ﻻ يوجد ملخص باللغة العربية
The study of SIS epidemics on networks has stressed the role of the network topology on the spreading process. However, accurate models of SIS epidemics rely on the complete knowledge of the network topology, which is often not available. This paper tackles the problem of inferring the network topology from observed infection time traces, especially where the network topology is partially known or known with some uncertainty. We propose a Bayesian method to infer the posterior probability of uncertain links in the network, and we derive closed form equations for these probabilities. We also propose a numerical approach based on a Gibbs sampling when the number of uncertain links is large such that using the closed form equations becomes impractical. Numerical results show the capability of the proposed approach to assign high probability to existing links and low probability to non-existing links of the network when the SIS traces are sufficiently long.
To provide a comprehensive view for dynamics of and on many real-world temporal networks, we investigate the interplay of temporal connectivity patterns and spreading phenomena, in terms of the susceptible-infected-removed (SIR) model on the modified
In this work we study a modified Susceptible-Infected-Susceptible (SIS) model in which the infection rate $lambda$ decays exponentially with the number of reinfections $n$, saturating after $n=l$. We find a critical decaying rate $epsilon_{c}(l)$ abo
A traffic incident analysis method based on extended spectral envelope (ESE) method is presented to detect the key incident time. Sensitivity analysis of parameters (the length of time window, the length of sliding window and the study period) are di
We investigate the accumulated wealth distribution by adopting evolutionary games taking place on scale-free networks. The system self-organizes to a critical Pareto distribution (1897) of wealth $P(m)sim m^{-(v+1)}$ with $1.6 < v <2.0$ (which is in
Moderate length of time window can get the best accurate result in detecting the key incident time using extended spectral envelope. This paper presents a method to calculate the moderate length of time window. Two factors are mainly considered: (1)