Since China’s reform and opening-up,the growing disparity between urban and rural areas and regions has led to massive migration.With China’s Rural Revitalization Strategy and the industrial transfer from the easter...Since China’s reform and opening-up,the growing disparity between urban and rural areas and regions has led to massive migration.With China’s Rural Revitalization Strategy and the industrial transfer from the eastern coastal areas to the inland,the migration direction and pattern of the floating population have undergone certain changes.Using the 2017 China Migrants Dynamic Survey(CMDS),excluding Hong Kong,Macao,and Taiwan regions of China,organized by China’s National Health Commission,the relationship matrix of the floating population is constructed according to the inflow place of the interviewees and their outflow place(the location of the registered residence)in the questionnaire survey.We then apply the complex network model to analyze the migration direction and network pattern of China’s floating population from the city scale.The migration network shows an obvious hierarchical agglomeration.The first-,second-,third-and fourth-tier distribution cities are municipalities directly under the central government,provincial capital cities,major cities in the central and western regions and ordinary cities in all provinces,respectively.The migration trend is from the central and western regions to the eastern coastal areas.The migration network has‘small world’characteristics,forming nine communities.It shows that most node cities in the same community are closely linked and geographically close,indicating that the migration network of floating population is still affected by geographical proximity.Narrowing the urban-rural and regional differences will promote the rational distribution this population.It is necessary to strengthen the reform of the registered residence system,so that the floating population can enjoy urban public services comparable to other populations,and allow migrants to live and work in peace.展开更多
The dissemination of information across various locations is an ubiquitous occurrence,however,prevalent methodologies for multi-source identification frequently overlook the fact that sources may initiate disseminatio...The dissemination of information across various locations is an ubiquitous occurrence,however,prevalent methodologies for multi-source identification frequently overlook the fact that sources may initiate dissemination at distinct initial moments.Although there are many research results of multi-source identification,the challenge of locating sources with varying initiation times using a limited subset of observational nodes remains unresolved.In this study,we provide the backward spread tree theorem and source centrality theorem,and develop a backward spread centrality algorithm to identify all the information sources that trigger the spread at different start times.The proposed algorithm does not require prior knowledge of the number of sources,however,it can estimate both the initial spread moment and the spread duration.The core concept of this algorithm involves inferring suspected sources through source centrality theorem and locating the source from the suspected sources with linear programming.Extensive experiments from synthetic and real network simulation corroborate the superiority of our method in terms of both efficacy and efficiency.Furthermore,we find that our method maintains robustness irrespective of the number of sources and the average degree of network.Compared with classical and state-of-the art source identification methods,our method generally improves the AUROC value by 0.1 to 0.2.展开更多
We construct a dual-layer coupled complex network of communities and residents to represent the interconnected risk transmission network between communities and the disease transmission network among residents. It cha...We construct a dual-layer coupled complex network of communities and residents to represent the interconnected risk transmission network between communities and the disease transmission network among residents. It characterizes the process of infectious disease transmission among residents between communities through the SE2IHR model considering two types of infectors. By depicting a more fine-grained social structure and combining further simulation experiments, the study validates the crucial role of various prevention and control measures implemented by communities as primary executors in controlling the epidemic. Research shows that the geographical boundaries of communities and the social interaction patterns of residents have a significant impact on the spread of the epidemic, where early detection, isolation and treatment strategies at community level are essential for controlling the spread of the epidemic. In addition, the study explores the collaborative governance model and institutional advantages of communities and residents in epidemic prevention and control.展开更多
The oil production of the multi-fractured horizontal wells(MFHWs) declines quickly in unconventional oil reservoirs due to the fast depletion of natural energy. Gas injection has been acknowledged as an effective meth...The oil production of the multi-fractured horizontal wells(MFHWs) declines quickly in unconventional oil reservoirs due to the fast depletion of natural energy. Gas injection has been acknowledged as an effective method to improve oil recovery factor from unconventional oil reservoirs. Hydrocarbon gas huff-n-puff becomes preferable when the CO_(2) source is limited. However, the impact of complex fracture networks and well interference on the EOR performance of multiple MFHWs is still unclear. The optimal gas huff-n-puff parameters are significant for enhancing oil recovery. This work aims to optimize the hydrocarbon gas injection and production parameters for multiple MFHWs with complex fracture networks in unconventional oil reservoirs. Firstly, the numerical model based on unstructured grids is developed to characterize the complex fracture networks and capture the dynamic fracture features.Secondly, the PVT phase behavior simulation was carried out to provide the fluid model for numerical simulation. Thirdly, the optimal parameters for hydrocarbon gas huff-n-puff were obtained. Finally, the dominant factors of hydrocarbon gas huff-n-puff under complex fracture networks are obtained by fuzzy mathematical method. Results reveal that the current pressure of hydrocarbon gas injection can achieve miscible displacement. The optimal injection and production parameters are obtained by single-factor analysis to analyze the effect of individual parameter. Gas injection time is the dominant factor of hydrocarbon gas huff-n-puff in unconventional oil reservoirs with complex fracture networks. This work can offer engineers guidance for hydrocarbon gas huff-n-puff of multiple MFHWs considering the complex fracture networks.展开更多
According to news reports on severe earthquakes since 2008,a total of 51 cases with magnitudes of 6.0 or above were analyzed,and 14 frequently occurring secondary disasters were identified.A disaster chain model was d...According to news reports on severe earthquakes since 2008,a total of 51 cases with magnitudes of 6.0 or above were analyzed,and 14 frequently occurring secondary disasters were identified.A disaster chain model was developed using principles from complex network theory.The vulnerability and risk level of each edge in this model were calculated,and high-risk edges and disaster chains were identified.The analysis reveals that the edge“floods→building collapses”has the highest vulnerability.Implementing measures to mitigate this edge is crucial for delaying the spread of secondary disasters.The highest risk is associated with the edge“building collapses→casualties,”and increased risks are also identified for chains such as“earthquake→building collapses→casualties,”“earthquake→landslides and debris flows→dammed lakes,”and“dammed lakes→floods→building collapses.”Following an earthquake,the prompt implementation of measures is crucial to effectively disrupt these chains and minimize the damage from secondary disasters.展开更多
In many engineering networks, only a part of target state variables are required to be estimated.On the other hand,multi-layer complex network exists widely in practical situations.In this paper, the state estimation ...In many engineering networks, only a part of target state variables are required to be estimated.On the other hand,multi-layer complex network exists widely in practical situations.In this paper, the state estimation of target state variables in multi-layer complex dynamical networks with nonlinear node dynamics is studied.A suitable functional state observer is constructed with the limited measurement.The parameters of the designed functional observer are obtained from the algebraic method and the stability of the functional observer is proven by the Lyapunov theorem.Some necessary conditions that need to be satisfied for the design of the functional state observer are obtained.Different from previous studies, in the multi-layer complex dynamical network with nonlinear node dynamics, the proposed method can estimate the state of target variables on some layers directly instead of estimating all the individual states.Thus, it can greatly reduce the placement of observers and computational cost.Numerical simulations with the three-layer complex dynamical network composed of three-dimensional nonlinear dynamical nodes are developed to verify the effectiveness of the method.展开更多
The present study addresses the problem of fault estimation for a specific class of nonlinear time-varying complex networks,utilizing an unknown-input-observer approach within the framework of dynamic event-triggered ...The present study addresses the problem of fault estimation for a specific class of nonlinear time-varying complex networks,utilizing an unknown-input-observer approach within the framework of dynamic event-triggered mechanism(DETM).In order to optimize communication resource utilization,the DETM is employed to determine whether the current measurement data should be transmitted to the estimator or not.To guarantee a satisfactory estimation performance for the fault signal,an unknown-input-observer-based estimator is constructed to decouple the estimation error dynamics from the influence of fault signals.The aim of this paper is to find the suitable estimator parameters under the effects of DETM such that both the state estimates and fault estimates are confined within two sets of closed ellipsoid domains.The techniques of recursive matrix inequality are applied to derive sufficient conditions for the existence of the desired estimator,ensuring that the specified performance requirements are met under certain conditions.Then,the estimator gains are derived by minimizing the ellipsoid domain in the sense of trace and a recursive estimator parameter design algorithm is then provided.Finally,a numerical example is conducted to demonstrate the effectiveness of the designed estimator.展开更多
While progress has been made in information source localization,it has overlooked the prevalent friend and adversarial relationships in social networks.This paper addresses this gap by focusing on source localization ...While progress has been made in information source localization,it has overlooked the prevalent friend and adversarial relationships in social networks.This paper addresses this gap by focusing on source localization in signed network models.Leveraging the topological characteristics of signed networks and transforming the propagation probability into effective distance,we propose an optimization method for observer selection.Additionally,by using the reverse propagation algorithm we present a method for information source localization in signed networks.Extensive experimental results demonstrate that a higher proportion of positive edges within signed networks contributes to more favorable source localization,and the higher the ratio of propagation rates between positive and negative edges,the more accurate the source localization becomes.Interestingly,this aligns with our observation that,in reality,the number of friends tends to be greater than the number of adversaries,and the likelihood of information propagation among friends is often higher than among adversaries.In addition,the source located at the periphery of the network is not easy to identify.Furthermore,our proposed observer selection method based on effective distance achieves higher operational efficiency and exhibits higher accuracy in information source localization,compared with three strategies for observer selection based on the classical full-order neighbor coverage.展开更多
We investigate the impact of pairwise and group interactions on the spread of epidemics through an activity-driven model based on time-dependent networks.The effects of pairwise/group interaction proportion and pairwi...We investigate the impact of pairwise and group interactions on the spread of epidemics through an activity-driven model based on time-dependent networks.The effects of pairwise/group interaction proportion and pairwise/group interaction intensity are explored by extensive simulation and theoretical analysis.It is demonstrated that altering the group interaction proportion can either hinder or enhance the spread of epidemics,depending on the relative social intensity of group and pairwise interactions.As the group interaction proportion decreases,the impact of reducing group social intensity diminishes.The ratio of group and pairwise social intensity can affect the effect of group interaction proportion on the scale of infection.A weak heterogeneous activity distribution can raise the epidemic threshold,and reduce the scale of infection.These results benefit the design of epidemic control strategy.展开更多
Hierarchical networks are frequently encountered in animal groups,gene networks,and artificial engineering systems such as multiple robots,unmanned vehicle systems,smart grids,wind farm networks,and so forth.The struc...Hierarchical networks are frequently encountered in animal groups,gene networks,and artificial engineering systems such as multiple robots,unmanned vehicle systems,smart grids,wind farm networks,and so forth.The structure of a large directed hierarchical network is often strongly influenced by reverse edges from lower-to higher-level nodes,such as lagging birds’howl in a flock or the opinions of lowerlevel individuals feeding back to higher-level ones in a social group.This study reveals that,for most large-scale real hierarchical networks,the majority of the reverse edges do not affect the synchronization process of the entire network;the synchronization process is influenced only by a small part of these reverse edges along specific paths.More surprisingly,a single effective reverse edge can slow down the synchronization of a huge hierarchical network by over 60%.The effect of such edges depends not on the network size but only on the average in-degree of the involved subnetwork.The overwhelming majority of active reverse edges turn out to have some kind of“bunching”effect on the information flows of hierarchical networks,which slows down synchronization processes.This finding refines the current understanding of the role of reverse edges in many natural,social,and engineering hierarchical networks,which might be beneficial for precisely tuning the synchronization rhythms of these networks.Our study also proposes an effective way to attack a hierarchical network by adding a malicious reverse edge to it and provides some guidance for protecting a network by screening out the specific small proportion of vulnerable nodes.展开更多
In recent years,there has been a growing interest in graph convolutional networks(GCN).However,existing GCN and variants are predominantly based on simple graph or hypergraph structures,which restricts their ability t...In recent years,there has been a growing interest in graph convolutional networks(GCN).However,existing GCN and variants are predominantly based on simple graph or hypergraph structures,which restricts their ability to handle complex data correlations in practical applications.These limitations stem from the difficulty in establishing multiple hierarchies and acquiring adaptive weights for each of them.To address this issue,this paper introduces the latest concept of complex hypergraphs and constructs a versatile high-order multi-level data correlation model.This model is realized by establishing a three-tier structure of complexes-hypergraphs-vertices.Specifically,we start by establishing hyperedge clusters on a foundational network,utilizing a second-order hypergraph structure to depict potential correlations.For this second-order structure,truncation methods are used to assess and generate a three-layer composite structure.During the construction of the composite structure,an adaptive learning strategy is implemented to merge correlations across different levels.We evaluate this model on several popular datasets and compare it with recent state-of-the-art methods.The comprehensive assessment results demonstrate that the proposed model surpasses the existing methods,particularly in modeling implicit data correlations(the classification accuracy of nodes on five public datasets Cora,Citeseer,Pubmed,Github Web ML,and Facebook are 86.1±0.33,79.2±0.35,83.1±0.46,83.8±0.23,and 80.1±0.37,respectively).This indicates that our approach possesses advantages in handling datasets with implicit multi-level structures.展开更多
Ecosystems generally have the self-adapting ability to resist various external pressures or disturbances,which is always called resilience.However,once the external disturbances exceed the tipping points of the system...Ecosystems generally have the self-adapting ability to resist various external pressures or disturbances,which is always called resilience.However,once the external disturbances exceed the tipping points of the system resilience,the consequences would be catastrophic,and eventually lead the ecosystem to complete collapse.We capture the collapse process of ecosystems represented by plant-pollinator networks with the k-core nested structural method,and find that a sufficiently weak interaction strength or a sufficiently large competition weight can cause the structure of the ecosystem to collapse from its smallest k-core towards its largest k-core.Then we give the tipping points of structure and dynamic collapse of the entire system from the one-dimensional dynamic function of the ecosystem.Our work provides an intuitive and precise description of the dynamic process of ecosystem collapse under multiple interactions,and provides theoretical insights into further avoiding the occurrence of ecosystem collapse.展开更多
Tree interactions are essential for the structure,dynamics,and function of forest ecosystems,but variations in the architecture of life-stage interaction networks(LSINs)across forests is unclear.Here,we constructed 16...Tree interactions are essential for the structure,dynamics,and function of forest ecosystems,but variations in the architecture of life-stage interaction networks(LSINs)across forests is unclear.Here,we constructed 16 LSINs in the mountainous forests of northwest Hebei,China based on crown overlap from four mixed forests with two dominant tree species.Our results show that LSINs decrease the complexity of stand densities and basal areas due to the interaction cluster differentiation.In addition,we found that mature trees and saplings play different roles,the first acting as“hub”life stages with high connectivity and the second,as“bridges”controlling information flow with high centrality.Across the forests,life stages with higher importance showed better parameter stability within LSINs.These results reveal that the structure of tree interactions among life stages is highly related to stand variables.Our efforts contribute to the understanding of LSIN complexity and provide a basis for further research on tree interactions in complex forest communities.展开更多
As the demand for high-quality services proliferates,an innovative network architecture,the fully-decoupled RAN(FD-RAN),has emerged for more flexible spectrum resource utilization and lower network costs.However,with ...As the demand for high-quality services proliferates,an innovative network architecture,the fully-decoupled RAN(FD-RAN),has emerged for more flexible spectrum resource utilization and lower network costs.However,with the decoupling of uplink base stations and downlink base stations in FDRAN,the traditional transmission mechanism,which relies on real-time channel feedback,is not suitable as the receiver is not able to feedback accurate and timely channel state information to the transmitter.This paper proposes a novel transmission scheme without relying on physical layer channel feedback.Specifically,we design a radio map based complex-valued precoding network(RMCPNet)model,which outputs the base station precoding based on user location.RMCPNet comprises multiple subnets,with each subnet responsible for extracting unique modal features from diverse input modalities.Furthermore,the multimodal embeddings derived from these distinct subnets are integrated within the information fusion layer,culminating in a unified representation.We also develop a specific RMCPNet training algorithm that employs the negative spectral efficiency as the loss function.We evaluate the performance of the proposed scheme on the public DeepMIMO dataset and show that RMCPNet can achieve 16%and 76%performance improvements over the conventional real-valued neural network and statistical codebook approach,respectively.展开更多
The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure ...The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes.展开更多
Severe well interference through complex fracture networks(CFNs)can be observed among multi-well pads in low permeability reservoirs.The well interference analysis between multi-fractured horizontal wells(MFHWs)is vit...Severe well interference through complex fracture networks(CFNs)can be observed among multi-well pads in low permeability reservoirs.The well interference analysis between multi-fractured horizontal wells(MFHWs)is vitally important for reservoir effective development.Well interference has been historically investigated by pressure transient analysis,while it has shown that rate transient analysis has great potential in well interference diagnosis.However,the impact of complex fracture networks(CFNs)on rate transient behavior of parent well and child well in unconventional reservoirs is still not clear.To further investigate,this paper develops an integrated approach combining pressure and rate transient analysis for well interference diagnosis considering CFNs.To perform multi-well simulation considering CFNs,non-intrusive embedded discrete fracture model approach was applied for coupling fracture with reservoir models.The impact of CFN including natural fractures and frac-hits on pressure and rate transient behavior in multi-well system was investigated.On a logelog plot,interference flow and compound linear flow are two new flow regimes caused by nearby producers.When both NFs and frac-hits are present in the reservoir,frac-hits have a greater impact on well#1 which contains frac-hits,and NFs have greater impact on well#3 which does not have frac-hits.For all well producing circumstances,it might be challenging to see divergence during pseudosteady state flow brought on by frac-hits on the logelog plot.Besides,when NFs occur,reservoir depletion becomes noticeable in comparison to frac-hits in pressure distribution.Application of this integrated approach demonstrates that it works well to characterize the well interference among different multi-fractured horizontal wells in a well pad.Better reservoir evaluation can be acquired based on the new features observed in the novel model,demonstrating the practicability of the proposed approach.The findings of this study can help for better evaluating well interference degree in multi-well systems combing PTA and RTA,which can reduce the uncertainty and improve the accuracy of the well interference analysis based on both field pressure and rate data.展开更多
Routing algorithms in satellite constellation networks usually make use of the local state information to adapt to the topology and traffic dynamics,since it’s difficult to obtain the global states in time due to the...Routing algorithms in satellite constellation networks usually make use of the local state information to adapt to the topology and traffic dynamics,since it’s difficult to obtain the global states in time due to the spatial large-scale feature of constellation networks.Furthermore,they use different range of local states and give these states distinct weights.However,the behind design criterion is ambiguous and often based on experience.This paper discusses the problem from the perspective of complex network.A universal local-state routing model with tunable parameters is presented to generalize the common characteristics of local-state routing algorithms for satellite constellation networks.Based on this,the impacts of localstate routing algorithms on performance and the correlation between routing and traffic dynamics are analyzed in detail.Among them,the tunable parameters,the congestion propagation process,the critical packet sending rate,and the network robustness are discussed respectively.Experimental results show that routing algorithms can achieve a satisfactory performance by maintaining a limited state awareness capability and obtaining the states in a range below the average path length.This provides a valuable design basis for routing algorithms in satellite constellation networks.展开更多
This paper addresses the problem of the input design of large-scale complex networks.Two types of network components,redundant inaccessible strongly connected component(RISCC)and intermittent inaccessible strongly con...This paper addresses the problem of the input design of large-scale complex networks.Two types of network components,redundant inaccessible strongly connected component(RISCC)and intermittent inaccessible strongly connected component(IISCC)are defined,and a subnetwork called a driver network is developed.Based on these,an efficient method is proposed to find the minimum number of controlled nodes to achieve structural complete controllability of a network,in the case that each input can act on multiple state nodes.The range of the number of input nodes to achieve minimal control,and the configuration method(the connection between the input nodes and the controlled nodes)are presented.All possible input solutions can be obtained by this method.Moreover,we give an example and some experiments on real-world networks to illustrate the effectiveness of the method.展开更多
In order to reveal the complex network characteristics and evolution principle of China aviation network,the relationship between the node degree and the average path length of China aviation network in 1988,1994,2001...In order to reveal the complex network characteristics and evolution principle of China aviation network,the relationship between the node degree and the average path length of China aviation network in 1988,1994,2001,2008 and 2015 was studied.According to the theory and method of complex network,the network system was constructed with the city where the airport was located as the network node and the airline as the edge of the network.On the basis of the statistical data,the node average path length of China aviation network in 1988,1994,2001,2008 and 2015 was calculated.Through regression analysis,it was found that the node degree had a logarithmic relationship with the average length of node path,and the two parameters of the logarithmic relationship had linear evolutionary trace.Key word:China aviation network,complex network,node degree,average length of node path,logarithmic relationship,evolutionary trace.展开更多
In order to reveal the complex network characteristics and evolution principle of China aviation network, the probability distribution and evolution trace of average degree of edge vertices of China aviation network w...In order to reveal the complex network characteristics and evolution principle of China aviation network, the probability distribution and evolution trace of average degree of edge vertices of China aviation network were studied based on the statistics data of China civil aviation network in 1988, 1994, 2001, 2008 and 2015. According to the theory and method of complex network, the network system was constructed with the city where the airport was located as the network node and the route between cities as the edge of the network. Based on the statistical data, the average degrees of edge vertices in China aviation network in 1988, 1994, 2001, 2008 and 2015 were calculated. Using the probability statistical analysis method and regression analysis approach, it was found that the average degree of edge vertices had the probability distribution of normal function and the position parameters and scale parameters of the probability distribution had linear evolution trace.展开更多
基金Under the auspices of the Fund of Social Sciences Research,Ministry of Education of China(No.17YJA840011)。
文摘Since China’s reform and opening-up,the growing disparity between urban and rural areas and regions has led to massive migration.With China’s Rural Revitalization Strategy and the industrial transfer from the eastern coastal areas to the inland,the migration direction and pattern of the floating population have undergone certain changes.Using the 2017 China Migrants Dynamic Survey(CMDS),excluding Hong Kong,Macao,and Taiwan regions of China,organized by China’s National Health Commission,the relationship matrix of the floating population is constructed according to the inflow place of the interviewees and their outflow place(the location of the registered residence)in the questionnaire survey.We then apply the complex network model to analyze the migration direction and network pattern of China’s floating population from the city scale.The migration network shows an obvious hierarchical agglomeration.The first-,second-,third-and fourth-tier distribution cities are municipalities directly under the central government,provincial capital cities,major cities in the central and western regions and ordinary cities in all provinces,respectively.The migration trend is from the central and western regions to the eastern coastal areas.The migration network has‘small world’characteristics,forming nine communities.It shows that most node cities in the same community are closely linked and geographically close,indicating that the migration network of floating population is still affected by geographical proximity.Narrowing the urban-rural and regional differences will promote the rational distribution this population.It is necessary to strengthen the reform of the registered residence system,so that the floating population can enjoy urban public services comparable to other populations,and allow migrants to live and work in peace.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.62103375,62006106,61877055,and 62171413)the Philosophy and Social Science Planning Project of Zhejinag Province,China(Grant No.22NDJC009Z)+1 种基金the Education Ministry Humanities and Social Science Foundation of China(Grant No.19YJCZH056)the Natural Science Foundation of Zhejiang Province,China(Grant Nos.LY23F030003,LY22F030006,and LQ21F020005).
文摘The dissemination of information across various locations is an ubiquitous occurrence,however,prevalent methodologies for multi-source identification frequently overlook the fact that sources may initiate dissemination at distinct initial moments.Although there are many research results of multi-source identification,the challenge of locating sources with varying initiation times using a limited subset of observational nodes remains unresolved.In this study,we provide the backward spread tree theorem and source centrality theorem,and develop a backward spread centrality algorithm to identify all the information sources that trigger the spread at different start times.The proposed algorithm does not require prior knowledge of the number of sources,however,it can estimate both the initial spread moment and the spread duration.The core concept of this algorithm involves inferring suspected sources through source centrality theorem and locating the source from the suspected sources with linear programming.Extensive experiments from synthetic and real network simulation corroborate the superiority of our method in terms of both efficacy and efficiency.Furthermore,we find that our method maintains robustness irrespective of the number of sources and the average degree of network.Compared with classical and state-of-the art source identification methods,our method generally improves the AUROC value by 0.1 to 0.2.
基金Project supported by the Ministry of Education of China in the later stage of philosophy and social science research(Grant No.19JHG091)the National Natural Science Foundation of China(Grant No.72061003)+1 种基金the Major Program of National Social Science Fund of China(Grant No.20&ZD155)the Guizhou Provincial Science and Technology Projects(Grant No.[2020]4Y172)。
文摘We construct a dual-layer coupled complex network of communities and residents to represent the interconnected risk transmission network between communities and the disease transmission network among residents. It characterizes the process of infectious disease transmission among residents between communities through the SE2IHR model considering two types of infectors. By depicting a more fine-grained social structure and combining further simulation experiments, the study validates the crucial role of various prevention and control measures implemented by communities as primary executors in controlling the epidemic. Research shows that the geographical boundaries of communities and the social interaction patterns of residents have a significant impact on the spread of the epidemic, where early detection, isolation and treatment strategies at community level are essential for controlling the spread of the epidemic. In addition, the study explores the collaborative governance model and institutional advantages of communities and residents in epidemic prevention and control.
基金funded by the National Natural Science Foundation of China(No.51974268)Open Fund of Key Laboratory of Ministry of Education for Improving Oil and Gas Recovery(NEPUEOR-2022-03)Research and Innovation Fund for Graduate Students of Southwest Petroleum University(No.2022KYCX005)。
文摘The oil production of the multi-fractured horizontal wells(MFHWs) declines quickly in unconventional oil reservoirs due to the fast depletion of natural energy. Gas injection has been acknowledged as an effective method to improve oil recovery factor from unconventional oil reservoirs. Hydrocarbon gas huff-n-puff becomes preferable when the CO_(2) source is limited. However, the impact of complex fracture networks and well interference on the EOR performance of multiple MFHWs is still unclear. The optimal gas huff-n-puff parameters are significant for enhancing oil recovery. This work aims to optimize the hydrocarbon gas injection and production parameters for multiple MFHWs with complex fracture networks in unconventional oil reservoirs. Firstly, the numerical model based on unstructured grids is developed to characterize the complex fracture networks and capture the dynamic fracture features.Secondly, the PVT phase behavior simulation was carried out to provide the fluid model for numerical simulation. Thirdly, the optimal parameters for hydrocarbon gas huff-n-puff were obtained. Finally, the dominant factors of hydrocarbon gas huff-n-puff under complex fracture networks are obtained by fuzzy mathematical method. Results reveal that the current pressure of hydrocarbon gas injection can achieve miscible displacement. The optimal injection and production parameters are obtained by single-factor analysis to analyze the effect of individual parameter. Gas injection time is the dominant factor of hydrocarbon gas huff-n-puff in unconventional oil reservoirs with complex fracture networks. This work can offer engineers guidance for hydrocarbon gas huff-n-puff of multiple MFHWs considering the complex fracture networks.
基金National Key Research and Development Program of China(No.2022YFC3803000).
文摘According to news reports on severe earthquakes since 2008,a total of 51 cases with magnitudes of 6.0 or above were analyzed,and 14 frequently occurring secondary disasters were identified.A disaster chain model was developed using principles from complex network theory.The vulnerability and risk level of each edge in this model were calculated,and high-risk edges and disaster chains were identified.The analysis reveals that the edge“floods→building collapses”has the highest vulnerability.Implementing measures to mitigate this edge is crucial for delaying the spread of secondary disasters.The highest risk is associated with the edge“building collapses→casualties,”and increased risks are also identified for chains such as“earthquake→building collapses→casualties,”“earthquake→landslides and debris flows→dammed lakes,”and“dammed lakes→floods→building collapses.”Following an earthquake,the prompt implementation of measures is crucial to effectively disrupt these chains and minimize the damage from secondary disasters.
基金Project supported by the National Natural Science Foundation of China (Grant Nos.62373197 and 61873326)。
文摘In many engineering networks, only a part of target state variables are required to be estimated.On the other hand,multi-layer complex network exists widely in practical situations.In this paper, the state estimation of target state variables in multi-layer complex dynamical networks with nonlinear node dynamics is studied.A suitable functional state observer is constructed with the limited measurement.The parameters of the designed functional observer are obtained from the algebraic method and the stability of the functional observer is proven by the Lyapunov theorem.Some necessary conditions that need to be satisfied for the design of the functional state observer are obtained.Different from previous studies, in the multi-layer complex dynamical network with nonlinear node dynamics, the proposed method can estimate the state of target variables on some layers directly instead of estimating all the individual states.Thus, it can greatly reduce the placement of observers and computational cost.Numerical simulations with the three-layer complex dynamical network composed of three-dimensional nonlinear dynamical nodes are developed to verify the effectiveness of the method.
基金supported in part by the National Natural Science Foundation of China (62233012,62273087)the Research Fund for the Taishan Scholar Project of Shandong Province of Chinathe Shanghai Pujiang Program of China (22PJ1400400)。
文摘The present study addresses the problem of fault estimation for a specific class of nonlinear time-varying complex networks,utilizing an unknown-input-observer approach within the framework of dynamic event-triggered mechanism(DETM).In order to optimize communication resource utilization,the DETM is employed to determine whether the current measurement data should be transmitted to the estimator or not.To guarantee a satisfactory estimation performance for the fault signal,an unknown-input-observer-based estimator is constructed to decouple the estimation error dynamics from the influence of fault signals.The aim of this paper is to find the suitable estimator parameters under the effects of DETM such that both the state estimates and fault estimates are confined within two sets of closed ellipsoid domains.The techniques of recursive matrix inequality are applied to derive sufficient conditions for the existence of the desired estimator,ensuring that the specified performance requirements are met under certain conditions.Then,the estimator gains are derived by minimizing the ellipsoid domain in the sense of trace and a recursive estimator parameter design algorithm is then provided.Finally,a numerical example is conducted to demonstrate the effectiveness of the designed estimator.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.62103375 and 62006106)the Zhejiang Provincial Philosophy and Social Science Planning Project(Grant No.22NDJC009Z)+1 种基金the Education Ministry Humanities and Social Science Foundation of China(Grant Nos.19YJCZH056 and 21YJC630120)the Natural Science Foundation of Zhejiang Province of China(Grant Nos.LY23F030003 and LQ21F020005).
文摘While progress has been made in information source localization,it has overlooked the prevalent friend and adversarial relationships in social networks.This paper addresses this gap by focusing on source localization in signed network models.Leveraging the topological characteristics of signed networks and transforming the propagation probability into effective distance,we propose an optimization method for observer selection.Additionally,by using the reverse propagation algorithm we present a method for information source localization in signed networks.Extensive experimental results demonstrate that a higher proportion of positive edges within signed networks contributes to more favorable source localization,and the higher the ratio of propagation rates between positive and negative edges,the more accurate the source localization becomes.Interestingly,this aligns with our observation that,in reality,the number of friends tends to be greater than the number of adversaries,and the likelihood of information propagation among friends is often higher than among adversaries.In addition,the source located at the periphery of the network is not easy to identify.Furthermore,our proposed observer selection method based on effective distance achieves higher operational efficiency and exhibits higher accuracy in information source localization,compared with three strategies for observer selection based on the classical full-order neighbor coverage.
基金This work was supported by the National Natural Science Foundation of China(Grant No.12072340)the China Postdoctoral Science Foundation(Grant No.2022M720727)the Jiangsu Funding Program for Excellent Postdoctoral Talent(Grant No.2022ZB130).
文摘We investigate the impact of pairwise and group interactions on the spread of epidemics through an activity-driven model based on time-dependent networks.The effects of pairwise/group interaction proportion and pairwise/group interaction intensity are explored by extensive simulation and theoretical analysis.It is demonstrated that altering the group interaction proportion can either hinder or enhance the spread of epidemics,depending on the relative social intensity of group and pairwise interactions.As the group interaction proportion decreases,the impact of reducing group social intensity diminishes.The ratio of group and pairwise social intensity can affect the effect of group interaction proportion on the scale of infection.A weak heterogeneous activity distribution can raise the epidemic threshold,and reduce the scale of infection.These results benefit the design of epidemic control strategy.
基金supported in part by the National Natural Science Foundation of China(62225306,U2141235,52188102,and 62003145)the National Key Research and Development Program of China(2022ZD0119601)+1 种基金Guangdong Basic and Applied Research Foundation(2022B1515120069)the Science and Technology Project of State Grid Corporation of China(5100-202199557A-0-5-ZN).
文摘Hierarchical networks are frequently encountered in animal groups,gene networks,and artificial engineering systems such as multiple robots,unmanned vehicle systems,smart grids,wind farm networks,and so forth.The structure of a large directed hierarchical network is often strongly influenced by reverse edges from lower-to higher-level nodes,such as lagging birds’howl in a flock or the opinions of lowerlevel individuals feeding back to higher-level ones in a social group.This study reveals that,for most large-scale real hierarchical networks,the majority of the reverse edges do not affect the synchronization process of the entire network;the synchronization process is influenced only by a small part of these reverse edges along specific paths.More surprisingly,a single effective reverse edge can slow down the synchronization of a huge hierarchical network by over 60%.The effect of such edges depends not on the network size but only on the average in-degree of the involved subnetwork.The overwhelming majority of active reverse edges turn out to have some kind of“bunching”effect on the information flows of hierarchical networks,which slows down synchronization processes.This finding refines the current understanding of the role of reverse edges in many natural,social,and engineering hierarchical networks,which might be beneficial for precisely tuning the synchronization rhythms of these networks.Our study also proposes an effective way to attack a hierarchical network by adding a malicious reverse edge to it and provides some guidance for protecting a network by screening out the specific small proportion of vulnerable nodes.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.12275179 and 11875042)the Natural Science Foundation of Shanghai Municipality,China(Grant No.21ZR1443900)。
文摘In recent years,there has been a growing interest in graph convolutional networks(GCN).However,existing GCN and variants are predominantly based on simple graph or hypergraph structures,which restricts their ability to handle complex data correlations in practical applications.These limitations stem from the difficulty in establishing multiple hierarchies and acquiring adaptive weights for each of them.To address this issue,this paper introduces the latest concept of complex hypergraphs and constructs a versatile high-order multi-level data correlation model.This model is realized by establishing a three-tier structure of complexes-hypergraphs-vertices.Specifically,we start by establishing hyperedge clusters on a foundational network,utilizing a second-order hypergraph structure to depict potential correlations.For this second-order structure,truncation methods are used to assess and generate a three-layer composite structure.During the construction of the composite structure,an adaptive learning strategy is implemented to merge correlations across different levels.We evaluate this model on several popular datasets and compare it with recent state-of-the-art methods.The comprehensive assessment results demonstrate that the proposed model surpasses the existing methods,particularly in modeling implicit data correlations(the classification accuracy of nodes on five public datasets Cora,Citeseer,Pubmed,Github Web ML,and Facebook are 86.1±0.33,79.2±0.35,83.1±0.46,83.8±0.23,and 80.1±0.37,respectively).This indicates that our approach possesses advantages in handling datasets with implicit multi-level structures.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.72071153 and 72231008)the Natural Science Foundation of Shaanxi Province(Grant No.2020JM-486)the Fund of the Key Laboratory of Equipment Integrated Support Technology(Grant No.6142003190102)。
文摘Ecosystems generally have the self-adapting ability to resist various external pressures or disturbances,which is always called resilience.However,once the external disturbances exceed the tipping points of the system resilience,the consequences would be catastrophic,and eventually lead the ecosystem to complete collapse.We capture the collapse process of ecosystems represented by plant-pollinator networks with the k-core nested structural method,and find that a sufficiently weak interaction strength or a sufficiently large competition weight can cause the structure of the ecosystem to collapse from its smallest k-core towards its largest k-core.Then we give the tipping points of structure and dynamic collapse of the entire system from the one-dimensional dynamic function of the ecosystem.Our work provides an intuitive and precise description of the dynamic process of ecosystem collapse under multiple interactions,and provides theoretical insights into further avoiding the occurrence of ecosystem collapse.
基金This study was supported by the National Water Pollution Control and Treatment Science and Technology Major Project(2017ZX07101-002).
文摘Tree interactions are essential for the structure,dynamics,and function of forest ecosystems,but variations in the architecture of life-stage interaction networks(LSINs)across forests is unclear.Here,we constructed 16 LSINs in the mountainous forests of northwest Hebei,China based on crown overlap from four mixed forests with two dominant tree species.Our results show that LSINs decrease the complexity of stand densities and basal areas due to the interaction cluster differentiation.In addition,we found that mature trees and saplings play different roles,the first acting as“hub”life stages with high connectivity and the second,as“bridges”controlling information flow with high centrality.Across the forests,life stages with higher importance showed better parameter stability within LSINs.These results reveal that the structure of tree interactions among life stages is highly related to stand variables.Our efforts contribute to the understanding of LSIN complexity and provide a basis for further research on tree interactions in complex forest communities.
基金supported in part by the National Natural Science Foundation Original Exploration Project of China under Grant 62250004the National Natural Science Foundation of China under Grant 62271244+1 种基金the Natural Science Fund for Distinguished Young Scholars of Jiangsu Province under Grant BK20220067the Natural Sciences and Engineering Research Council of Canada (NSERC)
文摘As the demand for high-quality services proliferates,an innovative network architecture,the fully-decoupled RAN(FD-RAN),has emerged for more flexible spectrum resource utilization and lower network costs.However,with the decoupling of uplink base stations and downlink base stations in FDRAN,the traditional transmission mechanism,which relies on real-time channel feedback,is not suitable as the receiver is not able to feedback accurate and timely channel state information to the transmitter.This paper proposes a novel transmission scheme without relying on physical layer channel feedback.Specifically,we design a radio map based complex-valued precoding network(RMCPNet)model,which outputs the base station precoding based on user location.RMCPNet comprises multiple subnets,with each subnet responsible for extracting unique modal features from diverse input modalities.Furthermore,the multimodal embeddings derived from these distinct subnets are integrated within the information fusion layer,culminating in a unified representation.We also develop a specific RMCPNet training algorithm that employs the negative spectral efficiency as the loss function.We evaluate the performance of the proposed scheme on the public DeepMIMO dataset and show that RMCPNet can achieve 16%and 76%performance improvements over the conventional real-valued neural network and statistical codebook approach,respectively.
基金support of the Interdisciplinary Research Center for Intelligent Secure Systems(IRC-ISS)Internal Fund Grant#INSS2202.
文摘The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes.
基金The authors are grateful to the financial support from China Postdoctoral Science Foundation(2022M712645)Opening Fund of Key Laboratory of Enhanced Oil Recovery(Northeast Petroleum University),Ministry of Education(NEPU-EOR-2021-03).
文摘Severe well interference through complex fracture networks(CFNs)can be observed among multi-well pads in low permeability reservoirs.The well interference analysis between multi-fractured horizontal wells(MFHWs)is vitally important for reservoir effective development.Well interference has been historically investigated by pressure transient analysis,while it has shown that rate transient analysis has great potential in well interference diagnosis.However,the impact of complex fracture networks(CFNs)on rate transient behavior of parent well and child well in unconventional reservoirs is still not clear.To further investigate,this paper develops an integrated approach combining pressure and rate transient analysis for well interference diagnosis considering CFNs.To perform multi-well simulation considering CFNs,non-intrusive embedded discrete fracture model approach was applied for coupling fracture with reservoir models.The impact of CFN including natural fractures and frac-hits on pressure and rate transient behavior in multi-well system was investigated.On a logelog plot,interference flow and compound linear flow are two new flow regimes caused by nearby producers.When both NFs and frac-hits are present in the reservoir,frac-hits have a greater impact on well#1 which contains frac-hits,and NFs have greater impact on well#3 which does not have frac-hits.For all well producing circumstances,it might be challenging to see divergence during pseudosteady state flow brought on by frac-hits on the logelog plot.Besides,when NFs occur,reservoir depletion becomes noticeable in comparison to frac-hits in pressure distribution.Application of this integrated approach demonstrates that it works well to characterize the well interference among different multi-fractured horizontal wells in a well pad.Better reservoir evaluation can be acquired based on the new features observed in the novel model,demonstrating the practicability of the proposed approach.The findings of this study can help for better evaluating well interference degree in multi-well systems combing PTA and RTA,which can reduce the uncertainty and improve the accuracy of the well interference analysis based on both field pressure and rate data.
基金supported in part by the National Natural Science Foundation of China under Grant 62171466and the National Natural Science Foundation of China under Grant 61971440+1 种基金the National Key R&D Program of China under Grant 2018YFB1801103the Natural Science Foundation on Frontier Leading Technology Basic Research Project of Jiangsu under Grant BK20192002。
文摘Routing algorithms in satellite constellation networks usually make use of the local state information to adapt to the topology and traffic dynamics,since it’s difficult to obtain the global states in time due to the spatial large-scale feature of constellation networks.Furthermore,they use different range of local states and give these states distinct weights.However,the behind design criterion is ambiguous and often based on experience.This paper discusses the problem from the perspective of complex network.A universal local-state routing model with tunable parameters is presented to generalize the common characteristics of local-state routing algorithms for satellite constellation networks.Based on this,the impacts of localstate routing algorithms on performance and the correlation between routing and traffic dynamics are analyzed in detail.Among them,the tunable parameters,the congestion propagation process,the critical packet sending rate,and the network robustness are discussed respectively.Experimental results show that routing algorithms can achieve a satisfactory performance by maintaining a limited state awareness capability and obtaining the states in a range below the average path length.This provides a valuable design basis for routing algorithms in satellite constellation networks.
基金supported in part by the National Natural Science Foundation of China(U1808205,62173079)the Natural Science Foundation of Hebei Province of China(F2000501005)。
文摘This paper addresses the problem of the input design of large-scale complex networks.Two types of network components,redundant inaccessible strongly connected component(RISCC)and intermittent inaccessible strongly connected component(IISCC)are defined,and a subnetwork called a driver network is developed.Based on these,an efficient method is proposed to find the minimum number of controlled nodes to achieve structural complete controllability of a network,in the case that each input can act on multiple state nodes.The range of the number of input nodes to achieve minimal control,and the configuration method(the connection between the input nodes and the controlled nodes)are presented.All possible input solutions can be obtained by this method.Moreover,we give an example and some experiments on real-world networks to illustrate the effectiveness of the method.
文摘In order to reveal the complex network characteristics and evolution principle of China aviation network,the relationship between the node degree and the average path length of China aviation network in 1988,1994,2001,2008 and 2015 was studied.According to the theory and method of complex network,the network system was constructed with the city where the airport was located as the network node and the airline as the edge of the network.On the basis of the statistical data,the node average path length of China aviation network in 1988,1994,2001,2008 and 2015 was calculated.Through regression analysis,it was found that the node degree had a logarithmic relationship with the average length of node path,and the two parameters of the logarithmic relationship had linear evolutionary trace.Key word:China aviation network,complex network,node degree,average length of node path,logarithmic relationship,evolutionary trace.
文摘In order to reveal the complex network characteristics and evolution principle of China aviation network, the probability distribution and evolution trace of average degree of edge vertices of China aviation network were studied based on the statistics data of China civil aviation network in 1988, 1994, 2001, 2008 and 2015. According to the theory and method of complex network, the network system was constructed with the city where the airport was located as the network node and the route between cities as the edge of the network. Based on the statistical data, the average degrees of edge vertices in China aviation network in 1988, 1994, 2001, 2008 and 2015 were calculated. Using the probability statistical analysis method and regression analysis approach, it was found that the average degree of edge vertices had the probability distribution of normal function and the position parameters and scale parameters of the probability distribution had linear evolution trace.