Network Science
Network Science
As a result, the BAST issued the NRC study in 2005 titled Network Science (referenced above) that dened a
new eld of basic research in Network Science for the
Army. Based on the ndings and recommendations of
that study and the subsequent 2007 NRC report titled
Strategy for an Army Center for Network Science, Technology, and Experimentation, Army basic research resources were redirected to initiate a new basic research
program in Network Science. To build a new theoretical foundation for complex networks, some of the key
Network Science research eorts now ongoing in Army
laboratories address:
NETWORK PROPERTIES
2 Network properties
Often, networks have certain attributes that can be calculated to analyze the properties & characteristics of the
network. These network properties often dene network
models and can be used to analyze how certain models
contrast to each other. Many of the denitions for other
terms used in network science can be found in Glossary
of graph theory.
2.1 Density
Mathematical models of network behavior to predict The density D of a network is dened as a ratio of the
given
performance with network size, complexity, and en- number of edges E to the number
( ) of possible edges,2E
by the binomial coecient N2 , giving D = N (N
vironment
1) .
T
Another possible equation is D = N (N 1) . , whereas the
Optimized human performance required for ties T are unidirectional (Wasserman & Faust 1994).[2]
network-enabled warfare
This gives a better overview over the network density, because unidirectional relationships can be measured.
Networking within ecosystems and at the molecular
level in cells.
As initiated in 2004 by Frederick I. Moxley with support he solicited from David S. Alberts, the Department
of Defense helped to establish the rst Network Science
Center in conjunction with the U.S. Army at the United
States Military Academy (USMA). Under the tutelage of
Dr. Moxley and the faculty of the USMA, the rst interdisciplinary undergraduate courses in Network Science
were taught to cadets at West Point. In order to better instill the tenets of network science among its cadre of future leaders, the USMA has also instituted a ve-course
undergraduate minor in Network Science.
2.2 Size
The size of a network can refer to the number of nodes
N or, less commonly, the number of edges E which can
range from N 1 (a tree) to Emax (a complete graph).
2.6
Clustering coecient
3 Network models
( )
k
k(k 1)
=
.
2
2
2.7
Connectedness
Weakly Connected Component: A collection of random number is greater than p, an edge is formed on the model.
nodes in which there exists a path from any node
to any other, ignoring directionality of the edges.
The ErdsRnyi model, named for Paul Erds and
Alfrd Rnyi, is used for generating random graphs in
Strongly Connected Component: A collection of which edges are set between nodes with equal probabilinodes in which there exists a directed path from any ties. It can be used in the probabilistic method to prove
node to any other.
the existence of graphs satisfying various properties, or
to provide a rigorous denition of what it means for a
property to hold for almost all graphs.
2.8
Node centrality
NETWORK ANALYSIS
(
)
n1 k
p (1 p)n1k
k
3.2
The Watts and Strogatz model is a random graph generation model that produces graphs with small-world properties.
An initial lattice structure is used to generate a WattsStrogatz model. Each node in the network is initially
linked to its < k > closest neighbors. Another parameter
is specied as the rewiring probability. Each edge has a
probability p that it will be rewired to the graph as a ranThe degree distribution of the BA Model, which follows a power
dom edge. The expected number of rewired links in the law. In loglog scale the power law function is a straight line.[7]
model is pE = pN < k > /2 .
As the Watts-Strogatz model begins as non-random lattice structure, it has a very high clustering coecient
along with high average path length. Each rewire is likely
to create a shortcut between highly connected clusters.
As the rewiring probability increases, the clustering coecient decreases slower than the average path length.
In eect, this allows the average path length of the network to decrease signicantly with only slightly decreases
in clustering coecient. Higher values of p force more
rewired edges, which in eect makes the Watts-Strogatz
model a random network.
3.3
4 Network analysis
4.4
4.1
Link analysis
5
in the interactome.[13]
Social network analysis examines the structure of relationships between social entities.[9] These entities are of- 4.4 Link analysis
ten persons, but may also be groups, organizations, nation
Link analysis is a subset of network analysis, exploring
states, web sites, scholarly publications.
associations between objects. An example may be examSince the 1970s, the empirical study of networks has
ining the addresses of suspects and victims, the telephone
played a central role in social science, and many of the
numbers they have dialed and nancial transactions that
mathematical and statistical tools used for studying netthey have partaken in during a given timeframe, and the
[10]
works have been rst developed in sociology. Amongst
familial relationships between these subjects as a part of
many other applications, social network analysis has been
police investigation. Link analysis here provides the cruused to understand the diusion of innovations, news and
cial relationships and associations between very many obrumors. Similarly, it has been used to examine the spread
jects of dierent types that are not apparent from isolated
of both diseases and health-related behaviors. It has also
pieces of information. Computer-assisted or fully autobeen applied to the study of markets, where it has been
matic computer-based link analysis is increasingly emused to examine the role of trust in exchange relationployed by banks and insurance agencies in fraud detecships and of social mechanisms in setting prices. Simition, by telecommunication operators in telecommunicalarly, it has been used to study recruitment into political
tion network analysis, by medical sector in epidemiology
movements and social organizations. It has also been used
and pharmacology, in law enforcement investigations, by
to conceptualize scientic disagreements as well as acasearch engines for relevance rating (and conversely by
demic prestige. More recently, network analysis (and its
the spammers for spamdexing and by business owners for
close cousin trac analysis) has gained a signicant use in
search engine optimization), and everywhere else where
military intelligence, for uncovering insurgent networks
relationships between many objects have to be analyzed.
of both hierarchical and leaderless nature.[11][12]
4.2
Dynamic Network Analysis examines the shifting structure of relationships among dierent classes of entities in
complex socio-technical systems eects, and reects social stability and changes such as the emergence of new
groups, topics, and leaders. Dynamic Network Analysis
focuses on meta-networks composed of multiple types of
nodes (entities) and multiple types of links. These entities can be highly varied. Examples include people, organizations, topics, resources, tasks, events, locations, and
beliefs.
4.3
Infectious Period Whether a population will be overcome by a pandemic, with regards to the SIR model, is
dependent on the value of R0 or the average people infected by an infected individual.
R0 = =
the spread of a disease?". Formally established measures
of centrality are degree centrality, closeness centrality,
betweenness centrality, eigenvector centrality, and katz
4.4.3 Web Link Analysis
centrality. The objective of network analysis generally
Several Web search ranking algorithms use link-based determines the type of centrality measure(s) to be used.
centrality metrics, including (in order of appearance)
Marchiori's Hyper Search, Google's PageRank, Klein Degree centrality of a node in a network is the
bergs HITS algorithm, the CheiRank and TrustRank alnumber of links (vertices) incident on the node.
gorithms. Link analysis is also conducted in information
Closeness centrality determines how close a
science and communication science in order to undernode is to other nodes in a network by measuring
stand and extract information from the structure of colthe sum of the shortest distances (geodesic paths)
lections of web pages. For example the analysis might be
between that node and all other nodes in the netof the interlinking between politicians web sites or blogs.
work.
PageRank PageRank works by randomly picking
nodes or websites and then with a certain probability,
randomly jumping to other nodes. By randomly jumping to these other nodes, it helps PageRank completely
traverse the network as some webpages exist on the periphery and would not as readily be assessed.
Betweenness centrality determines the relative importance of a node by measuring the amount of trafc owing through that node to other nodes in the
network. This is done by measuring the fraction of
paths connecting all pairs of nodes and containing
the node of interest.
(k)
xi = ji N1j xj
Eigenvector centrality is a more sophisticated version of degree centrality where the centrality of a
node not only depends on the number of links incident on the node but also the quality of those links.
This quality factor is determined by the eigenvectors
of the adjacency matrix of the network.
Random Jumping As explained above, PageRank enlists random jumps in attempts to assign PageRank to every website on the internet. These random jumps nd
websites that might not be found during the normal search
methodologies such as Breadth-First Search and DepthFirst Search.
Katz centrality of a node is measured by summing the geodesic paths between that node and all
(reachable) nodes in the network. These paths are
weighted, paths connecting the node with its immediate neighbors carry higher weights than those
which connect with nodes farther away from the immediate neighbors.
1 (k)
enters a complex network remains constant as it passes
R(p) = N + (1 ) ji Nj xj
through. The model of conserved spread can best be repAnother way of looking at it:
resented by a pitcher containing a xed amount of water
RB
Rn
being poured into a series of funnels connected by tubes
R(A) =
+
...
+
B(outlinks)
n(outlinks)
. Here, the pitcher represents the original source and the
water is the content being spread. The funnels and connecting tubing represent the nodes and the connections
4.5 Centrality measures
between nodes, respectively. As the water passes from
Information about the relative importance of nodes and one funnel into another, the water disappears instantly
edges in a graph can be obtained through centrality mea- from the funnel that was previously exposed to the water.
sures, widely used in disciplines like sociology. Central- In non-conserved spread, the amount of content changes
7
as it enters and passes through a complex network. The
model of non-conserved spread can best be represented
by a continuously running faucet running through a series
of funnels connected by tubes . Here, the amount of water
from the original source is innite Also, any funnels that
have been exposed to the water continue to experience
the water even as it passes into successive funnels. The
non-conserved model is the most suitable for explaining
the transmission of most infectious diseases.
5.1
SIR
Using a xed population, N = S(t) + I(t) + R(t)
, Kermack and McKendrick derived the following
equations:
dS
= SI
dt
dI
= SI I
dt
dR
= I
dt
Several assumptions were made in the formulation of
these equations: First, an individual in the population
must be considered as having an equal probability as every other individual of contracting the disease with a rate
of , which is considered the contact or infection rate of
the disease. Therefore, an infected individual makes contact and is able to transmit the disease with N others per
unit time and the fraction of contacts by an infected with
An interdependent network is a system of coupled networks where nodes of one or more networks depend on
nodes in other networks. Such dependencies are enhanced by the developments in modern technology. Dependencies may lead to cascading failures between the
networks and a relatively small failure can lead to a catastrophic breakdown of the system. Blackouts are a fascinating demonstration of the important role played by the
dependencies between networks. A recent study developed a framework to study the cascading failures in an
interdependent networks system.[17][18]
7 Network optimization
Network problems that involve nding an optimal
way of doing something are studied under the name
of combinatorial optimization.
Examples include
network ow, shortest path problem, transport problem, transshipment problem, location problem, matching
problem, assignment problem, packing problem, routing
problem, Critical Path Analysis and PERT (Program
Evaluation & Review Technique).
Science
Research
Center
11 FURTHER READING
Network Science Collaborative Technology Alliance (US Army Research Laboratory)[21]
Network Science and Technology (NEST) Center
(Rensselaer Polytechnic Institute)[22]
CEU Center for Network Science (Central European University , founded in 2009)
Center for Networks and Relational Analysis (University of California-Irvine)[23]
Interdisciplinary Center for Network Science
and Applications (iCeNSA) (University of Notre
Dame[24]
Technology Center for Networks & Pathways (Johns
Hopkins University[25]
Percolation
Network topology
Network analyzer
Network formation
Small-world networks
Scale-free networks
Structural cut-o
10
See also
Network dynamics
11 Further reading
Network Science Center, http://www.dodccrp.
org/files/Network_Science_Center.asf
Connected:
The Power of Six Degrees,
http://ivl.slis.indiana.edu/km/movies/
2008-talas-connected.mov
Cohen, R.; Erez, K.; Havlin, S. (2000). Resilience
of the Internet to random breakdown. Phys. Rev.
Lett 85: 4626. doi:10.1103/physrevlett.85.4626.
Pu, Cun-Lai; Wen-; Pei, Jiang; Michaelson, Andrew (2012). Robustness analysis of network
controllability (PDF). Physica A: Statistical Mechanics and its Applications 391 (18): 44204425.
doi:10.1016/j.physa.2012.04.019.
The Burgeoning Field of Network Science,
http://themilitaryengineer.com/index.
php/tme-articles/tme-past-articles/item/
160-leader-profile-the-burgeoning-field-of-network-science
9
S.N. Dorogovtsev and J.F.F. Mendes, Evolution of
Networks: From biological networks to the Internet
and WWW, Oxford University Press, 2003, ISBN
0-19-851590-1
Linked: The New Science of Networks, A.-L.
Barabsi (Perseus Publishing, Cambridge
Network Science, Committee on Network Science
for Future Army Applications, National Research
Council. 2005. The National Academies Press
(2005)ISBN 0-309-10026-7
Network Science Bulletin, USMA (2007) ISBN 9781-934808-00-9
The Structure and Dynamics of Networks Mark
Newman, Albert-Lszl Barabsi, & Duncan J.
Watts (The Princeton Press, 2006) ISBN 0-69111357-2
Dynamical processes on complex networks, Alain
Barrat, Marc Barthelemy, Alessandro Vespignani
(Cambridge University Press, 2008) ISBN 978-0521-87950-7
Network Science: Theory and Applications, Ted
G. Lewis (Wiley, March 11, 2009) ISBN 0-47033188-7
Nexus: Small Worlds and the Groundbreaking Theory of Networks, Mark Buchanan (W. W. Norton &
Company, June 2003) ISBN 0-393-32442-7
Six Degrees: The Science of a Connected Age, Duncan J. Watts (W. W. Norton & Company, February
17, 2004) ISBN 0-393-32542-3
netwiki Scientic wiki dedicated to network theory
New Network Theory International Conference on
'New Network Theory'
Network Workbench: A Large-Scale Network
Analysis, Modeling and Visualization Toolkit
Network analysis of computer networks
Network analysis of organizational networks
Network analysis of terrorist networks
Network analysis of a disease outbreak
Link Analysis: An Information Science Approach
(book)
Connected: The Power of Six Degrees (documentary)
Inuential Spreaders in Networks, M. Kitsak, L. K.
Gallos, S. Havlin, F. Liljeros, L. Muchnik, H. E.
Stanley, H.A. Makse, Nature Physics 6, 888 (2010)
A short course on complex networks
A course on complex network analysis by AlbertLszl Barabsi
12 External links
Network Science Center at the U.S. Military
Academy at West Point, NY
http://press.princeton.edu/titles/8114.html
http://www.cra.org/ccc/NSE.ppt.pdf
http://www.ifr.ac.uk/netsci08/
GNET Group of Complex Systems & Random
Networks
http://www.netsci09.net/
Cyberinfrastructure
Prof. Nicholas A Christakis introduction to network science in Prospect magazine
Video Lectures on complex networks by Prof.
Shlomo Havlin
13 Notes
[1] Committee on Network Science for Future Army Applications (2006). Network Science. National Research
Council. ISBN 0309653886.
[2] http://psycnet.apa.org/journals/prs/9/4/172/
[3] Lawyer, Glenn (2014). Understanding the spreading
power of all nodes in a network: a continuous-time perspective. arXiv. Retrieved July 11, 2014.
[4] Sikic, Mile; Lancic, Alen; Antulov-Fantulin, Nino; Stefancic, Hrvoje (October 2013). Epidemic centrality -is there an underestimated epidemic impact of network
peripheral nodes?". The European Physical Journal B 86
(10): 113. doi:10.1140/epjb/e2013-31025-5.
[5] Borgatti, Stephen P. (2005). Centrality and Network Flow. Social Networks (Elsevier) 27: 5571.
doi:10.1016/j.socnet.2004.11.008.
[6] R. Albert; A.-L. Barabsi (2002).
Statistical
mechanics of complex networks.
Reviews
of Modern Physics 74:
4797.
arXiv:condBibcode:2002RvMP...74...47A.
mat/0106096.
doi:10.1103/RevModPhys.74.47.
[7] Albert-Lszl Barabsi & Rka Albert (October
Emergence of scaling in random net1999).
works. Science 286 (5439): 509512. arXiv:condmat/9910332.
Bibcode:1999Sci...286..509B.
doi:10.1126/science.286.5439.509. PMID 10521342.
[8] R. Cohen, S. Havlin (2003). Scale-free networks
are ultrasmall. Phys. Rev. Lett 90 (5): 058701.
doi:10.1103/PhysRevLett.90.058701. PMID 12633404.
|rst2= missing |last2= in Authors list (help)
[9] Wasserman, Stanley and Katherine Faust. 1994. Social
Network Analysis: Methods and Applications. Cambridge:
Cambridge University Press.
10
[10] Newman, M.E.J. Networks: An Introduction. Oxford University Press. 2010, ISBN 978-0199206650
[11] Toward a Complex Adaptive Intelligence Community
The Wiki and the Blog. D. Calvin Andrus. cia.gov. Retrieved 25 August 2012.
[12] Network analysis of terrorist networks
[13] Barabsi, A. L., Gulbahce, N., & Loscalzo, J. (2011).
Network medicine: a network-based approach to human
disease. Nature Reviews Genetics, 12(1), 56-68.
[14] R. Cohen, S. Havlin (2010). Complex Networks: Structure,
Robustness and Function. Cambridge University Press.
[15] A. Bunde, S. Havlin (1996). Fractals and Disordered Systems. Springer.
[16] Newman, M., Barabsi, A.-L., Watts, D.J. [eds.] (2006)
The Structure and Dynamics of Networks. Princeton,
N.J.: Princeton University Press.
[17] S. V. Buldyrev, R. Parshani, G. Paul, H. E. Stanley,
S. Havlin (2010). Catastrophic cascade of failures in
interdependent networks. Nature 464 (7291): 1025
28. arXiv:0907.1182. Bibcode:2010Natur.464.1025B.
doi:10.1038/nature08932. PMID 20393559.
[18] Jianxi Gao, Sergey V. Buldyrev3, Shlomo Havlin4, and
H. Eugene Stanley (2011). Robustness of a Network
of Networks. Phys. Rev. Lett 107 (19): 195701.
arXiv:1010.5829.
Bibcode:2011PhRvL.107s5701G.
doi:10.1103/PhysRevLett.107.195701.
PMID
22181627.
|rst2= missing |last2= in Authors list
(help); |rst3= missing |last3= in Authors list (help);
|rst4= missing |last4= in Authors list (help)
[19] https://dnac.ssri.duke.edu/about.php
[20] http://www-304.ibm.com/industries/publicsector/us/en/
rep/!!/xmlid=229952
[21] http://www.ns-cta.org/ns-cta-blog/
[22] http://www.nest.rpi.edu/
[23] http://lakshmi.calit2.uci.edu/cnra/
[24] http://www.icensa.com/
[25] http://www.hopkinsmedicine.org/institute_basic_
biomedical_sciences/research_centers/high_
throughput_biology_hit/technology_center_networks_
pathways/
[26] http://yins.yale.edu/
[27] http://scnarc.rpi.edu/
[28] Kathleen M. Carley, 2014, ORA: A Toolkit for Dynamic
Network Analysis and Visualization, In Reda Alhajj and
Jon Rokne (Eds.) Encyclopedia of Social Network Analysis and Mining, Springer.
[29] Bejan A., Lorente S., The Constructal Law of Design
and Evolution in Nature. Philosophical Transactions of
the Royal Society B, Biological Science, Vol. 365, 2010,
pp. 1335-1347.
13 NOTES
11
14
14.1
14.2
Images
14.3
Content license