Cascading Failures in Interdependent Networks with Multiple Supply-Demand Links and Functionality Thresholds Supplementary Information M

Total Page:16

File Type:pdf, Size:1020Kb

Cascading Failures in Interdependent Networks with Multiple Supply-Demand Links and Functionality Thresholds Supplementary Information M Cascading Failures in Interdependent Networks with Multiple Supply-Demand Links and Functionality Thresholds Supplementary Information M. A. Di Muro1,*, L. D. Valdez2,3, H. H. Aragao˜ Regoˆ 4, S. V. Buldyrev5, H.E. Stanley6, and L. A. Braunstein1,6 1Instituto de Investigaciones F´ısicas de Mar del Plata (IFIMAR)-Departamento de F´ısica, Facultad de Ciencias Exactas y Naturales, Universidad Nacional de Mar del Plata-CONICET, Funes 3350, (7600) Mar del Plata, Argentina. 2Instituto de F´ısica Enrique Gaviola, CONICET, Ciudad Universitaria, 5000 Cordoba,´ Argentina. 3Facultad de Matematica,´ Astronom´ıa, F´ısica y Computacion,´ Universidad Nacional de Cordoba,´ Cordoba,´ Argentina 4Departamento de F´ısica, Instituto Federal de Educac¸ao,˜ Cienciaˆ e Tecnologia do Maranhao,˜ Sao˜ Lu´ıs, MA, 65030-005, Brazil 5Department of Physics, Yeshiva University, 500 West 185th Street, New York, New York 10033, USA 6Center for Polymer Studies, Boston University, Boston, Massachusetts 02215, USA *[email protected] Explicit form of the functionality rules Giant component The giant component in a network is the largest connected component. Most functioning networks are completely connected, but when they experience failure, finite components—little islands of nodes— become disconnected from the giant component. A common functionality rule states that nodes in these finite components have insufficient support to remain active. Thus in addition to the nodes rendered inactive by failure, the exacerbation factor renders inactive all nodes not connected to the giant component. If network X has a degree distribution PX (k) and a fraction 1 − yX of nodes is randomly removed, the X X X exacerbation factor gX is gX (yX ) = 1 − G0 [1 − yX (1 − f¥ )], where f¥ is the probability that the branches X X X do not expand to infinity, and it satisfies the recurrent equation f¥ = G1 [1 − yX (1 − f¥ )]. The functions X X G0 (u) and G1 (u) are the generating functions of the degree distribution and the excess degree distribution, X k X k−1 respectively. They are given by G0 (u) = ∑k PX (k)u and G1 (u) = ∑k k=hkiX PX (k)u , where hkiX is the average connectivity of network X, hkiX = ∑k k PX (k) . Finite components We can relax the giant component rule and allow some finite components to be self-sustaining and remain functional. If we allow the giant component to remain active after a failure and also some of the finite components to remain active with a probability related with their size h, then the exacerbation factor is gX (yX ) = 1 − ∑qX (h)ph;X (yX ); (1) h where qX (h) the probability that a component of size h has been removed, and ph;X (p) the probability that a randomly-selected surviving node belongs to a component of size h. We can obtain the functions 1 1 ph;X (yX ) using the Lagrange inversion formula for any given distribution PX (k). k-core Percolation In conventional or homogeneous k-core percolation, every node has an identical threshold k∗. Thus following a failure, if the number of surviving nodes among the k neighbors of a node is less than k∗, the node fails, otherwise it remains functional. In contrast, in heterogeneous k-core percolation each node ∗ i with initial degree ki has a randomly assigned threshold ki ≤ ki. In heterogeneous k-core percolation, ∗ ∗ the distribution of thresholds ki is given by the cumulative distribution rX ( j;k) = P(k ≤ jjk), where k denotes the degree values of network nodes. The simplest rX ( j;k) case is a step function, i.e., rX ( j;k) = 0 ∗ ∗ if j < k and rX ( j;k) = 1 if j ≥ k and for all k. This is equivalent to assigning all nodes the threshold ∗ ∗ ki = k , which is equivalent to homogeneous k-core percolation. Another option is the linear function ∗ ∗ rX ( j;k) = k =k in which the thresholds k for nodes with an initial degree k are uniformly distributed between 1 and k. If we know the degree distribution PX (k) and the threshold distribution r( j;k), we can define the heterogeneous k-core generating function ¥ k k j k− j WX (b) = ∑ PX (k) ∑ rX ( j;k)b (1 − b) ; (2) k=0 j=0 j and the k-core generating function of the excess distribution, ¥ k−1 kPX (k) k − 1 j k− j−1 ZX (b) = ∑ ∑ rX ( j + 1;k)b (1 − b) : (3) k=1 hkiX j=0 j The exacerbation factor of the k-core heterogeneous percolation can thus be written gX (yX ) = WX (b), where as in Sec. 1.1 b satisfies the self-consistent equation b = yX ZX (b), and yX is the fraction of surviving nodes in network X. Figure1 plots mA and mB in the steady state for the k-core rule. 1 1 0.8 0.8 0.6 0.6 Β Α µ µ 0.4 0.4 0.2 (a) 0.2 (b) 0 0 0 0.2 0.4 0.6 0.8 1 0 0.2 0.4 0.6 0.8 1 p p Figure 1. Order parameters for the homogeneous k-core rule with k∗ = 2 as a function of the initial fraction of survived nodes p, for two random regular (RR) networks with PsA(k) = PsB(k) = dk;5 and 5 ∗ ∗ ∗ ∗ system size N = 10 , and different values of required supplies, ks = 1 ( ), ks = 2 ( ), ks = 3 ( ) ks = 4 ( ). The symbols are the results of the stochastic simulations and the lines the iterated values from the equations. (a) Network A. (b) Network B. 2/7 Numerical Solution for the threshold pc The critical point pc at which the transition takes place can be determined using the equations from the main text. We combine the equations in set (3) at the steady state at which fX;n = fX;n−1 = fX , thus withdraw the fB-dependence, and obtain an equation in terms of fA, fA = F( fA) ≡ ZsB h( fA) gB WsB[h( fA)] ; (4) with h( fA) ≡ fB = pZsA fA gA pWsA( fA) . 1 1 (a) (b) 0.8 0.8 0.6 0.6 ) ) A A F(f 0.4 F(f 0.4 0.2 0.2 0 0 0 0.2 0.4 0.6 0.8 1 0 0.2 0.4 0.6 0.8 1 fA fA Figure 2. Graphical solution of Eq. (4) for a system of two RR networks with z = 5, PsX (k) = dk;2, in ∗ which all nodes have the same threshold ks = 1. In this case we use the “finite components” rule, with qX (1) = 1 and qX (h) = 0 for h > 2. In (a) we have qX (2) = 1, which results in a discontinuous transition. The curves represent different values of p: p = 0:26 ( ), p = 0:22 ( ) and p = pc = 0:2374 ( ). For the critical threshold, the curve is tangent to the identity at the solution fA > 0. In (b) we show a continuous transition with qX (2) = 0, in which p = 0:13 ( ), p = 0:07 ( ) and p = pc = 0:1 ( ). For the curve that represents the critical value, the point of tangency is located at fA = 0. For a given value of p, the solution is the intersection between function F and the identity. Above pc there is always a non-trivial solution. When p < pc, Eq. (4) is only valid for fA = 0. The method of finding the critical point differs depending on whether the transition is discontinuous or continuous. Figure2 shows the graphical solution of Eq. (4) for (a) a discontinuous transition and (b) a continuous transition. We plot the curves for p = pc, p > pc, and p < pc. When the transition is abrupt, when p = pc function F is tangent to the identity at fA = fAc, which is the solution to Eq. (4) for the critical threshold. Thus we have a condition that must be fulfilled at the critical point, dF( f ) A = 1: (5) d fA Thus we can solve Eqs. (4) and (5) numerically to find the critical threshold pc for a discontinuous abrupt transition. In contrast, Fig.2(b) shows that function F is also tangent to the identity, but here at fA = 0. Thus for a continuous transition we can find the critical value pc by solving Eq. (5) when fA = 0. 3/7 For the mass rule, the type of transition is related to the survival probability of the h = 2 components. If we assume here that all the h = 1 components and a fraction q(2) of the h = 2 components fail, then for ∗ single-value internal degree distributions and supply distributions when ks = 1, the derivative of function F at the critical threshold evaluated at the origin is dF( fA) 2 = pc ks k [1 − q(2)] : (6) d f A fA=0 Thus when q(2) = 1 the continuity condition is fulfilled only for ks ! ¥, as we can see in Fig. 5 in the main text. On the other hand we can use Eq. (4) to understand the transitions present in Fig. 6 from the main text. Here the system is bipartite and thus we apply no internal functionality rule. The system also has a supply 2 3 distribution Ps(k) = dk;ks and a supply threshold distribution rsX ( j;k) = 3( j=k) − 2( j=k) . 1.4 1.08 1.2 1.04 A A )/f )/f A 1 A 1 F(f F(f 0.8 0.96 (a) (b) 0.6 0.92 0 0.2 0.4 0.6 0.8 1 0 0.2 0.4 0.6 0.8 1 fA fA Figure 3.
Recommended publications
  • Breakdown of Interdependent Directed Networks Xueming Liu, ∗ † H
    i i \"SI Appendix"" | 2015/12/23 | 9:13 | page 1 | #1 i i Supporting Information: Breakdown of interdependent directed networks Xueming Liu, ∗ y H. Eugene Stanley y and Jianxi Gao z ∗Key Laboratory of Image Information Processing and Intelligent Control, School of Automation, Huazhong University of Science and Technology, Wuhan 430074, Hubei, China,yCenter for Polymer Studies and Department of Physics, Boston University, Boston, MA 02215, and zCenter for Complex Network Research and Department of Physics, Northeastern University, Boston, MA 02115 Submitted to Proceedings of the National Academy of Sciences of the United States of America I. Notions related to interdependent networks Multiplex networks. The agents (nodes) participate in ev- Both natural and engineered complex systems are not isolated ery layer of the network simultaneously. The connections but interdependent and interconnected. Such diverse infras- among these agents in different layers represent different tructures as water supply systems, transportation networks, relationships [14, 15, 28, 29, 13, 30, 31]. For example, a fuel delivery systems, and power stations are coupled together user of online social networks can subscribe to two or more [1]. To study the interdependence between networks, Buldyrev networks and build social relationships with other users on et al. [2] developed an analytic framework based on the gener- a range of social platforms (e.g., LinkedIn for a network of ating function formalism [3, 4] and discovered that the interde- professional contacts or Facebook for a network of friends) pendence between networks sharply increases system vulner- [11, 14]. ability, because node failures in one network can lead to the Temporal networks.
    [Show full text]
  • What Metrics Really Mean, a Question of Causality and Construction in Leveraging Social Media Audiences Into Business Results: Cases from the UK Film Industry
    . Volume 10, Issue 2 November 2013 What metrics really mean, a question of causality and construction in leveraging social media audiences into business results: Cases from the UK film industry Michael Franklin, University of St Andrews, UK Summary: Digital distribution and sustained audience engagement potentially offer filmmakers new business models for responding to decreasing revenues from DVD and TV rights. Key to campaigns that aim at enrolling audiences, mitigating demand uncertainty and improving revenues, is the management of digital media metrics. This process crucially involves the interpretation of figures where a causal gap exists between some digital activity and a market transaction. This paper charts the conceptual framing methods and calculations of value necessary to manipulating and utilising the audience in a new way. The invisible aspects and mediating role of contemporary creative industries audiences is presented through empirical case study evidence from two UK feature films. Practitioners’ understanding of digital engagement metrics is shown to be a social construction involving the agency of material artefacts as powerful elements of networks that include both market entities and audiences. Keywords: Film Business; Social Media; Market Device; Valuation; Digital Engagement Introduction The affordances of digital technology for audience engagement and more direct, or dis- intermediated distribution, prompt a reappraisal of the role of audiences in the film industry. Through digital tools, most significantly through social media, audiences are made material. Audiences are interacted with, engaged, marketed to, and financially exploited often visible all their social network connections, but they are also aggregated, manipulated and exert an agency that is much less visible and plays out off-screen.
    [Show full text]
  • A Network-Of-Networks Percolation Analysis of Cascading Failures in Spatially Co-Located Road-Sewer Infrastructure Networks
    Physica A 538 (2020) 122971 Contents lists available at ScienceDirect Physica A journal homepage: www.elsevier.com/locate/physa A network-of-networks percolation analysis of cascading failures in spatially co-located road-sewer infrastructure networks ∗ ∗ Shangjia Dong a, , Haizhong Wang a, , Alireza Mostafizi a, Xuan Song b a School of Civil and Construction Engineering, Oregon State University, Corvallis, OR 97331, United States of America b Department of Computer Science and Engineering, Southern University of Science and Technology, Shenzhen, China article info a b s t r a c t Article history: This paper presents a network-of-networks analysis framework of interdependent crit- Received 26 September 2018 ical infrastructure systems, with a focus on the co-located road-sewer network. The Received in revised form 28 May 2019 constructed interdependency considers two types of node dynamics: co-located and Available online 27 September 2019 multiple-to-one dependency, with different robustness metrics based on their function Keywords: logic. The objectives of this paper are twofold: (1) to characterize the impact of the Co-located road-sewer network interdependency on networks' robustness performance, and (2) to unveil the critical Network-of-networks percolation transition threshold of the interdependent road-sewer network. The results Percolation modeling show that (1) road and sewer networks are mutually interdependent and are vulnerable Infrastructure interdependency to the cascading failures initiated by sewer system disruption; (2) the network robust- Cascading failure ness decreases as the number of initial failure sources increases in the localized failure scenarios, but the rate declines as the number of failures increase; and (3) the sewer network contains two types of links: zero exposure and severe exposure to liquefaction, and therefore, it leads to a two-phase percolation transition subject to the probabilistic liquefaction-induced failures.
    [Show full text]
  • Multilayer Networks
    Journal of Complex Networks (2014) 2, 203–271 doi:10.1093/comnet/cnu016 Advance Access publication on 14 July 2014 Multilayer networks Mikko Kivelä Oxford Centre for Industrial and Applied Mathematics, Mathematical Institute, University of Oxford, Oxford OX2 6GG, UK Alex Arenas Departament d’Enginyeria Informática i Matemátiques, Universitat Rovira I Virgili, 43007 Tarragona, Spain Marc Barthelemy Downloaded from Institut de Physique Théorique, CEA, CNRS-URA 2306, F-91191, Gif-sur-Yvette, France and Centre d’Analyse et de Mathématiques Sociales, EHESS, 190-198 avenue de France, 75244 Paris, France James P. Gleeson MACSI, Department of Mathematics & Statistics, University of Limerick, Limerick, Ireland http://comnet.oxfordjournals.org/ Yamir Moreno Institute for Biocomputation and Physics of Complex Systems (BIFI), University of Zaragoza, Zaragoza 50018, Spain and Department of Theoretical Physics, University of Zaragoza, Zaragoza 50009, Spain and Mason A. Porter† Oxford Centre for Industrial and Applied Mathematics, Mathematical Institute, University of Oxford, by guest on August 21, 2014 Oxford OX2 6GG, UK and CABDyN Complexity Centre, University of Oxford, Oxford OX1 1HP, UK †Corresponding author. Email: [email protected] Edited by: Ernesto Estrada [Received on 16 October 2013; accepted on 23 April 2014] In most natural and engineered systems, a set of entities interact with each other in complicated patterns that can encompass multiple types of relationships, change in time and include other types of complications. Such systems include multiple subsystems and layers of connectivity, and it is important to take such ‘multilayer’ features into account to try to improve our understanding of complex systems. Consequently, it is necessary to generalize ‘traditional’ network theory by developing (and validating) a framework and associated tools to study multilayer systems in a comprehensive fashion.
    [Show full text]
  • Multidimensional Network Analysis
    Universita` degli Studi di Pisa Dipartimento di Informatica Dottorato di Ricerca in Informatica Ph.D. Thesis Multidimensional Network Analysis Michele Coscia Supervisor Supervisor Fosca Giannotti Dino Pedreschi May 9, 2012 Abstract This thesis is focused on the study of multidimensional networks. A multidimensional network is a network in which among the nodes there may be multiple different qualitative and quantitative relations. Traditionally, complex network analysis has focused on networks with only one kind of relation. Even with this constraint, monodimensional networks posed many analytic challenges, being representations of ubiquitous complex systems in nature. However, it is a matter of common experience that the constraint of considering only one single relation at a time limits the set of real world phenomena that can be represented with complex networks. When multiple different relations act at the same time, traditional complex network analysis cannot provide suitable an- alytic tools. To provide the suitable tools for this scenario is exactly the aim of this thesis: the creation and study of a Multidimensional Network Analysis, to extend the toolbox of complex network analysis and grasp the complexity of real world phenomena. The urgency and need for a multidimensional network analysis is here presented, along with an empirical proof of the ubiquity of this multifaceted reality in different complex networks, and some related works that in the last two years were proposed in this novel setting, yet to be systematically defined. Then, we tackle the foundations of the multidimensional setting at different levels, both by looking at the basic exten- sions of the known model and by developing novel algorithms and frameworks for well-understood and useful problems, such as community discovery (our main case study), temporal analysis, link prediction and more.
    [Show full text]
  • Multilayer Networks!
    Multilayer networks! Mikko Kivelä Assistant professor @bolozna www.mkivela.com C&)*$+, S-"%+)" Tutorial @ The 9th International Conference on @!".##$%&.'( Complex Networks and their Applications Outline 1. Why multilayer networks 2. Conceptual and mathematical framework 3. Multilayer network systems and data 4. How to analyse multilayer networks 5. Dynamics and multilayer networks 6. Tools an packages Why multilayer networks? Networks are everywhere Nodes Links Neurons, Synapses, brain areas axons Friendships, People phys. contacts, kinships, … Species, Genetic similarity, populations trophic interactions, individuals competition Genes, Regulatory proteins relationships Network representations – are simple graphs enough? vs Example: Sociograms G. C. Homans. ”Human Group”, Routledge 1951 F. Roethlisberger, W. Dickson. ”Management and the worker”, Cambridge University Press 1939 Example: Multivariate social networks S. Wasserman, K. Faust. ”Social Network Analysis”, Cambridge University Press 1994 Example: Cognitive social structures D. Krackhardt 1987 Example: Temporal networks M. Kivelä, R. K. Pan, K. Kaski, J. Kertész, J. Saramäki, M. Karsai: Multiscale analysis of spreading in a large communication network, J. Stat. Mech. 3 P03005 (2012) Example: Interdependent infrastructure networks S. V. Buldyrev, R. Parshani, G. Paul, H. E. Stanley, S. Havlin. ”Catastrophic cascade of failures in interdependent networks”, Nature 464:1025 2010 Example: UK infrastructure networks (Courtesy of Scott Thacker, ITRC, University of Oxford) More realistic network representations Interacting networks Temporal networks Multiplex networks Multidimensional Overlay networks networks Networks of networks Interdependent networks More realistic network representations Interacting networks Temporal networks Multiplex networks Multilayer networks Multidimensional Overlay networks networks Networks of networks Interdependent networks Conceptual and mathematical framework Review article on multilayer networks M. Kivelä, A. Arenas, M. Barthelemy, J.
    [Show full text]
  • Percolation in Real Interdependent Networks
    ARTICLES PUBLISHED ONLINE: 15 JUNE 2015 | DOI: 10.1038/NPHYS3374 Percolation in real interdependent networks Filippo Radicchi The function of a real network depends not only on the reliability of its own components, but is aected also by the simultaneous operation of other real networks coupled with it. Whereas theoretical methods of direct applicability to real isolated networks exist, the frameworks developed so far in percolation theory for interdependent network layers are of little help in practical contexts, as they are suited only for special models in the limit of infinite size. Here, we introduce a set of heuristic equations that takes as inputs the adjacency matrices of the layers to draw the entire phase diagram for the interconnected network. We demonstrate that percolation transitions in interdependent networks can be understood by decomposing these systems into uncoupled graphs: the intersection among the layers, and the remainders of the layers. When the intersection dominates the remainders, an interconnected network undergoes a smooth percolation transition. Conversely, if the intersection is dominated by the contribution of the remainders, the transition becomes abrupt even in small networks. We provide examples of real systems that have developed interdependent networks sharing cores of ‘high quality’ edges to prevent catastrophic failures. ercolation is among the most studied topics in statistical largest cluster of mutually connected nodes16. A cluster of mutually physics1. The model used to mimic percolation processes connected nodes is a set of vertices with the property that every node Passumes the existence of an underlying network of arbitrary in the cluster has at least one neighbour belonging to that cluster in structure.
    [Show full text]
  • Impact of Degree Heterogeneity on Attack Vulnerability
    www.nature.com/scientificreports OPEN Impact of Degree Heterogeneity on Attack Vulnerability of Interdependent Networks Received: 30 January 2016 Shiwen Sun1,2, Yafang Wu1,2, Yilin Ma1,2, Li Wang1,2, Zhongke Gao3 & Chengyi Xia1,2 Accepted: 15 August 2016 The study of interdependent networks has become a new research focus in recent years. We focus on Published: 09 September 2016 one fundamental property of interdependent networks: vulnerability. Previous studies mainly focused on the impact of topological properties upon interdependent networks under random attacks, the effect of degree heterogeneity on structural vulnerability of interdependent networks under intentional attacks, however, is still unexplored. In order to deeply understand the role of degree distribution and in particular degree heterogeneity, we construct an interdependent system model which consists of two networks whose extent of degree heterogeneity can be controlled simultaneously by a tuning parameter. Meanwhile, a new quantity, which can better measure the performance of interdependent networks after attack, is proposed. Numerical simulation results demonstrate that degree heterogeneity can significantly increase the vulnerability of both single and interdependent networks. Moreover, it is found that interdependent links between two networks make the entire system much more fragile to attacks. Enhancing coupling strength between networks can greatly increase the fragility of both networks against targeted attacks, which is most evident under the case of max-max assortative coupling. Current results can help to deepen the understanding of structural complexity of complex real-world systems. Complex network is an important tool used to describe and analyze the structure and dynamical behaviors of complex systems1–3. Since real-world complex systems are becoming increasingly dependent on one another, the study of interdependent networks has become another new active topic in network science4,5.
    [Show full text]
  • Cascading Failures in Interdependent Networks with Multiple
    www.nature.com/scientificreports OPEN Cascading Failures in Interdependent Networks with Multiple Supply-Demand Links and Received: 2 August 2017 Accepted: 3 October 2017 Functionality Thresholds Published: xx xx xxxx M. A. Di Muro1, L. D. Valdez2,3, H. H. Aragão Rêgo4, S. V. Buldyrev5, H. E. Stanley6 & L. A. Braunstein1,6 Various social, financial, biological and technological systems can be modeled by interdependent networks. It has been assumed that in order to remain functional, nodes in one network must receive the support from nodes belonging to different networks. So far these models have been limited to the case in which the failure propagates across networks only if the nodes lose all their supply nodes. In this paper we develop a more realistic model for two interdependent networks in which each node has its own supply threshold, i.e., they need the support of a minimum number of supply nodes to remain functional. In addition, we analyze different conditions of internal node failure due to disconnection from nodes within its own network. We show that several local internal failure conditions lead to similar nontrivial results. When there are no internal failures the model is equivalent to a bipartite system, which can be useful to model a financial market. We explore the rich behaviors of these models that include discontinuous and continuous phase transitions. Using the generating functions formalism, we analytically solve all the models in the limit of infinitely large networks and find an excellent agreement with the stochastic simulations. Studying complex systems includes analyzing how the different components of a given system interact with each other and how this interaction affects the system’s global collective behavior.
    [Show full text]
  • Multi-Layered Network Embedding
    Multi-Layered Network Embedding Jundong Li∗y Chen Chen∗y Hanghang Tong∗ Huan Liu∗ Abstract tasks. To mitigate this problem, recent studies show Network embedding has gained more attentions in re- that through learning general network embedding rep- cent years. It has been shown that the learned low- resentations, many subsequent learning tasks could be dimensional node vector representations could advance greatly enhanced [17, 34, 39]. The basic idea is to learn a a myriad of graph mining tasks such as node classifi- low-dimensional node vector representation by leverag- cation, community detection, and link prediction. A ing the node proximity manifested in the network topo- vast majority of the existing efforts are overwhelmingly logical structure. devoted to single-layered networks or homogeneous net- The vast majority of existing efforts predomi- works with a single type of nodes and node interactions. nately focus on single-layered or homogeneous net- 1 However, in many real-world applications, a variety of works . However, real-world networks are much more networks could be abstracted and presented in a multi- complicated as cross-domain interactions between dif- layered fashion. Typical multi-layered networks include ferent networks are widely observed, which naturally critical infrastructure systems, collaboration platforms, form a type of multi-layered networks [12, 16, 35]. Crit- social recommender systems, to name a few. Despite the ical infrastructure systems are a typical example of widespread use of multi-layered networks, it remains a multi-layered networks (left part of Figure 1). In this daunting task to learn vector representations of different system, the power stations in the power grid are used types of nodes due to the bewildering combination of to provide electricity to routers in the autonomous sys- both within-layer connections and cross-layer network tem network (AS network) and vehicles in the trans- dependencies.
    [Show full text]
  • The Language Networks
    Sanda Martinčić-Ipšić Ana Meštrović The Language Networks Odjel za informatiku Sveučilišta u Rijeci Sanda Martinčić-Ipšić Ana Meštrović THE LANGUAGE NETWORKS Publisher University of Rijeka, Department of Informatics For the Publisher Snježana Prijić-Samaržija Reviewers Prof. Dr. Matjaž Perc, University of Maribor, Ljubljana, Slovenia Prof. Dr. Boris Podobnik, Center for Polymer Studies and Department of Physics, Boston University, Boston, USA; Faculty of Civil Engineering, University of Rijeka, Croatia; Zagreb School of Economics and Management, Zagreb, Croatia and Luxemburg School of Business, Luxemburg Asoc. Prof. Dr. Zoran Levnajić, Faculty of Information Studies in Novo mesto, Slovenia and Jozef Stefan Institute, Slovenia Editor Sanda Martinčić-Ipšić Proofread Martin Mayhew Logo Design Ivo Matić Publication Date January 2018 Martinčić-Ipšić, Sanda and Meštrović, Ana The Language Networks, Includes bibliographical references and index. 1. Complex Networks 2. Natural language processing ISBN 978-953-7720-34-6 By the decision of the Publishing Committee of the University of Rijeka CLASS: 602-09/18-01/02, NUMBER: 2170-57-03-18-3 this work is published as a publication of the University of Rijeka. langnet.uniri.hr Copyright © 2018 Department of Informatics, University of Rijeka Sanda Martinčić-Ipšić Ana Meštrović The Language Networks Odjel za informatiku Rijeka, 2018. Sveučilišta u Rijeci Preface The language networks book provides insights into the principles of modeling and analyzing structural properties of language – manly in its written form, hence text. Book guidelines the basic principles of text preprocessing, covering the very initial steps needed for any natural language processing task. Further, the book examines the possibilities of representing text in a complex networks framework.
    [Show full text]
  • APPLICATION of GROUP TESTING for ANALYZING NOISY NETWORKS Vladimir Ufimtsev
    University of Nebraska at Omaha DigitalCommons@UNO Student Work 7-2016 APPLICATION OF GROUP TESTING FOR ANALYZING NOISY NETWORKS Vladimir Ufimtsev Follow this and additional works at: https://digitalcommons.unomaha.edu/studentwork Part of the Computer Sciences Commons APPLICATION OF GROUP TESTING FOR ANALYZING NOISY NETWORKS By Vladimir Ufimtsev A DISSERTATION Presented to the Faculty of The Graduate College at the University of Nebraska In Partial Fulfillment of Requirements For the Degree of Doctor of Philosophy Major: Information Technology Under the Supervision of Dr. Sanjukta Bhowmick Omaha, Nebraska July, 2016 Supervisory Committee Dr. Hesham Ali Dr. Prithviraj Dasgupta Dr. Lotfollah Najjar Dr. Vyacheslav Rykov ProQuest Number: 10143681 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. ProQuest 10143681 Published by ProQuest LLC (2016). Copyright of the Dissertation is held by the Author. All rights reserved. This work is protected against unauthorized copying under Title 17, United States Code Microform Edition © ProQuest LLC. ProQuest LLC. 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, MI 48106 - 1346 Abstract Application of Group Testing for Analyzing Noisy Networks Vladimir Ufimtsev, Ph.D. University of Nebraska, 2016 Advisor: Dr. Sanjukta Bhowmick My dissertation focuses on developing scalable algorithms for analyzing large complex networks and evaluating how the results alter with changes to the network. Network analysis has become a ubiquitous and very effective tool in big data analysis, particularly for understanding the mechanisms of complex systems that arise in diverse disciplines such as cybersecurity [83], biology [15], sociology [5], and epidemiology [7].
    [Show full text]