Network science Research Papers - Academia.edu (original) (raw)
The study of service value networks adds a new dimension of investigation to industrial systems: human networks. Existing literature shows humans hyper-network to co-create value within and outside of the traditional structures of an... more
The study of service value networks adds a new dimension of investigation to industrial systems: human networks. Existing literature shows humans hyper-network to co-create value within and outside of the traditional structures of an organization or an extended enterprisesuch as social networking for innovation and e-commerce for supply chain. Since human networks tend to be composite and multidimensional, they need new results to understand how networks collide during economic activities and what new coalesced networks will result. The hyper-network model uniquely describes this multi-layered evolving nature of human networks, and reveals some of the basic networking properties either directly from the initial community base networks or directly from the colliding single networks. This paper answers an important question about service value networks: What are the connection patterns of a network of networks, such as the distribution of the number of connections at a nodethe degree distribution? We develop formulae to determine four prototypical classes of hyper-networks, which constitute a baseline analysis to the new study of network evolution for network science and service science.
Les modes operatoires des groupes criminels se livrant a des faits de traite des etres humains sont complexes et reposent sur des pratiques diverses : fabrication et mise en circulation de faux documents, violation des regles migratoires,... more
Les modes operatoires des groupes criminels se livrant a des faits de traite des etres humains sont complexes et reposent sur des pratiques diverses : fabrication et mise en circulation de faux documents, violation des regles migratoires, detournement de la demande d’asile, fraude aux prestations sociales, circulation, transfert et blanchiment de fonds issus de l’activite criminelle, violences et limitation de la liberte d’aller et de venue des victimes. Ces modes operatoires evoluent en permanence vers une plus grande clandestinite : developpement de « sex tours » organises depuis l’etranger, organisation de la prostitution au sein d’etablissements declares (salon de massage chinois,…) et disparition du racolage de rue au profit d’internet. En France, rares sont les recherches fondamentales ou operationnelles portant sur le mode operatoire de groupes se livrant a des faits de traite quels qu’ils soient. La recherche AVRES revet alors un double objectif fondamental et applique, le d...
Formal analysis of the emergent structural properties of dynamic networks is largely uncharted territory. We focus here on the properties of forward reachable sets (FRS) as a function of the underlying degree distribution and edge... more
Formal analysis of the emergent structural properties of dynamic networks is largely uncharted territory. We focus here on the properties of forward reachable sets (FRS) as a function of the underlying degree distribution and edge duration. FRS are defined as the set of nodes that can be reached from an initial seed via a path of temporally ordered edges; a natural extension of connected component measures to dynamic networks. Working in a stochastic framework, we derive closed-form expressions for the mean and variance of the exponential growth rate of the FRS for temporal networks with both edge and node dynamics. For networks with node dynamics, we calculate thresholds for the growth of the FRS. The effects of finite population size are explored via simulation and approximation. We examine how these properties vary by edge duration and different cross-sectional degree distributions that characterize a range of scientifically interesting normative outcomes (Poisson and Bernoulli)....
Social Networking Sites (SNSs) are powerful marketing and communication tools. There are hundreds of SNSs that have entered and exited the market over time. The coexistence of multiple SNSs is a rarely observed phenomenon. Most coexisting... more
Social Networking Sites (SNSs) are powerful marketing and communication tools. There are hundreds of SNSs that have entered and exited the market over time. The coexistence of multiple SNSs is a rarely observed phenomenon. Most coexisting SNSs either serve different purposes for its users or have cultural differences among them. The introduction of a new SNS with a better set of features can lead to the demise of an existing SNS, as observed in the transition from Orkut to Facebook. The paper proposes a model for analyzing the transition of users from one SNS to another, when a new SNS is introduced in the system. The game theoretic model proposed considers two major factors in determining the success of a new SNS. The first being time that an old SNS gets to stabilise. We study whether the time that a SNS like Facebook received to monopolize its reach had a distinguishable effect. The second factor is the set of features showcased by the new SNS. The results of the model are also e...
Cet article dessine le contexte d'une etude portant sur les reseaux criminels de traite des etres humains et decrit la rencontre de trois champs disciplinaires engages dans ces travaux : droit, sociologie et informatique ainsi que les... more
Cet article dessine le contexte d'une etude portant sur les reseaux criminels de traite des etres humains et decrit la rencontre de trois champs disciplinaires engages dans ces travaux : droit, sociologie et informatique ainsi que les elements methodologiques developpes. Il pose en effet les fondations d'une methodologie venant en appui a l'etude juridique des reseaux criminels, et plus specifiquement de ceux se livrant a des faits de traite des etres humains. La " science des reseaux " (Network Science), vue a la fois comme une abstraction mathematique et une methodologie sociologique, sert de socle pour formuler et explorer un faisceau d'hypotheses eclairant le(s) mode(s) operatoire(s) des reseaux criminels et le statut des acteurs au sein de celui-ci. Les lecons apprises, nourries des interactions entre disciplines, permettent de dessiner les axes de travaux futurs pour ameliorer la methodologie avancee.
- by IAEES Publications
- •
- Biology, Networks, Ecology, Medicine
Information and communication technologies have brought major changes in data storage and processing. Various types and high volume of data has been digitalized and support mining-based data processing to provide knowledge in a modern and... more
Information and communication technologies have brought major changes in data storage and processing. Various types and high volume of data has been digitalized and support mining-based data processing to provide knowledge in a modern and efficient way. Banking transaction data has been stored digitally and suitable for the mining process especially in network science model.
Understanding transaction system risk requires fundamental study on payments flow and bank behavior in various situations. Lehman Brother’s failure spread contagion impact in a short time indicates that financial markets have interdependent properties and connected to each other in a large network. Thus, overall system network approach becomes more important than a single bank.
Political conditions greatly affect economic stability including the banking and financial sectors. Presidential election is a major political event for a nation. This affected on community sentiment and financial market. However, the linkage between political events and topological changes is poorly understood.
This research presents an insight of the event driven dynamic network topology with banking transaction as a case study. We search for the banking transaction network topology dynamic driven by 2014 Indonesian presidential election event. We discover that banks are more engaged to others in larger value 3 days before the end of campaign period and less engaged to others in smaller value in the end of campaign period. Unique transaction activity between banks remain stable with low declination in the end of campaign period. This scenario provides the possibility to learn the banking transaction pattern and support the financial system stability supervision.
This paper proposes some reflections concerning the practice of reading, its conceptual structure and its transformations, the blurred profile of the information ecology in which it is inserted. At the same time illustrates some outcomes... more
This paper proposes some reflections concerning the practice of reading, its conceptual structure and its transformations, the blurred profile of the information ecology in which it is inserted. At the same time illustrates some outcomes of a research project conducted with tools of text mining and network science on the social reading platform aNobii. The paper presents these main topics: a) general overview of reading's context; b) short discussion reading as a complex system; c) presentation of some central concepts of network science and of its applications; d) introduction to text mining with some results of analysis of aNobii's reviews; e) conclusions and prospectives.
- by chiara faggiolani and +1
- •
- Text Mining, Reading, Network science, Data Science
The purpose here is to see if the paper, Universal Resilience Patterns in Complex Networks (Gao, Barzel, and Barabási 2016), can allow " one to think about complexity differently along a path to perhaps suggest modeling applications for... more
The purpose here is to see if the paper, Universal Resilience Patterns in Complex Networks (Gao, Barzel, and Barabási 2016), can allow " one to think about complexity differently along a path to perhaps suggest modeling applications for real system[s] (simplified models of them not actual systems) in the future. " The paper is analyzed using the intrinsic nature of complexity—quantity and diversity of components and relations, together resulting in complexity of pattern-of-organization of structure and processes. The analysis is further developed by way of knowledge drawn from general systems, for example factor-development. At issue is whether or not there is an adequate match between the model or formulation presented in the paper and the real-world complex systems to which it is intended to apply.
Contribution/Originality: This study contributes in the existing literature with a new scale that can be used as a support tool in the existing transfer system. With the development of such scale, the transfer score of soccer players will... more
Contribution/Originality: This study contributes in the existing literature with a new scale that can be used as a support tool in the existing transfer system. With the development of such scale, the transfer score of soccer players will be determined and the change of their performance over time could be observed. 1. INTRODUCTION In the middle of 2018, it would not be wrong to say that football clubs in our country are in debt. There can be a variety of reasons for this, and it can be said that transfers are one of them. Today, it is known that in the football, very large amounts of money are exchanged, especially during the transfer windows. Statistics are now being used to measure performance in a variety of sports, including football. On the other hand, in recent years besides statistics, data science and network science have begun to be used in such analyzes. However, whatever the developments are, the decision to transfer in the football market is still based on subjective views rather than on objective data.
This is one of the assessment tasks I undertook during 2015 for the Australian National Universitz subject Social Research Practice. Please note that this is listed here simply to showcase my research skills. The research proposal did not... more
This is one of the assessment tasks I undertook during 2015 for the Australian National Universitz subject Social Research Practice. Please note that this is listed here simply to showcase my research skills. The research proposal did not proceed, this was done for learning purposes only.
This paper analyses the possibility of exploiting a small spacecrafts constellation around Mars to ensure a complete and continuous coverage of the planet, for the purpose of supporting future human and robotic operations and taking... more
This paper analyses the possibility of exploiting a small spacecrafts constellation around Mars to ensure a complete and continuous coverage of the planet, for the purpose of supporting future human and robotic operations and taking advantage of optical transmission techniques. The study foresees such a communications mission to be implemented at least after 2020 and a high data-rate requirement is imposed for the return of huge scientific data from massive robotic exploration or to allow video transmissions from a possible human outpost.In addition, the set-up of a communication constellation around Mars would give the opportunity of exploiting this multi-platform infrastructure to perform network science, that would largely increase our knowledge of the planet.The paper covers all technical aspects of a feasibility study performed for the primary communications mission. Results are presented for the system trade-offs, including communication architecture, constellation configuration and transfer strategy, and the mission analysis optimization, performed through the application of a multi-objective genetic algorithm to two models of increasing difficulty for the low-thrust trajectory definition.The resulting communication architecture is quite complex and includes six 530 kg spacecrafts on two different orbital planes, plus one redundant unit per plane, that ensure complete coverage of the planet’s surface; communications between the satellites and Earth are achieved through optical links, that allow lower mass and power consumption with respect to traditional radio-frequency technology, while inter-satellite links and spacecrafts-to-Mars connections are ensured by radio transmissions. The resulting data-rates for Earth–Mars uplink and downlink, satellite-to-satellite and satellite-to-surface are respectively 13.7 Mbps, 10.2 Mbps, 4.8 Mbps and 4.3 Mbps, in worst-case.Two electric propulsion modules are foreseen, to be placed on a C3∼0 escape orbit with two Zenith Sea Launch rockets in March 2021 and carrying four satellites each. After the entrance in Mars sphere of influence, the single spacecrafts separate and spiral-down with Hall effect thrusters until they reach the final operational orbits in April 2025, at 17,030 km of altitude and 37 deg of inclination. The preliminary design includes 105 kg and 577 W of mass and power margin for each satellite, that can be allocated for scientific payloads.The main challenges of the proposed design are represented by the optical technology development and the connected strict pointing constraints satisfaction, as well as by the Martian constellation operations management.This mission study has therefore shown the possibility of deploying an effective communication infrastructure in Mars orbit employing a small amount of the resources needed for the human exploration programme, additionally providing the chance of performing important scientific research either from orbit or with a network of small rovers carried on-board and deployed on the surface.
László Barabási is among network science’s main spokepersons. Despite this recent field being a vibrant and interdisciplinary one (Barabási, 2016, p. 7), its thesis requires simple language and communication in order to reach wider... more
László Barabási is among network science’s main spokepersons.
Despite this recent field being a vibrant and interdisciplinary one (Barabási,
2016, p. 7), its thesis requires simple language and communication in order
to reach wider audiences, which might be this Hungarian physicist’s main
achievement with The Formula. In this review we go through the five laws that the author suggests and we raise questions about agency and equality.
Network biology is a science that deals with the structure, function, regulation (control), design, and application, etc., of various biological networks. It is an interdisciplinary science based on life sciences (biology, ecology,... more
Foodwebs are nowadays an interesting and challenging subject of study for network analysis. In this study real food webs are compared one to each other in terms of how authors collected data, in order to build a coherent dataset. Emergent... more
Foodwebs are nowadays an interesting and challenging subject of study for network analysis. In this study real food webs are compared one to each other in terms of how authors collected data, in order to build a coherent dataset. Emergent patterns of these food webs are then quantified and three different generative models are used to try to reproduce them: cascade model, niche model and nested hierarchy model. A detailed comparison shows how niche model is the most suited of the three in accord with the data. Finally, an original clustering algorithm based on the idea of pollution spread is proposed and studied over food webs generated with the niche model. This algorithm needs no parameters, is suited for directed networks and provides information on which species may be screened to understand if the considered food web is polluted.
As Daniel J. Levitin interestingly noted, No known human culture now or anytime in the recorded past lacked music. Therefore, the impetus behind this research paper is to model the interactions between countries in order to reveal music... more
As Daniel J. Levitin interestingly noted, No known human culture now or anytime in the recorded past lacked music. Therefore, the impetus behind this research paper is to model the interactions between countries in order to reveal music listening trends at a macro level. Subsequently, the framework for performing this analysis consists of techniques used in the multidisciplinary field known as Network Science. Throughout the past decade, the world has witnessed a gradual shift in the way music is listened to. In that respect, Spotify, an online music streaming service, has been the imperative giant with a user base of around 191 million. With the help of Spotify's Application Programming Interface (API), a dataset was compiled, which contains the Weekly Top 40 streamed songs across 50 countries, in the year 2017. Through research, the team explored whether, and to which extent, do language, nationality and geographic distance influence the way global communities are formed. Furthermore, the project aimed to prove that there is a clear direction of leadership flow in the network. Until now, the acquired information supports the hypotheses that some countries do indeed follow the trends beset by others and that language and nationality play an essential role in the development of communities.
Security organizations often attempt to disrupt terror or insurgent networks by targeting "high value targets" (HVT's). However, there have been numerous examples that illustrate how such networks are able to quickly re-generate... more
Security organizations often attempt to disrupt terror or insurgent networks by targeting "high value targets" (HVT's). However, there have been numerous examples that illustrate how such networks are able to quickly re-generate leadership after such an operation. Here, we introduce the notion of a "shaping" operation in which the terrorist network is first targeted for the purpose of reducing its leadership re-generation ability before targeting HVT's. We look to conduct shaping by maximizing the network-wide degree centrality through node removal. We formally define this problem and prove solving it is NP-Complete. We introduce a mixed integer-linear program that solves this problem exactly as well as a greedy heuristic for more practical use. We implement the greedy heuristic and found in examining five real-world terrorist networks that removing only 12% of nodes can increase the network-wide centrality between 17% and 45%. We also show our algorithm can scale to large social networks of 1,133 nodes and 5,541 edges on commodity hardware.
Blockchain technology, with its decentralised peer-to-peer network and cryptographic protocols, has led to a proliferation of cryp-tocurrencies, with Bitcoin at the forefront. The blockchain publicly records all Bitcoin transactions which... more
Blockchain technology, with its decentralised peer-to-peer network and cryptographic protocols, has led to a proliferation of cryp-tocurrencies, with Bitcoin at the forefront. The blockchain publicly records all Bitcoin transactions which can be used to build a dynamic and complex network to give a representation of the transactions in the underlying monetary system. Despite the cryptographic guarantees there exist inconsistencies and suspicious behavior in the chain. We reported on two such anomalies related to block mining in previous work. In this paper, we build a network using bitcoin transactions and apply techniques from network science to analyse its complex structure. We focus our analysis on sub-networks induced by the two sets of anomalies, and investigate how inequality in terms of wealth and anomaly fraction evolves from the blockchain's origin. Thereby we present a novel way of using network science to detect and investigate cryptographic anomalies.
A kánonfogalomnak a kánonkutatás megélénkülésétől kezdve van egy strukturális eleme is: a "kánonba bekerülni" azt jelenti, hogy az adott szerző, mű, probléma, jelenség nehezebben évül el, téma marad, kapcsolódási pont, illetve biztos... more
A kánonfogalomnak a kánonkutatás megélénkülésétől kezdve van egy strukturális eleme is: a "kánonba bekerülni" azt jelenti, hogy az adott szerző, mű, probléma, jelenség nehezebben évül el, téma marad, kapcsolódási pont, illetve biztos pozíciót nyer az archiváló-publikáló rendszerekben, ami által gazdasági viszonyítási ponttá is válván tovább erősödik kanonikus pozíciója. Ennél azonban hagyományosan jóval többet foglalkozunk a kánon értékelméleti, úgymond "tartalmi" aspektusaival, aminek természetesen szintén megvan a létjogosultsága, ám számos problémát megoldatlanul hagy.
Az újabb hálózatelméleti kutatások (mindenekelőtt Barabási Albert-László vizsgálatai) fényében ugyanis a kánont tekinthetjük hálózati csomópontnak is, a kérdés pedig az lesz, hogy mi eredményezheti a hálózati csomóponttá válást a különböző esetekben, és mi tekinthető "élnek" ebben az értelmezésben. Előadásomban amellett érvelek, hogy a csomópontosodás előfeltétele nem elsősorban a fontosság, az értékesség, a tartalmi relevancia, hanem sokkal inkább a fókusz, a figyelem megszületése. Ha valami fókuszba kerül, hatványozódik az esélye, hogy figyelem övezze, értelmezések, idézetek, utalások kiindulópontjává, vagyis (hálózati) csomóponttá váljon. Ez nem nagy újdonság: hasonló jelenség régóta ismert a médiaelméletben, egyrészt a hírérték és az agenda, másrészt a keresőoptimalizálás jelenségének vizsgálatában. Irodalomtörténetileg nézve pedig a figyelem felkeltésének és megtartásának, az érdeklődés, az „interessze” kiemelkedő szerepének kérdése már az irodalom modern intézményrendszerének kialakulásakor is középpontban állt a 18. század közepétől-végétől fogva.
Ami azonban talán még érdekesebb, az az, hogy a kiinduló figyelem, az, hogy a pásztázó tekintet megragad-e egy "él", egy kapcsolódás létrehozásának erejéig valamin, az mitől függhet és befolyásolható-e. Enélkül ugyanis az adott célpontnak nincs esélye hálózati csomóponttá válni. E kérdés megközelítéséhez szeretném újragondolni a szűrés, a "filter" alapjainak számító szelekció és redukció (rendszerelméleti) fogalmait a mikroelbeszélések és a látens narratívák szerepének vizsgálata segítségével. Különösen fontos lehet ez a jelenben, amikor az internetes megjelenés, a neten való jelenlét, bár sokszor a kánon új, modern formájaként említődik, mégsem tűnik vizsgálhatónak a kánon hagyományos irodalomtörténeti fogalma(i) segítségével.
Research has documented increasing partisan division and extremist positions that are more pronounced among political elites than among voters. Attention has now begun to focus on how polarization might be attenuated. We use a general... more
Research has documented increasing partisan division and extremist positions that are more pronounced among political elites than among voters. Attention has now begun to focus on how polarization might be attenuated. We use a general model of opinion change to see if the self-reinforcing dynamics of influence and homophily may be characterized by tipping points that make reversibility problematic. The model applies to a legislative body or other small, densely connected organization, but does not assume country-specific institutional arrangements that would obscure the identification of fundamental regularities in the phase transitions. Agents in the model have initially random locations in a multidimensional issue space consisting of membership in one of two equal-sized parties and positions on 10 issues. Agents then update their issue positions by moving closer to nearby neighbors and farther from those with whom they disagree, depending on the agents’ tolerance of disagreement a...
Contribution/Originality: This study contributes in the existing literature with a new scale that can be used as a support tool in the existing transfer system. With the development of such scale, the transfer score of soccer players will... more
Contribution/Originality: This study contributes in the existing literature with a new scale that can be used as a support tool in the existing transfer system. With the development of such scale, the transfer score of soccer players will be determined and the change of their performance over time could be observed. 1. INTRODUCTION In the middle of 2018, it would not be wrong to say that football clubs in our country are in debt. There can be a variety of reasons for this, and it can be said that transfers are one of them. Today, it is known that in the football, very large amounts of money are exchanged, especially during the transfer windows. Statistics are now being used to measure performance in a variety of sports, including football. On the other hand, in recent years besides statistics, data science and network science have begun to be used in such analyzes. However, whatever the developments are, the decision to transfer in the football market is still based on subjective views rather than on objective data.
A dissertation combing both quantitative and qualitative analyses to describe the Old Assyrian social networks, the remains of a Middle Bronze Age (IIa) merchant colony with surviving documents from 1970 to 1720 B.C.E. including a... more
A dissertation combing both quantitative and qualitative analyses to describe the Old Assyrian social networks, the remains of a Middle Bronze Age (IIa) merchant colony with surviving documents from 1970 to 1720 B.C.E. including a hierarchical social reconstruction, chronological familial genealogies, and social network analysis of ca. 6,000 Old Assyrian texts from Kültepe, Turkey. The initial western discovery and subsequent excavations in the early 20th century and onwards yielded thousands of cuneiform tablets. By exploiting the names of the individual merchants and their relationships to each other, as recorded on the tablets, we demonstrate how to generate quantitative and qualitative social networks in order to populate them with hierarchical rank distributions reflecting the merchants’ age and seniority in the network, the results of a latent variable model described herein. A method for homonym disambiguation is delineated, and applied for the purpose of assessing the age of cohort groups for demographic analysis. We conclude that grounding the primary sources in a structural networked setting will allow for a closer examination of the textual narratives around events occurring in the trade-network scalable from multiple vantage points, from a single merchant’s household to the broadest extent of the trade networks, stretching 1,000 km between the city-state of Assur and this central trade hub in Anatolia, known as Kanesh.
In Social Computing, Social Network Analysis (SNA) provides models and techniques for analysing social and economic network based on graph theory. SNA can help us to understand the real-world network application such as knowledge... more
In Social Computing, Social Network Analysis (SNA) provides models and techniques for analysing social and economic network based on graph theory. SNA can help us to understand the real-world network application such as knowledge management, market segmentation, viral marketing, customer behavior, competitive advantage and many other applications. The ability to quantify complex network can greatly give an advantage for decision support. There are three approaches in current SNA study: Graph Representation, Content Mining, and Semantic Analysis. In this paper, we focus on graph representation approach which has been used for analyzing social network topology, structural modeling, tie-strength, community detection, group cohesion, visualization, and metrics computations. Many research contribute to the development of SNA, they are based from various idea and sometimes is difficult to track the development of this field. This paper provides SNA taxonomy based on its graph representation
This thesis deals with how we think, why we fail and what we can do to become better at thinking.
It is run on a non-proi t, voluntary basis by postgraduate research students at the University of Cambridge. Although primarily rooted in archaeological theory and practice, ARC increasingly invites a range of perspectives with the aim of... more
It is run on a non-proi t, voluntary basis by postgraduate research students at the University of Cambridge. Although primarily rooted in archaeological theory and practice, ARC increasingly invites a range of perspectives with the aim of establishing a strong, interdisciplinary journal which will be of interest in a range of i elds.
Usually, project management is understood as a set of processes. One of the better known project management standards, the Guide to PMBOK© (PMI, 2013), is presented as a set of 42 processes, each one with inputs and outputs. Using graph... more
Usually, project management is understood as a set of processes. One of the better known project management standards, the Guide to PMBOK© (PMI, 2013), is presented as a set of 42 processes, each one with inputs and outputs. Using graph algorithms to describe this concept can be formulated as: " inputs feed a process, and the process delivers some outputs ". This simple idea is actually quite powerful when used for all the collection of processes, because some outputs from one process can actually be inputs for some other processes. For instance, when quality control process is mentioned in the standards, one of the outputs is " quality control measurements " and this is an input for the quality assurance process. This verification allows understanding all processes as components to chains of processes being connected through any element which can play both roles, an output for the first process in the chain and an input for the second process in the chain. If all elements mentioned in the standard are linked to processes according to its role, a complex network is formed. Some additional details can be taken into account. Processes belong to certain knowledge areas and certain process groups. Also some tools and techniques are shared among many processes. Considering all these attributes, the set of project management processes, elements and tools and techniques are subjects to be integrated in complex graphs or complex networks, discipline that explains models as chains of nodes and links, or from a mathematical perspective vertices and edges.
The popularity of various tourist destinations in Indonesia makes the tourism industry an essential pillar of the Indonesian economy sector. Understanding tourist behavior while visiting Indonesia plays a vital role in determining a... more
The popularity of various tourist destinations in Indonesia makes the tourism industry an essential pillar of the Indonesian economy sector. Understanding tourist behavior while visiting Indonesia plays a vital role in determining a suitable tourism strategy by knowing the tourist movement. But monitoring tourist movement is a nontrivial problem. Therefore, this study uses data sources based on tourist reviews on social media. The data is then applied to form the network based on network science that models their movements in Indonesia. The authors pick Lombok and Bali to represent this study because both islands are the most popular tourist destinations. This study models a complex representation of tourist movement, finds tourist movement directions to recognize their favorite destinations, and find the group of location preferred by tourist through network visualization. The study will be beneficial for policymakers, business opportunities, and the tourism office.
Evolutionary graph theory (EGT), studies the ability of a mutant gene to overtake a nite structured population. In this review, we describe the original framework for EGT and the major work that has followed it. This review looks at the... more
Evolutionary graph theory (EGT), studies the ability of a mutant gene to overtake a nite structured population. In this review, we describe the original framework for EGT and the major work that has followed it. This review looks at the calculation of the "fixation probability" - the probability of a mutant taking over a population and focuses on game-theoretic applications. We look at varying topics such as alternate evolutionary dynamics, time to fixation, special topological cases, and game theoretic results. Throughout the review, we examine several interesting open problems that warrant further research.
- by Paulo Shakarian and +1
- •
- Bioinformatics, Evolutionary Biology, Game Theory, Social Networks
Hundreds of high-elevation medieval strongholds are dispersed throughout the Central Himalayan region of Garhwal Himalaya, India. Believed to have originated in the eleventh century AD, these sites are interwoven into local folklore, yet... more
Hundreds of high-elevation medieval strongholds are dispersed throughout the Central Himalayan region of Garhwal Himalaya, India. Believed to have originated in the eleventh century AD, these sites are interwoven into local folklore, yet they have been subject to limited research. This article presents new survey data, along with computational and spatial analyses of 193 Garhwal strongholds, facilitating the assessment of more complex hypotheses-particularly visual signalling theories-concerning the fortification phenomenon. The results strongly suggest the integration of Garhwal's strongholds as a coherent visual signalling network. In turn, the method also holds great potential for the evaluation of putative visual signalling networks in other archaeological contexts.
- by Nagendra S. Rawat and +1
- •
- History, Archaeology, Network Analysis, Network science
Electronic databases, from phone to e-mails logs, currently provide detailed records of human communication patterns, offering novel avenues to map and explore the structure of social and communication networks. Here we examine the... more
Electronic databases, from phone to e-mails logs, currently provide detailed records of human communication patterns, offering novel avenues to map and explore the structure of social and communication networks. Here we examine the communication patterns of millions of mobile phone users, allowing us to simultaneously study the local and the global structure of a society-wide communication network. We observe a coupling between interaction strengths and the network's local structure, with the counterintuitive consequence that social networks are robust to the removal of the strong ties but fall apart after a phase transition if the weak ties are removed. We show that this coupling significantly slows the diffusion process, resulting in dynamic trapping of information in communities and find that, when it comes to information diffusion, weak and strong ties are both simultaneously ineffective.
- by Janos Kertesz and +1
- •
- Network science
This review aims to expose the potential of formal network methods for archaeology by tracing the origins of the academic traditions, network models and techniques that have been most influential to archaeologists. A brief discussion of... more
This review aims to expose the potential of formal network methods for archaeology by tracing the origins of the academic traditions, network models and techniques that have been most influential to archaeologists. A brief discussion of graph theoretic applications in archaeology reveals how graph visualization and analysis was used since the 1960’s in a very similar way to later network analysis applications but did not seem to have influenced the more widespread adoption of network techniques over the past decade. These recent archaeological applications have been strongly influenced by two academic traditions, social network analysis and socio-physics. The most influential and promising techniques and models adopted from these traditions are critically discussed. This review reveals some general trends which are considered to be the result of two critical issues that will need to be addressed in future archaeological network analysis: (1) a general unawareness of the historicity and diversity of formal network methods both within and outside the archaeological discipline has resulted in a very limited methodological scope; (2) the adoption or development of network methods has very rarely been driven by specific archaeological research questions and is dominated by a few popular models and techniques, which has in some cases resulted in a routinized explanatory process. This review illustrates, however, the great potential of formal network methods for archaeology and argues that, if this potential is to be applied in a critical way, a broad multi-disciplinary scope is necessary and specific archaeological research contexts should dominate applications.
People in modern society use mobile phones as their primary way to retrieve information and to connect with others across the globe. The kinds of connections these devices support give rise to networks at many levels, from those among... more
People in modern society use mobile phones as their primary way to retrieve information and to connect with others across the globe. The kinds of connections these devices support give rise to networks at many levels, from those among devices connected by near-field radio or bluetooth, to society-wide networks of phone calls made between individuals. This chapter introduces state-of-the-art propagation models that have been applied to understand such networks. It discusses how the models are used in many innovative studies, including how short-lived information spreads between phone callers, how malware spreads within public places, how to detect fraudulent and scamming activity on a phone network, and to predict the propensity of a user to unsubscribe from a mobile phone carrier. It concludes with a discussion of future research opportunities for the study of propagation modeling to mobile phone data analytics.
"Corruption has become one of the most popular topics in the social scientific disciplines. However, there is a lack of interdisciplinary communication about corruption. Models developed by different academic disciplines are often... more
"Corruption has become one of the most popular topics in the social scientific disciplines. However, there is a lack of interdisciplinary communication about corruption. Models developed by different
academic disciplines are often isolated from each other. The purpose of this paper is to review several major approaches to corruption and draw them closer to each other. Most studies of corruption fall
into three major categories: (i) rational-actor models where corruption is viewed as resulting from cost/benefit analysis of individual actors; (ii) structural models that focus on external forces that determine corruption; and (iii) relational models that emphasize social interactions and networks among corrupt actors. Focusing on actors’ behavior and the social context, this article explains corruption concepts taken from sociology, economics, organization studies, political science, social anthropology, and social psychology."
Social life is rife with networks of any kind. Nowadays, sociological concerns for networks, relations, associations, processes, mobilities, and flows are intensive and em-blematic. This reflection takes " networks " and their multiple... more
Social life is rife with networks of any kind. Nowadays, sociological concerns for networks, relations, associations, processes, mobilities, and flows are intensive and em-blematic. This reflection takes " networks " and their multiple products as starting points for a new sociological imagination. It hence outlines a set of current theoretical and methodologi-cal issues for approaching the wide and diverse field of the sociology of networks in a critical manner, beginning from the analytical distinction between the critical and the normative-functionalist sociology of networks. The paper concludes with reference to contemporary digital society and the critical use of network data (Big Data), that is, ever-larger quantities of information generated by human communicative interactions in social networking platforms and other web activities.
A wide variety of networked systems in human societies are composed of repeated communications between actors. A dyadic relationship made up of repeated interactions may be reciprocal (both actors have the same probability of directing a... more
A wide variety of networked systems in human societies are composed of repeated communications between actors. A dyadic relationship made up of repeated interactions may be reciprocal (both actors have the same probability of directing a communication attempt to the other) or non-reciprocal (one actor has a higher probability of initiating a communication attempt than other). In this paper we propose a theoretically motivated index of reciprocity appropriate for networks formed from repeated interactions based on these ...
This work explores the influence of social connections on young people's political knowledge. Extending previous research on individual and interpersonal predictors of political learning, the study examines relational characteristics and... more
This work explores the influence of social connections on young people's political knowledge. Extending previous research on individual and interpersonal predictors of political learning, the study examines relational characteristics and their role in informed citizenship. Factors expected to affect social contagion in political behavior include conversation content, interaction frequency, relational closeness, mutual communication partners, and shared ideology. The analyses were based on longitudinal network data from thirteen residential student communities. The study found evidence consistent with social contagion. The political knowledge of participants was predicted by the knowledge of their strong social ties. Political discussants were not as influential as high-frequency general conversation partners. These findings have important implications for research exploring social influence on political behavior. They signal that the contacts we tend to identify as political are not necessarily the ones that matter most in shaping our opinions and attitudes.
A review of the archeological and non-archeological use of visibility networks reveals the use of a limited range of formal techniques, in particular for representing visibility theories. This paper aims to contribute to the study of... more
A review of the archeological and non-archeological use of visibility networks reveals the use of a limited range of formal techniques, in particular for representing visibility theories. This paper aims to contribute to the study of complex visual relational phenomena in landscape archeology by proposing a range of visibility network patterns and methods. We propose first-and second-order visibility graph representations of total and cumulative viewsheds, and two-mode representations of cumulative viewsheds. We present network patterns that can be used to represent aspects of visibility theories and that can be used in statistical simulation models to compare theorized networks with observed networks. We argue for the need to incorporate observed visibility network density in these simulation models, by illustrating strong differences in visibility network density in three example landscapes. The approach is illustrated through a brief case study of visibility networks of long barrows in Cranborne Chase.
This article aims to evaluate how a citation network analysis could contribute to a review of a specific corpus of archaeological literature, and how the publishing and citation behaviour of archaeologists affects the use of citation... more
This article aims to evaluate how a citation network analysis could contribute to a review of a specific corpus of archaeological literature, and how the publishing and citation behaviour of archaeologists affects the use of citation network analysis techniques for archaeology. It will do this through a case study that aims to trace the adoption of formal network methods by archaeologists. A review of the archaeological literature will be confronted with an analysis of a citation network consisting of 33,556 publications and 42,993 citations. The results indicate that a citation network analysis succeeds in quantitatively expressing the intuitive results drawn from the literature review. It also allows for the archaeological literature to be re-contextualized in a larger multidisciplinary body of literature. However, the use of citation network analysis for archaeology is significantly restricted by the limitations of the available citation databases, which are still less representative for the humanities and the social sciences than for the natural sciences. It is suggested that different disciplines in the humanities require distinct strategies for citation data collection and analysis.
Botnets, the groups of illegally controlled infected devices on the Internet have had a history of two decades already. This history shows an evolution of the infection techniques, the scope of the target devices, and their usage. Thus,... more
Botnets, the groups of illegally controlled infected devices on the Internet have had a history of two decades already. This history shows an evolution of the infection techniques, the scope of the target devices, and their usage. Thus, the new direction is the usage of sophisticated data leakage techniques by state-sponsored hacker groups. Our article analyses this evolution while focusing on Botnet usage for cyber espionage. We present the Botnet architecture in the context of network science research, lifecycle, applied network protocols, and capabilities. Next, we analyze two examples, the APT28 group activities and the VPNFilter Botnet, which demonstrate the real-life cyber espionage capability of this technique.
- by Tamás Szádeczky and +1
- •
- Information Security, Network science, Cyber Security, Botnets
African Swine Fever (ASF) is a viral infection which causes acute disease in Sus scrofa – domestic pigs and wild boar. Although the virus does not cause disease in humans, the impact it has on the economy, especially via trade and farming... more
African Swine Fever (ASF) is a viral infection which causes acute disease in Sus scrofa – domestic pigs and wild boar. Although the virus does not cause disease in humans, the impact it has on the economy, especially via trade and farming disturbance, is substantial. We analyze 3487 ASF notifications of wild boars and pigs in Poland (infection events registered to OiE) from February 2014 to April 2019 comprising event time, longitude, latitude and administrative unit: county/poviat. We propose a spatial modeling approach incorporating phenomenological analysis of multilayer transmission networks: 1) domestic pig abundance, 2) disease vectors (wild boar) abundance, 3) human mobility related to disease propagation. We use a pseudo gravity model to simulate the future epidemic projection and calculated the most probable infection paths for all counties (poviats) as well as estimated the most likely disease arrival times with or without countermeasures such as border fencing and animals corridors blocking on the A1 motorway. According to current observation, the ASF spread in Poland will be ongoing and recent jumps to wschowski poviat 320 km from the closest previously affected area manifests its complex behavior. The proposed complex network approach promise to be useful to practioners, farmers and veterinarians, helping them to choose the optimal mitigation strategies.
In this paper the thesis is submitted that the study of China (indeed of each and every country) is wrongheaded in its methodology and should be fundamentally redesigned. Readers are kindly requested to notice that the author... more
In this paper the thesis is submitted that the study of China (indeed of each and every country) is wrongheaded in its methodology and should be fundamentally redesigned. Readers are kindly requested to notice that the author distinguishes between two kinds of 'China experts': 1) Those (tacitly) claiming to be knowledgeable about everything related to China, a - thank God - dying but by no means extinct breed of scholars mainly active in Europe; and 2) Those not CLAIMING to be China experts (that is, those eventually admitting not to be scientific all-rounders with respect to the country) but - and herein lies the crux of the matter - not shying away from entering, without announcement or permission, a domain outside their own field of expertise, SHOULD THEY HAVE ONE! Many American and other 'China experts' can be blamed for this. 'China expert' is a misnomer, grossly (and dangerously) misleading politicians, captains of industry and the general public, as the author argues at length in the paper, which sums up a great deal of his research over the last few years. Scientists (e.g. demographers, economists, sociologists, psychologists, political scientists, jurists, linguists, literary theorists/critics and 'Kunst- und Kulturwissenschaftler') may have research interest in a particular, their discipline related aspect of China; they can never be justifiably called 'China experts'. Throughout the article, particularly in the text under the subheading Scientific Collaboration, the necessity (and possibility!) of academic teamwork is emphasised, that is to say, the need for interdisciplinary (as distinct from multidisciplinary) research of China. The political, legal, military, economic, financial, social, educational, ecological, religious and other kindred affairs of China are inextricably intertwined, forming together a complex system of complex systems. Consequently, the country should be studied (as it has never been done!) by specialists closely working together and being aware of the historical as well as the geographical dimension of their 'material objects' (explananda). Briefly, the paper pleads for gaining EMPIRICALLY AND THEORETICALLY BASED knowledge of CHINA AS SUCH.
Subjects: studied by people often impact their careers. The relation between education and careers has been well studied by social scientists, however limited research on this relation is available in network science. Network science has... more
Subjects: studied by people often impact their careers. The relation between education and careers has been well studied by social scientists, however limited research on this relation is available in network science. Network science has emerged as a promising field to understand complex systems. We study the relation between education and careers from a network science perspective. In this research we propose methods from network science to understand the relation between the subjects studied by a person and the impact of these subjects on the career of the person. We model the relation between favorite subjects and careers using a network. The model helps in understanding the positive and negative contributions of certain subjects towards other subjects and careers. The results show that mathematics and English are the two basic subjects that are highly related to most of the professions. The detailed results are of particular significance for people associated with higher education and career development.