A multi-local-world model is introduced to describe the evolving networks that have a localization property such as the Internet. Based on this model, we show that the traffic load defined by 'betweenness centrali...A multi-local-world model is introduced to describe the evolving networks that have a localization property such as the Internet. Based on this model, we show that the traffic load defined by 'betweenness centrality' on the multi-local-world scale-free networks' model also follows a power law form. In this kind of network, a few vertices have heavier loads and so play more important roles than the others in the network.展开更多
This study considers the performance impacts of false data injection attacks on the cascading failures of a power cyber-physical system,and identifies vulnerable nodes.First,considering the monitoring and control func...This study considers the performance impacts of false data injection attacks on the cascading failures of a power cyber-physical system,and identifies vulnerable nodes.First,considering the monitoring and control functions of a cyber network and power flow characteristics of a power network,a power cyber-physical system model is established.Then,the influences of a false data attack on the decision-making and control processes of the cyber network communication processes are studied,and a cascading failure analysis process is proposed for the cyber-attack environment.In addition,a vulnerability evaluation index is defined from two perspectives,i.e.,the topology integrity and power network operation characteristics.Moreover,the effectiveness of a power flow betweenness assessment for vulnerable nodes in the cyberphysical environment is verified based on comparing the node power flow betweenness and vulnerability assessment index.Finally,an IEEE14-bus power network is selected for constructing a power cyber-physical system.Simulations show that both the uplink communication channel and downlink communication channel suffer from false data attacks,which affect the ability of the cyber network to suppress the propagation of cascading failures,and expand the scale of the cascading failures.The vulnerability evaluation index is calculated for each node,so as to verify the effectiveness of identifying vulnerable nodes based on the power flow betweenness.展开更多
We explore the robustness of a network against failures of vertices or edges where a fraction of vertices is removed and an overload model based on betweenness is constructed.It is assumed that the load and capacity o...We explore the robustness of a network against failures of vertices or edges where a fraction of vertices is removed and an overload model based on betweenness is constructed.It is assumed that the load and capacity of vertex are correlated with its betweenness centrality B_(i)as B_(i)^(θ)and(1+α)B_(i)^(θ)(θis the strength parameter,αis the tolerance parameter).We model the cascading failures following a local load preferential sharing rule.It is found that there exists a minimal whenθis between 0 and 1,and its theoretical analysis is given.The minimalα_(c)characterizes the strongest robustness of a network against cascading failures triggered by removing a random fraction f of vertices.It is realized that the minimalα_(c)increases with the increase of the removal fraction f or the decrease of average degree.In addition,we compare the robustness of networks whose overload models are characterized by degree and betweenness,and find that the networks based on betweenness have stronger robustness against the random removal of a fraction f of vertices.展开更多
In this paper, we propose two methods to enhance the synchronizability of a class of complex networks which do not hold the positive correlation between betweenness centrality (BC) and degree of a node, and observe ...In this paper, we propose two methods to enhance the synchronizability of a class of complex networks which do not hold the positive correlation between betweenness centrality (BC) and degree of a node, and observe other topology characteristics of the network affected by the methods. Numerical simulations show that both methods can effectively enhance the synchronizability of this kind of networks. Furthermore, we show that the maximal BC of all edges is an important factor to affect the network synchronizability, although it is not the unique factor.展开更多
By considering the flow control of urban sewer networks to minimize the electricity consumption of pumping stations, a decomposition-coordination strategy for energy savings based on network community division is deve...By considering the flow control of urban sewer networks to minimize the electricity consumption of pumping stations, a decomposition-coordination strategy for energy savings based on network community division is developed in this paper. A mathematical model characterizing the steady-state flow of urban sewer networks is first constructed, consisting of a set of algebraic equations with the structure transportation capacities captured as constraints. Since the sewer networks have no apparent natural hierarchical structure in general, it is very difficult to identify the clustered groups. A fast network division approach through calculating the betweenness of each edge is successfully applied to identify the groups and a sewer network with arbitrary configuration could be then decomposed into subnetworks. By integrating the coupling constraints of the subnetworks, the original problem is separated into N optimization subproblems in accordance with the network decomposition. Each subproblem is solved locally and the solutions to the subproblems are coordinated to form an appropriate global solution. Finally, an application to a specified large-scale sewer network is also investigated to demonstrate the validity of the proposed algorithm.展开更多
This paper explores traffic dynamics and performance of complex networks. Complex networks of various structures are studied. We use node betweenness centrality, network polarization, and average path length to captur...This paper explores traffic dynamics and performance of complex networks. Complex networks of various structures are studied. We use node betweenness centrality, network polarization, and average path length to capture the structural characteristics of a network. Network throughput, delay, and packet loss are used as network performance measures. We investigate how internal traffic, through put, delay, and packet loss change as a function of packet generation rate, network structure, queue type, and queuing discipline through simulation. Three network states are classified. Further, our work reveals that the parameters chosen to reflect network structure, including node betweenness centrality, network polarization, and average path length, play important roles in different states of the underlying networks.展开更多
We present an energy-based method to estimate centrality in electrical networks. Here the energy between a pair of vertices denotes by the effective resistance between them. If there is only one generation and one loa...We present an energy-based method to estimate centrality in electrical networks. Here the energy between a pair of vertices denotes by the effective resistance between them. If there is only one generation and one load, then the centrality of an edge in our method is the difference between the energy of network after deleting the edge and that of the original network. Compared with the local current-flow betweenness on the IEEE 14-bus system, we have an interesting discovery that our proposed centrality is closely related to it in the sense of that the significance of edges under the two measures are very similar.展开更多
This research uses random networks as benchmarks for inferential tests of network structures. Specifically, we develop formulas for expected values and confidence intervals for four frequently employed social network ...This research uses random networks as benchmarks for inferential tests of network structures. Specifically, we develop formulas for expected values and confidence intervals for four frequently employed social network centrality indices. The first study begins with analyses of stylized networks, which are then perturbed with increasing levels of random noise. When the indices achieve their values for fully random networks, the indices reveal systematic relationships that generalize across network forms. The second study then delves into the relationships between numbers of actors in a network and the density of a network for each of the centrality indices. In doing so, expected values are easily calculated, which in turn enable chi-square tests of network structure. Furthermore, confidence intervals are developed to facilitate a network analyst’s understanding as to which patterns in the data are merely random, versus which are structurally significantly distinct.展开更多
Betweenness centrality helps researcher to master the changes of the system from the overall perspective in software network. The existing betweenness centrality algorithm has high time complexity but low accuracy. Th...Betweenness centrality helps researcher to master the changes of the system from the overall perspective in software network. The existing betweenness centrality algorithm has high time complexity but low accuracy. Therefore, Layer First Searching (LFS) algorithm is proposed that is low in time complexity and high in accuracy. LFS algorithm searches the nodes with the shortest to the designated node, then travels all paths and calculates the nodes on the paths, at last get the times of each node being traveled which is betweenness centrality. The time complexity of LFS algorithm is O(V2).展开更多
Temporal lobe resection is an important treatment option for epilepsy that involves removal of potentially essential brain regions. Selective amygdalohippocampectomy is a widely performed temporal lobe surgery. We sug...Temporal lobe resection is an important treatment option for epilepsy that involves removal of potentially essential brain regions. Selective amygdalohippocampectomy is a widely performed temporal lobe surgery. We suggest starting the incision for selective amygdalohippocampectomy at the inferior temporal gyrus based on diffusion magnetic resonance imaging(MRI) tractography. Diffusion MRI data from 20 normal participants were obtained from Parkinson's Progression Markers Initiative(PPMI) database(www.ppmi-info.org). A tractography algorithm was applied to extract neuronal fiber information for the temporal lobe, hippocampus, and amygdala. Fiber information was analyzed in terms of the number of fibers and betweenness centrality. Distances between starting incisions and surgical target regions were also considered to explore the length of the surgical path. Middle temporal and superior temporal gyrus regions have higher connectivity values than the inferior temporal gyrus and thus are not good candidates for starting the incision. The distances between inferior temporal gyrus and surgical target regions were shorter than those between middle temporal gyrus and target regions. Thus, the inferior temporal gyrus is a good candidate for starting the incision. Starting the incision from the inferior temporal gyrus would spare the important(in terms of betweenness centrality values) middle region and shorten the distance to the target regions of the hippocampus and amygdala.展开更多
As a great challenge of network virtualization, virtual network embedding/mapping is increasingly important. It aims to successfully and efficiently assign the nodes and links of a virtual network (VN) onto a shared...As a great challenge of network virtualization, virtual network embedding/mapping is increasingly important. It aims to successfully and efficiently assign the nodes and links of a virtual network (VN) onto a shared substrate network. The problem has been proved to be NP-hard and some heuristic algorithms have been proposed. However, most of the algorithms use only the local information of a node, such as CPU capacity and bandwidth, to determine how to map a VN, without considering the top- ological attributes which may pose significant impact on the performance of the embedding. In this paper, a new embedding algorithm is proposed based on real-time topological attributes. The concept ofbetweenness centrality in graph theory is borrowed to sort the nodes of VNs, and the nodes of the substrate network are sorted according to the correlation properties between the former selected and unselected nodes. In this way, node mapping and link mapping can be well coupled. A simulator is built to evaluate the performance of the proposed virtual network embedding (VNE) algorithm. The results show that the new algorithm significantly increases the revenue/cost (R/C) ratio and acceptance ratio as well as reduces the runtime.展开更多
An adaptive predictive pinning control is proposed to suppress the cascade in coupled map lattices (CMLs).Two monitoring strategies are applied:(1) A specific fraction of nodes with the highest degree or betweenness a...An adaptive predictive pinning control is proposed to suppress the cascade in coupled map lattices (CMLs).Two monitoring strategies are applied:(1) A specific fraction of nodes with the highest degree or betweenness are chosen to constitute the set of monitored nodes;(2) During the cascade,an adaptive pinning control is implemented,in which only the nodes in the monitored set whose current state is normal but whose predictive state is abnormal,are pinned with the predictive controller.Simulations show that for the scale-free (SF) CML the degree-based monitoring strategy is advantageous over the betweenness-based strategy,while for the small-world (SW) CML the situation is the opposite.With the adaptive predictive pinning control,the fewer local controllers can effectively suppress the cascade throughout the whole network.展开更多
基金This work was supported by the Hong Kong Research Grants Council under the CERG Grants CityU 1031/01E and 1115/03E.
文摘A multi-local-world model is introduced to describe the evolving networks that have a localization property such as the Internet. Based on this model, we show that the traffic load defined by 'betweenness centrality' on the multi-local-world scale-free networks' model also follows a power law form. In this kind of network, a few vertices have heavier loads and so play more important roles than the others in the network.
基金the National Natural Science Foundation of China(61873057)the Education Department of Jilin Province(JJKH20200118KJ).
文摘This study considers the performance impacts of false data injection attacks on the cascading failures of a power cyber-physical system,and identifies vulnerable nodes.First,considering the monitoring and control functions of a cyber network and power flow characteristics of a power network,a power cyber-physical system model is established.Then,the influences of a false data attack on the decision-making and control processes of the cyber network communication processes are studied,and a cascading failure analysis process is proposed for the cyber-attack environment.In addition,a vulnerability evaluation index is defined from two perspectives,i.e.,the topology integrity and power network operation characteristics.Moreover,the effectiveness of a power flow betweenness assessment for vulnerable nodes in the cyberphysical environment is verified based on comparing the node power flow betweenness and vulnerability assessment index.Finally,an IEEE14-bus power network is selected for constructing a power cyber-physical system.Simulations show that both the uplink communication channel and downlink communication channel suffer from false data attacks,which affect the ability of the cyber network to suppress the propagation of cascading failures,and expand the scale of the cascading failures.The vulnerability evaluation index is calculated for each node,so as to verify the effectiveness of identifying vulnerable nodes based on the power flow betweenness.
基金the National Natural Science Foundation of China(Grant Nos.71771186,71631001,and 72071153)the Natural Science Foundation of Shaanxi Province,China(Grant Nos.2020JM-486 and 2020JM-486).
文摘We explore the robustness of a network against failures of vertices or edges where a fraction of vertices is removed and an overload model based on betweenness is constructed.It is assumed that the load and capacity of vertex are correlated with its betweenness centrality B_(i)as B_(i)^(θ)and(1+α)B_(i)^(θ)(θis the strength parameter,αis the tolerance parameter).We model the cascading failures following a local load preferential sharing rule.It is found that there exists a minimal whenθis between 0 and 1,and its theoretical analysis is given.The minimalα_(c)characterizes the strongest robustness of a network against cascading failures triggered by removing a random fraction f of vertices.It is realized that the minimalα_(c)increases with the increase of the removal fraction f or the decrease of average degree.In addition,we compare the robustness of networks whose overload models are characterized by degree and betweenness,and find that the networks based on betweenness have stronger robustness against the random removal of a fraction f of vertices.
基金The project supported by National Natural Science Foundation of China under Grant Nos.70431002 and 60674045
文摘In this paper, we propose two methods to enhance the synchronizability of a class of complex networks which do not hold the positive correlation between betweenness centrality (BC) and degree of a node, and observe other topology characteristics of the network affected by the methods. Numerical simulations show that both methods can effectively enhance the synchronizability of this kind of networks. Furthermore, we show that the maximal BC of all edges is an important factor to affect the network synchronizability, although it is not the unique factor.
基金the National Natural Science Foundation of China (No.60674041, 60504026)the National High Technology Project(No.2006AA04Z173).
文摘By considering the flow control of urban sewer networks to minimize the electricity consumption of pumping stations, a decomposition-coordination strategy for energy savings based on network community division is developed in this paper. A mathematical model characterizing the steady-state flow of urban sewer networks is first constructed, consisting of a set of algebraic equations with the structure transportation capacities captured as constraints. Since the sewer networks have no apparent natural hierarchical structure in general, it is very difficult to identify the clustered groups. A fast network division approach through calculating the betweenness of each edge is successfully applied to identify the groups and a sewer network with arbitrary configuration could be then decomposed into subnetworks. By integrating the coupling constraints of the subnetworks, the original problem is separated into N optimization subproblems in accordance with the network decomposition. Each subproblem is solved locally and the solutions to the subproblems are coordinated to form an appropriate global solution. Finally, an application to a specified large-scale sewer network is also investigated to demonstrate the validity of the proposed algorithm.
文摘This paper explores traffic dynamics and performance of complex networks. Complex networks of various structures are studied. We use node betweenness centrality, network polarization, and average path length to capture the structural characteristics of a network. Network throughput, delay, and packet loss are used as network performance measures. We investigate how internal traffic, through put, delay, and packet loss change as a function of packet generation rate, network structure, queue type, and queuing discipline through simulation. Three network states are classified. Further, our work reveals that the parameters chosen to reflect network structure, including node betweenness centrality, network polarization, and average path length, play important roles in different states of the underlying networks.
文摘We present an energy-based method to estimate centrality in electrical networks. Here the energy between a pair of vertices denotes by the effective resistance between them. If there is only one generation and one load, then the centrality of an edge in our method is the difference between the energy of network after deleting the edge and that of the original network. Compared with the local current-flow betweenness on the IEEE 14-bus system, we have an interesting discovery that our proposed centrality is closely related to it in the sense of that the significance of edges under the two measures are very similar.
文摘This research uses random networks as benchmarks for inferential tests of network structures. Specifically, we develop formulas for expected values and confidence intervals for four frequently employed social network centrality indices. The first study begins with analyses of stylized networks, which are then perturbed with increasing levels of random noise. When the indices achieve their values for fully random networks, the indices reveal systematic relationships that generalize across network forms. The second study then delves into the relationships between numbers of actors in a network and the density of a network for each of the centrality indices. In doing so, expected values are easily calculated, which in turn enable chi-square tests of network structure. Furthermore, confidence intervals are developed to facilitate a network analyst’s understanding as to which patterns in the data are merely random, versus which are structurally significantly distinct.
文摘Betweenness centrality helps researcher to master the changes of the system from the overall perspective in software network. The existing betweenness centrality algorithm has high time complexity but low accuracy. Therefore, Layer First Searching (LFS) algorithm is proposed that is low in time complexity and high in accuracy. LFS algorithm searches the nodes with the shortest to the designated node, then travels all paths and calculates the nodes on the paths, at last get the times of each node being traveled which is betweenness centrality. The time complexity of LFS algorithm is O(V2).
基金supported by the National Research Foundation of Korea,No.20100023233
文摘Temporal lobe resection is an important treatment option for epilepsy that involves removal of potentially essential brain regions. Selective amygdalohippocampectomy is a widely performed temporal lobe surgery. We suggest starting the incision for selective amygdalohippocampectomy at the inferior temporal gyrus based on diffusion magnetic resonance imaging(MRI) tractography. Diffusion MRI data from 20 normal participants were obtained from Parkinson's Progression Markers Initiative(PPMI) database(www.ppmi-info.org). A tractography algorithm was applied to extract neuronal fiber information for the temporal lobe, hippocampus, and amygdala. Fiber information was analyzed in terms of the number of fibers and betweenness centrality. Distances between starting incisions and surgical target regions were also considered to explore the length of the surgical path. Middle temporal and superior temporal gyrus regions have higher connectivity values than the inferior temporal gyrus and thus are not good candidates for starting the incision. The distances between inferior temporal gyrus and surgical target regions were shorter than those between middle temporal gyrus and target regions. Thus, the inferior temporal gyrus is a good candidate for starting the incision. Starting the incision from the inferior temporal gyrus would spare the important(in terms of betweenness centrality values) middle region and shorten the distance to the target regions of the hippocampus and amygdala.
基金Project supported by the National Basic Research Program (973) of China (No. 2012CB315801), the National Natural Science Foundation of China (Nos. 61302089 and 61300184), and the Fundamental Research Funds for the Central Universities, China (No. 2013RC0113)
文摘As a great challenge of network virtualization, virtual network embedding/mapping is increasingly important. It aims to successfully and efficiently assign the nodes and links of a virtual network (VN) onto a shared substrate network. The problem has been proved to be NP-hard and some heuristic algorithms have been proposed. However, most of the algorithms use only the local information of a node, such as CPU capacity and bandwidth, to determine how to map a VN, without considering the top- ological attributes which may pose significant impact on the performance of the embedding. In this paper, a new embedding algorithm is proposed based on real-time topological attributes. The concept ofbetweenness centrality in graph theory is borrowed to sort the nodes of VNs, and the nodes of the substrate network are sorted according to the correlation properties between the former selected and unselected nodes. In this way, node mapping and link mapping can be well coupled. A simulator is built to evaluate the performance of the proposed virtual network embedding (VNE) algorithm. The results show that the new algorithm significantly increases the revenue/cost (R/C) ratio and acceptance ratio as well as reduces the runtime.
基金Project supported by the National Natural Science Foundation of China (No. 60804045)the Zhejiang Provincial Natural Science Foundation of China (No. Y1110229)
文摘An adaptive predictive pinning control is proposed to suppress the cascade in coupled map lattices (CMLs).Two monitoring strategies are applied:(1) A specific fraction of nodes with the highest degree or betweenness are chosen to constitute the set of monitored nodes;(2) During the cascade,an adaptive pinning control is implemented,in which only the nodes in the monitored set whose current state is normal but whose predictive state is abnormal,are pinned with the predictive controller.Simulations show that for the scale-free (SF) CML the degree-based monitoring strategy is advantageous over the betweenness-based strategy,while for the small-world (SW) CML the situation is the opposite.With the adaptive predictive pinning control,the fewer local controllers can effectively suppress the cascade throughout the whole network.