2,214 research outputs found

    Numerical assessment of the percolation threshold using complement networks

    Get PDF
    Models of percolation processes on networks currently assume locally tree-like structures at low densities, and are derived exactly only in the thermodynamic limit. Finite size effects and the presence of short loops in real systems however cause a deviation between the empirical percolation threshold pcp_c and its model-predicted value πc\pi_c. Here we show the existence of an empirical linear relation between pcp_c and πc\pi_c across a large number of real and model networks. Such a putatively universal relation can then be used to correct the estimated value of πc\pi_c. We further show how to obtain a more precise relation using the concept of the complement graph, by investigating on the connection between the percolation threshold of a network, pcp_c, and that of its complement, pˉc\bar{p}_c

    Effectiveness of dismantling strategies on moderated vs. unmoderated online social platforms

    Full text link
    Online social networks are the perfect test bed to better understand large-scale human behavior in interacting contexts. Although they are broadly used and studied, little is known about how their terms of service and posting rules affect the way users interact and information spreads. Acknowledging the relation between network connectivity and functionality, we compare the robustness of two different online social platforms, Twitter and Gab, with respect to dismantling strategies based on the recursive censor of users characterized by social prominence (degree) or intensity of inflammatory content (sentiment). We find that the moderated (Twitter) vs unmoderated (Gab) character of the network is not a discriminating factor for intervention effectiveness. We find, however, that more complex strategies based upon the combination of topological and content features may be effective for network dismantling. Our results provide useful indications to design better strategies for countervailing the production and dissemination of anti-social content in online social platforms

    Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependency

    Full text link
    Increased coupling between critical infrastructure networks, such as power and communication systems, will have important implications for the reliability and security of these systems. To understand the effects of power-communication coupling, several have studied interdependent network models and reported that increased coupling can increase system vulnerability. However, these results come from models that have substantially different mechanisms of cascading, relative to those found in actual power and communication networks. This paper reports on two sets of experiments that compare the network vulnerability implications resulting from simple topological models and models that more accurately capture the dynamics of cascading in power systems. First, we compare a simple model of topological contagion to a model of cascading in power systems and find that the power grid shows a much higher level of vulnerability, relative to the contagion model. Second, we compare a model of topological cascades in coupled networks to three different physics-based models of power grids coupled to communication networks. Again, the more accurate models suggest very different conclusions. In all but the most extreme case, the physics-based power grid models indicate that increased power-communication coupling decreases vulnerability. This is opposite from what one would conclude from the coupled topological model, in which zero coupling is optimal. Finally, an extreme case in which communication failures immediately cause grid failures, suggests that if systems are poorly designed, increased coupling can be harmful. Together these results suggest design strategies for reducing the risk of cascades in interdependent infrastructure systems

    Statistical Mechanics of Community Detection

    Full text link
    Starting from a general \textit{ansatz}, we show how community detection can be interpreted as finding the ground state of an infinite range spin glass. Our approach applies to weighted and directed networks alike. It contains the \textit{at hoc} introduced quality function from \cite{ReichardtPRL} and the modularity QQ as defined by Newman and Girvan \cite{Girvan03} as special cases. The community structure of the network is interpreted as the spin configuration that minimizes the energy of the spin glass with the spin states being the community indices. We elucidate the properties of the ground state configuration to give a concise definition of communities as cohesive subgroups in networks that is adaptive to the specific class of network under study. Further we show, how hierarchies and overlap in the community structure can be detected. Computationally effective local update rules for optimization procedures to find the ground state are given. We show how the \textit{ansatz} may be used to discover the community around a given node without detecting all communities in the full network and we give benchmarks for the performance of this extension. Finally, we give expectation values for the modularity of random graphs, which can be used in the assessment of statistical significance of community structure

    Duality and free energy analyticity bounds for few-body Ising models with extensive homology rank

    Get PDF
    We consider pairs of few-body Ising models where each spin enters a bounded number of interaction terms (bonds) such that each model can be obtained from the dual of the other after freezing k spins on large-degree sites. Such a pair of Ising models can be interpreted as a two-chain complex with k being the rank of the first homology group. Our focus is on the case where k is extensive, that is, scales linearly with the number of bonds n. Flipping any of these additional spins introduces a homologically nontrivial defect (generalized domain wall). In the presence of bond disorder, we prove the existence of a low-temperature weak-disorder region where additional summation over the defects has no effect on the free energy density f(T) in the thermodynamical limit and of a high-temperature region where an extensive homological defect does not affect f(T). We also discuss the convergence of the high- and low-temperature series for the free energy density, prove the analyticity of limiting f(T) at high and low temperatures, and construct inequalities for the critical point(s) where analyticity is lost. As an application, we prove multiplicity of the conventionally defined critical points for Ising models on all { f, d} tilings of the infinite hyperbolic plane, where df/(d + f) \u3e 2. Namely, for these infinite graphs, we show that critical temperatures with free and wired boundary conditions differ, Tc(f)T(f)

    Ten-tier and multi-scale supplychain network analysis of medical equipment: Random failure and intelligent attack analysis

    Full text link
    Motivated by the COVID-19 pandemic, this paper explores the supply chain viability of medical equipment, an industry whose supply chain was put under a crucial test during the pandemic. This paper includes an empirical network-level analysis of supplier reachability under Random Failure Experiment (RFE) and Intelligent Attack Experiment (IAE). Specifically, this study investigates the effect of RFA and IAE across multiple tiers and scales. The global supply chain data was mined and analyzed from about 45,000 firms with about 115,000 intertwined relationships spanning across 10 tiers of the backward supply chain of medical equipment. This complex supply chain network was analyzed at four scales, namely: firm, country-industry, industry, and country. A notable contribution of this study is the application of a supply chain tier optimization tool to identify the lowest tier of the supply chain that can provide adequate resolution for the study of the supply chain pattern. We also developed data-driven-tools to identify the thresholds for breakdown and fragmentation of the medical equipment supply chain when faced with random failures or different intelligent attack scenarios. The novel network analysis tools utilized in the study can be applied to the study of supply chain reachability and viability in other industries.Comment: 47 page

    Dragon-kings: mechanisms, statistical methods and empirical evidence

    Full text link
    This introductory article presents the special Discussion and Debate volume "From black swans to dragon-kings, is there life beyond power laws?" published in Eur. Phys. J. Special Topics in May 2012. We summarize and put in perspective the contributions into three main themes: (i) mechanisms for dragon-kings, (ii) detection of dragon-kings and statistical tests and (iii) empirical evidence in a large variety of natural and social systems. Overall, we are pleased to witness significant advances both in the introduction and clarification of underlying mechanisms and in the development of novel efficient tests that demonstrate clear evidence for the presence of dragon-kings in many systems. However, this positive view should be balanced by the fact that this remains a very delicate and difficult field, if only due to the scarcity of data as well as the extraordinary important implications with respect to hazard assessment, risk control and predictability.Comment: 20 page
    • …
    corecore