-
Fast Bayesian Basis Selection for Functional Data Representation with Correlated Errors
Authors:
Ana Carolina da Cruz,
Camila P. E. de Souza,
Pedro H. T. O. Sousa
Abstract:
Functional data analysis (FDA) finds widespread application across various fields, due to data being recorded continuously over a time interval or at several discrete points. Since the data is not observed at every point but rather across a dense grid, smoothing techniques are often employed to convert the observed data into functions. In this work, we propose a novel Bayesian approach for selecti…
▽ More
Functional data analysis (FDA) finds widespread application across various fields, due to data being recorded continuously over a time interval or at several discrete points. Since the data is not observed at every point but rather across a dense grid, smoothing techniques are often employed to convert the observed data into functions. In this work, we propose a novel Bayesian approach for selecting basis functions for smoothing one or multiple curves simultaneously. Our method differentiates from other Bayesian approaches in two key ways: (i) by accounting for correlated errors and (ii) by develo** a variational EM algorithm instead of a Gibbs sampler. Simulation studies demonstrate that our method effectively identifies the true underlying structure of the data across various scenarios and it is applicable to different types of functional data. Our variational EM algorithm not only recovers the basis coefficients and the correct set of basis functions but also estimates the existing within-curve correlation. When applied to the motorcycle dataset, our method demonstrates comparable, and in some cases superior, performance in terms of adjusted $R^2$ compared to other techniques such as regression splines, Bayesian LASSO and LASSO. Additionally, when assuming independence among observations within a curve, our method, utilizing only a variational Bayes algorithm, is in the order of thousands faster than a Gibbs sampler on average. Our proposed method is implemented in R and codes are available at https://github.com/acarolcruz/VB-Bases-Selection.
△ Less
Submitted 31 May, 2024;
originally announced May 2024.
-
Finding Software Vulnerabilities in Open-Source C Projects via Bounded Model Checking
Authors:
Janislley Oliveira de Sousa,
Bruno Carvalho de Farias,
Thales Araujo da Silva,
Eddie Batista de Lima Filho,
Lucas C. Cordeiro
Abstract:
Computer-based systems have solved several domain problems, including industrial, military, education, and wearable. Nevertheless, such arrangements need high-quality software to guarantee security and safety as both are mandatory for modern software products. We advocate that bounded model-checking techniques can efficiently detect vulnerabilities in general software systems. However, such an app…
▽ More
Computer-based systems have solved several domain problems, including industrial, military, education, and wearable. Nevertheless, such arrangements need high-quality software to guarantee security and safety as both are mandatory for modern software products. We advocate that bounded model-checking techniques can efficiently detect vulnerabilities in general software systems. However, such an approach struggles to scale up and verify extensive code bases. Consequently, we have developed and evaluated a methodology to verify large software systems using a state-of-the-art bounded model checker. In particular, we pre-process input source-code files and guide the respective model checker to explore them systematically. Moreover, the proposed scheme includes a function-wise prioritization strategy, which readily provides results for code entities according to a scale of importance. Experimental results using a real implementation of the proposed methodology show that it can efficiently verify large software systems. Besides, it presented low peak memory allocation when executed. We have evaluated our approach by verifying twelve popular open-source C projects, where we have found real software vulnerabilities that their developers confirmed.
△ Less
Submitted 9 November, 2023;
originally announced November 2023.
-
Bayesian Variable Selection for Function-on-Scalar Regression Models: a comparative analysis
Authors:
Pedro Henrique T. O. Sousa,
Camila P. E. de Souza,
Ronaldo Dias
Abstract:
In this work, we developed a new Bayesian method for variable selection in function-on-scalar regression (FOSR). Our method uses a hierarchical Bayesian structure and latent variables to enable an adaptive covariate selection process for FOSR. Extensive simulation studies show the proposed method's main properties, such as its accuracy in estimating the coefficients and high capacity to select var…
▽ More
In this work, we developed a new Bayesian method for variable selection in function-on-scalar regression (FOSR). Our method uses a hierarchical Bayesian structure and latent variables to enable an adaptive covariate selection process for FOSR. Extensive simulation studies show the proposed method's main properties, such as its accuracy in estimating the coefficients and high capacity to select variables correctly. Furthermore, we conducted a substantial comparative analysis with the main competing methods, the BGLSS (Bayesian Group Lasso with Spike and Slab prior) method, the group LASSO (Least Absolute Shrinkage and Selection Operator), the group MCP (Minimax Concave Penalty), and the group SCAD (Smoothly Clipped Absolute Deviation). Our results demonstrate that the proposed methodology is superior in correctly selecting covariates compared with the existing competing methods while maintaining a satisfactory level of goodness of fit. In contrast, the competing methods could not balance selection accuracy with goodness of fit. We also considered a COVID-19 dataset and some socioeconomic data from Brazil as an application and obtained satisfactory results. In short, the proposed Bayesian variable selection model is highly competitive, showing significant predictive and selective quality.
△ Less
Submitted 24 April, 2024; v1 submitted 6 March, 2023;
originally announced March 2023.
-
An IoT Cloud and Big Data Architecture for the Maintenance of Home Appliances
Authors:
Pedro Chaves,
Tiago Fonseca,
Luis Lino Ferreira,
Bernardo Cabral,
Orlando Sousa,
Andre Oliveira,
Jorge Landeck
Abstract:
Billions of interconnected Internet of Things (IoT) sensors and devices collect tremendous amounts of data from real-world scenarios. Big data is generating increasing interest in a wide range of industries. Once data is analyzed through compute-intensive Machine Learning (ML) methods, it can derive critical business value for organizations. Powerfulplatforms are essential to handle and process su…
▽ More
Billions of interconnected Internet of Things (IoT) sensors and devices collect tremendous amounts of data from real-world scenarios. Big data is generating increasing interest in a wide range of industries. Once data is analyzed through compute-intensive Machine Learning (ML) methods, it can derive critical business value for organizations. Powerfulplatforms are essential to handle and process such massive collections of information cost-effectively and conveniently. This work introduces a distributed and scalable platform architecture that can be deployed for efficient real-world big data collection and analytics. The proposed system was tested with a case study for Predictive Maintenance of Home Appliances, where current and vibration sensors with high acquisition frequency were connected to washing machines and refrigerators. The introduced platform was used to collect, store, and analyze the data. The experimental results demonstrated that the presented system could be advantageous for tackling real-world IoT scenarios in a cost-effective and local approach.
△ Less
Submitted 25 October, 2022;
originally announced November 2022.
-
Bayesian Adaptive Selection of Basis Functions for Functional Data Representation
Authors:
Pedro Henrique T. O. Sousa,
Camila P. E. de Souza,
Ronaldo Dias
Abstract:
Considering the context of functional data analysis, we developed and applied a new Bayesian approach via Gibbs sampler to select basis functions for a finite representation of functional data. The proposed methodology uses Bernoulli latent variables to assign zero to some of the basis function coefficients with a positive probability. This procedure allows for an adaptive basis selection since it…
▽ More
Considering the context of functional data analysis, we developed and applied a new Bayesian approach via Gibbs sampler to select basis functions for a finite representation of functional data. The proposed methodology uses Bernoulli latent variables to assign zero to some of the basis function coefficients with a positive probability. This procedure allows for an adaptive basis selection since it can determine the number of bases and which should be selected to represent functional data. Moreover, the proposed procedure measures the uncertainty of the selection process and can be applied to multiple curves simultaneously. The methodology developed can deal with observed curves that may differ due to experimental error and random individual differences between subjects, which one can observe in a real dataset application involving daily numbers of COVID-19 cases in Brazil. Simulation studies show the main properties of the proposed method, such as its accuracy in estimating the coefficients and the strength of the procedure to find the true set of basis functions. Despite having been developed in the context of functional data analysis, we also compared the proposed model via simulation with the well-established LASSO and Bayesian LASSO, which are methods developed for non-functional data.
△ Less
Submitted 26 May, 2022; v1 submitted 6 April, 2022;
originally announced April 2022.
-
A tool to support the investigation and visualization of cyber and/or physical incidents
Authors:
Inês Macedo,
Sinan Wanous,
Nuno Oliveira,
Orlando Sousa,
Isabel Praça
Abstract:
Investigating efficiently the data collected from a system's activity can help to detect malicious attempts and better understand the context behind past incident occurrences. Nowadays, several solutions can be used to monitor system activities to detect probable abnormalities and malfunctions. However, most of these systems overwhelm their users with vast amounts of information, making it harder…
▽ More
Investigating efficiently the data collected from a system's activity can help to detect malicious attempts and better understand the context behind past incident occurrences. Nowadays, several solutions can be used to monitor system activities to detect probable abnormalities and malfunctions. However, most of these systems overwhelm their users with vast amounts of information, making it harder for them to perceive incident occurrences and their context. Our approach combines a dynamic and intuitive user interface with Machine Learning forecasts to provide an intelligent investigation tool that facilitates the security operator's work. Our system can also act as an enhanced and fully automated decision support mechanism that provides suggestions about possible incident occurrences.
△ Less
Submitted 2 December, 2021;
originally announced December 2021.
-
A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection
Authors:
João Vitorino,
Rui Andrade,
Isabel Praça,
Orlando Sousa,
Eva Maia
Abstract:
The digital transformation faces tremendous security challenges. In particular, the growing number of cyber-attacks targeting Internet of Things (IoT) systems restates the need for a reliable detection of malicious network activity. This paper presents a comparative analysis of supervised, unsupervised and reinforcement learning techniques on nine malware captures of the IoT-23 dataset, considerin…
▽ More
The digital transformation faces tremendous security challenges. In particular, the growing number of cyber-attacks targeting Internet of Things (IoT) systems restates the need for a reliable detection of malicious network activity. This paper presents a comparative analysis of supervised, unsupervised and reinforcement learning techniques on nine malware captures of the IoT-23 dataset, considering both binary and multi-class classification scenarios. The developed models consisted of Support Vector Machine (SVM), Extreme Gradient Boosting (XGBoost), Light Gradient Boosting Machine (LightGBM), Isolation Forest (iForest), Local Outlier Factor (LOF) and a Deep Reinforcement Learning (DRL) model based on a Double Deep Q-Network (DDQN), adapted to the intrusion detection context. The most reliable performance was achieved by LightGBM. Nonetheless, iForest displayed good anomaly detection results and the DRL model demonstrated the possible benefits of employing this methodology to continuously improve the detection. Overall, the obtained results indicate that the analyzed techniques are well suited for IoT intrusion detection.
△ Less
Submitted 1 June, 2022; v1 submitted 25 November, 2021;
originally announced November 2021.
-
A Hybrid Approach for an Interpretable and Explainable Intrusion Detection System
Authors:
Tiago Dias,
Nuno Oliveira,
Norberto Sousa,
Isabel Praça,
Orlando Sousa
Abstract:
Cybersecurity has been a concern for quite a while now. In the latest years, cyberattacks have been increasing in size and complexity, fueled by significant advances in technology. Nowadays, there is an unavoidable necessity of protecting systems and data crucial for business continuity. Hence, many intrusion detection systems have been created in an attempt to mitigate these threats and contribut…
▽ More
Cybersecurity has been a concern for quite a while now. In the latest years, cyberattacks have been increasing in size and complexity, fueled by significant advances in technology. Nowadays, there is an unavoidable necessity of protecting systems and data crucial for business continuity. Hence, many intrusion detection systems have been created in an attempt to mitigate these threats and contribute to a timelier detection. This work proposes an interpretable and explainable hybrid intrusion detection system, which makes use of artificial intelligence methods to achieve better and more long-lasting security. The system combines experts' written rules and dynamic knowledge continuously generated by a decision tree algorithm as new shreds of evidence emerge from network activity.
△ Less
Submitted 19 November, 2021;
originally announced November 2021.
-
Signatures of sub-band excitons in few-layer black phosphorus
Authors:
A. Chaves,
G. O. Sousa,
K. Khaliji,
D. R. da Costa,
G. A. Farias,
Tony Low
Abstract:
Recent experimental measurements of light absorption in few-layer black phosphorus (BP) reveal a series of high and sharp peaks, interspersed by pairs of lower and broader features. Here, we propose a theoretical model for these excitonic states in few-layer black phosphorus (BP) within a continuum approach for the in-plane degrees of freedom and a tight-binding approximation that accounts for int…
▽ More
Recent experimental measurements of light absorption in few-layer black phosphorus (BP) reveal a series of high and sharp peaks, interspersed by pairs of lower and broader features. Here, we propose a theoretical model for these excitonic states in few-layer black phosphorus (BP) within a continuum approach for the in-plane degrees of freedom and a tight-binding approximation that accounts for inter-layer couplings. This yields excitonic transitions between different combinations of the sub-bands created by the coupled BP layers, which leads to a series of high and low oscillator strength excitonic states, consistent with the experimentally observed bright and dark exciton peaks, respectively. The main characteristics of such sub-band exciton states, as well as the possibility to control their energies and oscillator strengths via applied electric and magnetic fields, are discussed, towards a full understanding of the excitonic spectrum of few-layer BP and its tunability.
△ Less
Submitted 27 April, 2021;
originally announced April 2021.
-
Flow optimization process in a transportation network
Authors:
Fabricio L. Forgerini,
Orahcio F. de Sousa
Abstract:
Numerous networks, such as transportation, distribution and delivery networks optimize their designs in order to increase efficiency and lower costs, improving the stability of its intended functions, etc. Networks that distribute goods, such as electricity, water, gas, telephone and data (Internet), or services as mail, railways and roads are examples of transportation networks. The optimal desig…
▽ More
Numerous networks, such as transportation, distribution and delivery networks optimize their designs in order to increase efficiency and lower costs, improving the stability of its intended functions, etc. Networks that distribute goods, such as electricity, water, gas, telephone and data (Internet), or services as mail, railways and roads are examples of transportation networks. The optimal design fixes network architecture, including clustering, degree distribution, hierarchy, community structures and other structural metrics. These networks are specifically designed for efficient transportation, minimizing transit times and costs. All sorts of transportation networks face the same problem: traffic congestion among their channels. In this work we considered a transportation network model in which we optimize/minimize a cost function for the flux/current at each channel/link of the network. We performed simulations and an analytical study of this problem, focusing on the fraction of used channels and the flow distribution through these channels. Our results show that, after the initial transient, the fraction of used channels stays constant and, remarkably, this result does not depend on the lattice structure (2D, 3D, or long-range connections). For the case of high flow, all channels in the network are used. On the other hand, in the small flow limit, we observe a novel behavior that the fraction of used channels depends on the square root of the flow.
△ Less
Submitted 25 March, 2020; v1 submitted 15 October, 2018;
originally announced October 2018.
-
Energy shift and conduction-to-valence band transition mediated by a time dependent potential barrier in graphene
Authors:
Andrey Chaves,
D. R. da Costa,
G. O. de Sousa,
J. M. Pereira Jr.,
G. A. Farias
Abstract:
We investigate the scattering of a wave packet describing low-energy electrons in graphene by a time-dependent finite step potential barrier. Our results demonstrate that, after Klein tunneling through the barrier, the electron acquires an extra energy which depends on the rate of change the barrier height in time. If such a rate is negative, the electron loses energy and ends up as a valence band…
▽ More
We investigate the scattering of a wave packet describing low-energy electrons in graphene by a time-dependent finite step potential barrier. Our results demonstrate that, after Klein tunneling through the barrier, the electron acquires an extra energy which depends on the rate of change the barrier height in time. If such a rate is negative, the electron loses energy and ends up as a valence band state after leaving the barrier, which effectively behaves as a positively charged quasi-particle
△ Less
Submitted 4 January, 2016;
originally announced January 2016.
-
Love kills: Simulations in Penna Ageing Model
Authors:
D. Stauffer,
S. Cebrat,
T. J. P. Penna,
A. O. Sousa
Abstract:
The standard Penna ageing model with sexual reproduction is enlarged by adding additional bit-strings for love: Marriage happens only if the male love strings are sufficiently different from the female ones. We simulate at what level of required difference the population dies out.
The standard Penna ageing model with sexual reproduction is enlarged by adding additional bit-strings for love: Marriage happens only if the male love strings are sufficiently different from the female ones. We simulate at what level of required difference the population dies out.
△ Less
Submitted 19 August, 2010;
originally announced August 2010.
-
Majority-vote model on directed Erdos-Renyi random graphs
Authors:
F. W. S. Lima,
A. O. Sousa,
M. A. Sumuor
Abstract:
Through Monte Carlo Simulation, the well-known majority-vote model has been studied with noise on directed random graphs. In order to characterize completely the observed order-disorder phase transition, the critical noise parameter $q_c$, as well as the critical exponents $beta/nu$, $gamma/nu$ and $1/nu$ have been calculated as a function of the connectivity $z$ of the random graph.
Through Monte Carlo Simulation, the well-known majority-vote model has been studied with noise on directed random graphs. In order to characterize completely the observed order-disorder phase transition, the critical noise parameter $q_c$, as well as the critical exponents $beta/nu$, $gamma/nu$ and $1/nu$ have been calculated as a function of the connectivity $z$ of the random graph.
△ Less
Submitted 28 January, 2008;
originally announced January 2008.
-
Bit-strings and other modifications of Viviane model for language competition
Authors:
P. M. C. de Oliveira,
D. Stauffer,
F. W. S. Lima,
A. O. Sousa,
C. Schulze,
S. Moss de Oliveira
Abstract:
The language competition model of Viviane de Oliveira et al is modified by associating with each language a string of 32 bits. Whenever a language changes in this Viviane model, also one randomly selected bit is flipped. If then only languages with different bit-strings are counted as different, the resulting size distribution of languages agrees with the empirically observed slightly asymmetric…
▽ More
The language competition model of Viviane de Oliveira et al is modified by associating with each language a string of 32 bits. Whenever a language changes in this Viviane model, also one randomly selected bit is flipped. If then only languages with different bit-strings are counted as different, the resulting size distribution of languages agrees with the empirically observed slightly asymmetric log-normal distribution. Several other modifications were also tried but either had more free parameters or agreed less well with reality.
△ Less
Submitted 20 August, 2006;
originally announced August 2006.
-
Combined update scheme in the Sznajd model
Authors:
Tu Yu-Song,
A. O. Sousa,
Kong Ling-Jiang,
Liu Mu-Ren
Abstract:
We analyze the Sznajd opinion formation model, where a pair of neighboring individuals sharing the same opinion on a square lattice convince its six neighbors to adopt their opinions, when a fraction of the individuals is updated according to the usual random sequential updating rule (asynchronous updating), and the other fraction, the simultaneous updating (synchronous updating). This combined…
▽ More
We analyze the Sznajd opinion formation model, where a pair of neighboring individuals sharing the same opinion on a square lattice convince its six neighbors to adopt their opinions, when a fraction of the individuals is updated according to the usual random sequential updating rule (asynchronous updating), and the other fraction, the simultaneous updating (synchronous updating). This combined updating scheme provides that the bigger the synchronous frequency becomes, the more difficult the system reaches a consensus. Moreover, in the thermodynamic limit, the system needs only a small fraction of individuals following a different kind of updating rules to present a non-consensus state as a final state.
△ Less
Submitted 3 April, 2006;
originally announced April 2006.
-
Renormalizing Sznajd model on complex networks taking into account the effects of growth mechanisms
Authors:
M. C. Gonzalez,
A. O. Sousa,
H. J. Herrmann
Abstract:
We present a renormalization approach to solve the Sznajd opinion formation model on complex networks. For the case of two opinions, we present an expression of the probability of reaching consensus for a given opinion as a function of the initial fraction of agents with that opinion. The calculations reproduce the sharp transition of the model on a fixed network, as well as the recently observe…
▽ More
We present a renormalization approach to solve the Sznajd opinion formation model on complex networks. For the case of two opinions, we present an expression of the probability of reaching consensus for a given opinion as a function of the initial fraction of agents with that opinion. The calculations reproduce the sharp transition of the model on a fixed network, as well as the recently observed smooth function for the model when simulated on a growing complex networks.
△ Less
Submitted 5 October, 2005;
originally announced October 2005.
-
Monte carlo simulations of parapatric speciation
Authors:
V. Schwammle,
A. O. Sousa,
S. M. de Oliveira
Abstract:
Parapatric speciation is studied using an individual--based model with sexual reproduction. We combine the theory of mutation accumulation for biological ageing with an environmental selection pressure that varies according to the individuals geographical positions and phenotypic traits. Fluctuations and genetic diversity of large populations are crucial ingredients to model the features of evol…
▽ More
Parapatric speciation is studied using an individual--based model with sexual reproduction. We combine the theory of mutation accumulation for biological ageing with an environmental selection pressure that varies according to the individuals geographical positions and phenotypic traits. Fluctuations and genetic diversity of large populations are crucial ingredients to model the features of evolutionary branching and are intrinsic properties of the model. Its implementation on a spatial lattice gives interesting insights into the population dynamics of speciation on a geographical landscape and the disruptive selection that leads to the divergence of phenotypes. Our results suggest that assortative mating is not an obligatory ingredient to obtain speciation in large populations at low gene flow.
△ Less
Submitted 15 August, 2005;
originally announced August 2005.
-
Outward-inward information flux in an opinion formation model on different topologies
Authors:
A. O. Sousa,
J. R. Sanchez
Abstract:
A simple model of opinion formation dynamics in which binary-state agents make up their opinions due to the influence of agents in a local neighborhood is studied using different network topologies. Each agent uses two different strategies, the Sznajd rule with a probability $q$ and the Galam majority rule (without inertia) otherwise; being $q$ a parameter of the system. Initially, the binary-st…
▽ More
A simple model of opinion formation dynamics in which binary-state agents make up their opinions due to the influence of agents in a local neighborhood is studied using different network topologies. Each agent uses two different strategies, the Sznajd rule with a probability $q$ and the Galam majority rule (without inertia) otherwise; being $q$ a parameter of the system. Initially, the binary-state agents may have opinions (at random) against or in favor about a certain topic. The time evolution of the system is studied using different network topologies, starting from different initial opinion densities. A transition from consensus in one opinion to the other is found at the same percentage of initial distribution no matter which type of network is used or which opinion formation rule is used.
△ Less
Submitted 12 May, 2005;
originally announced May 2005.
-
Reshuffling spins with short range interactions: When sociophysics produces physical results
Authors:
A. O. Sousa,
K. Malarz,
S. Galam
Abstract:
Galam reshuffling introduced in opinion dynamics models is investigated under the nearest neighbor Ising model on a square lattice using Monte Carlo simulations. While the corresponding Galam analytical critical temperature T_C \approx 3.09 [J/k_B] is recovered almost exactly, it is proved to be different from both values, not reshuffled (T_C=2/arcsinh(1) \approx 2.27 [J/k_B]) and mean-field (T_…
▽ More
Galam reshuffling introduced in opinion dynamics models is investigated under the nearest neighbor Ising model on a square lattice using Monte Carlo simulations. While the corresponding Galam analytical critical temperature T_C \approx 3.09 [J/k_B] is recovered almost exactly, it is proved to be different from both values, not reshuffled (T_C=2/arcsinh(1) \approx 2.27 [J/k_B]) and mean-field (T_C=4 [J/k_B]). On this basis, gradual reshuffling is studied as function of 0 \leq p \leq 1 where p measures the probability of spin reshuffling after each Monte Carlo step. The variation of T_C as function of p is obtained and exhibits a non-linear behavior. The simplest Solomon network realization is noted to reproduce Galam p=1 result. Similarly to the critical temperature, critical exponents are found to differ from both, the classical Ising case and the mean-field values.
△ Less
Submitted 30 March, 2005;
originally announced March 2005.
-
Modelling formation and evolution of transverse dune fields
Authors:
J. H. Lee,
A. O. Sousa,
E. J. R. Parteli,
H. J. Herrmann
Abstract:
We model formation and evolution of transverse dune fields. In the model, only the cross section of the dune is simulated. The only physical variable of relevance is the dune height, from which the dune width and velocity are determined, as well as phenomenological rules for interaction between two dunes of different heights. We find that dune fields with no sand on the ground between dunes are…
▽ More
We model formation and evolution of transverse dune fields. In the model, only the cross section of the dune is simulated. The only physical variable of relevance is the dune height, from which the dune width and velocity are determined, as well as phenomenological rules for interaction between two dunes of different heights. We find that dune fields with no sand on the ground between dunes are unstable, i.e. small dunes leave the higher ones behind. We then introduce a saturation length to simulate transverse dunes on a sand bed and show that this leads to stable dune fields with regular spacing and dune heights. Finally, we show that our model can be used to simulate coastal dune fields if a constant sand influx is considered, where the dune height increases with the distance from the beach, reaching a constant value.
△ Less
Submitted 19 October, 2006; v1 submitted 26 January, 2005;
originally announced January 2005.
-
Sznajd model with synchronous updating on complex networks
Authors:
Tu Yu-Song,
A. O. Sousa,
Kong Ling-Jiang,
Liu Mu-Ren
Abstract:
We analyze the evolution of Sznajd Model with synchronous updating in several complex networks. Similar to the model on square lattice, we have found a transition between the state with no-consensus and the state with complete consensus in several complex networks. Furthermore, by adjusting the network parameters, we find that a large clustering coefficient favors development of a consensus. In…
▽ More
We analyze the evolution of Sznajd Model with synchronous updating in several complex networks. Similar to the model on square lattice, we have found a transition between the state with no-consensus and the state with complete consensus in several complex networks. Furthermore, by adjusting the network parameters, we find that a large clustering coefficient favors development of a consensus. In particular, in the limit of large system size with the initial concentration p=0.5 of opinion +1, a consensus seems to be never reached for the Watts-Strogatz small-world network, when we fix the connectivity k and the rewiring probability p_s; nor for the scale-free network, when we fix the minimum node degree m and the triad formation step probability p_t.
△ Less
Submitted 26 January, 2005;
originally announced January 2005.
-
Sympatric speciation in an age-structured population living on a lattice
Authors:
A. O. Sousa
Abstract:
A square lattice is introduced into the Penna model for biological aging in order to study the evolution of diploid sexual populations under certain conditions when one single locus in the individual's genome is considered as identifier of species. The simulation results show, after several generations, the flourishing and coexistence of two separate species in the same environment, i.e., one or…
▽ More
A square lattice is introduced into the Penna model for biological aging in order to study the evolution of diploid sexual populations under certain conditions when one single locus in the individual's genome is considered as identifier of species. The simulation results show, after several generations, the flourishing and coexistence of two separate species in the same environment, i.e., one original species splits up into two on the same territory (sympatric speciation). As well, the mortalities obtained are in a good agreement with the Gompertz law of exponential increase of mortality with age.
△ Less
Submitted 16 June, 2004;
originally announced June 2004.
-
Bounded confidence model on a still growing scale-free network
Authors:
A. O. Sousa
Abstract:
A Bounded Confidence (BC) model of socio-physics, in which the agents have continuous opinions and can influence each other only if the distance between their opinions is below a threshold, is simulated on a still growing scale-free network considering several different strategies: for each new node (or vertex), that is added to the network all individuals of the network have their opinions upda…
▽ More
A Bounded Confidence (BC) model of socio-physics, in which the agents have continuous opinions and can influence each other only if the distance between their opinions is below a threshold, is simulated on a still growing scale-free network considering several different strategies: for each new node (or vertex), that is added to the network all individuals of the network have their opinions updated following a BC model recipe. The results obtained are compared with the original model, with numerical simulations on different graph structures and also when it is considered on the usual fixed BA network. In particular, the comparison with the latter leads us to conclude that it does not matter much whether the network is still growing or is fixed during the opinion dynamics.
△ Less
Submitted 19 January, 2005; v1 submitted 30 June, 2004;
originally announced June 2004.
-
Consensus formation on a triad scale-free network
Authors:
A. O. Sousa
Abstract:
Several cases of the Sznajd model of socio-physics, that only a group of people sharing the same opinion can convince their neighbors, have been simulated on a more realistic network with a stronger clustering. In addition, many opinions, instead of usually only two, and a convincing probability have been also considered. Finally, with minor changes we obtain a vote distribution in good agreemen…
▽ More
Several cases of the Sznajd model of socio-physics, that only a group of people sharing the same opinion can convince their neighbors, have been simulated on a more realistic network with a stronger clustering. In addition, many opinions, instead of usually only two, and a convincing probability have been also considered. Finally, with minor changes we obtain a vote distribution in good agreement with reality.
△ Less
Submitted 17 June, 2004;
originally announced June 2004.
-
Discretized opinion dynamics of Deffuant on scale-free networks
Authors:
D. Stauffer,
A. O. Sousa,
C. Schulze
Abstract:
The consensus model of Deffuant et al is simplified by allowing for many discrete instead of infinitely many continuous opinions, on a directed Barabasi-Albert network. A simple scaling law is observed. We then introduce noise and also use a more realistic network and compare the results. Finally, we look at a multi-layer model representing various age levels, and we include advertising effects.
The consensus model of Deffuant et al is simplified by allowing for many discrete instead of infinitely many continuous opinions, on a directed Barabasi-Albert network. A simple scaling law is observed. We then introduce noise and also use a more realistic network and compare the results. Finally, we look at a multi-layer model representing various age levels, and we include advertising effects.
△ Less
Submitted 30 March, 2004; v1 submitted 10 October, 2003;
originally announced October 2003.
-
Opinion Formation on a Deterministic Pseudo-fractal Network
Authors:
M. C. Gonzalez,
A. O. Sousa,
H. J. Herrmann
Abstract:
The Sznajd model of socio-physics, that only a group of people sharing the same opinion can convince their neighbors, is applied to a scale-free random network modeled by a deterministic graph. We also study a model for elections based on the Sznajd model and the exponent obtained for the distribution of votes during the transient agrees with those obtained for real elections in Brazil and India…
▽ More
The Sznajd model of socio-physics, that only a group of people sharing the same opinion can convince their neighbors, is applied to a scale-free random network modeled by a deterministic graph. We also study a model for elections based on the Sznajd model and the exponent obtained for the distribution of votes during the transient agrees with those obtained for real elections in Brazil and India. Our results are compared to those obtained using a Barabasi-Albert scale-free network.
△ Less
Submitted 23 July, 2003; v1 submitted 22 July, 2003;
originally announced July 2003.
-
Sex and recombination in the Hötzel aging model
Authors:
A. O. Sousa
Abstract:
Why sex evolved and it prevails in nature remains one of the great puzzles of evolution. Most biologists would explain that it promotes genetic variability, however this explanation suffers from several difficulties. What advantages might sex confer? The present communication aims at certain investigations related to this question, in this way we introduce sexual recombination on the Hötzel mode…
▽ More
Why sex evolved and it prevails in nature remains one of the great puzzles of evolution. Most biologists would explain that it promotes genetic variability, however this explanation suffers from several difficulties. What advantages might sex confer? The present communication aims at certain investigations related to this question, in this way we introduce sexual recombination on the Hötzel model (with males and females) and we compare these results with those from asexual reproduction without recombination.
△ Less
Submitted 14 March, 2003;
originally announced March 2003.
-
The evolutionary advantage of diploid sex
Authors:
A. O. Sousa,
S. Moss de Oliveira,
J. S. Sa Martins
Abstract:
We modify the Penna Model for biological aging, which is based on the mutation-accumulation theory, in order to verify if there would be any evolutionary advantage of triploid over diploid organisms. We show that this is not the case, and that usual sex is always better than that involving three individuals.
We modify the Penna Model for biological aging, which is based on the mutation-accumulation theory, in order to verify if there would be any evolutionary advantage of triploid over diploid organisms. We show that this is not the case, and that usual sex is always better than that involving three individuals.
△ Less
Submitted 17 December, 2002;
originally announced December 2002.
-
Simulation of reproductive risk and emergence of female reproductive cessation
Authors:
A. O. Sousa
Abstract:
Using a simple computer model for evolution, we show that in a sexual population subject only to age-increasing reproductive risk, a cessation of female reproduction emerges.
Using a simple computer model for evolution, we show that in a sexual population subject only to age-increasing reproductive risk, a cessation of female reproduction emerges.
△ Less
Submitted 3 December, 2002;
originally announced December 2002.
-
Applications and Sexual Version of a Simple Model for Biological Ageing
Authors:
A. O. Sousa,
S. Moss de Oliveira,
D. Stauffer
Abstract:
We use a simple model for biological ageing to study the mortality of the population, obtaining a good agreement with the Gompertz law. We also simulate the same model on a square lattice, considering different strategies of parental care. The results are in agreement with those obtained earlier with the more complicated Penna model for biological ageing. Finally, we present the sexual version o…
▽ More
We use a simple model for biological ageing to study the mortality of the population, obtaining a good agreement with the Gompertz law. We also simulate the same model on a square lattice, considering different strategies of parental care. The results are in agreement with those obtained earlier with the more complicated Penna model for biological ageing. Finally, we present the sexual version of this simple model.
△ Less
Submitted 29 August, 2001;
originally announced August 2001.
-
An Unusual Antagonistic Pleiotropy in the Penna Model for Biological Ageing
Authors:
A. O. Sousa,
S. Moss de Oliveira
Abstract:
We combine the Penna Model for biological aging, which is based on the mutation-accumulation theory, with a sort of antagonistic pleiotropy. We show that depending on how the pleiotropy is introduced, it is possible to reproduce both the humans mortality, which increases exponentially with age, and fruitfly mortality, which decelerates at old ages, allowing the appearance of arbitrarily old Meth…
▽ More
We combine the Penna Model for biological aging, which is based on the mutation-accumulation theory, with a sort of antagonistic pleiotropy. We show that depending on how the pleiotropy is introduced, it is possible to reproduce both the humans mortality, which increases exponentially with age, and fruitfly mortality, which decelerates at old ages, allowing the appearance of arbitrarily old Methuselah's.
△ Less
Submitted 21 February, 2001;
originally announced February 2001.
-
High Reproduction Rate versus Sexual Fidelity
Authors:
A. O. Sousa,
S. Moss de Oliveira
Abstract:
We introduce fidelity into the bit-string Penna model for biological ageing and study the advantage of this fidelity when it produces a higher survival probability of the offspring due to paternal care. We attribute a lower reproduction rate to the faithful males but a higher death probability to the offspring of non-faithful males that abandon the pups to mate other females. The fidelity is con…
▽ More
We introduce fidelity into the bit-string Penna model for biological ageing and study the advantage of this fidelity when it produces a higher survival probability of the offspring due to paternal care. We attribute a lower reproduction rate to the faithful males but a higher death probability to the offspring of non-faithful males that abandon the pups to mate other females. The fidelity is considered as a genetic trait which is transmitted to the male offspring (with or without error). We show that nature may prefer a lower reproduction rate to warrant the survival of the offspring already born.
△ Less
Submitted 3 February, 2000;
originally announced February 2000.
-
The Penna model for biological ageing on a lattice: spatial consequences of child-care
Authors:
A. O. Sousa,
S. Moss de Oliveira
Abstract:
We introduce a square lattice into the Penna bit-string model for biological ageing and study the evolution of the spatial distribution of the population considering different strategies of child-care. Two of the strategies are related to the movements of a whole family on the lattice: in one case the mother cannot move if she has any child younger than a given age, and in the other case if she…
▽ More
We introduce a square lattice into the Penna bit-string model for biological ageing and study the evolution of the spatial distribution of the population considering different strategies of child-care. Two of the strategies are related to the movements of a whole family on the lattice: in one case the mother cannot move if she has any child younger than a given age, and in the other case if she moves, she brings these young children with her. A stronger condition has also been added to the second case, considering that young children die with a higher probability if their mothers die, this probability decreasing with age. We show that a highly non uniform occupation can be obtained when child-care is considered, even for an uniform initial occupation per site. We also compare the standard survival rate of the model with that obtained when the spacial lattice is considered (without any kind of child-care).
△ Less
Submitted 22 November, 1999;
originally announced November 1999.