首页 > 最新文献

Journal of complex networks最新文献

英文 中文
The role of network topological structure and semantic features in creating verbal aggression 网络拓扑结构和语义特征在言语攻击产生中的作用
IF 2.1 4区 数学 Q2 Mathematics Pub Date : 2023-02-01 DOI: 10.1093/comnet/cnac056
Meghdad Abarghouei Nejad;Salman Abarghouei Nejad;Azizollah Memariani;Masoud Asadpour;Javad Hatami;Mohammad Mahdi Kashani
In this article, we studied the role of the topological structure of semantic networking in creating verbal aggression. It is shown that centralities such as degree, betweenness and closeness play an important role in the activation of verbal aggression in the network. We have also shown that aggressive labelled nodes with spectral clustering in different spectra are often divided into two groups, with the larger group activating more aggressive labelled nodes. In addition, the parameter of eccentric distribution from the origin is introduced to study the dispersion of aggressive nodes around the specific nodes. Hence, studying two networks with different contexts shows that the dispersion of nodes with aggressive labelling around the network's hub, as the centre of the network with political context, is much more than artistic context. In addition, different clusters of verbal aggression in the political and artistic context have the same pattern of frequency. In addition, we investigated semantic features in creating verbal aggression, showing that non-aggressive words are prone to create verbal aggression as much as aggressive words.
在本文中,我们研究了语义网络拓扑结构在言语攻击产生中的作用。研究表明,程度、中间性和亲密性等中心性在网络言语攻击的激活中起着重要作用。我们还表明,在不同光谱中具有光谱聚类的主动标记节点通常分为两组,较大的组激活更积极的标记节点。此外,引入原点偏心分布参数,研究侵彻节点在特定节点周围的分散情况。因此,研究两个具有不同背景的网络表明,作为具有政治背景的网络中心,具有侵略性标签的节点在网络中心周围的分散程度远远超过艺术背景。此外,在政治语境和艺术语境中,不同类型的言语攻击具有相同的频率模式。此外,我们还研究了产生言语攻击的语义特征,发现非攻击性词汇和攻击性词汇同样容易产生言语攻击。
{"title":"The role of network topological structure and semantic features in creating verbal aggression","authors":"Meghdad Abarghouei Nejad;Salman Abarghouei Nejad;Azizollah Memariani;Masoud Asadpour;Javad Hatami;Mohammad Mahdi Kashani","doi":"10.1093/comnet/cnac056","DOIUrl":"https://doi.org/10.1093/comnet/cnac056","url":null,"abstract":"In this article, we studied the role of the topological structure of semantic networking in creating verbal aggression. It is shown that centralities such as degree, betweenness and closeness play an important role in the activation of verbal aggression in the network. We have also shown that aggressive labelled nodes with spectral clustering in different spectra are often divided into two groups, with the larger group activating more aggressive labelled nodes. In addition, the parameter of eccentric distribution from the origin is introduced to study the dispersion of aggressive nodes around the specific nodes. Hence, studying two networks with different contexts shows that the dispersion of nodes with aggressive labelling around the network's hub, as the centre of the network with political context, is much more than artistic context. In addition, different clusters of verbal aggression in the political and artistic context have the same pattern of frequency. In addition, we investigated semantic features in creating verbal aggression, showing that non-aggressive words are prone to create verbal aggression as much as aggressive words.","PeriodicalId":15442,"journal":{"name":"Journal of complex networks","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49961483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An adaptive bounded-confidence model of opinion dynamics on networks 网络上意见动态的自适应有界置信模型
IF 2.1 4区 数学 Q2 Mathematics Pub Date : 2023-02-01 DOI: 10.1093/comnet/cnac055
Unchitta Kan;Michelle Feng;Mason A Porter
Individuals who interact with each other in social networks often exchange ideas and influence each other's opinions. A popular approach to study the spread of opinions on networks is by examining bounded-confidence models (BCMs), in which the nodes of a network have continuous-valued states that encode their opinions and are receptive to other nodes’ opinions when they lie within some confidence bound of their own opinion. In this article, we extend the Deffuant–Weisbuch (DW) model, which is a well-known BCM, by examining the spread of opinions that coevolve with network structure. We propose an adaptive variant of the DW model in which the nodes of a network can (1) alter their opinions when they interact with neighbouring nodes and (2) break connections with neighbours based on an opinion tolerance threshold and then form new connections following the principle of homophily. This opinion tolerance threshold determines whether or not the opinions of adjacent nodes are sufficiently different to be viewed as ‘discordant’. Using numerical simulations, we find that our adaptive DW model requires a larger confidence bound than a baseline DW model for the nodes of a network to achieve a consensus opinion. In one region of parameter space, we observe ‘pseudo-consensus’ steady states, in which there exist multiple subclusters of an opinion cluster with opinions that differ from each other by a small amount. In our simulations, we also examine the roles of early-time dynamics and nodes with initially moderate opinions for achieving consensus. Additionally, we explore the effects of coevolution on the convergence time of our BCM.
在社交网络中相互互动的个人经常交换想法并影响彼此的观点。研究意见在网络上传播的一种流行方法是通过检查有界置信模型(bcm),其中网络的节点具有连续值状态,这些状态对它们的意见进行编码,并且当它们处于自己意见的某个置信范围内时,它们会接受其他节点的意见。在本文中,我们扩展了Deffuant-Weisbuch (DW)模型,这是一个著名的BCM,通过研究与网络结构共同进化的观点的传播。我们提出了一种自适应的DW模型,其中网络节点可以(1)在与相邻节点交互时改变自己的意见,(2)根据意见容忍阈值与邻居断开连接,然后根据同质性原则形成新的连接。这个意见容忍阈值决定了相邻节点的意见是否足够不同而被视为“不一致”。通过数值模拟,我们发现我们的自适应DW模型需要比基线DW模型更大的置信边界才能达到网络节点的一致意见。在参数空间的一个区域,我们观察到“伪共识”稳定状态,其中存在意见集群的多个子集群,这些子集群的意见彼此之间存在少量差异。在我们的模拟中,我们还研究了早期动态和节点的作用,这些节点最初具有达成共识的温和意见。此外,我们还探讨了协同进化对BCM收敛时间的影响。
{"title":"An adaptive bounded-confidence model of opinion dynamics on networks","authors":"Unchitta Kan;Michelle Feng;Mason A Porter","doi":"10.1093/comnet/cnac055","DOIUrl":"https://doi.org/10.1093/comnet/cnac055","url":null,"abstract":"Individuals who interact with each other in social networks often exchange ideas and influence each other's opinions. A popular approach to study the spread of opinions on networks is by examining bounded-confidence models (BCMs), in which the nodes of a network have continuous-valued states that encode their opinions and are receptive to other nodes’ opinions when they lie within some confidence bound of their own opinion. In this article, we extend the Deffuant–Weisbuch (DW) model, which is a well-known BCM, by examining the spread of opinions that coevolve with network structure. We propose an adaptive variant of the DW model in which the nodes of a network can (1) alter their opinions when they interact with neighbouring nodes and (2) break connections with neighbours based on an opinion tolerance threshold and then form new connections following the principle of homophily. This opinion tolerance threshold determines whether or not the opinions of adjacent nodes are sufficiently different to be viewed as ‘discordant’. Using numerical simulations, we find that our adaptive DW model requires a larger confidence bound than a baseline DW model for the nodes of a network to achieve a consensus opinion. In one region of parameter space, we observe ‘pseudo-consensus’ steady states, in which there exist multiple subclusters of an opinion cluster with opinions that differ from each other by a small amount. In our simulations, we also examine the roles of early-time dynamics and nodes with initially moderate opinions for achieving consensus. Additionally, we explore the effects of coevolution on the convergence time of our BCM.","PeriodicalId":15442,"journal":{"name":"Journal of complex networks","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/8016804/10068397/10068398.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49961486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A fast algorithm to approximate the spectral density of locally tree-like networks with assortativity 基于分类的局部树状网络谱密度快速近似算法
IF 2.1 4区 数学 Q2 Mathematics Pub Date : 2023-02-01 DOI: 10.1093/comnet/cnad005
Grover E C Guzman;André Fujita
Graphs have become crucial for representing and examining biological, social and technological interactions. In this context, the graph spectrum is an exciting feature to be studied because it encodes the structural and dynamic characteristics of the graph. Hence, it becomes essential to efficiently compute the graph's spectral distribution (eigenvalue's density function). Recently, some authors proposed degree-based methods to obtain the spectral density of locally tree-like networks in linear time. The bottleneck of their approach is that they assumed that the graph's assortativity is zero. However, most real-world networks, such as social and biological networks, present assortativity. Consequently, their spectral density approximations may be inaccurate. Here, we propose a method that considers assortativity. Our algorithm's time and space complexities are $mathscr{O}(d_{max}^{2})$, where $d_{max}$ is the largest degree of the graph. Finally, we show our method's efficacy in simulated and empirical networks.
图形对于表示和检查生物、社会和技术的相互作用已经变得至关重要。在这种情况下,图谱是一个值得研究的令人兴奋的特征,因为它编码了图的结构和动态特性。因此,有效地计算图的谱分布(特征值的密度函数)变得至关重要。最近,一些作者提出了基于度的方法来获得线性时间内局部树状网络的谱密度。他们方法的瓶颈是他们假设图的分类性为零。然而,大多数现实世界的网络,如社会网络和生物网络,都呈现出分类性。因此,它们的光谱密度近似值可能是不准确的。在这里,我们提出了一种考虑分类性的方法。我们的算法的时间和空间复杂性是$mathscr{O}(d_{max}^{2})$,其中$d_{max}$是图的最大度。最后,我们展示了我们的方法在模拟和经验网络中的有效性。
{"title":"A fast algorithm to approximate the spectral density of locally tree-like networks with assortativity","authors":"Grover E C Guzman;André Fujita","doi":"10.1093/comnet/cnad005","DOIUrl":"https://doi.org/10.1093/comnet/cnad005","url":null,"abstract":"Graphs have become crucial for representing and examining biological, social and technological interactions. In this context, the graph spectrum is an exciting feature to be studied because it encodes the structural and dynamic characteristics of the graph. Hence, it becomes essential to efficiently compute the graph's spectral distribution (eigenvalue's density function). Recently, some authors proposed degree-based methods to obtain the spectral density of locally tree-like networks in linear time. The bottleneck of their approach is that they assumed that the graph's assortativity is zero. However, most real-world networks, such as social and biological networks, present assortativity. Consequently, their spectral density approximations may be inaccurate. Here, we propose a method that considers assortativity. Our algorithm's time and space complexities are \u0000<tex>$mathscr{O}(d_{max}^{2})$</tex>\u0000, where \u0000<tex>$d_{max}$</tex>\u0000 is the largest degree of the graph. Finally, we show our method's efficacy in simulated and empirical networks.","PeriodicalId":15442,"journal":{"name":"Journal of complex networks","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49937038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction to: Structural analysis of water networks 修正:水网结构分析
IF 2.1 4区 数学 Q2 Mathematics Pub Date : 2023-02-01 DOI: 10.1093/comnet/cnad008
{"title":"Correction to: Structural analysis of water networks","authors":"","doi":"10.1093/comnet/cnad008","DOIUrl":"https://doi.org/10.1093/comnet/cnad008","url":null,"abstract":"","PeriodicalId":15442,"journal":{"name":"Journal of complex networks","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49937036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A method based on link prediction for identifying set of super-spreaders in complex networks 一种基于链路预测的复杂网络超传播者集识别方法
IF 2.1 4区 数学 Q2 Mathematics Pub Date : 2023-02-01 DOI: 10.1093/comnet/cnad007
Bayan Hosseini;Farshid Veisi;Amir Sheikhahmdi
Identifying a group of key nodes with enormous capability for spreading information to other network nodes is one of the favourable research topics in complex networks. In most existing methods, only the current status of the network is used for identifying and selecting the member of these groups. The main weakness of these methods is a lack of attention to the highly dynamic nature of complex networks and continuous changes in them in terms of creating and eliminating nodes and links. This matter makes the selected group have no proper performance in spreading information relative to other nodes. Therefore, this article presents a novel method for identifying spreader nodes and selecting a superior set from them. In the proposed method, the diffusion power of network nodes is calculated in the first step, and some are selected as influential nodes. In the following steps, it is tried to modify the list of selected nodes by predicting the network variation. Six datasets gathered from real-world networks are utilized for evaluation. The proposed method and other methods are tested to evaluate their spread of influence and time complexity. Results show that using the link prediction in the proposed method can enhance the spread of influence by the selected set compared to other methods so that the spread of influence in some datasets is more than 30$%$. On the other hand, the time complexity of the proposed method confirms its utility in very large networks.
在复杂网络中,识别一组具有向其他网络节点传播信息能力的关键节点是一个重要的研究课题。在大多数现有方法中,仅使用网络的当前状态来识别和选择这些组的成员。这些方法的主要缺点是缺乏对复杂网络的高度动态性以及它们在创建和消除节点和链接方面的持续变化的关注。这一问题使得所选组相对于其他节点的信息传播性能不佳。因此,本文提出了一种识别扩散节点并从中选择优集的新方法。在该方法中,首先计算网络节点的扩散能力,并选择一些有影响的节点。在接下来的步骤中,尝试通过预测网络变化来修改所选节点的列表。从现实世界的网络中收集的六个数据集被用于评估。对该方法和其他方法进行了测试,以评估其影响范围和时间复杂度。结果表明,与其他方法相比,该方法中使用链接预测可以增强所选数据集的影响力传播,某些数据集的影响力传播超过30 %。另一方面,该方法的时间复杂度证实了它在非常大的网络中的实用性。
{"title":"A method based on link prediction for identifying set of super-spreaders in complex networks","authors":"Bayan Hosseini;Farshid Veisi;Amir Sheikhahmdi","doi":"10.1093/comnet/cnad007","DOIUrl":"https://doi.org/10.1093/comnet/cnad007","url":null,"abstract":"Identifying a group of key nodes with enormous capability for spreading information to other network nodes is one of the favourable research topics in complex networks. In most existing methods, only the current status of the network is used for identifying and selecting the member of these groups. The main weakness of these methods is a lack of attention to the highly dynamic nature of complex networks and continuous changes in them in terms of creating and eliminating nodes and links. This matter makes the selected group have no proper performance in spreading information relative to other nodes. Therefore, this article presents a novel method for identifying spreader nodes and selecting a superior set from them. In the proposed method, the diffusion power of network nodes is calculated in the first step, and some are selected as influential nodes. In the following steps, it is tried to modify the list of selected nodes by predicting the network variation. Six datasets gathered from real-world networks are utilized for evaluation. The proposed method and other methods are tested to evaluate their spread of influence and time complexity. Results show that using the link prediction in the proposed method can enhance the spread of influence by the selected set compared to other methods so that the spread of influence in some datasets is more than 30\u0000<tex>$%$</tex>\u0000. On the other hand, the time complexity of the proposed method confirms its utility in very large networks.","PeriodicalId":15442,"journal":{"name":"Journal of complex networks","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49918047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A machine-learning procedure to detect network attacks 检测网络攻击的机器学习程序
IF 2.1 4区 数学 Q2 Mathematics Pub Date : 2023-01-15 DOI: 10.1093/comnet/cnad017
Davide Coppes, P. Cermelli
The goal of this note is to assess whether simple machine learning algorithms can be used to determine whether and how a given network has been attacked. The procedure is based on the $k$-Nearest Neighbor and the Random Forest classification schemes, using both intact and attacked ErdH{o}s-R'enyi, Barabasi-Albert and Watts-Strogatz networks to train the algorithm. The types of attacks we consider here are random failures and maximum-degree or maximum-betweenness node deletion. Each network is characterized by a list of 4 metrics, namely the normalized reciprocal maximum degree, the global clustering coefficient, the normalized average path length and the assortativity: a statistical analysis shows that this list of graph metrics is indeed significantly different in intact or damaged networks. We test the procedure by choosing both artificial and real networks, performing the attacks and applying the classification algorithms to the resulting graphs: the procedure discussed here turns out to be able to distinguish between intact networks and those attacked by the maximum-degree of maximum-betweenness deletions, but cannot detect random failures. Our results suggest that this approach may provide a basis for the analysis and detection of network attacks.
本文的目的是评估是否可以使用简单的机器学习算法来确定给定网络是否受到攻击以及如何受到攻击。该过程基于$k$-最近邻和随机森林分类方案,使用完整和攻击的ErdH{o} - r enyi, barabsi - albert和Watts-Strogatz网络来训练算法。我们在这里考虑的攻击类型是随机故障和最大程度或最大间隔节点删除。每个网络都有一个包含4个指标的列表来表征,即归一化倒最大度、全局聚类系数、归一化平均路径长度和分类度:统计分析表明,这一列表的图指标在完整或损坏的网络中确实有显著差异。我们通过选择人工网络和真实网络,执行攻击并将分类算法应用于结果图来测试该过程:这里讨论的过程能够区分完整网络和被最大间数删除的最大程度攻击的网络,但不能检测随机故障。我们的研究结果表明,这种方法可以为分析和检测网络攻击提供基础。
{"title":"A machine-learning procedure to detect network attacks","authors":"Davide Coppes, P. Cermelli","doi":"10.1093/comnet/cnad017","DOIUrl":"https://doi.org/10.1093/comnet/cnad017","url":null,"abstract":"The goal of this note is to assess whether simple machine learning algorithms can be used to determine whether and how a given network has been attacked. The procedure is based on the $k$-Nearest Neighbor and the Random Forest classification schemes, using both intact and attacked ErdH{o}s-R'enyi, Barabasi-Albert and Watts-Strogatz networks to train the algorithm. The types of attacks we consider here are random failures and maximum-degree or maximum-betweenness node deletion. Each network is characterized by a list of 4 metrics, namely the normalized reciprocal maximum degree, the global clustering coefficient, the normalized average path length and the assortativity: a statistical analysis shows that this list of graph metrics is indeed significantly different in intact or damaged networks. We test the procedure by choosing both artificial and real networks, performing the attacks and applying the classification algorithms to the resulting graphs: the procedure discussed here turns out to be able to distinguish between intact networks and those attacked by the maximum-degree of maximum-betweenness deletions, but cannot detect random failures. Our results suggest that this approach may provide a basis for the analysis and detection of network attacks.","PeriodicalId":15442,"journal":{"name":"Journal of complex networks","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2023-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82823521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correlation distances in social networks 社交网络中的相关距离
IF 2.1 4区 数学 Q2 Mathematics Pub Date : 2022-12-21 DOI: 10.1093/comnet/cnad016
Pádraig MacCarron, Shane Mannion, T. Platini
In this work we explore degree assortativity in complex networks, and extend its usual definition beyond that of nearest neighbours. We apply this definition to model networks, and describe a rewiring algorithm that induces assortativity. We compare these results to real networks. Social networks in particular tend to be assortatively mixed by degree in contrast to many other types of complex networks. However, we show here that these positive correlations diminish after one step and in most of the empirical networks analysed. Properties besides degree support this, such as the number of papers in scientific coauthorship networks, with no correlations beyond nearest neighbours. Beyond next-nearest neighbours we also observe a diasassortative tendency for nodes three steps away indicating that nodes at that distance are more likely different than similar.
在这项工作中,我们探索了复杂网络中的程度分类,并将其通常的定义扩展到最近邻的定义之外。我们将这一定义应用于网络模型,并描述了一种诱导分类的重新布线算法。我们将这些结果与真实网络进行比较。与许多其他类型的复杂网络相比,社会网络尤其倾向于按程度分类混合。然而,我们在这里表明,这些正相关性在一步后减少,并在大多数实证网络分析。除了程度之外,其他属性也支持这一点,比如科学合作网络中的论文数量,除了近邻之外没有相关性。除了最近的邻居之外,我们还观察到距离三步远的节点的非分类趋势,表明该距离的节点更有可能不同而不是相似。
{"title":"Correlation distances in social networks","authors":"Pádraig MacCarron, Shane Mannion, T. Platini","doi":"10.1093/comnet/cnad016","DOIUrl":"https://doi.org/10.1093/comnet/cnad016","url":null,"abstract":"In this work we explore degree assortativity in complex networks, and extend its usual definition beyond that of nearest neighbours. We apply this definition to model networks, and describe a rewiring algorithm that induces assortativity. We compare these results to real networks. Social networks in particular tend to be assortatively mixed by degree in contrast to many other types of complex networks. However, we show here that these positive correlations diminish after one step and in most of the empirical networks analysed. Properties besides degree support this, such as the number of papers in scientific coauthorship networks, with no correlations beyond nearest neighbours. Beyond next-nearest neighbours we also observe a diasassortative tendency for nodes three steps away indicating that nodes at that distance are more likely different than similar.","PeriodicalId":15442,"journal":{"name":"Journal of complex networks","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2022-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86581104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A robust method for fitting degree distributions of complex networks 复杂网络度分布拟合的鲁棒方法
IF 2.1 4区 数学 Q2 Mathematics Pub Date : 2022-12-13 DOI: 10.1093/comnet/cnad023
Shane Mannion, Pádraig MacCarron
This work introduces a method for fitting to the degree distributions of complex network datasets, such that the most appropriate distribution from a set of candidate distributions is chosen while maximizing the portion of the distribution to which the model is fit. Current methods for fitting to degree distributions in the literature are inconsistent and often assume a priori what distribution the data are drawn from. Much focus is given to fitting to the tail of the distribution, while a large portion of the distribution below the tail is ignored. It is important to account for these low degree nodes, as they play crucial roles in processes such as percolation. Here we address these issues, using maximum likelihood estimators to fit to the entire dataset, or close to it. This methodology is applicable to any network dataset (or discrete empirical dataset), and we test it on over 25 network datasets from a wide range of sources, achieving good fits in all but a few cases. We also demonstrate that numerical maximization of the likelihood performs better than commonly used analytical approximations. In addition, we have made available a Python package which can be used to apply this methodology.
这项工作介绍了一种拟合复杂网络数据集的度分布的方法,这样就可以从一组候选分布中选择最合适的分布,同时最大化模型拟合的分布部分。目前文献中拟合程度分布的方法是不一致的,并且通常假设数据是从什么分布中提取的先验。大部分的重点放在拟合分布的尾部,而忽略了尾部以下的大部分分布。考虑这些低度节点是很重要的,因为它们在渗流等过程中起着至关重要的作用。在这里,我们解决这些问题,使用最大似然估计器来拟合整个数据集,或接近它。这种方法适用于任何网络数据集(或离散经验数据集),我们在来自广泛来源的超过25个网络数据集上进行了测试,除了少数情况外,在所有情况下都取得了良好的拟合。我们还证明,数值最大化的似然执行比常用的解析近似更好。此外,我们还提供了一个Python包,可用于应用此方法。
{"title":"A robust method for fitting degree distributions of complex networks","authors":"Shane Mannion, Pádraig MacCarron","doi":"10.1093/comnet/cnad023","DOIUrl":"https://doi.org/10.1093/comnet/cnad023","url":null,"abstract":"This work introduces a method for fitting to the degree distributions of complex network datasets, such that the most appropriate distribution from a set of candidate distributions is chosen while maximizing the portion of the distribution to which the model is fit. Current methods for fitting to degree distributions in the literature are inconsistent and often assume a priori what distribution the data are drawn from. Much focus is given to fitting to the tail of the distribution, while a large portion of the distribution below the tail is ignored. It is important to account for these low degree nodes, as they play crucial roles in processes such as percolation. Here we address these issues, using maximum likelihood estimators to fit to the entire dataset, or close to it. This methodology is applicable to any network dataset (or discrete empirical dataset), and we test it on over 25 network datasets from a wide range of sources, achieving good fits in all but a few cases. We also demonstrate that numerical maximization of the likelihood performs better than commonly used analytical approximations. In addition, we have made available a Python package which can be used to apply this methodology.","PeriodicalId":15442,"journal":{"name":"Journal of complex networks","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2022-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87624292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tractability of L2-approximation and integration in weighted Hermite spaces of finite smoothness 有限光滑加权Hermite空间中l2逼近与积分的可跟踪性
IF 2.1 4区 数学 Q2 Mathematics Pub Date : 2022-12-12 DOI: 10.48550/arXiv.2212.05780
G. Leobacher, F. Pillichshammer, Adrian Ebert
In this paper we consider integration and $L_2$-approximation for functions over $RR^s$ from weighted Hermite spaces. The first part of the paper is devoted to a comparison of several weighted Hermite spaces that appear in literature, which is interesting on its own. Then we study tractability of the integration and $L_2$-approximation problem for the introduced Hermite spaces, which describes the growth rate of the information complexity when the error threshold $varepsilon$ tends to 0 and the problem dimension $s$ grows to infinity. Our main results are characterizations of tractability in terms of the involved weights, which model the importance of the successive coordinate directions for functions from the weighted Hermite spaces.
本文研究了加权Hermite空间中$RR^s$上函数的积分和$L_2$逼近问题。论文的第一部分致力于比较文学中出现的几个加权赫米特空间,这本身就很有趣。然后研究了引入的Hermite空间的积分和$L_2$逼近问题的可跟踪性,描述了误差阈值$ varepsilon$趋近于0,问题维数$s$趋近于无穷时信息复杂度的增长速度。我们的主要结果是根据所涉及的权重来描述可跟踪性,这对来自加权Hermite空间的函数的连续坐标方向的重要性进行了建模。
{"title":"Tractability of L2-approximation and integration in weighted Hermite spaces of finite smoothness","authors":"G. Leobacher, F. Pillichshammer, Adrian Ebert","doi":"10.48550/arXiv.2212.05780","DOIUrl":"https://doi.org/10.48550/arXiv.2212.05780","url":null,"abstract":"In this paper we consider integration and $L_2$-approximation for functions over $RR^s$ from weighted Hermite spaces. The first part of the paper is devoted to a comparison of several weighted Hermite spaces that appear in literature, which is interesting on its own. Then we study tractability of the integration and $L_2$-approximation problem for the introduced Hermite spaces, which describes the growth rate of the information complexity when the error threshold $varepsilon$ tends to 0 and the problem dimension $s$ grows to infinity. Our main results are characterizations of tractability in terms of the involved weights, which model the importance of the successive coordinate directions for functions from the weighted Hermite spaces.","PeriodicalId":15442,"journal":{"name":"Journal of complex networks","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2022-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90648254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A cosine rule-based discrete sectional curvature for graphs 基于余弦规则的离散截面曲率图
IF 2.1 4区 数学 Q2 Mathematics Pub Date : 2022-12-02 DOI: 10.1093/comnet/cnad022
J. D. Plessis, X. Arsiwalla
How does one generalize differential geometric constructs such as curvature of a manifold to the discrete world of graphs and other combinatorial structures? This problem carries significant importance for analyzing models of discrete spacetime in quantum gravity; inferring network geometry in network science; and manifold learning in data science. The key contribution of this paper is to introduce and validate a new estimator of discrete sectional curvature for random graphs with low metric-distortion. The latter are constructed via a specific graph sprinkling method on different manifolds with constant sectional curvature. We define a notion of metric distortion, which quantifies how well the graph metric approximates the metric of the underlying manifold. We show how graph sprinkling algorithms can be refined to produce hard annulus random geometric graphs with minimal metric distortion. We construct random geometric graphs for spheres, hyperbolic and euclidean planes; upon which we validate our curvature estimator. Numerical analysis reveals that the error of the estimated curvature diminishes as the mean metric distortion goes to zero, thus demonstrating convergence of the estimate. We also perform comparisons to other existing discrete curvature measures. Finally, we demonstrate two practical applications: (i) estimation of the earth's radius using geographical data; and (ii) sectional curvature distributions of self-similar fractals.
如何将诸如流形曲率之类的微分几何构造推广到图形和其他组合结构的离散世界?这个问题对于分析量子引力中的离散时空模型具有重要意义;网络科学中的网络几何推理以及数据科学中的多元学习。本文的主要贡献是引入并验证了一种新的低度量失真随机图的离散截面曲率估计。后者是在不同截面曲率不变的流形上,通过一种特殊的图喷洒方法来构造的。我们定义了度量失真的概念,它量化了图形度量近似底层流形的度量的程度。我们展示了如何改进图形喷洒算法,以产生具有最小度量失真的硬环随机几何图形。我们构造了球面、双曲平面和欧几里得平面的随机几何图;在此基础上我们验证曲率估计。数值分析表明,估计曲率的误差随着平均度规畸变趋近于零而减小,从而证明了估计的收敛性。我们还与其他现有的离散曲率度量进行了比较。最后,我们展示了两个实际应用:(i)利用地理数据估计地球半径;(ii)自相似分形的截面曲率分布。
{"title":"A cosine rule-based discrete sectional curvature for graphs","authors":"J. D. Plessis, X. Arsiwalla","doi":"10.1093/comnet/cnad022","DOIUrl":"https://doi.org/10.1093/comnet/cnad022","url":null,"abstract":"How does one generalize differential geometric constructs such as curvature of a manifold to the discrete world of graphs and other combinatorial structures? This problem carries significant importance for analyzing models of discrete spacetime in quantum gravity; inferring network geometry in network science; and manifold learning in data science. The key contribution of this paper is to introduce and validate a new estimator of discrete sectional curvature for random graphs with low metric-distortion. The latter are constructed via a specific graph sprinkling method on different manifolds with constant sectional curvature. We define a notion of metric distortion, which quantifies how well the graph metric approximates the metric of the underlying manifold. We show how graph sprinkling algorithms can be refined to produce hard annulus random geometric graphs with minimal metric distortion. We construct random geometric graphs for spheres, hyperbolic and euclidean planes; upon which we validate our curvature estimator. Numerical analysis reveals that the error of the estimated curvature diminishes as the mean metric distortion goes to zero, thus demonstrating convergence of the estimate. We also perform comparisons to other existing discrete curvature measures. Finally, we demonstrate two practical applications: (i) estimation of the earth's radius using geographical data; and (ii) sectional curvature distributions of self-similar fractals.","PeriodicalId":15442,"journal":{"name":"Journal of complex networks","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89522668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Journal of complex networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1