SlideShare a Scribd company logo
1 of 32
Preferential attachment renders an
evolving network of populations robust
against crashes
Areejit Samal
Max Planck Institute for Mathematics in the Sciences
Inselstr. 22 04103 Leipzig Germany
Email: samal@mis.mpg.de
Outline
 Jain and Krishna (JK) evolving network model
 Interesting features of the model
 Structural changes leading to crashes in the model
 Modified model with preferential attachment scheme
 Results
( Jain and Krishna, PRL 1998, PNAS 2001, PNAS 2002 )
100-500 million years
Jain and Krishna (JK) model is motivated by the
origin of life problem
The model tries to address some of the puzzles behind the emergence of prebiotic chemical
organization.
Variables of the model
1ijc =
1ijc =1
2
4
8
5
3
7
6
A graph of interacting molecular species
An arrow from node j to i implies that j is a catalyst for
the production of i, and then
The absence of an arrow from j to i implies that
0
The s x s matrix C = (cij ) is the adjacency matrix of the
graph
s is the number of molecular species
Each species i has a population yi or a relative population xi
The variables x and C characterize the chemical organization in the pond and
they change with time.
Dynamical rules
Initialization:
Cij = 1 with probability p,
= 0 with probability 1-p
p is the “catalytic
probability”.
xi are chosen randomly.
Relative population of new node is
set to x0, a small constant.
All other xi are perturbed randomly.
x → X: Attractor
C fixed
Population Dynamics
(step 1)
( Jain and Krishna, PRL 1998, PNAS 2001, PNAS 2002 )
Population Dynamics
,
( , )i i ij j i jk k
j j k
x f x c c x x c x
•
= = −∑ ∑
= population of species i
ix = relative population of species i =
iy
Ywhere i
i
Y y= ∑
0 1ix≤ ≤Therefore, and
1
1
s
i
i
x
=
=∑
1ijc = implies i j¬ ⇔ j is a catalyst for the production of i
.
Interpretation of the chemical rate equation
i j iy Ky yφ= −
.
how efficient j is in catalyzing
i, reactant concentrations etc.
dilution flux
(2)
Eq. (1) implies Eq. (2). Note that Eq. (2) does not contain φ.
iy
Y1
s
i ij j i
j
y c y yφ
=
= −∑
.
(1)
Auto Catalytic Set (ACS)
An ACS is a subgraph, each of whose nodes has at least one incoming link
from a node belonging to the same subgraph.
This definition of ACS was introduced in the context of a set of catalytically
interacting molecules where it was defined to be a set of molecular species
that contains within itself a catalyst for each of the member species.
Examples of graph structures that are ACS
Sandeep Krishna, PhD Thesis (2003)
Core and Periphery of an ACS
An ACS can be further subdivided into core and periphery.
The core is the irreducible subgraph of the ACS, i.e., every node in the core
has access to every other node in the directed subgraph.
The periphery consists of nodes which can be reached from the core nodes
while the core nodes cannot be reached from the periphery nodes in the
directed subgraph.
In the ACS shown below, nodes 1 and 2 form the core and node 3 forms the
periphery.
Sandeep Krishna, PhD Thesis (2003)
Three phases during network evolution
There are three phases observed during the graph evolution
process:
 Random phase
 Growth phase
 Organized phase
Random phase
n = 1 n = 78 n = 2853
The random phase is characterized by a graph where there is no ACS. The
onset of the growth phase is triggered by the appearance of the first ACS
in the graph.
Sandeep Krishna, PhD Thesis (2003)
Growth phase
n = 2854 n = 3022 n = 3386
The growth phase starts with the appearance of the first ACS in the graph.
The growth phase is characterized by a dramatic increase in the number of
links in the graph with the ACS accreting more and more nodes into it.
Sandeep Krishna, PhD Thesis (2003)
n
0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000
NumberofLinks
0
20
40
60
80
100
120
140
160
n
0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000
Numberofpopulatednodes(s
1
)
0
20
40
60
80
100
120
n
0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000
λ
1
0.0
0.2
0.4
0.6
0.8
1.0
1.2
1.4
1.6
1.8
2.0
The creation of the first ACS is
marked by the increase in the
Perron-Frobenius eigenvalue to a
value larger than or equal to 1. In
the growth phase, the number of
links in the graph increases
dramatically.
Organized phase
n = 3880 n = 4448 n = 5041
The growth phase culminates with the ACS spanning the whole graph. This
marks the start of the organized phase where at least s-1 nodes are
populated.
The system remains in the organized phase until a crash occurs after
which the system ends in the growth or the random phase.
Sandeep Krishna, PhD Thesis (2003)
n
0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000
NumberofLinks
0
20
40
60
80
100
120
140
160
n
0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000
Numberofpopulatednodes(s
1
)
0
20
40
60
80
100
120
n
0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000
λ
1
0.0
0.2
0.4
0.6
0.8
1.0
1.2
1.4
1.6
1.8
2.0
In the organized phase, the
number of populated nodes is
greater than equal to s-1.
There is always an ACS in the
graph in the growth and organized
phase with Perron-Frobenius
eigenvalue larger than or equal to
1.
Random phase
n = 8500 n = 10000
The system eventually returns to the random phase from the organized
phase.
Sandeep Krishna, PhD Thesis (2003)
n
0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000
NumberofLinks
0
20
40
60
80
100
120
140
160
n
0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000
Numberofpopulatednodes(s
1
)
0
20
40
60
80
100
120
n
0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000
λ
1
0.0
0.2
0.4
0.6
0.8
1.0
1.2
1.4
1.6
1.8
2.0
After a crash, the number of
populated nodes suddenly
decreases.
Crashes
In the context of the JK model, a crash has been
defined as a graph update event where a significant
fraction of the nodes (arbitrarily chosen as 50%)
become extinct.
It has been shown that the crashes usually occur as a
result of two different types of structural changes in the
graph:
1. Core-shifts
2. Complete crashes
Jain and Krishna, PRE (2002)
Core-shifts
n = 5041 n = 5042
Most crashes in the model are a result of core-shifts.
A core-shift is a graph update event which results in a graph at the present
time step with a core that has a zero overlap with the core of the graph at
the previous time step.
In this case, a new irreducible subgraph takes over as the core of the ACS
after the graph update event.
Complete crash
n = 8232 n = 8233
After a complete crash, there is no ACS in the graph.
Such crashes are rare in the model.
Modified model with preferential attachment scheme
We have modified the evolving network model of Jain and Krishna (JK) and studied
its features in detail. Our model differs from the JK model in the graph update
scheme.
In JK model, at each time step, one of the nodes with the least population is
eliminated along with its links and a new node is added with links assigned randomly
to existing nodes. The average in-degree and out-degree of the incoming node is
equal to m.
In our modified model, at each time step, one of the nodes with the least population is
eliminated along with its links and a new node is added with links assigned
preferentially to existing nodes with higher degree. The new node will have an
outgoing link and an incoming link to an existing node j in the graph with the same
probability
1
/
s
j j
j
k m k
=
∑
where kj is the total degree of node j.
The average in-degree and out-degree of the incoming node is again equal to m for
the modified model.
Note that the average in-degree and out-degree is an average over many graph
update events.
We choose the number of nodes (s) equal to 100 and m=0.25 for our simulations of
both models.
Dynamical rules of the modified model
Initialization:
Cij = 1 with probability p,
= 0 with probability 1-p
p = m/(s -1)
xi are chosen randomly.
x → X: Attractor
C fixed
Population Dynamics
(step 1)
1
/
s
j j
j
k m k
=
∑
The new node
attaches
preferentially to high
degree nodes with
probability:
Three phases are also observed in the modified model
In both the models, there are three phases observed:
initial random phase, growth phase and organized phase.
Former model Modified model
Preferential attachment accelerates the creation
of the first ACS and the transition from growth to
organized phase
In the former model:
– Average time for the creation of the first ACS = 1107 time steps
– Average time of the first growth phase = 1600 time steps
In the modified model:
– Average time for the creation of the first ACS = 113 time steps
– Average time of the first growth phase = 491 time steps
The numbers presented here are an average over 1000 different
runs with different seeds.
Crashes are extremely rare in the modified model
We compared the number of crashes in both models in a larger data set
compiled from 25 different runs of 105
times steps each.
The number of crashes in the former model was equal to 1160.
The number of crashes in the modified model was equal to 6.
Crashes are extremely rare in the modified model.
Also, in the runs of the modified model, we observed that after the creation
of the first ACS there was always an ACS in the graph.
Former model Modified model
A typical graph in the organized phase of the modified model has a
much larger Perron-Frobenius eigenvalue
The Perron-Frobenius eigenvalue is related to the density of links in the
core of the graph.
In the modified model, the value of λ1 is much larger than 1 in the organized
phase.
Former model Modified model
The core of the graph in the modified model has many more
fundamental loops
The number of nodes in the core of the graph or core size in the former
model can become as large as that in the modified model but the number of
fundamental loops in the core is much larger in the modified model
compared to the former model.
This explains the much larger Perron-Frobenius eigenvalue λ1 in the
modified model.
The number of fundamental loops is given by the first Betti number or
cyclomatic number.
Number of links in the graph
There are much more links in the graph of the modified model compared to
the former model with same parameter values.
Typical graph in the organized phase of the modified model
The graph shows the dense structure of the core of the graph in the organized
phase of the modified model. The multiplicity of paths within the core of the
graph is an indicator of stability of the system in the modified model.
Degree distribution and clustering coefficient of typical graphs in
the organized phase
Both the degree distributions are power-like but it is not possible to uniquely
read of the power from the data.
The average value of clustering coefficient of graphs in the former model is
given by 0.02 and that of graphs in the modified model is given by 0.79. This
is a result of the dense architecture of the core in the modified model.
In-degree distribution Out-degree distribution
Both diversity and preferential attachment can enhance network
robustness
In the context of the former model, it was shown recently that the number of
crashes decreases with the increase in the number of nodes in the graph or
diversity.
Reference: Mehrotra, Soni and Jain, J. R. Soc. Interface (2008)
We have shown here an alternate mechanism, i.e., preferential attachment
mechanism which can also render the system robust against crashes.
Reference: Samal and Meyer-Ortmanns, Physica A (2009)
Classification of graph update events into different
categories of innovation explains enhanced robustness of
the modified model
Acknowledgement
Collaboration:
Hildegard Meyer-Ortmanns, Jacobs University, Bermen, Germany
Discussions:
Sanjay Jain, University of Delhi
Sandeep Krishna,NBI Copenhagen
Reference:
Preferential attachment renders an evolving network of populations
robust against crashes,
Areejit Samal and Hildegard Meyer-Ortmanns,
Physica A (2009) (MPI-MIS Preprint 77/2008).

More Related Content

Viewers also liked

Networks .ppt
Networks .pptNetworks .ppt
Networks .pptbrisso99
 
Yandex wg-talk
Yandex wg-talkYandex wg-talk
Yandex wg-talkYandex
 
Holland Round
Holland RoundHolland Round
Holland Roundhenktocht
 
5 gusev
5 gusev5 gusev
5 gusevYandex
 
It’s a “small world” after all
It’s a “small world” after allIt’s a “small world” after all
It’s a “small world” after allquanmengli
 
5 ostroumova
5 ostroumova5 ostroumova
5 ostroumovaYandex
 
Alexander Krot – Limits of Local Algorithms for Randomly Generated Constraint...
Alexander Krot – Limits of Local Algorithms for Randomly Generated Constraint...Alexander Krot – Limits of Local Algorithms for Randomly Generated Constraint...
Alexander Krot – Limits of Local Algorithms for Randomly Generated Constraint...Yandex
 
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?Steven Wardell
 
Preferential Attachment in Online Networks: Measurement and Explanations
Preferential Attachment in Online Networks:  Measurement and ExplanationsPreferential Attachment in Online Networks:  Measurement and Explanations
Preferential Attachment in Online Networks: Measurement and ExplanationsJérôme KUNEGIS
 
Eight Formalisms for Defining Graph Models
Eight Formalisms for Defining Graph ModelsEight Formalisms for Defining Graph Models
Eight Formalisms for Defining Graph ModelsJérôme KUNEGIS
 
Кілька тез про ціннісні орієнтири українців
Кілька тез про ціннісні орієнтири українцівКілька тез про ціннісні орієнтири українців
Кілька тез про ціннісні орієнтири українцівRatinggroup
 
Deployment and Mobility for Animal Social Life Monitoring Based on Preferenti...
Deployment and Mobility for Animal Social Life Monitoring Based on Preferenti...Deployment and Mobility for Animal Social Life Monitoring Based on Preferenti...
Deployment and Mobility for Animal Social Life Monitoring Based on Preferenti...M. Ilhan Akbas
 
Complex Social Systems - Lecture 5 in Introduction to Computational Social Sc...
Complex Social Systems - Lecture 5 in Introduction to Computational Social Sc...Complex Social Systems - Lecture 5 in Introduction to Computational Social Sc...
Complex Social Systems - Lecture 5 in Introduction to Computational Social Sc...Lauri Eloranta
 
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Lauri Eloranta
 
Social network analysis course 2010 - 2011
Social network analysis course 2010 - 2011Social network analysis course 2010 - 2011
Social network analysis course 2010 - 2011guillaume ereteo
 
ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...Daniel Katz
 
How to conduct a social network analysis: A tool for empowering teams and wor...
How to conduct a social network analysis: A tool for empowering teams and wor...How to conduct a social network analysis: A tool for empowering teams and wor...
How to conduct a social network analysis: A tool for empowering teams and wor...Jeromy Anglim
 
Social Network Analysis - Lecture 4 in Introduction to Computational Social S...
Social Network Analysis - Lecture 4 in Introduction to Computational Social S...Social Network Analysis - Lecture 4 in Introduction to Computational Social S...
Social Network Analysis - Lecture 4 in Introduction to Computational Social S...Lauri Eloranta
 
The Basics of Social Network Analysis
The Basics of Social Network AnalysisThe Basics of Social Network Analysis
The Basics of Social Network AnalysisRory Sie
 

Viewers also liked (20)

Networks .ppt
Networks .pptNetworks .ppt
Networks .ppt
 
Yandex wg-talk
Yandex wg-talkYandex wg-talk
Yandex wg-talk
 
Holland Round
Holland RoundHolland Round
Holland Round
 
5 gusev
5 gusev5 gusev
5 gusev
 
It’s a “small world” after all
It’s a “small world” after allIt’s a “small world” after all
It’s a “small world” after all
 
5 ostroumova
5 ostroumova5 ostroumova
5 ostroumova
 
Alexander Krot – Limits of Local Algorithms for Randomly Generated Constraint...
Alexander Krot – Limits of Local Algorithms for Randomly Generated Constraint...Alexander Krot – Limits of Local Algorithms for Randomly Generated Constraint...
Alexander Krot – Limits of Local Algorithms for Randomly Generated Constraint...
 
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?
 
Preferential Attachment in Online Networks: Measurement and Explanations
Preferential Attachment in Online Networks:  Measurement and ExplanationsPreferential Attachment in Online Networks:  Measurement and Explanations
Preferential Attachment in Online Networks: Measurement and Explanations
 
Eight Formalisms for Defining Graph Models
Eight Formalisms for Defining Graph ModelsEight Formalisms for Defining Graph Models
Eight Formalisms for Defining Graph Models
 
Кілька тез про ціннісні орієнтири українців
Кілька тез про ціннісні орієнтири українцівКілька тез про ціннісні орієнтири українців
Кілька тез про ціннісні орієнтири українців
 
Deployment and Mobility for Animal Social Life Monitoring Based on Preferenti...
Deployment and Mobility for Animal Social Life Monitoring Based on Preferenti...Deployment and Mobility for Animal Social Life Monitoring Based on Preferenti...
Deployment and Mobility for Animal Social Life Monitoring Based on Preferenti...
 
Complex Social Systems - Lecture 5 in Introduction to Computational Social Sc...
Complex Social Systems - Lecture 5 in Introduction to Computational Social Sc...Complex Social Systems - Lecture 5 in Introduction to Computational Social Sc...
Complex Social Systems - Lecture 5 in Introduction to Computational Social Sc...
 
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
 
Social network analysis course 2010 - 2011
Social network analysis course 2010 - 2011Social network analysis course 2010 - 2011
Social network analysis course 2010 - 2011
 
ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...
 
How to conduct a social network analysis: A tool for empowering teams and wor...
How to conduct a social network analysis: A tool for empowering teams and wor...How to conduct a social network analysis: A tool for empowering teams and wor...
How to conduct a social network analysis: A tool for empowering teams and wor...
 
Social Network Analysis - Lecture 4 in Introduction to Computational Social S...
Social Network Analysis - Lecture 4 in Introduction to Computational Social S...Social Network Analysis - Lecture 4 in Introduction to Computational Social S...
Social Network Analysis - Lecture 4 in Introduction to Computational Social S...
 
I Social Network
I Social NetworkI Social Network
I Social Network
 
The Basics of Social Network Analysis
The Basics of Social Network AnalysisThe Basics of Social Network Analysis
The Basics of Social Network Analysis
 

Similar to Areejit Samal Preferential Attachment in Catalytic Model

A03401001005
A03401001005A03401001005
A03401001005theijes
 
BP219 class 4 04 2011
BP219 class 4 04 2011BP219 class 4 04 2011
BP219 class 4 04 2011waddling
 
Linear regression [Theory and Application (In physics point of view) using py...
Linear regression [Theory and Application (In physics point of view) using py...Linear regression [Theory and Application (In physics point of view) using py...
Linear regression [Theory and Application (In physics point of view) using py...ANIRBANMAJUMDAR18
 
Bp219 2011
Bp219 2011Bp219 2011
Bp219 2011waddling
 
Secure Communication and Implementation for a Chaotic Autonomous System
Secure Communication and Implementation for a Chaotic Autonomous SystemSecure Communication and Implementation for a Chaotic Autonomous System
Secure Communication and Implementation for a Chaotic Autonomous SystemNooria Sukmaningtyas
 
JAISTサマースクール2016「脳を知るための理論」講義01 Single neuron models
JAISTサマースクール2016「脳を知るための理論」講義01 Single neuron modelsJAISTサマースクール2016「脳を知るための理論」講義01 Single neuron models
JAISTサマースクール2016「脳を知るための理論」講義01 Single neuron modelshirokazutanaka
 
Transfer Functions and Linear Active Networks Using Operational Amplifiers
Transfer Functions and Linear Active Networks Using Operational AmplifiersTransfer Functions and Linear Active Networks Using Operational Amplifiers
Transfer Functions and Linear Active Networks Using Operational AmplifiersSachin Mehta
 
Control Analysis of a mass- loaded String
Control Analysis of a mass- loaded StringControl Analysis of a mass- loaded String
Control Analysis of a mass- loaded StringAM Publications
 
STUDY OF THE EQUIVALENT CIRCUIT OF A DYESENSITIZED SOLAR CELLS
STUDY OF THE EQUIVALENT CIRCUIT OF A DYESENSITIZED SOLAR CELLSSTUDY OF THE EQUIVALENT CIRCUIT OF A DYESENSITIZED SOLAR CELLS
STUDY OF THE EQUIVALENT CIRCUIT OF A DYESENSITIZED SOLAR CELLSAEIJjournal2
 
Stability and pole location
Stability and pole locationStability and pole location
Stability and pole locationssuser5d64bb
 
APPLICATION OF PARTICLE SWARM OPTIMIZATION TO MICROWAVE TAPERED MICROSTRIP LINES
APPLICATION OF PARTICLE SWARM OPTIMIZATION TO MICROWAVE TAPERED MICROSTRIP LINESAPPLICATION OF PARTICLE SWARM OPTIMIZATION TO MICROWAVE TAPERED MICROSTRIP LINES
APPLICATION OF PARTICLE SWARM OPTIMIZATION TO MICROWAVE TAPERED MICROSTRIP LINEScseij
 
Application of particle swarm optimization to microwave tapered microstrip lines
Application of particle swarm optimization to microwave tapered microstrip linesApplication of particle swarm optimization to microwave tapered microstrip lines
Application of particle swarm optimization to microwave tapered microstrip linescseij
 
Network-Growth Rule Dependence of Fractal Dimension of Percolation Cluster on...
Network-Growth Rule Dependence of Fractal Dimension of Percolation Cluster on...Network-Growth Rule Dependence of Fractal Dimension of Percolation Cluster on...
Network-Growth Rule Dependence of Fractal Dimension of Percolation Cluster on...Shu Tanaka
 
STUDY OF THE EQUIVALENT CIRCUIT OF A DYESENSITIZED SOLAR CELLS
STUDY OF THE EQUIVALENT CIRCUIT OF A DYESENSITIZED SOLAR CELLSSTUDY OF THE EQUIVALENT CIRCUIT OF A DYESENSITIZED SOLAR CELLS
STUDY OF THE EQUIVALENT CIRCUIT OF A DYESENSITIZED SOLAR CELLSAEIJjournal2
 
A chaotic particle swarm optimization (cpso) algorithm for solving optimal re...
A chaotic particle swarm optimization (cpso) algorithm for solving optimal re...A chaotic particle swarm optimization (cpso) algorithm for solving optimal re...
A chaotic particle swarm optimization (cpso) algorithm for solving optimal re...Alexander Decker
 
A chaotic particle swarm optimization (cpso) algorithm for solving optimal re...
A chaotic particle swarm optimization (cpso) algorithm for solving optimal re...A chaotic particle swarm optimization (cpso) algorithm for solving optimal re...
A chaotic particle swarm optimization (cpso) algorithm for solving optimal re...Alexander Decker
 
1 Aminullah Assagaf_Estimation-of-domain-of-attraction-for-the-fract_2021_Non...
1 Aminullah Assagaf_Estimation-of-domain-of-attraction-for-the-fract_2021_Non...1 Aminullah Assagaf_Estimation-of-domain-of-attraction-for-the-fract_2021_Non...
1 Aminullah Assagaf_Estimation-of-domain-of-attraction-for-the-fract_2021_Non...Aminullah Assagaf
 
A Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR FiltersA Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR FiltersIDES Editor
 

Similar to Areejit Samal Preferential Attachment in Catalytic Model (20)

A03401001005
A03401001005A03401001005
A03401001005
 
BP219 class 4 04 2011
BP219 class 4 04 2011BP219 class 4 04 2011
BP219 class 4 04 2011
 
Linear regression [Theory and Application (In physics point of view) using py...
Linear regression [Theory and Application (In physics point of view) using py...Linear regression [Theory and Application (In physics point of view) using py...
Linear regression [Theory and Application (In physics point of view) using py...
 
Bp219 2011
Bp219 2011Bp219 2011
Bp219 2011
 
Bp219 2011-4.13
Bp219 2011-4.13Bp219 2011-4.13
Bp219 2011-4.13
 
Secure Communication and Implementation for a Chaotic Autonomous System
Secure Communication and Implementation for a Chaotic Autonomous SystemSecure Communication and Implementation for a Chaotic Autonomous System
Secure Communication and Implementation for a Chaotic Autonomous System
 
JAISTサマースクール2016「脳を知るための理論」講義01 Single neuron models
JAISTサマースクール2016「脳を知るための理論」講義01 Single neuron modelsJAISTサマースクール2016「脳を知るための理論」講義01 Single neuron models
JAISTサマースクール2016「脳を知るための理論」講義01 Single neuron models
 
En mp ggf
En mp ggfEn mp ggf
En mp ggf
 
Transfer Functions and Linear Active Networks Using Operational Amplifiers
Transfer Functions and Linear Active Networks Using Operational AmplifiersTransfer Functions and Linear Active Networks Using Operational Amplifiers
Transfer Functions and Linear Active Networks Using Operational Amplifiers
 
Control Analysis of a mass- loaded String
Control Analysis of a mass- loaded StringControl Analysis of a mass- loaded String
Control Analysis of a mass- loaded String
 
STUDY OF THE EQUIVALENT CIRCUIT OF A DYESENSITIZED SOLAR CELLS
STUDY OF THE EQUIVALENT CIRCUIT OF A DYESENSITIZED SOLAR CELLSSTUDY OF THE EQUIVALENT CIRCUIT OF A DYESENSITIZED SOLAR CELLS
STUDY OF THE EQUIVALENT CIRCUIT OF A DYESENSITIZED SOLAR CELLS
 
Stability and pole location
Stability and pole locationStability and pole location
Stability and pole location
 
APPLICATION OF PARTICLE SWARM OPTIMIZATION TO MICROWAVE TAPERED MICROSTRIP LINES
APPLICATION OF PARTICLE SWARM OPTIMIZATION TO MICROWAVE TAPERED MICROSTRIP LINESAPPLICATION OF PARTICLE SWARM OPTIMIZATION TO MICROWAVE TAPERED MICROSTRIP LINES
APPLICATION OF PARTICLE SWARM OPTIMIZATION TO MICROWAVE TAPERED MICROSTRIP LINES
 
Application of particle swarm optimization to microwave tapered microstrip lines
Application of particle swarm optimization to microwave tapered microstrip linesApplication of particle swarm optimization to microwave tapered microstrip lines
Application of particle swarm optimization to microwave tapered microstrip lines
 
Network-Growth Rule Dependence of Fractal Dimension of Percolation Cluster on...
Network-Growth Rule Dependence of Fractal Dimension of Percolation Cluster on...Network-Growth Rule Dependence of Fractal Dimension of Percolation Cluster on...
Network-Growth Rule Dependence of Fractal Dimension of Percolation Cluster on...
 
STUDY OF THE EQUIVALENT CIRCUIT OF A DYESENSITIZED SOLAR CELLS
STUDY OF THE EQUIVALENT CIRCUIT OF A DYESENSITIZED SOLAR CELLSSTUDY OF THE EQUIVALENT CIRCUIT OF A DYESENSITIZED SOLAR CELLS
STUDY OF THE EQUIVALENT CIRCUIT OF A DYESENSITIZED SOLAR CELLS
 
A chaotic particle swarm optimization (cpso) algorithm for solving optimal re...
A chaotic particle swarm optimization (cpso) algorithm for solving optimal re...A chaotic particle swarm optimization (cpso) algorithm for solving optimal re...
A chaotic particle swarm optimization (cpso) algorithm for solving optimal re...
 
A chaotic particle swarm optimization (cpso) algorithm for solving optimal re...
A chaotic particle swarm optimization (cpso) algorithm for solving optimal re...A chaotic particle swarm optimization (cpso) algorithm for solving optimal re...
A chaotic particle swarm optimization (cpso) algorithm for solving optimal re...
 
1 Aminullah Assagaf_Estimation-of-domain-of-attraction-for-the-fract_2021_Non...
1 Aminullah Assagaf_Estimation-of-domain-of-attraction-for-the-fract_2021_Non...1 Aminullah Assagaf_Estimation-of-domain-of-attraction-for-the-fract_2021_Non...
1 Aminullah Assagaf_Estimation-of-domain-of-attraction-for-the-fract_2021_Non...
 
A Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR FiltersA Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR Filters
 

More from Areejit Samal

Areejit Samal Emergence Alaska 2013
Areejit Samal Emergence Alaska 2013Areejit Samal Emergence Alaska 2013
Areejit Samal Emergence Alaska 2013Areejit Samal
 
Metabolic Network Analysis
Metabolic Network AnalysisMetabolic Network Analysis
Metabolic Network AnalysisAreejit Samal
 
Modularity in metabolic networks
Modularity in metabolic networksModularity in metabolic networks
Modularity in metabolic networksAreejit Samal
 
Areejit Samal Regulation
Areejit Samal RegulationAreejit Samal Regulation
Areejit Samal RegulationAreejit Samal
 
Areejit Samal Randomizing metabolic networks
Areejit Samal Randomizing metabolic networksAreejit Samal Randomizing metabolic networks
Areejit Samal Randomizing metabolic networksAreejit Samal
 
Randomizing genome-scale metabolic networks
Randomizing genome-scale metabolic networksRandomizing genome-scale metabolic networks
Randomizing genome-scale metabolic networksAreejit Samal
 
Areejit samal fba_tutorial
Areejit samal fba_tutorialAreejit samal fba_tutorial
Areejit samal fba_tutorialAreejit Samal
 

More from Areejit Samal (7)

Areejit Samal Emergence Alaska 2013
Areejit Samal Emergence Alaska 2013Areejit Samal Emergence Alaska 2013
Areejit Samal Emergence Alaska 2013
 
Metabolic Network Analysis
Metabolic Network AnalysisMetabolic Network Analysis
Metabolic Network Analysis
 
Modularity in metabolic networks
Modularity in metabolic networksModularity in metabolic networks
Modularity in metabolic networks
 
Areejit Samal Regulation
Areejit Samal RegulationAreejit Samal Regulation
Areejit Samal Regulation
 
Areejit Samal Randomizing metabolic networks
Areejit Samal Randomizing metabolic networksAreejit Samal Randomizing metabolic networks
Areejit Samal Randomizing metabolic networks
 
Randomizing genome-scale metabolic networks
Randomizing genome-scale metabolic networksRandomizing genome-scale metabolic networks
Randomizing genome-scale metabolic networks
 
Areejit samal fba_tutorial
Areejit samal fba_tutorialAreejit samal fba_tutorial
Areejit samal fba_tutorial
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Areejit Samal Preferential Attachment in Catalytic Model

  • 1. Preferential attachment renders an evolving network of populations robust against crashes Areejit Samal Max Planck Institute for Mathematics in the Sciences Inselstr. 22 04103 Leipzig Germany Email: samal@mis.mpg.de
  • 2. Outline  Jain and Krishna (JK) evolving network model  Interesting features of the model  Structural changes leading to crashes in the model  Modified model with preferential attachment scheme  Results
  • 3. ( Jain and Krishna, PRL 1998, PNAS 2001, PNAS 2002 ) 100-500 million years Jain and Krishna (JK) model is motivated by the origin of life problem The model tries to address some of the puzzles behind the emergence of prebiotic chemical organization.
  • 4. Variables of the model 1ijc = 1ijc =1 2 4 8 5 3 7 6 A graph of interacting molecular species An arrow from node j to i implies that j is a catalyst for the production of i, and then The absence of an arrow from j to i implies that 0 The s x s matrix C = (cij ) is the adjacency matrix of the graph s is the number of molecular species Each species i has a population yi or a relative population xi The variables x and C characterize the chemical organization in the pond and they change with time.
  • 5. Dynamical rules Initialization: Cij = 1 with probability p, = 0 with probability 1-p p is the “catalytic probability”. xi are chosen randomly. Relative population of new node is set to x0, a small constant. All other xi are perturbed randomly. x → X: Attractor C fixed Population Dynamics (step 1) ( Jain and Krishna, PRL 1998, PNAS 2001, PNAS 2002 )
  • 6. Population Dynamics , ( , )i i ij j i jk k j j k x f x c c x x c x • = = −∑ ∑ = population of species i ix = relative population of species i = iy Ywhere i i Y y= ∑ 0 1ix≤ ≤Therefore, and 1 1 s i i x = =∑ 1ijc = implies i j¬ ⇔ j is a catalyst for the production of i . Interpretation of the chemical rate equation i j iy Ky yφ= − . how efficient j is in catalyzing i, reactant concentrations etc. dilution flux (2) Eq. (1) implies Eq. (2). Note that Eq. (2) does not contain φ. iy Y1 s i ij j i j y c y yφ = = −∑ . (1)
  • 7. Auto Catalytic Set (ACS) An ACS is a subgraph, each of whose nodes has at least one incoming link from a node belonging to the same subgraph. This definition of ACS was introduced in the context of a set of catalytically interacting molecules where it was defined to be a set of molecular species that contains within itself a catalyst for each of the member species. Examples of graph structures that are ACS Sandeep Krishna, PhD Thesis (2003)
  • 8. Core and Periphery of an ACS An ACS can be further subdivided into core and periphery. The core is the irreducible subgraph of the ACS, i.e., every node in the core has access to every other node in the directed subgraph. The periphery consists of nodes which can be reached from the core nodes while the core nodes cannot be reached from the periphery nodes in the directed subgraph. In the ACS shown below, nodes 1 and 2 form the core and node 3 forms the periphery. Sandeep Krishna, PhD Thesis (2003)
  • 9. Three phases during network evolution There are three phases observed during the graph evolution process:  Random phase  Growth phase  Organized phase
  • 10. Random phase n = 1 n = 78 n = 2853 The random phase is characterized by a graph where there is no ACS. The onset of the growth phase is triggered by the appearance of the first ACS in the graph. Sandeep Krishna, PhD Thesis (2003)
  • 11. Growth phase n = 2854 n = 3022 n = 3386 The growth phase starts with the appearance of the first ACS in the graph. The growth phase is characterized by a dramatic increase in the number of links in the graph with the ACS accreting more and more nodes into it. Sandeep Krishna, PhD Thesis (2003)
  • 12. n 0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000 NumberofLinks 0 20 40 60 80 100 120 140 160 n 0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000 Numberofpopulatednodes(s 1 ) 0 20 40 60 80 100 120 n 0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000 λ 1 0.0 0.2 0.4 0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0 The creation of the first ACS is marked by the increase in the Perron-Frobenius eigenvalue to a value larger than or equal to 1. In the growth phase, the number of links in the graph increases dramatically.
  • 13. Organized phase n = 3880 n = 4448 n = 5041 The growth phase culminates with the ACS spanning the whole graph. This marks the start of the organized phase where at least s-1 nodes are populated. The system remains in the organized phase until a crash occurs after which the system ends in the growth or the random phase. Sandeep Krishna, PhD Thesis (2003)
  • 14. n 0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000 NumberofLinks 0 20 40 60 80 100 120 140 160 n 0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000 Numberofpopulatednodes(s 1 ) 0 20 40 60 80 100 120 n 0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000 λ 1 0.0 0.2 0.4 0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0 In the organized phase, the number of populated nodes is greater than equal to s-1. There is always an ACS in the graph in the growth and organized phase with Perron-Frobenius eigenvalue larger than or equal to 1.
  • 15. Random phase n = 8500 n = 10000 The system eventually returns to the random phase from the organized phase. Sandeep Krishna, PhD Thesis (2003)
  • 16. n 0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000 NumberofLinks 0 20 40 60 80 100 120 140 160 n 0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000 Numberofpopulatednodes(s 1 ) 0 20 40 60 80 100 120 n 0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000 λ 1 0.0 0.2 0.4 0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0 After a crash, the number of populated nodes suddenly decreases.
  • 17. Crashes In the context of the JK model, a crash has been defined as a graph update event where a significant fraction of the nodes (arbitrarily chosen as 50%) become extinct. It has been shown that the crashes usually occur as a result of two different types of structural changes in the graph: 1. Core-shifts 2. Complete crashes Jain and Krishna, PRE (2002)
  • 18. Core-shifts n = 5041 n = 5042 Most crashes in the model are a result of core-shifts. A core-shift is a graph update event which results in a graph at the present time step with a core that has a zero overlap with the core of the graph at the previous time step. In this case, a new irreducible subgraph takes over as the core of the ACS after the graph update event.
  • 19. Complete crash n = 8232 n = 8233 After a complete crash, there is no ACS in the graph. Such crashes are rare in the model.
  • 20. Modified model with preferential attachment scheme We have modified the evolving network model of Jain and Krishna (JK) and studied its features in detail. Our model differs from the JK model in the graph update scheme. In JK model, at each time step, one of the nodes with the least population is eliminated along with its links and a new node is added with links assigned randomly to existing nodes. The average in-degree and out-degree of the incoming node is equal to m. In our modified model, at each time step, one of the nodes with the least population is eliminated along with its links and a new node is added with links assigned preferentially to existing nodes with higher degree. The new node will have an outgoing link and an incoming link to an existing node j in the graph with the same probability 1 / s j j j k m k = ∑ where kj is the total degree of node j. The average in-degree and out-degree of the incoming node is again equal to m for the modified model. Note that the average in-degree and out-degree is an average over many graph update events. We choose the number of nodes (s) equal to 100 and m=0.25 for our simulations of both models.
  • 21. Dynamical rules of the modified model Initialization: Cij = 1 with probability p, = 0 with probability 1-p p = m/(s -1) xi are chosen randomly. x → X: Attractor C fixed Population Dynamics (step 1) 1 / s j j j k m k = ∑ The new node attaches preferentially to high degree nodes with probability:
  • 22. Three phases are also observed in the modified model In both the models, there are three phases observed: initial random phase, growth phase and organized phase. Former model Modified model
  • 23. Preferential attachment accelerates the creation of the first ACS and the transition from growth to organized phase In the former model: – Average time for the creation of the first ACS = 1107 time steps – Average time of the first growth phase = 1600 time steps In the modified model: – Average time for the creation of the first ACS = 113 time steps – Average time of the first growth phase = 491 time steps The numbers presented here are an average over 1000 different runs with different seeds.
  • 24. Crashes are extremely rare in the modified model We compared the number of crashes in both models in a larger data set compiled from 25 different runs of 105 times steps each. The number of crashes in the former model was equal to 1160. The number of crashes in the modified model was equal to 6. Crashes are extremely rare in the modified model. Also, in the runs of the modified model, we observed that after the creation of the first ACS there was always an ACS in the graph. Former model Modified model
  • 25. A typical graph in the organized phase of the modified model has a much larger Perron-Frobenius eigenvalue The Perron-Frobenius eigenvalue is related to the density of links in the core of the graph. In the modified model, the value of λ1 is much larger than 1 in the organized phase. Former model Modified model
  • 26. The core of the graph in the modified model has many more fundamental loops The number of nodes in the core of the graph or core size in the former model can become as large as that in the modified model but the number of fundamental loops in the core is much larger in the modified model compared to the former model. This explains the much larger Perron-Frobenius eigenvalue λ1 in the modified model. The number of fundamental loops is given by the first Betti number or cyclomatic number.
  • 27. Number of links in the graph There are much more links in the graph of the modified model compared to the former model with same parameter values.
  • 28. Typical graph in the organized phase of the modified model The graph shows the dense structure of the core of the graph in the organized phase of the modified model. The multiplicity of paths within the core of the graph is an indicator of stability of the system in the modified model.
  • 29. Degree distribution and clustering coefficient of typical graphs in the organized phase Both the degree distributions are power-like but it is not possible to uniquely read of the power from the data. The average value of clustering coefficient of graphs in the former model is given by 0.02 and that of graphs in the modified model is given by 0.79. This is a result of the dense architecture of the core in the modified model. In-degree distribution Out-degree distribution
  • 30. Both diversity and preferential attachment can enhance network robustness In the context of the former model, it was shown recently that the number of crashes decreases with the increase in the number of nodes in the graph or diversity. Reference: Mehrotra, Soni and Jain, J. R. Soc. Interface (2008) We have shown here an alternate mechanism, i.e., preferential attachment mechanism which can also render the system robust against crashes. Reference: Samal and Meyer-Ortmanns, Physica A (2009)
  • 31. Classification of graph update events into different categories of innovation explains enhanced robustness of the modified model
  • 32. Acknowledgement Collaboration: Hildegard Meyer-Ortmanns, Jacobs University, Bermen, Germany Discussions: Sanjay Jain, University of Delhi Sandeep Krishna,NBI Copenhagen Reference: Preferential attachment renders an evolving network of populations robust against crashes, Areejit Samal and Hildegard Meyer-Ortmanns, Physica A (2009) (MPI-MIS Preprint 77/2008).