2,918 research outputs found
Towards real-world complexity: an introduction to multiplex networks
Many real-world complex systems are best modeled by multiplex networks of
interacting network layers. The multiplex network study is one of the newest
and hottest themes in the statistical physics of complex networks. Pioneering
studies have proven that the multiplexity has broad impact on the system's
structure and function. In this Colloquium paper, we present an organized
review of the growing body of current literature on multiplex networks by
categorizing existing studies broadly according to the type of layer coupling
in the problem. Major recent advances in the field are surveyed and some
outstanding open challenges and future perspectives will be proposed.Comment: 20 pages, 10 figure
Network-Structured BST/MBO Composites Made from Core-Shell-Structured Granulates
A finite element method (FEM)-based simulation approach to predict the tunability in composite materials was developed and tested with analytical data. These tests showed good prediction capabilities of the simulation for the test data. The simulation model was then used to predict the tunability of a network-structured composite, where the dielectric phase formed clusters in a paraelectric network. This was achieved by simulating a reciprocal core-shell unit cell of said network. The simulation showed a high tunability for this network model, exceeding the tunability of the analytically evaluated layered, columnar, and particulate model. The simulation results were experimentally verified with a Ba0.6Sr0.4TiO3/Mg3B2O6 (BST/MBO) composite, where core-shell granulates were made with a two-step granulation process. These structured samples showed higher tunability and dielectric loss than the unstructured samples made for comparison. Overall, the structured samples showed higher tunability to loss ratios, indicating their potential for use in tunable radio frequency applications, since they may combine high performance with little energy loss
Graphical Analysis of Social Group Dynamics
Identifying communities in social networks becomes an increasingly important
research problem. Several methods for identifying such groups have been
developed, however, qualitative analysis (taking into account the scale of the
problem) still poses serious problems. This paper describes a tool for
facilitating such an analysis, allowing to visualize the dynamics and
supporting localization of different events (such as creation or merging of
groups). In the final part of the paper, the experimental results performed
using the benchmark data (Enron emails) provide an insight into usefulness of
the proposed tool.Comment: Fourth International Conference on Computational Aspects of Social
Networks, CASoN 2012, Sao Carlos, Brazil, November 21-23, 2012, pp. 41-46;
IEEE Computer Society, 201
Cyber-Threat Assessment for the Air Traffic Management System: A Network Controls Approach
Air transportation networks are being disrupted with increasing frequency by failures in their cyber- (computing, communication, control) systems. Whether these cyber- failures arise due to deliberate attacks or incidental errors, they can have far-reaching impact on the performance of the air traffic control and management systems. For instance, a computer failure in the Washington DC Air Route Traffic Control Center (ZDC) on August 15, 2015, caused nearly complete closure of the Centers airspace for several hours. This closure had a propagative impact across the United States National Airspace System, causing changed congestion patterns and requiring placement of a suite of traffic management initiatives to address the capacity reduction and congestion. A snapshot of traffic on that day clearly shows the closure of the ZDC airspace and the resulting congestion at its boundary, which required augmented traffic management at multiple locations. Cyber- events also have important ramifications for private stakeholders, particularly the airlines. During the last few months, computer-system issues have caused several airlines fleets to be grounded for significant periods of time: these include United Airlines (twice), LOT Polish Airlines, and American Airlines. Delays and regional stoppages due to cyber- events are even more common, and may have myriad causes (e.g., failure of the Department of Homeland Security systems needed for security check of passengers, see [3]). The growing frequency of cyber- disruptions in the air transportation system reflects a much broader trend in the modern society: cyber- failures and threats are becoming increasingly pervasive, varied, and impactful. In consequence, an intense effort is underway to develop secure and resilient cyber- systems that can protect against, detect, and remove threats, see e.g. and its many citations. The outcomes of this wide effort on cyber- security are applicable to the air transportation infrastructure, and indeed security solutions are being implemented in the current system. While these security solutions are important, they only provide a piecemeal solution. Particular computers or communication channels are protected from particular attacks, without a holistic view of the air transportation infrastructure. On the other hand, the above-listed incidents highlight that a holistic approach is needed, for several reasons. First, the air transportation infrastructure is a large scale cyber-physical system with multiple stakeholders and diverse legacy assets. It is impractical to protect every cyber- asset from known and unknown disruptions, and instead a strategic view of security is needed. Second, disruptions to the cyber- system can incur complex propagative impacts across the air transportation network, including its physical and human assets. Also, these implications of cyber- events are exacerbated or modulated by other disruptions and operational specifics, e.g. severe weather, operator fatigue or error, etc. These characteristics motivate a holistic and strategic perspective on protecting the air transportation infrastructure from cyber- events. The analysis of cyber- threats to the air traffic system is also inextricably tied to the integration of new autonomy into the airspace. The replacement of human operators with cyber functions leaves the network open to new cyber threats, which must be modeled and managed. Paradoxically, the mitigation of cyber events in the airspace will also likely require additional autonomy, given the fast time scale and myriad pathways of cyber-attacks which must be managed. The assessment of new vulnerabilities upon integration of new autonomy is also a key motivation for a holistic perspective on cyber threats
The random geometry of equilibrium phases
This is a (long) survey about applications of percolation theory in
equilibrium statistical mechanics. The chapters are as follows:
1. Introduction
2. Equilibrium phases
3. Some models
4. Coupling and stochastic domination
5. Percolation
6. Random-cluster representations
7. Uniqueness and exponential mixing from non-percolation
8. Phase transition and percolation
9. Random interactions
10. Continuum modelsComment: 118 pages. Addresses: [email protected]
http://www.mathematik.uni-muenchen.de/~georgii.html [email protected]
http://www.math.chalmers.se/~olleh [email protected]
Non-constant ground configurations in the disordered ferromagnet
The disordered ferromagnet is a disordered version of the ferromagnetic Ising
model in which the coupling constants are non-negative quenched random. A
ground configuration is an infinite-volume configuration whose energy cannot be
reduced by finite modifications. It is a long-standing challenge to ascertain
whether the disordered ferromagnet on the lattice admits
non-constant ground configurations. We answer this affirmatively in dimensions
, when the coupling constants are sampled independently from a
sufficiently concentrated distribution. The obtained ground configurations are
further shown to be translation-covariant with respect to
translations of the disorder.
Our result is proved by showing that the finite-volume interface formed by
Dobrushin boundary conditions is localized, and converges to an infinite-volume
interface. This may be expressed in purely combinatorial terms, as a result on
the fluctuations of certain minimal cutsets in the lattice
endowed with independent edge capacities.Comment: A combinatorial interpretation was added; some additional minor
changes to the presentatio
The structure and dynamics of multilayer networks
In the past years, network theory has successfully characterized the
interaction among the constituents of a variety of complex systems, ranging
from biological to technological, and social systems. However, up until
recently, attention was almost exclusively given to networks in which all
components were treated on equivalent footing, while neglecting all the extra
information about the temporal- or context-related properties of the
interactions under study. Only in the last years, taking advantage of the
enhanced resolution in real data sets, network scientists have directed their
interest to the multiplex character of real-world systems, and explicitly
considered the time-varying and multilayer nature of networks. We offer here a
comprehensive review on both structural and dynamical organization of graphs
made of diverse relationships (layers) between its constituents, and cover
several relevant issues, from a full redefinition of the basic structural
measures, to understanding how the multilayer nature of the network affects
processes and dynamics.Comment: In Press, Accepted Manuscript, Physics Reports 201
- …