MODELING THE DYNAMICS OF DISASTER SPREADING FROM KEY NODES IN COMPLEX NETWORKS

2007 ◽  
Vol 18 (05) ◽  
pp. 889-901 ◽  
Author(s):  
WEN GUO WENG ◽  
SHUN JIANG NI ◽  
HONG YONG YUAN ◽  
WEI CHENG FAN

In this paper, we present the dynamics of disaster spreading from key nodes in complex networks. The key nodes have maximum and minimum out-degree nodes, which show important in spreading disaster. This paper considers directed Erdös–Rényi, scale-free and small-world networks. Using the model considering the common characteristics of infrastructure and lifeline networks, i.e., self-healing function and disaster spreading mechanism, we carry out simulations for the effects of the recovery time parameter and the time delay on the recovery rate and the number of damaged nodes. Simulation results show some typical disaster spreading characteristics, e.g., a non-equilibrium phase transition in the parameter space, disturbance from the maximum out-degree nodes resulting in more damaged effect, etc.

2015 ◽  
Vol 26 (05) ◽  
pp. 1550052 ◽  
Author(s):  
Lei Wang ◽  
Ping Wang

In this paper, we attempt to understand the propagation and stability feature of large-scale complex software from the perspective of complex networks. Specifically, we introduced the concept of "propagation scope" to investigate the problem of change propagation in complex software. Although many complex software networks exhibit clear "small-world" and "scale-free" features, we found that the propagation scope of complex software networks is much lower than that of small-world networks and scale-free networks. Furthermore, because the design of complex software always obeys the principles of software engineering, we introduced the concept of "edge instability" to quantify the structural difference among complex software networks, small-world networks and scale-free networks. We discovered that the edge instability distribution of complex software networks is different from that of small-world networks and scale-free networks. We also found a typical structure that contributes to the edge instability distribution of complex software networks. Finally, we uncovered the correlation between propagation scope and edge instability in complex networks by eliminating the edges with different instability ranges.


Author(s):  
Graziano Vernizzi ◽  
Henri Orland

This article deals with complex networks, and in particular small world and scale free networks. Various networks exhibit the small world phenomenon, including social networks and gene expression networks. The local ordering property of small world networks is typically associated with regular networks such as a 2D square lattice. The small world phenomenon can be observed in most scale free networks, but few small world networks are scale free. The article first provides a brief background on small world networks and two models of scale free graphs before describing the replica method and how it can be applied to calculate the spectral densities of the adjacency matrix and Laplacian matrix of a scale free network. It then shows how the effective medium approximation can be used to treat networks with finite mean degree and concludes with a discussion of the local properties of random matrices associated with complex networks.


2014 ◽  
Vol 513-517 ◽  
pp. 2444-2448 ◽  
Author(s):  
Bing Yao ◽  
Ming Yao ◽  
Xiang En Chen ◽  
Xia Liu ◽  
Wan Jia Zhang

Understanding the topological structure of scale-free networks or small world networks is required and useful for investigation of complex networks. We will build up a class of edge-growing network models and provide an algorithm for finding spanning trees of edge-growing network models in this article.


2007 ◽  
Vol 10 (02) ◽  
pp. 117-141 ◽  
Author(s):  
JINQING FANG ◽  
QIAO BI ◽  
YONG LI ◽  
XIN-BIAO LU ◽  
QIANG LIU

The current interest in complex networks is a part of a broader movement towards research on complex systems. Motivation of this work raises the two challenging questions: (i) Are real networks fundamentally random preferential attached without any deterministic attachment for both un-weighted and weighted networks? (ii) Is there a coherent physical idea and model for unifying the study of the formation mechanism of complex networks? To answer these questions, we propose a harmonious unifying hybrid preferential model (HUHPM) to a certain class of complex networks, which is controlled by a hybrid ratio, d/r, and study their behavior both numerically and analytically. As typical examples, we apply the concepts and method of the HUHPM to un-weighted scale-free networks proposed by Barabasi and Albert (BA), weighted evolving networks proposed by Barras, Bartholomew and Vespignani (BBV), and the traffic driven evolution (TDE) networks proposed by Wang et al., to get the so-called HUHPM-BA, HUHPM-BBV and HUHPM-TDE networks. All the findings of topological properties in the above three typical HUHPM networks give certain universal meaningful results which reveal some essential hybrid mechanisms for the formation of nontrivial scale-free and small-world networks.


2017 ◽  
Vol 31 (27) ◽  
pp. 1750252 ◽  
Author(s):  
Lin Ding ◽  
Victor C. M. Leung ◽  
Min-Sheng Tan

The robustness of complex networks against cascading failures has been of great interest, while most of the researchers have considered undirected networks. However, to be more realistic, a part of links of many real systems should be described as unidirectional. In this paper, by applying three link direction-determining (DD) strategies, the tolerance of cascading failures is investigated in various networks with both unidirectional and bidirectional links. By extending the utilization of a classical global betweenness method, we propose a new cascading model, taking into account the weights of nodes and the directions of links. Then, the effects of unidirectional links on the network robustness against cascaded attacks are examined under the global load-based distribution mechanism. The simulation results show that the link-directed methods could not always lead to the decrease of the network robustness as indicated in the previous studies. For small-world networks, these methods certainly make the network weaker. However, for scale-free networks, the network robustness can be significantly improved by the link-directed method, especially for the method with non-random DD strategies. These results are independent of the weight parameter of the nodes. Due to the strongly improved robustness and easy realization with low cost on networks, the method for enforcing proper links to the unidirectional ones may be useful for leading to insights into the control of cascading failures in real-world networks, like communication and transportation networks.


2013 ◽  
Vol 2013 ◽  
pp. 1-8 ◽  
Author(s):  
Faxu Li ◽  
Liang Wei ◽  
Haixing Zhao ◽  
Feng Hu

Subgraph centrality measure characterizes the participation of each node in all subgraphs in a network. Smaller subgraphs are given more weight than large ones, which makes this measure appropriate for characterizing network motifs. This measure is better in being able to discriminate the nodes of a network than alternate measures. In this paper, the important issue of subgraph centrality distributions is investigated through theory-guided extensive numerical simulations, for three typical complex network models, namely, the ER random-graph networks, WS small-world networks, and BA scale-free networks. It is found that these three very different types of complex networks share some common features, particularly that the subgraph centrality distributions in increasing order are all insensitive to the network connectivity characteristics, and also found that the probability distributions of subgraph centrality of the ER and of the WS models both follow the gamma distribution, and the BA scale-free networks exhibit a power-law distribution with an exponential cutoff.


Author(s):  
Pengli Lu ◽  
Wei chen

Identifying the vital nodes in complex networks is essential in disease transmission control and network attack protection. In this paper, in order to identify the vital nodes, we define a centrality method named EMDC, which is based on information entropy, minimum dominating set (MDS) and the distance between node pairs. This method calculates the local spreading capability (LSC) of node by information entropy and selects that nodes have the largest value of LSC as core nodes by MDS. Then it defines the node’s spreading capability (SC) to use the sum of weighted distances from a node to the core nodes. Finally, the nodes are ranked by considering SC of their neighbors. The key nodes can be further identified in complex networks. In order to verify the effectiveness of this method, key nodes identification simulation experiments are carried out on 11 real networks, Scale-Free (BA) networks and Small-World (WS) networks, respectively. Experimental results show that this method can more effectively identify the influence of nodes in the networks.


2009 ◽  
Vol 19 (02) ◽  
pp. 623-628 ◽  
Author(s):  
XIN-JIAN XU ◽  
GUANRONG CHEN

We present a time-delayed SIS model on complex networks to study epidemic spreading. We found that the existence of delay will affect, and oftentimes enhance, both outbreak and prevalence of infectious diseases in the networks. For small-world networks, we found that the epidemic threshold and the delay time have a power-law relation. For scale-free networks, we found that for a given transmission rate, the epidemic prevalence has an exponential form, which can be analytically obtained, and it decays as the delay time increases. We confirm all results by sufficient numerical simulations.


2013 ◽  
Vol 2013 ◽  
pp. 1-10 ◽  
Author(s):  
Shudong Li ◽  
Lixiang Li ◽  
Yan Jia ◽  
Xinran Liu ◽  
Yixian Yang

In the research on network security, distinguishing the vulnerable components of networks is very important for protecting infrastructures systems. Here, we probe how to identify the vulnerable nodes of complex networks in cascading failures, which was ignored before. Concerned with random attack (RA) and highest load attack (HL) on nodes, we model cascading dynamics of complex networks. Then, we introduce four kinds of weighting methods to characterize the nodes of networks including Barabási-Albert scale-free networks (SF), Watts-Strogatz small-world networks (WS), Erdos-Renyi random networks (ER), and two real-world networks. The simulations show that, for SF networks under HL attack, the nodes with small value of the fourth kind of weight are the most vulnerable and the ones with small value of the third weight are also vulnerable. Also, the real-world autonomous system with power-law distribution verifies these findings. Moreover, for WS and ER networks under both RA and HL attack, when the nodes have low tolerant ability, the ones with small value of the fourth kind of weight are more vulnerable and also the ones with high degree are easier to break down. The results give us important theoretical basis for digging the potential safety loophole and making protection strategy.


Author(s):  
Stefan Thurner ◽  
Rudolf Hanel ◽  
Peter Klimekl

Understanding the interactions between the components of a system is key to understanding it. In complex systems, interactions are usually not uniform, not isotropic and not homogeneous: each interaction can be specific between elements.Networks are a tool for keeping track of who is interacting with whom, at what strength, when, and in what way. Networks are essential for understanding of the co-evolution and phase diagrams of complex systems. Here we provide a self-contained introduction to the field of network science. We introduce ways of representing and handle networks mathematically and introduce the basic vocabulary and definitions. The notions of random- and complex networks are reviewed as well as the notions of small world networks, simple preferentially grown networks, community detection, and generalized multilayer networks.


Sign in / Sign up

Export Citation Format

Share Document