1
|
Zheng C, Hu Y, Zhang C, Yu W, Yao H, Li Y, Fan C, Cen X. Optimizing the robustness of higher-low order coupled networks. PLoS One 2024; 19:e0298439. [PMID: 38483852 PMCID: PMC10939264 DOI: 10.1371/journal.pone.0298439] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/10/2023] [Accepted: 01/23/2024] [Indexed: 03/17/2024] Open
Abstract
Enhancing the robustness of complex networks is of great practical significance as it ensures the stable operation of infrastructure systems. We measure its robustness by examining the size of the largest connected component of the network after initial attacks. However, traditional research on network robustness enhancement has mainly focused on low-order networks, with little attention given to higher-order networks, particularly higher-low order coupling networks(the largest connected component of the network must exist in both higher-order and low-order networks). To address this issue, this paper proposes robust optimization methods for higher-low order coupled networks based on the greedy algorithm and the simulated annealing algorithm. By comparison, we found that the simulated annealing algorithm performs better. The proposed method optimizes the topology of the low-order network and the higher-order network by randomly reconnecting the edges, thereby enhancing the robustness of the higher-order and low-order coupled network. The experiments were conducted on multiple real networks to evaluate the change in the robustness coefficient before and after network optimization. The results demonstrate that the proposed method can effectively improve the robustness of both low-order and higher-order networks, ultimately enhancing the robustness of higher-low order coupled networks.
Collapse
Affiliation(s)
- Chunlin Zheng
- School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China
- Jiangsu Second Normal University, Nanjing, China
| | - Yonglin Hu
- School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China
- Information & Computer Center, Tianfeigong Primary School, Nanjing, China
| | - Chengjun Zhang
- School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China
- Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET), Nanjing University of Information Science and Technology, Nanjing, China
- Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing, China
| | - Wenbin Yu
- School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China
- School of Software, Nanjing University of Information Science and Technology, Nanjing, China
- Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET), Nanjing University of Information Science and Technology, Nanjing, China
- Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing, China
| | - Hui Yao
- School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China
| | - Yangsong Li
- School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China
- School of Software, Nanjing University of Information Science and Technology, Nanjing, China
| | - Cheng Fan
- School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China
- School of Software, Nanjing University of Information Science and Technology, Nanjing, China
| | - Xiaolin Cen
- School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China
| |
Collapse
|
2
|
Zhang C, Xie Y, Chen Y, Yu W, Xiang G, Zhao P, Lei Y. Improving Robustness of High-Low-Order Coupled Networks against Malicious Attacks Based on a Simulated Annealing Algorithm. ENTROPY (BASEL, SWITZERLAND) 2023; 26:8. [PMID: 38275487 PMCID: PMC10814750 DOI: 10.3390/e26010008] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/26/2023] [Revised: 12/13/2023] [Accepted: 12/15/2023] [Indexed: 01/27/2024]
Abstract
Malicious attacks can cause significant damage to the structure and functionality of complex networks. Previous research has pointed out that the ability of networks to withstand malicious attacks becomes weaker when networks are coupled. However, traditional research on improving the robustness of networks has focused on individual low-order or higher-order networks, lacking studies on coupled networks with higher-order and low-order networks. This paper proposes a method for optimizing the robustness of coupled networks with higher-order and low-order based on a simulated annealing algorithm to address this issue. Without altering the network's degree distribution, the method rewires the edges, taking the robustness of low-order and higher-order networks as joint optimization objectives. Making minimal changes to the network, the method effectively enhances the robustness of coupled networks. Experiments were conducted on Erdős-Rényi random networks (ER), scale-free networks (BA), and small-world networks (SW). Finally, validation was performed on various real networks. The results indicate that this method can effectively enhance the robustness of coupled networks with higher-order and low-order.
Collapse
Affiliation(s)
- Chengjun Zhang
- School of Computer Science, Nanjing University of Information Science and Technology, Nanjing 210044, China
- Wuxi Institute of Technology, Nanjing University of lnformation Science & Technology, Wuxi 214000, China
| | - Yifan Xie
- School of Computer Science, Nanjing University of Information Science and Technology, Nanjing 210044, China
| | - Yadang Chen
- School of Computer Science, Nanjing University of Information Science and Technology, Nanjing 210044, China
| | - Wenbin Yu
- Wuxi Institute of Technology, Nanjing University of lnformation Science & Technology, Wuxi 214000, China
- School of Software, Nanjing University of Information Science and Technology, Nanjing 210044, China
- Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CI-CAEET), Nanjing University of Information Science and Technology, Nanjing 210044, China
| | - Gaofeng Xiang
- School of Computer Science, Nanjing University of Information Science and Technology, Nanjing 210044, China
| | - Peijun Zhao
- School of Computer Science, Nanjing University of Information Science and Technology, Nanjing 210044, China
| | - Yi Lei
- School of Computer Science, Nanjing University of Information Science and Technology, Nanjing 210044, China
| |
Collapse
|
3
|
Zhong C, Xing Y, Fan Y, Zeng A. Predicting the cascading dynamics in complex networks via the bimodal failure size distribution. CHAOS (WOODBURY, N.Y.) 2023; 33:023137. [PMID: 36859195 DOI: 10.1063/5.0119902] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/10/2022] [Accepted: 02/03/2023] [Indexed: 06/18/2023]
Abstract
Cascading failure as a systematic risk occurs in a wide range of real-world networks. Cascade size distribution is a basic and crucial characteristic of systemic cascade behaviors. Recent research works have revealed that the distribution of cascade sizes is a bimodal form indicating the existence of either very small cascades or large ones. In this paper, we aim to understand the properties and formation characteristics of such bimodal distribution in complex networks and further predict the final cascade size. We first find that the bimodal distribution is ubiquitous under certain conditions in both synthetic and real networks. Moreover, the large cascades distributed in the right peak of bimodal distribution are resulted from either the failure of nodes with high load at the first step of the cascade or multiple rounds of cascades triggered by the initial failure. Accordingly, we propose a hybrid load metric (HLM), which combines the load of the initial broken node and the load of failed nodes triggered by the initial failure, to predict the final size of cascading failures. We validate the effectiveness of HLM by computing the accuracy of identifying the cascades belonging to the right and left peaks of the bimodal distribution. The results show that HLM is a better predictor than commonly used network centrality metrics in both synthetic and real-world networks. Finally, the influence of network structure on the optimal HLM is discussed.
Collapse
Affiliation(s)
- Chongxin Zhong
- School of Systems Science, Beijing Normal University, Beijing 100875, People's Republic of China
| | - Yanmeng Xing
- School of Systems Science, Beijing Normal University, Beijing 100875, People's Republic of China
| | - Ying Fan
- School of Systems Science, Beijing Normal University, Beijing 100875, People's Republic of China
| | - An Zeng
- School of Systems Science, Beijing Normal University, Beijing 100875, People's Republic of China
| |
Collapse
|
4
|
Zhang C, Lei Y, Shen X, Li Q, Yao H, Cheng D, Xie Y, Yu W. Fragility Induced by Interdependency of Complex Networks and Their Higher-Order Networks. ENTROPY (BASEL, SWITZERLAND) 2022; 25:22. [PMID: 36673163 PMCID: PMC9858052 DOI: 10.3390/e25010022] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/01/2022] [Revised: 12/18/2022] [Accepted: 12/19/2022] [Indexed: 06/17/2023]
Abstract
The higher-order structure of networks is a hot research topic in complex networks. It has received much attention because it is closely related to the functionality of networks, such as network transportation and propagation. For instance, recent studies have revealed that studying higher-order networks can explore hub structures in transportation networks and information dissemination units in neuronal networks. Therefore, the destruction of the connectivity of higher-order networks will cause significant damage to network functionalities. Meanwhile, previous works pointed out that the function of a complex network depends on the giant component of the original(low-order) network. Therefore, the network functionality will be influenced by both the low-order and its corresponding higher-order network. To study this issue, we build a network model of the interdependence of low-order and higher-order networks (we call it ILH). When some low-order network nodes fail, the low-order network's giant component shrinks, leading to changes in the structure of the higher-order network, which further affects the low-order network. This process occurs iteratively; the propagation of the failure can lead to an eventual network crash. We conducted experiments on different networks based on the percolation theory, and our network percolation results demonstrated a first-order phase transition feature. In particular, we found that an ILH is more fragile than the low-order network alone, and an ILH is more likely to be corrupted in the event of a random node failure.
Collapse
Affiliation(s)
- Chengjun Zhang
- School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044, China
- Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing 210044, China
- Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing 210044, China
- Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CI-CAEET), Nanjing University of Information Science and Technology, Nanjing 210044, China
| | - Yi Lei
- School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044, China
- Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing 210044, China
| | - Xinyu Shen
- School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044, China
- Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing 210044, China
| | - Qi Li
- School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044, China
- Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing 210044, China
| | - Hui Yao
- School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044, China
- Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CI-CAEET), Nanjing University of Information Science and Technology, Nanjing 210044, China
| | - Di Cheng
- School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044, China
- Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing 210044, China
| | - Yifan Xie
- School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044, China
- Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing 210044, China
| | - Wenbin Yu
- School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044, China
- Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing 210044, China
- Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing 210044, China
- Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CI-CAEET), Nanjing University of Information Science and Technology, Nanjing 210044, China
| |
Collapse
|
5
|
Three Decades in Econophysics—From Microscopic Modelling to Macroscopic Complexity and Back. ENTROPY 2022; 24:e24020271. [PMID: 35205566 PMCID: PMC8870777 DOI: 10.3390/e24020271] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/06/2022] [Revised: 02/10/2022] [Accepted: 02/11/2022] [Indexed: 01/27/2023]
Abstract
We explore recent contributions to research in Econophysics, switching between Macroscopic complexity and microscopic modelling, showing how each leads to the other and detailing the everyday applicability of both approaches and the tools they help develop. Over the past decades, the world underwent several major crises, leading to significant increase in interdependence and, thus, complexity. We show here that from the perspective of network science, these processes become more understandable and, to some extent, also controllable.
Collapse
|
6
|
Smolyak A, Bonaccorsi G, Flori A, Pammolli F, Havlin S. Effects of mobility restrictions during COVID19 in Italy. Sci Rep 2021; 11:21783. [PMID: 34750387 PMCID: PMC8575918 DOI: 10.1038/s41598-021-01076-x] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/24/2021] [Accepted: 10/14/2021] [Indexed: 11/28/2022] Open
Abstract
To reduce the spread and the effect of the COVID-19 global pandemic, non-pharmaceutical interventions have been adopted on multiple occasions by governments. In particular lockdown policies, i.e., generalized mobility restrictions, have been employed to fight the first wave of the pandemic. We analyze data reflecting mobility levels over time in Italy before, during and after the national lockdown, in order to assess some direct and indirect effects. By applying methodologies based on percolation and network science approaches, we find that the typical network characteristics, while very revealing, do not tell the whole story. In particular, the Italian mobility network during lockdown has been damaged much more than node- and edge-level metrics indicate. Additionally, many of the main Provinces of Italy are affected by the lockdown in a surprisingly similar fashion, despite their geographical and economic dissimilarity. Based on our findings we offer an approach to estimate unavailable high-resolution economic dimensions, such as real time Province-level GDP, based on easily measurable mobility information.
Collapse
Affiliation(s)
- Alex Smolyak
- Department of Physics, Bar-Ilan University, 52900, Ramat-Gan, Israel.
| | - Giovanni Bonaccorsi
- Impact, Department of Management, Economics and Industrial Engineering, Politecnico di Milano, Milan, Italy
| | - Andrea Flori
- Impact, Department of Management, Economics and Industrial Engineering, Politecnico di Milano, Milan, Italy
| | - Fabio Pammolli
- Impact, Department of Management, Economics and Industrial Engineering, Politecnico di Milano, Milan, Italy
- SIT, Schaffhausen Institute of Technology, Schaffhausen, Switzerland
| | - Shlomo Havlin
- Department of Physics, Bar-Ilan University, 52900, Ramat-Gan, Israel
| |
Collapse
|
7
|
Naqvi A, Monasterolo I. Assessing the cascading impacts of natural disasters in a multi-layer behavioral network framework. Sci Rep 2021; 11:20146. [PMID: 34635682 PMCID: PMC8505522 DOI: 10.1038/s41598-021-99343-4] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/12/2021] [Accepted: 09/16/2021] [Indexed: 11/09/2022] Open
Abstract
Natural disasters negatively impact regions and exacerbate socioeconomic vulnerabilities. While the direct impacts of natural disasters are well understood, the channels through which these shocks spread to non-affected regions, still represents an open research question. In this paper we propose modelling socioeconomic systems as spatially-explicit, multi-layer behavioral networks, where the interplay of supply-side production, and demand-side consumption decisions, can help us understand how climate shocks cascade. We apply this modelling framework to analyze the spatial-temporal evolution of vulnerability following a negative food-production shock in one part of an agriculture-dependent economy. Simulation results show that vulnerability is cyclical, and its distribution critically depends on the network density and distance from the epicenter of the shock. We also introduce a new multi-layer measure, the Vulnerability Rank (VRank), which synthesizes various location-level risks into a single index. This framework can help design policies, aimed to better understand, effectively respond, and build resilience to natural disasters. This is particularly important for poorer regions, where response time is critical and financial resources are limited.
Collapse
Affiliation(s)
- Asjad Naqvi
- International Institute for Applied Systems Analysis (IIASA), Laxenburg, Austria. .,Vienna University of Economics and Business (WU), Vienna, Austria.
| | - Irene Monasterolo
- International Institute for Applied Systems Analysis (IIASA), Laxenburg, Austria.,Vienna University of Economics and Business (WU), Vienna, Austria.,Global Development Policy Center, Boston University (BU), Boston, USA
| |
Collapse
|
8
|
Shang Y. Percolation of attack with tunable limited knowledge. Phys Rev E 2021; 103:042316. [PMID: 34005897 DOI: 10.1103/physreve.103.042316] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/22/2020] [Accepted: 04/06/2021] [Indexed: 12/28/2022]
Abstract
Percolation models shed a light on network integrity and functionality and have numerous applications in network theory. This paper studies a targeted percolation (α model) with incomplete knowledge where the highest degree node in a randomly selected set of n nodes is removed at each step, and the model features a tunable probability that the removed node is instead a random one. A "mirror image" process (β model) in which the target is the lowest degree node is also investigated. We analytically calculate the giant component size, the critical occupation probability, and the scaling law for the percolation threshold with respect to the knowledge level n under both models. We also derive self-consistency equations to analyze the k-core organization including the size of the k core and its corona in the context of attacks under tunable limited knowledge. These percolation models are characterized by some interesting critical phenomena and reveal profound quantitative structure discrepancies between Erdős-Rényi networks and power-law networks.
Collapse
Affiliation(s)
- Yilun Shang
- Department of Computer and Information Sciences, Northumbria University, Newcastle upon Tyne NE1 8ST, United Kingdom
| |
Collapse
|
9
|
Vodenska I, Dehmamy N, Becker AP, Buldyrev SV, Havlin S. Systemic stress test model for shared portfolio networks. Sci Rep 2021; 11:3358. [PMID: 33558573 PMCID: PMC7870944 DOI: 10.1038/s41598-021-82904-y] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/14/2020] [Accepted: 01/26/2021] [Indexed: 11/09/2022] Open
Abstract
We propose a dynamic model for systemic risk using a bipartite network of banks and assets in which the weight of links and node attributes vary over time. Using market data and bank asset holdings, we are able to estimate a single parameter as an indicator of the stability of the financial system. We apply the model to the European sovereign debt crisis and observe that the results closely match real-world events (e.g., the high risk of Greek sovereign bonds and the distress of Greek banks). Our model could become complementary to existing stress tests, incorporating the contribution of interconnectivity of the banks to systemic risk in time-dependent networks. Additionally, we propose an institutional systemic importance ranking, BankRank, for the financial institutions analyzed in this study to assess the contribution of individual banks to the overall systemic risk.
Collapse
Affiliation(s)
- Irena Vodenska
- Department of Administrative Sciences, Metropolitan College, Boston University, 1010 Commonwealth Avenue, Boston, MA, 02215, USA. .,Center for Polymer Studies and Department of Physics, Boston University, 590 Commonwealth Avenue, Boston, MA, 02215, USA.
| | - Nima Dehmamy
- Center for Science of Science and Innovation, Kellogg School of Management, Northwestern University, Evanston, IL, 60208, USA
| | - Alexander P Becker
- Department of Administrative Sciences, Metropolitan College, Boston University, 1010 Commonwealth Avenue, Boston, MA, 02215, USA.,Center for Polymer Studies and Department of Physics, Boston University, 590 Commonwealth Avenue, Boston, MA, 02215, USA
| | - Sergey V Buldyrev
- Department of Physics, Yeshiva University, 500 West 185th Street, New York, NY, 10033, USA
| | | |
Collapse
|