scholarly journals Node diversification in complex networks by decentralized colouring

2018 ◽  
Vol 7 (4) ◽  
pp. 554-563 ◽  
Author(s):  
Richard Garcia-Lebron ◽  
David J Myers ◽  
Shouhuai Xu ◽  
Jie Sun

Abstract We develop a decentralized colouring approach to diversify the nodes in a complex network. The key is the introduction of a local conflict index (LCI) that measures the colour conflicts arising at each node which can be efficiently computed using only local information. We demonstrate via both synthetic and real-world networks that the proposed approach significantly outperforms random colouring as measured by the size of the largest colour-induced connected component. Interestingly, for scale-free networks further improvement of diversity can be achieved by tuning a degree-biasing weighting parameter in the LCI.


2021 ◽  
Vol 9 ◽  
Author(s):  
Zhaoxing Li ◽  
Qionghai Liu ◽  
Li Chen

A complex network can crash down due to disturbances which significantly reduce the network’s robustness. It is of great significance to study on how to improve the robustness of complex networks. In the literature, the network rewire mechanism is one of the most widely adopted methods to improve the robustness of a given network. Existing network rewire mechanism improves the robustness of a given network by re-connecting its nodes but keeping the total number of edges or by adding more edges to the given network. In this work we propose a novel yet efficient network rewire mechanism which is based on multiobjective optimization. The proposed rewire mechanism simultaneously optimizes two objective functions, i.e., maximizing network robustness and minimizing edge rewire operations. We further develop a multiobjective discrete partite swarm optimization algorithm to solve the proposed mechanism. Compared to existing network rewire mechanisms, the developed mechanism has two advantages. First, the proposed mechanism does not require specific constraints on the rewire mechanism to the studied network, which makes it more feasible for applications. Second, the proposed mechanism can suggest a set of network rewire choices each of which can improve the robustness of a given network, which makes it be more helpful for decision makings. To validate the effectiveness of the proposed mechanism, we carry out experiments on computer-generated Erdős–Rényi and scale-free networks, as well as real-world complex networks. The results demonstrate that for each tested network, the proposed multiobjective optimization based edge rewire mechanism can recommend a set of edge rewire solutions to improve its robustness.



2020 ◽  
Vol 117 (26) ◽  
pp. 14812-14818 ◽  
Author(s):  
Bin Zhou ◽  
Xiangyi Meng ◽  
H. Eugene Stanley

Whether real-world complex networks are scale free or not has long been controversial. Recently, in Broido and Clauset [A. D. Broido, A. Clauset,Nat. Commun.10, 1017 (2019)], it was claimed that the degree distributions of real-world networks are rarely power law under statistical tests. Here, we attempt to address this issue by defining a fundamental property possessed by each link, the degree–degree distance, the distribution of which also shows signs of being power law by our empirical study. Surprisingly, although full-range statistical tests show that degree distributions are not often power law in real-world networks, we find that in more than half of the cases the degree–degree distance distributions can still be described by power laws. To explain these findings, we introduce a bidirectional preferential selection model where the link configuration is a randomly weighted, two-way selection process. The model does not always produce solid power-law distributions but predicts that the degree–degree distance distribution exhibits stronger power-law behavior than the degree distribution of a finite-size network, especially when the network is dense. We test the strength of our model and its predictive power by examining how real-world networks evolve into an overly dense stage and how the corresponding distributions change. We propose that being scale free is a property of a complex network that should be determined by its underlying mechanism (e.g., preferential attachment) rather than by apparent distribution statistics of finite size. We thus conclude that the degree–degree distance distribution better represents the scale-free property of a complex network.



2013 ◽  
Vol 278-280 ◽  
pp. 2118-2122
Author(s):  
Bo Wang ◽  
Meng Jia Zhao ◽  
Sheng Li

The micro-blog community is the complex composed of many nodes. Based on interrelated theory of complex networks, this paper constructs the micro-blog community complex network by taking users as nodes, relationship between users as edges, then analyzes the scale-free features and shows that micro-blog community fits the two main characteristics of scale-free networks. Finally from the aspects of government policies、operators and users, putting forward some suggestions about micro-blog community according to its scale-free characteristics in order to let micro-blog play a better role in society.



Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Lifu Wang ◽  
Guotao Zhao ◽  
Zhi Kong ◽  
Yunkang Zhao

In a complex network, each edge has different functions on controllability of the whole network. A network may be out of control due to failure or attack of some specific edges. Bridges are a kind of key edges whose removal will disconnect a network and increase connected components. Here, we investigate the effects of removing bridges on controllability of network. Various strategies, including random deletion of edges, deletion based on betweenness centrality, and deletion based on degree of source or target nodes, are used to compare with the effect of removing bridges. It is found that the removing bridges strategy is more efficient on reducing controllability than the other strategies of removing edges for ER networks and scale-free networks. In addition, we also found the controllability robustness under edge attack is related to the average degree of complex networks. Therefore, we propose two optimization strategies based on bridges to improve the controllability robustness of complex networks against attacks. The effectiveness of the proposed strategies is demonstrated by simulation results of some model networks. These results are helpful for people to understand and control spreading processes of epidemic across different paths.



2020 ◽  
Vol 31 (05) ◽  
pp. 2050069 ◽  
Author(s):  
Nastaran Lotfi ◽  
Amir Hossein Darooneh

Synchronization is getting high attention in different fields specially in complex network area in the recent years. One of its new aspects is Chimera state in which some groups of oscillators are synchronized while the others are in the incoherent state. Here, we study how this state depends on the community structure in complex networks. In this work, we consider scale-free networks with community structures and study how the measurements such as the size of the community and mixing parameter could influence the global synchronization and chimera-like state.



2019 ◽  
Vol 6 (1) ◽  
Author(s):  
Vincenza Carchiolo ◽  
Marco Grassia ◽  
Alessandro Longheu ◽  
Michele Malgeri ◽  
Giuseppe Mangioni

AbstractMany systems are today modelled as complex networks, since this representation has been proven being an effective approach for understanding and controlling many real-world phenomena. A significant area of interest and research is that of networks robustness, which aims to explore to what extent a network keeps working when failures occur in its structure and how disruptions can be avoided. In this paper, we introduce the idea of exploiting long-range links to improve the robustness of Scale-Free (SF) networks. Several experiments are carried out by attacking the networks before and after the addition of links between the farthest nodes, and the results show that this approach effectively improves the SF network correct functionalities better than other commonly used strategies.



2018 ◽  
Vol 29 (08) ◽  
pp. 1850075
Author(s):  
Tingyuan Nie ◽  
Xinling Guo ◽  
Mengda Lin ◽  
Kun Zhao

The quantification for the invulnerability of complex network is a fundamental problem in which identifying influential nodes is of theoretical and practical significance. In this paper, we propose a novel definition of centrality named total information (TC) which derives from a local sub-graph being constructed by a node and its neighbors. The centrality is then defined as the sum of the self-information of the node and the mutual information of its neighbor nodes. We use the proposed centrality to identify the importance of nodes through the evaluation of the invulnerability of scale-free networks. It shows both the efficiency and the effectiveness of the proposed centrality are improved, compared with traditional centralities.



2018 ◽  
Vol 29 (06) ◽  
pp. 1850044 ◽  
Author(s):  
Zhichao Ju ◽  
Jinlong Ma ◽  
Jianjun Xie ◽  
Zhaohui Qi

To control the spread of cascading failure on scale-free networks, we propose a new model with the betweenness centrality and the degrees of the nodes which are combined. The effects of the parameters of the edge weight on cascading dynamics are investigated. Five metrics to evaluate the robustness of the network are given: the threshold parameter ([Formula: see text]), the proportion of collapsed edges ([Formula: see text]), the proportion of collapsed nodes ([Formula: see text]), the number of nodes in the largest connected component ([Formula: see text]) and the number of the connected component ([Formula: see text]). Compared with the degrees of nodes’ model and the betweenness of the nodes’ model, the new model could control the spread of cascading failure more significantly. This work might be helpful for preventing and mitigating cascading failure in real life, especially for small load networks.



2019 ◽  
Vol 4 (1) ◽  
Author(s):  
Nicole Balashov ◽  
Reuven Cohen ◽  
Avieli Haber ◽  
Michael Krivelevich ◽  
Simi Haber

Abstract We consider optimal attacks or immunization schemes on different models of random graphs. We derive bounds for the minimum number of nodes needed to be removed from a network such that all remaining components are fragments of negligible size.We obtain bounds for different regimes of random regular graphs, Erdős-Rényi random graphs, and scale free networks, some of which are tight. We show that the performance of attacks by degree is bounded away from optimality.Finally we present a polynomial time attack algorithm and prove its optimal performance in certain cases.



2017 ◽  
Vol 2017 ◽  
pp. 1-9 ◽  
Author(s):  
Marek Šimon ◽  
Iveta Dirgová Luptáková ◽  
Ladislav Huraj ◽  
Marián Hosťovecký ◽  
Jiří Pospíchal

Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.



Sign in / Sign up

Export Citation Format

Share Document