29 research outputs found

    Detecting climate adaptation with mobile network data in Bangladesh: anomalies in communication, mobility and consumption patterns during cyclone Mahasen

    No full text
    Large-scale data from digital infrastructure, like mobile phone networks, provides rich information on the behavior of millions of people in areas affected by climate stress. Using anonymized data on mobility and calling behavior from 5.1 million Grameenphone users in Barisal Division and Chittagong District, Bangladesh, we investigate the effect of Cyclone Mahasen, which struck Barisal and Chittagong in May 2013. We characterize spatiotemporal patterns and anomalies in calling frequency, mobile recharges, and population movements before, during and after the cyclone. While it was originally anticipated that the analysis might detect mass evacuations and displacement from coastal areas in the weeks following the storm, no evidence was found to suggest any permanent changes in population distributions. We detect anomalous patterns of mobility both around the time of early warning messages and the storm’s landfall, showing where and when mobility occurred as well as its characteristics. We find that anomalous patterns of mobility and calling frequency correlate with rainfall intensity (r = .75, p < 0.05) and use calling frequency to construct a spatiotemporal distribution of cyclone impact as the storm moves across the affected region. Likewise, from mobile recharge purchases we show the spatiotemporal patterns in people’s preparation for the storm in vulnerable areas. In addition to demonstrating how anomaly detection can be useful for modeling human adaptation to climate extremes, we also identify several promising avenues for future improvement of disaster planning and response activities

    Chiral patterns arising from electrostatic growth models

    Full text link
    Recently, unusual and strikingly beautiful seahorse-like growth patterns have been observed under conditions of quasi-two-dimensional growth. These `S'-shaped patterns strongly break two-dimensional inversion symmetry; however such broken symmetry occurs only at the level of overall morphology, as the clusters are formed from achiral molecules with an achiral unit cell. Here we describe a mechanism which gives rise to chiral growth morphologies without invoking microscopic chirality. This mechanism involves trapped electrostatic charge on the growing cluster, and the enhancement of growth in regions of large electric field. We illustrate the mechanism with a tree growth model, with a continuum model for the motion of the one-dimensional boundary, and with microscopic Monte Carlo simulations. Our most dramatic results are found using the continuum model, which strongly exhibits spontaneous chiral symmetry breaking, and in particular finned `S' shapes like those seen in the experiments.Comment: RevTeX, 12 pages, 9 figure

    Roles in networks

    Get PDF
    AbstractIn this paper we offer a topology-driven (‘natural’) definition of subclusters of an undirected graph or network. In addition we find rules for assigning unique roles (from a small set of possible roles) to each node in the network. Our approach is based on the use of a ‘smooth’ index for well-connectedness (eigenvector centrality) which is computed for each node. This index, viewed as a height function, then guides the decomposition of the graph into regions (associated with local peaks of the index), and borders (valleys) between regions. We propose and compare two rules for assigning nodes to regions. We illustrate our approach with simple test graphs, and also by applying it to snapshots of the Gnutella peer-to-peer network from late 2001. This latter analysis suggests that our method implies novel ways of interpreting the notion of well-connectedness for a graph, as these snapshots represent very well connected networks. We argue that our approach is well suited for analyzing computer networks, towards the goal of enhancing their security

    Asynchronous distributed power iteration with gossip-based normalization

    Get PDF
    Abstract. The dominant eigenvector of matrices defined by weighted links in overlay networks plays an important role in many peer-to-peer applications. Examples include trust management, importance ranking to support search, and virtual coordinate systems to facilitate managing network proximity. Robust and efficient asynchronous distributed algorithms are known only for the case when the dominant eigenvalue is exactly one. We present a fully distributed algorithm for a more general case: non-negative square matrices that have an arbitrary dominant eigenvalue. The basic idea is that we apply a gossip-based aggregation protocol coupled with an asynchronous iteration algorithm, where the gossip component controls the iteration component. The norm of the resulting vector is an unknown finite constant by default; however, it can optionally be set to any desired constant using a third gossip control component. Through extensive simulation results on artificially generated overlay networks and real web traces we demonstrate the correctness, the performance and the fault tolerance of the protocol.
    corecore