-
Dynamics of extended Schelling models
Authors:
A. P. Vieira,
E. Goles,
H. J. Herrmann
Abstract:
We explore extensions of Schelling's model of social dynamics, in which two types of agents live on a checkerboard lattice and move in order to optimize their own satisfaction, which depends on how many agents among their neighbors are of their same type. For each number $n$ of same-type nearest neighbors we independently assign a binary satisfaction variable $s_{k}$ which is equal to one only if…
▽ More
We explore extensions of Schelling's model of social dynamics, in which two types of agents live on a checkerboard lattice and move in order to optimize their own satisfaction, which depends on how many agents among their neighbors are of their same type. For each number $n$ of same-type nearest neighbors we independently assign a binary satisfaction variable $s_{k}$ which is equal to one only if the agent is satisfied with that condition, and is equal to zero otherwise. This defines 32 different satisfaction rules, which we investigate in detail, focusing on pattern formation and measuring segregation with the help of an "energy" function which is related to the number of neighboring agents of different types and plays no role in the dynamics. We consider the checkerboard lattice to be fully occupied and the dynamics consists of switching the locations of randomly selected unsatisfied agents of opposite types. We show that, starting from a random distribution of agents, only a small number of rules lead to (nearly) fully segregated patterns in the long run, with many rules leading to chaotic steady-state behavior. Nevertheless, other interesting patterns may also be dynamically generated, such as "anti-segregate d" patterns as well as patterns resembling sponges.
△ Less
Submitted 22 January, 2020;
originally announced January 2020.
-
The Impact of Technologies in Political Campaigns
Authors:
Moritz Hoferer,
Lucas Böttcher,
Hans J. Herrmann,
Hans Gersbach
Abstract:
Recent political campaigns have demonstrated how technologies are used to boost election outcomes by microtargeting voters. We propose and analyze a framework which analyzes how political activists use technologies to target voters. Voters are represented as nodes of a network. Political activists reach out locally to voters and try to convince them. Depending on their technological advantage and…
▽ More
Recent political campaigns have demonstrated how technologies are used to boost election outcomes by microtargeting voters. We propose and analyze a framework which analyzes how political activists use technologies to target voters. Voters are represented as nodes of a network. Political activists reach out locally to voters and try to convince them. Depending on their technological advantage and budget, political activists target certain regions in the network where their activities are able to generate the largest vote-share gains. Analytically and numerically, we quantify vote-share gains and savings in terms of budget and number of activists from employing superior targeting technologies compared to traditional campaigns. Moreover, we demonstrate that the technological precision must surpass a certain threshold in order to lead to a vote-share gain or budget advantage. Finally, by calibrating the technology parameters to the recent U.S. presidential election, we show that a pure targeting technology advantage is consistent with Trump winning against Clinton.
△ Less
Submitted 17 September, 2019;
originally announced September 2019.
-
Spatial features of synaptic adaptation affecting learning performance
Authors:
Damian L. Berger,
Lucilla de Arcangelis,
Hans J. Herrmann
Abstract:
Recent studies have proposed that the diffusion of messenger molecules, such as monoamines, can mediate the plastic adaptation of synapses in supervised learning of neural networks. Based on these findings we developed a model for neural learning, where the signal for plastic adaptation is assumed to propagate through the extracellular space. We investigate the conditions allowing learning of Bool…
▽ More
Recent studies have proposed that the diffusion of messenger molecules, such as monoamines, can mediate the plastic adaptation of synapses in supervised learning of neural networks. Based on these findings we developed a model for neural learning, where the signal for plastic adaptation is assumed to propagate through the extracellular space. We investigate the conditions allowing learning of Boolean rules in a neural network. Even fully excitatory networks show very good learning performances. Moreover, the investigation of the plastic adaptation features optimizing the performance suggests that learning is very sensitive to the extent of the plastic adaptation and the spatial range of synaptic connections.
△ Less
Submitted 20 September, 2017;
originally announced September 2017.
-
The complex social network of surnames: A comparison between Brazil and Portugal
Authors:
G. D. Ferreira,
G. M. Viswanathan,
L. R. da Silva,
H. J. Herrmann
Abstract:
We present a study of social networks based on the analysis of Brazilian and Portuguese family names (surnames). We construct networks whose nodes are names of families and whose edges represent parental relations between two families. From these networks we extract the connectivity distribution, clustering coefficient, shortest path and centrality. We find that the connectivity distribution follo…
▽ More
We present a study of social networks based on the analysis of Brazilian and Portuguese family names (surnames). We construct networks whose nodes are names of families and whose edges represent parental relations between two families. From these networks we extract the connectivity distribution, clustering coefficient, shortest path and centrality. We find that the connectivity distribution follows an approximate power law. We associate the number of hubs, centrality and entropy to the degree of miscegenation in the societies in both countries. Our results show that Portuguese society has a higher miscegenation degree than Brazilian society. All networks analyzed lead to approximate inverse square power laws in the degree distribution. We conclude that the thermodynamic limit is reached for small networks (3 or 4 thousand nodes). The assortative mixing of all networks is negative, showing that the more connected vertices are connected to vertices with lower connectivity. Finally, the network of surnames presents some small world characteristics.
△ Less
Submitted 12 May, 2017;
originally announced May 2017.
-
Gender differences in scientific collaborations: Women are more egalitarian than men
Authors:
Eduardo B. Araujo,
Nuno A. M. Araujo,
Andre A. Moreira,
Hans J. Herrmann,
J. S. Andrade Jr
Abstract:
By analyzing a unique dataset of more than 270,000 scientists, we discovered substantial gender differences in scientific collaborations. While men are more likely to collaborate with other men, women are more egalitarian. This is consistently observed over all fields and regardless of the number of collaborators a scientist has. The only exception is observed in the field of engineering, where th…
▽ More
By analyzing a unique dataset of more than 270,000 scientists, we discovered substantial gender differences in scientific collaborations. While men are more likely to collaborate with other men, women are more egalitarian. This is consistently observed over all fields and regardless of the number of collaborators a scientist has. The only exception is observed in the field of engineering, where this gender bias disappears with increasing number of collaborators. We also found that the distribution of the number of collaborators follows a truncated power law with a cut-off that is gender dependent and related to the gender differences in the number of published papers. Considering interdisciplinary research, our analysis shows that men and women behave similarly across fields, except in the case of natural sciences, where women with many collaborators are more likely to have collaborators from other fields.
△ Less
Submitted 19 October, 2016;
originally announced October 2016.
-
Mandala Networks: ultra-robust, ultra-small-world and highly sparse graphs
Authors:
C. I. N. Sampaio Filho,
A. A. Moreira,
R. F. S. Andrade,
H. J. Herrmann,
J. S. Andrade Jr
Abstract:
The increasing demands in security and reliability of infrastructures call for the optimal design of their embedded complex networks topologies. The following question then arises: what is the optimal layout to fulfill best all the demands? Here we present a general solution for this problem with scale-free networks, like the Internet and airline networks. Precisely, we disclose a way to systemati…
▽ More
The increasing demands in security and reliability of infrastructures call for the optimal design of their embedded complex networks topologies. The following question then arises: what is the optimal layout to fulfill best all the demands? Here we present a general solution for this problem with scale-free networks, like the Internet and airline networks. Precisely, we disclose a way to systematically construct networks which are 100$\%$ robust against random failures as well as to malicious attacks. Furthermore, as the sizes of these networks increase, their shortest paths become asymptotically invariant and densities of links go to zero, making them ultra-small worlds and highly sparse, respectively. The first property is ideal for communication and navigation purposes, while the second is interesting economically.
△ Less
Submitted 27 June, 2014;
originally announced June 2014.
-
Revealing the structure of the world airline network
Authors:
Trivik Verma,
Nuno A. M. Araújo,
Hans J Herrmann
Abstract:
Resilience of most critical infrastructures against failure of elements that appear insignificant is usually taken for granted. The World Airline Network (WAN) is an infrastructure that reduces the geographical gap between societies, both small and large, and brings forth economic gains. With the extensive use of a publicly maintained data set that contains information about airports and alternati…
▽ More
Resilience of most critical infrastructures against failure of elements that appear insignificant is usually taken for granted. The World Airline Network (WAN) is an infrastructure that reduces the geographical gap between societies, both small and large, and brings forth economic gains. With the extensive use of a publicly maintained data set that contains information about airports and alternative connections between these airports, we empirically reveal that the WAN is a redundant and resilient network for long distance air travel, but otherwise breaks down completely due to removal of short and apparently insignificant connections. These short range connections with moderate number of passengers and alternate flights are the connections that keep remote parts of the world accessible. It is surprising, insofar as there exists a highly resilient and strongly connected core consisting of a small fraction of airports (around 2.3%) together with an extremely fragile star-like periphery. Yet, in spite of their relevance, more than 90% of the world airports are still interconnected upon removal of this core. With standard and unconventional removal measures we compare both empirical and topological perceptions for the fragmentation of the world. We identify how the WAN is organized into different classes of clusters based on the physical proximity of airports and analyze the consequence of this fragmentation.
△ Less
Submitted 4 April, 2014;
originally announced April 2014.
-
Smart Rewiring for Network Robustness
Authors:
V. H. P. Louzada,
F. Daolio,
H. J. Herrmann,
M. Tomassini
Abstract:
While new forms of attacks are developed every day to compromise essential infrastructures, service providers are also expected to develop strategies to mitigate the risk of extreme failures. In this context, tools of Network Science have been used to evaluate network robustness and propose resilient topologies against attacks. We present here a new rewiring method to modify the network topology i…
▽ More
While new forms of attacks are developed every day to compromise essential infrastructures, service providers are also expected to develop strategies to mitigate the risk of extreme failures. In this context, tools of Network Science have been used to evaluate network robustness and propose resilient topologies against attacks. We present here a new rewiring method to modify the network topology improving its robustness, based on the evolution of the network largest component during a sequence of targeted attacks. In comparison to previous strategies, our method lowers by several orders of magnitude the computational effort necessary to improve robustness. Our rewiring also drives the formation of layers of nodes with similar degree while kee** a highly modular structure. This "modular onion-like structure" is a particular class of the onion-like structure previously described in the literature. We apply our rewiring strategy to an unweighted representation of the World Air Transportation network and show that an improvement of 30% in its overall robustness can be achieved through smart swaps of around 9% of its links.
△ Less
Submitted 20 September, 2013; v1 submitted 21 March, 2013;
originally announced March 2013.
-
Efficient algorithm to study interconnected networks
Authors:
Christian M. Schneider,
Nuno A. M. Araújo,
Hans J. Herrmann
Abstract:
Interconnected networks have been shown to be much more vulnerable to random and targeted failures than isolated ones, raising several interesting questions regarding the identification and mitigation of their risk. The paradigm to address these questions is the percolation model, where the resilience of the system is quantified by the dependence of the size of the largest cluster on the number of…
▽ More
Interconnected networks have been shown to be much more vulnerable to random and targeted failures than isolated ones, raising several interesting questions regarding the identification and mitigation of their risk. The paradigm to address these questions is the percolation model, where the resilience of the system is quantified by the dependence of the size of the largest cluster on the number of failures. Numerically, the major challenge is the identification of this cluster and the calculation of its size. Here, we propose an efficient algorithm to tackle this problem. We show that the algorithm scales as O(N log N), where N is the number of nodes in the network, a significant improvement compared to O(N^2) for a greedy algorithm, what permits studying much larger networks. Our new strategy can be applied to any network topology and distribution of interdependencies, as well as any sequence of failures.
△ Less
Submitted 13 January, 2013;
originally announced January 2013.
-
Subdivision Shell Elements with Anisotropic Growth
Authors:
Roman Vetter,
Norbert Stoop,
Thomas Jenni,
Falk K. Wittel,
Hans J. Herrmann
Abstract:
A thin shell finite element approach based on Loop's subdivision surfaces is proposed, capable of dealing with large deformations and anisotropic growth. To this end, the Kirchhoff-Love theory of thin shells is derived and extended to allow for arbitrary in-plane growth. The simplicity and computational efficiency of the subdivision thin shell elements is outstanding, which is demonstrated on a fe…
▽ More
A thin shell finite element approach based on Loop's subdivision surfaces is proposed, capable of dealing with large deformations and anisotropic growth. To this end, the Kirchhoff-Love theory of thin shells is derived and extended to allow for arbitrary in-plane growth. The simplicity and computational efficiency of the subdivision thin shell elements is outstanding, which is demonstrated on a few standard loading benchmarks. With this powerful tool at hand, we demonstrate the broad range of possible applications by numerical solution of several growth scenarios, ranging from the uniform growth of a sphere, to boundary instabilities induced by large anisotropic growth. Finally, it is shown that the problem of a slowly and uniformly growing sheet confined in a fixed hollow sphere is equivalent to the inverse process where a sheet of fixed size is slowly crumpled in a shrinking hollow sphere in the frictionless, quasi-static, elastic limit.
△ Less
Submitted 27 March, 2013; v1 submitted 22 August, 2012;
originally announced August 2012.
-
Generating Robust and Efficient Networks Under Targeted Attacks
Authors:
Vitor H. P. Louzada,
Fabio Daolio,
Hans J. Herrmann,
Marco Tomassini
Abstract:
Much of our commerce and traveling depend on the efficient operation of large scale networks. Some of those, such as electric power grids, transportation systems, communication networks, and others, must maintain their efficiency even after several failures, or malicious attacks. We outline a procedure that modifies any given network to enhance its robustness, defined as the size of its largest co…
▽ More
Much of our commerce and traveling depend on the efficient operation of large scale networks. Some of those, such as electric power grids, transportation systems, communication networks, and others, must maintain their efficiency even after several failures, or malicious attacks. We outline a procedure that modifies any given network to enhance its robustness, defined as the size of its largest connected component after a succession of attacks, whilst kee** a high efficiency, described in terms of the shortest paths among nodes. We also show that this generated set of networks is very similar to networks optimized for robustness in several aspects such as high assortativity and the presence of an onion-like structure.
△ Less
Submitted 24 March, 2015; v1 submitted 5 July, 2012;
originally announced July 2012.
-
Optimal box-covering algorithm for fractal dimension of complex networks
Authors:
Christian M. Schneider,
Tobias A. Kesselring,
Jose S. Andrade Jr.,
Hans J. Herrmann
Abstract:
The self-similarity of complex networks is typically investigated through computational algorithms the primary task of which is to cover the structure with a minimal number of boxes. Here we introduce a box-covering algorithm that not only outperforms previous ones, but also finds optimal solutions. For the two benchmark cases tested, namely, the E. Coli and the WWW networks, our results show that…
▽ More
The self-similarity of complex networks is typically investigated through computational algorithms the primary task of which is to cover the structure with a minimal number of boxes. Here we introduce a box-covering algorithm that not only outperforms previous ones, but also finds optimal solutions. For the two benchmark cases tested, namely, the E. Coli and the WWW networks, our results show that the improvement can be rather substantial, reaching up to 15% in the case of the WWW network.
△ Less
Submitted 13 April, 2012;
originally announced April 2012.
-
Inverse targeting -- an effective immunization strategy
Authors:
Christian M. Schneider,
Tamara Mihaljev,
Hans J. Herrmann
Abstract:
We propose a new method to immunize populations or computer networks against epidemics which is more efficient than any method considered before. The novelty of our method resides in the way of determining the immunization targets. First we identify those individuals or computers that contribute the least to the disease spreading measured through their contribution to the size of the largest conne…
▽ More
We propose a new method to immunize populations or computer networks against epidemics which is more efficient than any method considered before. The novelty of our method resides in the way of determining the immunization targets. First we identify those individuals or computers that contribute the least to the disease spreading measured through their contribution to the size of the largest connected cluster in the social or a computer network. The immunization process follows the list of identified individuals or computers in inverse order, immunizing first those which are most relevant for the epidemic spreading. We have applied our immunization strategy to several model networks and two real networks, the Internet and the collaboration network of high energy physicists. We find that our new immunization strategy is in the case of model networks up to 14%, and for real networks up to 33% more efficient than immunizing dynamically the most connected nodes in a network. Our strategy is also numerically efficient and can therefore be applied to large systems.
△ Less
Submitted 13 December, 2011;
originally announced December 2011.
-
Mitigation of Malicious Attacks on Networks
Authors:
Christian M. Schneider,
Andre A. Moreira,
Jose S. Andrade Jr.,
Shlomo Havlin,
Hans J. Herrmann
Abstract:
Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it…
▽ More
Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically while their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.
△ Less
Submitted 9 March, 2011;
originally announced March 2011.
-
Scale free networks by preferential depletion
Authors:
Christian M. Schneider,
Lucilla de Arcangelis,
Hans J. Herrmann
Abstract:
We show that not only preferential attachment but also preferential depletion leads to scale-free networks. The resulting degree distribution exponents is typically less than two (5/3) as opposed to the case of the growth models studied before where the exponents are larger. Our approach applies in particular to biological networks where in fact we find interesting agreement with experimental meas…
▽ More
We show that not only preferential attachment but also preferential depletion leads to scale-free networks. The resulting degree distribution exponents is typically less than two (5/3) as opposed to the case of the growth models studied before where the exponents are larger. Our approach applies in particular to biological networks where in fact we find interesting agreement with experimental measurements. We investigate the most important properties characterizing these networks, as the cluster size distribution, the average shortest path and the clustering coefficient.
△ Less
Submitted 7 March, 2011;
originally announced March 2011.
-
Suppressing Epidemics with a Limited Amount of Immunization Units
Authors:
Christian M. Schneider,
Tamara Mihaljev,
Shlomo Havlin,
Hans J. Herrmann
Abstract:
The way diseases spread through schools, epidemics through countries, and viruses through the Internet is crucial in determining their risk. Although each of these threats has its own characteristics, its underlying network determines the spreading. To restrain the spreading, a widely used approach is the fragmentation of these networks through immunization, so that epidemics cannot spread. Here w…
▽ More
The way diseases spread through schools, epidemics through countries, and viruses through the Internet is crucial in determining their risk. Although each of these threats has its own characteristics, its underlying network determines the spreading. To restrain the spreading, a widely used approach is the fragmentation of these networks through immunization, so that epidemics cannot spread. Here we develop an immunization approach based on optimizing the susceptible size, which outperforms the best known strategy based on immunizing the highest-betweenness links or nodes. We find that the network's vulnerability can be significantly reduced, demonstrating this on three different real networks: the global flight network, a school friendship network, and the internet. In all cases, we find that not only is the average infection probability significantly suppressed, but also for the most relevant case of a small and limited number of immunization units the infection probability can be reduced by up to 55%.
△ Less
Submitted 18 December, 2011; v1 submitted 9 February, 2011;
originally announced February 2011.
-
Inter-arrival times of message propagation on directed networks
Authors:
Tamara Mihaljev,
Lucilla de Arcangelis,
Hans J. Herrmann
Abstract:
One of the challenges in fighting cybercrime is to understand the dynamics of message propagation on botnets, networks of infected computers used to send viruses, unsolicited commercial emails (SPAM) or denial of service attacks. We map this problem to the propagation of multiple random walkers on directed networks and we evaluate the inter-arrival time distribution between successive walkers arri…
▽ More
One of the challenges in fighting cybercrime is to understand the dynamics of message propagation on botnets, networks of infected computers used to send viruses, unsolicited commercial emails (SPAM) or denial of service attacks. We map this problem to the propagation of multiple random walkers on directed networks and we evaluate the inter-arrival time distribution between successive walkers arriving at a target. We show that the temporal organization of this process, which models information propagation on unstructured peer to peer networks, has the same features as SPAM arriving to a single user. We study the behavior of the message inter-arrival time distribution on three different network topologies using two different rules for sending messages. In all networks the propagation is not a pure Poisson process. It shows universal features on Poissonian networks and a more complex behavior on scale free networks. Results open the possibility to indirectly learn about the process of sending messages on networks with unknown topologies, by studying inter-arrival times at any node of the network.
△ Less
Submitted 2 November, 2010;
originally announced November 2010.