeying principles. The variant of a dynamic CM-SWN, where the quenched disorder of small-world networks is replaced by randomly changing connections between individuals in a single network and stable connection by star nodes between networks, is also analysed in detail and compared with a mean-field approximation.  相似文献   

16.
17.
We study the dynamics of an epidemic-like model for the spread of a rumor on a connecting multi-small-world-network (CM-SWN) model, which represents organizational communication in the real world. It has been shown that this model exhibits a transition between regimes of localization and propagation at a finite value of network randomness. Here, by numerical means, we perform a quantitative characterization of the evolution in the three groups under two evolution rules, namely the conformity and obeying principles. The variant of a dynamic CM-SWN, where the quenched disorder of small-world networks is replaced by randomly changing connections between individuals in a single network and stable connection by star nodes between networks, is also analysed in detail and compared with a mean-field approximation.  相似文献   

18.
Recently, small-scale Quantum Key Distribution (QKD) networks have been demonstrated and continuously operated in field environment. However, nodes of these QKD networks are less than 10 nodes. When the scale and structure of these networks becomes large and complex, such networks will subject to problem of intractable routing selection and limited transmission distance. We present a novel quantum network model and the corresponding protocol to solve these problems. The proposed quantum network model integrates classical communication network with quantum key distribution layer. Nodes in this quantum network model are divided into communication nodes for classical communication and quantum nodes for quantum key distribution. We use atomic ensembles to create entangled photons inside quantum nodes. Quantum repeaters are used to establish entanglement between remote quantum nodes so the maximum distribution distance of entangled photons can be extended. The main idea is to establish an appropriate key distribution path in the quantum key distribution layer based on the routing information obtained by the upper classical communication network. After the entanglement has been established between remote quantum nodes, these nodes will use the Ekert91 or BBM92 protocol to generate secret keys shared between each other. Then, these keys can be used to ensure the security of communication in the classical communication network.  相似文献   

19.
Random links between otherwise distant nodes can greatly facilitate the propagation of disease or information, provided contagion can be transmitted by a single active node. However, we show that when the propagation requires simultaneous exposure to multiple sources of activation, called complex propagation, the effect of random links can be just the opposite; it can make the propagation more difficult to achieve. We numerically calculate critical points for a threshold model using several classes of complex networks, including an empirical social network. We also provide an estimation of the critical values in terms of vulnerable nodes.  相似文献   

20.
苏臻  高超  李向华 《物理学报》2017,66(12):120201-120201
在众多的重要节点评估方法研究中,具有较高中心性的节点一直是关注的焦点,许多传播行为的研究也主要围绕高中心性节点展开,因此在一定程度上忽略了低中心性节点对传播行为的影响.本文从传播异构性角度,通过初始感染最大中心性节点和最小中心性节点揭示网络结构异构性对信息传播的影响.实验结果表明,传播过程中存在"链型"和"扇型"两种传播模式,在初始感染比例不断提升的情况下,两种传播模式的相互转换引发传播速率的变化,进一步促使非线性传播规模交叉现象的产生.这一现象说明,在宏观的信息传播过程中,最小中心性节点的影响力不容忽视,尤其在初始感染比例升高时,最小中心性节点比最大中心性节点更具传播优势.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号