A signature of power law network dynamics
نویسندگان
چکیده
Can one hear the 'sound' of a growing network? We address the problem of recognizing the topology of evolving biological or social networks. Starting from percolation theory, we analytically prove a linear inverse relationship between two simple graph parameters—the logarithm of the average cluster size and logarithm of the ratio of the edges of the graph to the theoretically maximum number of edges for that graph—that holds for all growing power law graphs. The result establishes a novel property of evolving power-law networks in the asymptotic limit of network size. Numerical simulations as well as fitting to real-world citation co-authorship networks demonstrate that the result holds for networks of finite sizes, and provides a convenient measure of the extent to which an evolving family of networks belongs to the same power-law class. 3 Mark Kac posed the question " Can one hear the shape of a drum? " (1), asking whether one could infer the geometric shape of a drum from its vibrational modes. Here we explore a similar question about the evolution of complex networks. The structure and properties of complex networks (2-4), such as the Internet (5, 6), citation networks (7), biological interaction network such as metabolic (8), protein-interaction networks (9), and disease-gene network (10) have been investigated intensively over the past decade. Many of these real world networks belong to the power-law family where the number of nodes with neighbors, , scales as a power law of the form where is the scaling coefficient (11). Several mechanisms by which power law networks arise through evolutionary mechanisms were proposed by considering the structure of the real-world network as a target and by constructing models of network growth that produce such a network given an arbitrary seed graph as the initial condition (12-15). An important problem that arises in evaluating models of network evolution and in testing these against real data is the need to definitively characterize experimentally determined networks as belonging to the power-law family (16). Here we consider a related problem—given a time-series of network structure data, can one deduce whether the collection of networks belongs to the same power-law class? In percolation theory (17), the vertices of a lattice are " occupied " or connected with a certain probability , and the emergence of connected clusters are studied as a function of. Of interest is the existence of a path that would allow a liquid, as …
منابع مشابه
Using the Theory of Network in Finance
It is very important for managers, investors and financial policy-makers to detect and analyze factors affecting financial markets to obtain optimal decision and reduce risks. The importance of market analysis and attempt to improve its behavior understanding, has led analysts to use the experiences of other professionals in the fields such as social sciences and mathematics to examine the inte...
متن کاملتولید خودکار الگوهای نفوذ جدید با استفاده از طبقهبندهای تک کلاسی و روشهای یادگیری استقرایی
In this paper, we propose an approach for automatic generation of novel intrusion signatures. This approach can be used in the signature-based Network Intrusion Detection Systems (NIDSs) and for the automation of the process of intrusion detection in these systems. In the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...
متن کاملAvalanches in a Stochastic Model of Spiking Neurons
Neuronal avalanches are a form of spontaneous activity widely observed in cortical slices and other types of nervous tissue, both in vivo and in vitro. They are characterized by irregular, isolated population bursts when many neurons fire together, where the number of spikes per burst obeys a power law distribution. We simulate, using the Gillespie algorithm, a model of neuronal avalanches base...
متن کاملReal Time Dynamic Simulation of Power System Using Multiple Microcomputers
Recent developments in the design and manufacture of microcomputers together with improved simulation techniques make it possible to achieve the speed and accuracy required for the dynamic simulation of power systems in real time. This paper presents some experimental results and outlines new ideas on hardware architecture, mathematical algorithms and software development for this purpose. The ...
متن کاملImprovement and parallelization of Snort network intrusion detection mechanism using graphics processing unit
Nowadays, Network Intrusion Detection Systems (NIDS) are widely used to provide full security on computer networks. IDS are categorized into two primary types, including signature-based systems and anomaly-based systems. The former is more commonly used than the latter due to its lower error rate. The core of a signature-based IDS is the pattern matching. This process is inherently a computatio...
متن کاملInvestigation of Melting by Molecular Dynamics Simulation
The melting of a 64 ion microcrystal of KCI was studied by means of a molecular dynamics computer simulation. We used a central pair interaction with an inverse power law repulsion. The thermodynamics, kinetic and structural properties such as melting temperature, latent heat, mean square displacement, diffusion constant, radial distribution function and bond angle distribution are calculated. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1404.2374 شماره
صفحات -
تاریخ انتشار 2014