13 resultados para truss networks
Resumo:
How can networking affect the turnout in an election? We present a simple model to explain turnout as a result of a dynamic process of formation of the intention to vote within Erdös-Renyi random networks. Citizens have fixed preferences for one of two parties and are embedded in a given social network. They decide whether or not to vote on the basis of the attitude of their immediate contacts. They may simply follow the behavior of the majority (followers) or make an adaptive local calculus of voting (Downsian behavior). So they either have the intention of voting when the majority of their neighbors are willing to vote too, or they vote when they perceive in their social neighborhood that elections are "close". We study the long run average turnout, interpreted as the actual turnout observed in an election. Depending on the combination of values of the two key parameters, the average connectivity and the probability of behaving as a follower or in a Downsian fashion, the system exhibits monostability (zero turnout), bistability (zero turnout and either moderate or high turnout) or tristability (zero, moderate and high turnout). This means, in particular, that for a wide range of values of both parameters, we obtain realistic turnout rates, i.e. between 50% and 90%.
Resumo:
This paper provides a new model of network formation that bridges the gap between the two benchmark models by Bala and Goyal, the one-way flow model, and the two-way flow model, and includes both as particular extreme cases. As in both benchmark models, in what we call an "asymmetric flow" network a link can be initiated unilaterally by any player with any other, and the flow through a link towards the player who supports it is perfect. Unlike those models, in the opposite direction there is friction or decay. When this decay is complete there is no flow and this corresponds to the one-way flow model. The limit case when the decay in the opposite direction (and asymmetry) disappears, corresponds to the two-way flow model. We characterize stable and strictly stable architectures for the whole range of parameters of this "intermediate" and more general model. We also prove the convergence of Bala and Goyal's dynamic model in this context.
Resumo:
We provide empirical evidence to support the claims that social diversity promotes prosocial behavior. We elicit a real-life social network and its members’ adherence to a social norm, namely inequity aversion. The data reveal a positive relationship between subjects’ prosociality and several measures of centrality. This result is in line with the theoretical literature that relates the evolution of social norms to the structure of social interactions and argues that central individuals are crucial for the emergence of prosocial behavior.
Resumo:
The study of complex networks has attracted the attention of the scientific community for many obvious reasons. A vast number of systems, from the brain to ecosystems, power grid, and the Internet, can be represented as large complex networks, i.e, assemblies of many interacting components with nontrivial topological properties. The link between these components can describe a global behaviour such as the Internet traffic, electricity supply service, market trend, etc. One of the most relevant topological feature of graphs representing these complex systems is community structure which aims to identify the modules and, possibly, their hierarchical organization, by only using the information encoded in the graph topology. Deciphering network community structure is not only important in order to characterize the graph topologically, but gives some information both on the formation of the network and on its functionality.
Resumo:
We consider cooperation situations where players have network relations. Networks evolve according to a stationary transition probability matrix and at each moment in time players receive payoffs from a stationary allocation rule. Players discount the future by a common factor. The pair formed by an allocation rule and a transition probability matrix is called a forward-looking network formation scheme if, first, the probability that a link is created is positive if the discounted, expected gains to its two participants are positive, and if, second, the probability that a link is eliminated is positive if the discounted, expected gains to at least one of its two participants are positive. The main result is the existence, for all discount factors and all value functions, of a forward-looking network formation scheme. Furthermore, we can always nd a forward-looking network formation scheme such that (i) the allocation rule is component balanced and (ii) the transition probabilities increase in the di erence in payo s for the corresponding players responsible for the transition. We use this dynamic solution concept to explore the tension between e ciency and stability.
Resumo:
[EN]This work analyzes the problem of community structure in real-world networks based on the synchronization of nonidentical coupled chaotic Rössler oscillators each one characterized by a defined natural frequency, and coupled according to a predefined network topology. The interaction scheme contemplates an uniformly increasing coupling force to simulate a society in which the association between the agents grows in time. To enhance the stability of the correlated states that could emerge from the synchronization process, we propose a parameterless mechanism that adapts the characteristic frequencies of coupled oscillators according to a dynamic connectivity matrix deduced from correlated data. We show that the characteristic frequency vector that results from the adaptation mechanism reveals the underlying community structure present in the network.
Resumo:
Attempts to model any present or future power grid face a huge challenge because a power grid is a complex system, with feedback and multi-agent behaviors, integrated by generation, distribution, storage and consumption systems, using various control and automation computing systems to manage electricity flows. Our approach to modeling is to build upon an established model of the low voltage electricity network which is tested and proven, by extending it to a generalized energy model. But, in order to address the crucial issues of energy efficiency, additional processes like energy conversion and storage, and further energy carriers, such as gas, heat, etc., besides the traditional electrical one, must be considered. Therefore a more powerful model, provided with enhanced nodes or conversion points, able to deal with multidimensional flows, is being required. This article addresses the issue of modeling a local multi-carrier energy network. This problem can be considered as an extension of modeling a low voltage distribution network located at some urban or rural geographic area. But instead of using an external power flow analysis package to do the power flow calculations, as used in electric networks, in this work we integrate a multiagent algorithm to perform the task, in a concurrent way to the other simulation tasks, and not only for the electric fluid but also for a number of additional energy carriers. As the model is mainly focused in system operation, generation and load models are not developed.
Resumo:
Nowadays, enterprises, and especially SMEs, are immersed in a very difficult economic situation. Therefore, they need new and innovative tools to compete in that environment. Integration of the internet 2.0 and social networks in marketing strategies of companies could be the key to success. If social networks are well managed, they can bring a lot to enterprise plans. Moreover, social networks are very attractive from an economic point of view as companies can find most of their customers on it.
Resumo:
This doctoral Thesis defines and develops a new methodology for feeder reconfiguration in distribution networks with Distributed Energy Resources (DER). The proposed methodology is based on metaheuristic Ant Colony Optimization (ACO) algorithms. The methodology is called Item Oriented Ant System (IOAS) and the doctoral Thesis also defines three variations of the original methodology, Item Oriented Ant Colony System (IOACS), Item Oriented Max-min Ant System (IOMMAS) y Item Oriented Max-min Ant Colony System (IOACS). All methodologies pursue a twofold objective, to minimize the power losses and maximize DER penetration in distribution networks. The aim of the variations is to find the algorithm that adapts better to the present optimization problem, solving it most efficiently. The main feature of the methodology lies in the fact that the heuristic information and the exploitation information (pheromone) are attached to the item not to the path. Besides, the doctoral Thesis proposes to use feeder reconfiguration in order to increase the distribution network capacity of accepting a major degree of DER. The proposed methodology and its three variations have been tested and verified in two distribution networks well documented in the existing bibliography. These networks have been modeled and used to test all proposed methodologies for different scenarios with various DER penetration degrees.
Resumo:
Barneko ikerkuntza-txostena
Resumo:
Sex workers are traditionally considered important vectors of transmission of sexually transmitted infections (STI). The role of clients is commonly overlooked, partially due to the lack of evidence on clients' position in the sexual network created by commercial sex. Contrasting the diffusion importance of sex workers and their clients in the map of their sexual encounters in two Web-mediated communities, we find that from diffusion perspective, clients are as important as sex workers. Their diffusion importance is closely linked to the geography of the sexual encounters: as a result of different movement patterns, travelling clients shorten network distances between distant network neighborhoods and thus facilitate contagion among them more than sex workers, and find themselves more often in the core of the network by which they could contribute to the persistence of STIs in the community. These findings position clients into the set of the key actors and highlight the role of human mobility in the transmission of STIs in commercial sexual networks.
Resumo:
In a multi-target complex network, the links (L-ij) represent the interactions between the drug (d(i)) and the target (t(j)), characterized by different experimental measures (K-i, K-m, IC50, etc.) obtained in pharmacological assays under diverse boundary conditions (c(j)). In this work, we handle Shannon entropy measures for developing a model encompassing a multi-target network of neuroprotective/neurotoxic compounds reported in the CHEMBL database. The model predicts correctly >8300 experimental outcomes with Accuracy, Specificity, and Sensitivity above 80%-90% on training and external validation series. Indeed, the model can calculate different outcomes for >30 experimental measures in >400 different experimental protocolsin relation with >150 molecular and cellular targets on 11 different organisms (including human). Hereafter, we reported by the first time the synthesis, characterization, and experimental assays of a new series of chiral 1,2-rasagiline carbamate derivatives not reported in previous works. The experimental tests included: (1) assay in absence of neurotoxic agents; (2) in the presence of glutamate; and (3) in the presence of H2O2. Lastly, we used the new Assessing Links with Moving Averages (ALMA)-entropy model to predict possible outcomes for the new compounds in a high number of pharmacological tests not carried out experimentally.
Resumo:
[ES]El objetivo de este trabajo es el diseño e implementación de un complemento adicional a OpenFlow que permita la ejecución de los mensajes en el switch dentro de un espacio de tiempo concreto que previamente ha sido definido. El primer paso será la definición de objetivos y especificaciones del trabajo, para posteriormente realizar el diseño de un escenario mediante el análisis de posibles alternativas, y que permitirá la consecución de dichos objetivos. A continuación se añadirá el código necesario para que los equipos sean capaces de realizar el envío y ejecución de los mensajes en el tiempo programado y se finalizará realizando simulaciones y pruebas tanto del funcionamiento como del formato que utilizan los mensajes intercambiados entre el controlador y los switches que maneja, con el objetivo de verificar la viabilidad del módulo desarrollado.