A new model explaining the origin of different topologies in interaction networks

2018 ◽  
Author(s):  
Rafael B. P. Pinheiro ◽  
Gabriel M. F. Félix ◽  
Carsten F. Dormann ◽  
Marco A. R. Mello

AbstractThe architecture of interaction networks has been extensively studied in the past decades, and different topologies have been observed in natural systems. Despite several phenomenological explanations proposed, we still understand little of the mechanisms that generate those topologies. Here we present a mechanistic model based on the integrative hypothesis of specialization, which aims at explaining the emergence of topology and specialization in consumer-resource networks. By following three first-principles and adjusting five parameters, our model was able to generate synthetic weighted networks that show the main patterns of topology and specialization observed in nature. Our results prove that topology emergence is possible without network-level selection. In our simulations, the intensity of trade-offs in the performance of each consumer species on different resource species is the main factor driving network topology. We predict that interaction networks with low species diversity and low dissimilarity between resources should have a nested topology, although more diverse networks with large dissimilarity should have a compound topology. Additionally, our results highlight scale as a key factor. Our model generates predictions consistent with ecological and evolutionary theories and real-world observations. Therefore, it supports the IHS as a useful conceptual framework to study the architecture of interaction networks.

This volume combines philosophical analysis with normative legal theory. Although both disciplines have spent the past fifty years investigating the nature of the principles of necessity and proportionality, these discussions were all too often walled off from each other. However, the boundaries of these disciplinary conversations have recently broken down, and this volume continues the cross-disciplinary effort by bringing together philosophers concerned with the real-world military implications of their theories and legal scholars who frequently build doctrinal arguments from first principles, many of which herald from the historical just war tradition or from the contemporary just war literature. What unites the chapters into a singular conversation is their common skepticism regarding whether the traditional doctrines, in both law and philosophy, have correctly valued the lives of civilians and combatants at war. The arguments outlined in this volume reveal a set of principles, including necessity and proportionality, whose core essence remains essentially contested. What does military necessity mean and are soldiers always subject to lethal force? What is proportionality and how should military commanders attach a value to a military target and weigh it against collateral damage? Do these valuations remain the same for both sides of the conflict? From the secure viewpoint of the purely descriptive, lawyers might confidently describe some of these questions as settled. But many others, even from the vantage point of descriptive theory, remain under-analyzed and radically lacking in clarity and certainty.


Author(s):  
Lennart E. Nacke

This chapter presents the physiological metrics used in Games User Research (GUR). Aimed at GUR professionals in the games industry, it explains what methods are available to researchers to measure biometric data while subjects are engaged in play. It sets out when it is appropriate to use biometric measures in GUR projects, the kind of data generated, and the differing ways it can be analysed. The chapter also discusses the trade-offs required when interpreting physiological data, and will help games researchers to make informed decisions about which research questions can benefit from biometric methodologies. As the equipment needed to collect biometric data becomes more sophisticated as well as cheaper, physiological testing of players during a game’s development will become more common. At the same time, Games User Researchers will become more discriminating in its use. Where in the past professionals in the games industry have used biometric testing to generate quick, actionable feedback about player responses to elements of a game, and have been less concerned with the scientific robustness of their methodology, as GUR develops a new breed of games industry professionals are attempting to deploy good academic practice in their researches.


Nanoscale ◽  
2021 ◽  
Author(s):  
Jinsong Xiong ◽  
Qinghuan Bian ◽  
Shuijin Lei ◽  
Yatian Deng ◽  
Kehan Zhao ◽  
...  

Near-infrared (NIR) light induced photothermal cancer therapy using nanomaterials as photothermal agents has attracted considerable research interest over the past few years. As the key factor in the photothermal therapy...


2020 ◽  
Vol 1 (2) ◽  
pp. 176-180
Author(s):  
T. Zh. Yeginbayeva ◽  

Global processes in the musical culture of Kazakhstan are the result of the numerous events that have taken place in the country over the past 20 years. The independence of the state has become a key factor that has had a decisive impact on the economic, socio-political and cultural development of the country. We have entered a new life, which has a rich cultural heritage and was carefully preserved by our ancestors. One of the proofs is the history of Kazakh kobyz art from ancient times to the present day. Modern kobyz art is closely connected with ancient history and has a rich natural tendency for new development, based on centuries of experience. Therefore, kobyz music of the XXth–XXIst centuries absorbed the traditions of European genres and styles, and is widely used in mass music, in various directions of ethnorock, art-rock, folk and others. Two lines of development of music for kobyz and music on kobyz existed in ancient times and nowadays. From here comes the divergence of creative direction among modern composers and in ensemble performance.


Molecules ◽  
2018 ◽  
Vol 24 (1) ◽  
pp. 30 ◽  
Author(s):  
Jingpu Zhang ◽  
Lei Deng

In the past few decades, the number and variety of genomic and proteomic data available have increased dramatically. Molecular or functional interaction networks are usually constructed according to high-throughput data and the topological structure of these interaction networks provide a wealth of information for inferring the function of genes or proteins. It is a widely used way to mine functional information of genes or proteins by analyzing the association networks. However, it remains still an urgent but unresolved challenge how to combine multiple heterogeneous networks to achieve more accurate predictions. In this paper, we present a method named ReprsentConcat to improve function inference by integrating multiple interaction networks. The low-dimensional representation of each node in each network is extracted, then these representations from multiple networks are concatenated and fed to gcForest, which augment feature vectors by cascading and automatically determines the number of cascade levels. We experimentally compare ReprsentConcat with a state-of-the-art method, showing that it achieves competitive results on the datasets of yeast and human. Moreover, it is robust to the hyperparameters including the number of dimensions.


2020 ◽  
Vol 9 (2) ◽  
pp. 130-139
Author(s):  
Saraswati Saraswati ◽  
Elsafira Maghfiroti Resyanta

The background of this study is to examine the profile of child terrorist and the motivation behind the crime of terrorism in children by using child development theory and sosial ecology theory. This research is a qualitative study using a phenomenology approach. The phenomenology approach aims to describe the meaning of the life experience of a terrorist child so that the level of belief or paradigm of the terrorist child changes, so to learn and understand it must be based on the point of view of a terrorist child as a subject who directly experiences the incident. The subject of this research is a child who commits a terrorist crime. Data collection techniques by conducting deep interviews, observation and documentation study. This research was conducted at the Juvenile Penitentiary Class I Tangerang (LPKA). The results of this study indicate that the profile picture of a child terrorist can be assessed based on the child's speaking style, behavior, motivation, beliefs, and experiences in the past. The main factor for a child committing a terrorist crime comes from the lack of figures and supervision from parents in their teens so that children look for other figures to be used as examples.


2005 ◽  
Author(s):  
Frank DeBord ◽  
Harry Dunning

Over the past few years several advanced concepts have gained wider acceptance from owners of large racing yachts and organizers of major international events. Two of these concepts, water ballast and canting keels, were evaluated during the design of the maxZ86 yachts Pyewacket and Morning Glory. This paper presents the key design features of these large movable ballast racing yachts and compares their performance to conventional racing yachts of similar size. Comparisons include results of physical model tests, CFD analysis using a panel code, velocity prediction program modeling, and sailing data from the existing boats. These results are accompanied by physical explanations of the differences, and the special testing and analysis requirements for the movable-ballast configurations are detailed. Finally, some of the design issues unique to the movable-ballast concepts and design trade-offs are discussed.


2010 ◽  
pp. 2310-2325
Author(s):  
Adam Slagell ◽  
Kiran Lakkaraju

It is desirable for many reasons to share information, particularly computer and network logs. Researchers need it for experiments, incident responders need it for collaborative security, and educators need this data for real world examples. However, the sensitive nature of this information often prevents its sharing. Anonymization techniques have been developed in recent years that help reduce risk and navigate the trade-offs between privacy, security and the need to openly share information. This chapter looks at the progress made in this area of research over the past several years, identifies the major problems left to solve and sets a roadmap for future research.


AJIL Unbound ◽  
2017 ◽  
Vol 111 ◽  
pp. 344-348 ◽  
Author(s):  
Helen Keller ◽  
Severin Meier

Jeffrey L. Dunoff and Mark A. Pollack's article is an important and very welcome contribution to the discussion about judicial values. The authors argue that with respect to judicial independence, transparency, and accountability “judicial systems face inherent trade-offs, such that any given court can maximize two, but not all three, of these features.” In our eyes, the article's most important contribution is its holistic view: it shows why these three judicial values can only be understood in their interconnectedness. It is, for instance, not meaningful to make a statement about the correlation between transparency and independence without also taking accountability into the equation. This is because the effect of transparency on independence can only be understood if information about judicial accountability is at one's disposal. In the past, these judicial values have often been analyzed in an isolated manner, thereby leading to wrong conclusions. The Judicial Trilemma will hopefully help in shifting the discourse from isolated to holistic views on independence, transparency, and accountability. Moreover, Dunoff and Pollack lay the groundwork for a meaningful normative discussion of these three judicial values. Any debate about how to structure (international) courts should henceforth take Dunoff and Pollack's holistic view as a basis for discussion.


Sign in / Sign up

Export Citation Format

Share Document