-
Gellan-Based Hydrogels and Microgels for culturage heritage: a rheological perspective
Authors:
Silvia Franco,
Leonardo Severini,
Elena Buratti,
Letizia Tavagnacco,
Simona Sennato,
Mauro Missori,
Barbara Ruzicka,
Claudia Mazzuca,
Emanuela Zaccarelli,
Roberta Angelini
Abstract:
Gellan gum has gained significant attention due to its versatility in multiple applications in the form of hydrogels and microgels. A thorough understanding of the rheological behaviour of these systems is crucial both for fundamental research and to optimize the manufacturing needs. To this aim, here we extensively characterize the rheological behaviour of gellan based hydrogels and microgels rec…
▽ More
Gellan gum has gained significant attention due to its versatility in multiple applications in the form of hydrogels and microgels. A thorough understanding of the rheological behaviour of these systems is crucial both for fundamental research and to optimize the manufacturing needs. To this aim, here we extensively characterize the rheological behaviour of gellan based hydrogels and microgels recently used for efficient paper cleaning for restoration interventions. In particular, we study their viscoelastic properties, also during hydrogel and microgel formation, assessing the role of temperature, gellan concentration, and, importantly, the presence of different cations, which plays a crucial role in the gelation process. We find the interesting result that, in the conditions where they are efficient for cleaning, gellan hydrogels exhibit a double yielding behavior. In addition, we provide a detailed description of gellan microgels preparation, ensuring high control and reproducibility of the samples. Altogether our study sheds light on the mechanical stability, network structure, and overall functionality of the gellan-based gels, providing valuable insights into optimizing conditions for desired applications in paper cleaning.
△ Less
Submitted 30 August, 2024;
originally announced August 2024.
-
Local Centrality Minimization with Quality Guarantees
Authors:
Atsushi Miyauchi,
Lorenzo Severini,
Francesco Bonchi
Abstract:
Centrality measures, quantifying the importance of vertices or edges, play a fundamental role in network analysis. To date, triggered by some positive approximability results, a large body of work has been devoted to studying centrality maximization, where the goal is to maximize the centrality score of a target vertex by manipulating the structure of a given network. On the other hand, due to the…
▽ More
Centrality measures, quantifying the importance of vertices or edges, play a fundamental role in network analysis. To date, triggered by some positive approximability results, a large body of work has been devoted to studying centrality maximization, where the goal is to maximize the centrality score of a target vertex by manipulating the structure of a given network. On the other hand, due to the lack of such results, only very little attention has been paid to centrality minimization, despite its practical usefulness.
In this study, we introduce a novel optimization model for local centrality minimization, where the manipulation is allowed only around the target vertex. We prove the NP-hardness of our model and that the most intuitive greedy algorithm has a quite limited performance in terms of approximation ratio. Then we design two effective approximation algorithms: The first algorithm is a highly-scalable algorithm that has an approximation ratio unachievable by the greedy algorithm, while the second algorithm is a bicriteria approximation algorithm that solves a continuous relaxation based on the Lovász extension, using a projected subgradient method. To the best of our knowledge, ours are the first polynomial-time algorithms with provable approximation guarantees for centrality minimization. Experiments using a variety of real-world networks demonstrate the effectiveness of our proposed algorithms: Our first algorithm is applicable to million-scale graphs and obtains much better solutions than those of scalable baselines, while our second algorithm is rather strong against adversarial instances.
△ Less
Submitted 12 February, 2024;
originally announced February 2024.
-
Molecular origin of the two-step mechanism of gellan aggregation
Authors:
Letizia Tavagnacco,
Ester Chiessi,
Leonardo Severini,
Silvia Franco,
Elena Buratti,
Angela Capocefalo,
Francesco Brasili,
Adriano Mosca Conte,
Mauro Missori,
Roberta Angelini,
Simona Sennato,
Claudia Mazzuca,
Emanuela Zaccarelli
Abstract:
Among hydrocolloids, gellan is one of the most used anionic polysaccharides, because of its capability of forming mechanically stable gels at relatively low concentrations. Despite its long-standing use and importance, the gellan aggregation mechanism is still not presently understood at the microscopic level due to the lack of atomistic information. Here we will fill this gap by reporting molecul…
▽ More
Among hydrocolloids, gellan is one of the most used anionic polysaccharides, because of its capability of forming mechanically stable gels at relatively low concentrations. Despite its long-standing use and importance, the gellan aggregation mechanism is still not presently understood at the microscopic level due to the lack of atomistic information. Here we will fill this gap by reporting molecular dynamics simulations of gellan chains at different polymer and salt contents, being able to unveil the occurrence of the two steps in the process, in agreement with existing hypotheses. At first, the formation of double helices takes place, followed by the aggregation into super-structures. For both steps, the role of bivalent cations appears to be crucial, as also shown by rheology and atomic force microscopy measurements: they not only facilitate the junction of the chains into double helices, but also promote through bridging their arrangement into larger aggregates. On the other hand, monovalent cations have a much more reduced role, making it possible to form double helices only at very high salt content and not actively participating in the formation of gels. Our simulations thus offer the first complete microscopic overview of gellan aggregation and will be important for future use of gellan-based systems for a wide variety of applications, ranging from food science to art restoration.
△ Less
Submitted 19 September, 2022;
originally announced September 2022.
-
Better Fewer but Better: Community Search with Outliers
Authors:
Francesco Bonchi,
Lorenzo Severini,
Mauro Sozio
Abstract:
Given a set of vertices in a network, that we believe are of interest for the application under analysis, community search is the problem of producing a subgraph potentially explaining the relationships existing among the vertices of interest. In practice this means that the solution should add some vertices to the query ones, so to create a connected subgraph that exhibits some "cohesiveness" pro…
▽ More
Given a set of vertices in a network, that we believe are of interest for the application under analysis, community search is the problem of producing a subgraph potentially explaining the relationships existing among the vertices of interest. In practice this means that the solution should add some vertices to the query ones, so to create a connected subgraph that exhibits some "cohesiveness" property. This problem has received increasing attention in recent years: while several cohesiveness functions have been studied, the bulk of the literature looks for a solution subgraphs containing all the query vertices. However, in many exploratory analyses we might only have a reasonable belief about the vertices of interest: if only one of them is not really related to the others, forcing the solution to include all of them might hide the existence of much more cohesive and meaningful subgraphs, that we could have found by allowing the solution to detect and drop the outlier vertex. In this paper we study the problem of community search with outliers, where we are allowed to drop up to $k$ query vertices, with $k$ being an input parameter. We consider three of the most used measures of cohesiveness: the minimum degree, the diameter of the subgraph and the maximum distance with a query vertex. By optimizing one and using one of the others as a constraint we obtain three optimization problems: we study their hardness and we propose different exact and approximation algorithms.
△ Less
Submitted 4 December, 2020; v1 submitted 1 December, 2020;
originally announced December 2020.
-
Distance-generalized Core Decomposition
Authors:
Francesco Bonchi,
Arijit Khan,
Lorenzo Severini
Abstract:
The $k$-core of a graph is defined as the maximal subgraph in which every vertex is connected to at least $k$ other vertices within that subgraph. In this work we introduce a distance-based generalization of the notion of $k$-core, which we refer to as the $(k,h)$-core, i.e., the maximal subgraph in which every vertex has at least $k$ other vertices at distance $\leq h$ within that subgraph. We st…
▽ More
The $k$-core of a graph is defined as the maximal subgraph in which every vertex is connected to at least $k$ other vertices within that subgraph. In this work we introduce a distance-based generalization of the notion of $k$-core, which we refer to as the $(k,h)$-core, i.e., the maximal subgraph in which every vertex has at least $k$ other vertices at distance $\leq h$ within that subgraph. We study the properties of the $(k,h)$-core showing that it preserves many of the nice features of the classic core decomposition (e.g., its connection with the notion of distance-generalized chromatic number) and it preserves its usefulness to speed-up or approximate distance-generalized notions of dense structures, such as $h$-club.
Computing the distance-generalized core decomposition over large networks is intrinsically complex. However, by exploiting clever upper and lower bounds we can partition the computation in a set of totally independent subcomputations, opening the door to top-down exploration and to multithreading, and thus achieving an efficient algorithm.
△ Less
Submitted 15 April, 2019;
originally announced April 2019.
-
Coverage Centrality Maximization in Undirected Networks
Authors:
Gianlorenzo D'Angelo,
Martin Olsen,
Lorenzo Severini
Abstract:
Centrality metrics are among the main tools in social network analysis. Being central for a user of a network leads to several benefits to the user: central users are highly influential and play key roles within the network. Therefore, the optimization problem of increasing the centrality of a network user recently received considerable attention. Given a network and a target user $v$, the central…
▽ More
Centrality metrics are among the main tools in social network analysis. Being central for a user of a network leads to several benefits to the user: central users are highly influential and play key roles within the network. Therefore, the optimization problem of increasing the centrality of a network user recently received considerable attention. Given a network and a target user $v$, the centrality maximization problem consists in creating $k$ new links incident to $v$ in such a way that the centrality of $v$ is maximized, according to some centrality metric. Most of the algorithms proposed in the literature are based on showing that a given centrality metric is monotone and submodular with respect to link addition. However, this property does not hold for several shortest-path based centrality metrics if the links are undirected. In this paper we study the centrality maximization problem in undirected networks for one of the most important shortest-path based centrality measures, the coverage centrality. We provide several hardness and approximation results. We first show that the problem cannot be approximated within a factor greater than $1-1/e$, unless $P=NP$, and, under the stronger gap-ETH hypothesis, the problem cannot be approximated within a factor better than $1/n^{o(1)}$, where $n$ is the number of users. We then propose two greedy approximation algorithms, and show that, by suitably combining them, we can guarantee an approximation factor of $Ω(1/\sqrt{n})$. We experimentally compare the solutions provided by our approximation algorithm with optimal solutions computed by means of an exact IP formulation. We show that our algorithm produces solutions that are very close to the optimum.
△ Less
Submitted 10 November, 2018;
originally announced November 2018.
-
Selecting nodes and buying links to maximize the information diffusion in a network
Authors:
Gianlorenzo D'Angelo,
Lorenzo Severini,
Yllka Velaj
Abstract:
The Independent Cascade Model (ICM) is a widely studied model that aims to capture the dynamics of the information diffusion in social networks and in general complex networks. In this model, we can distinguish between active nodes which spread the information and inactive ones. The process starts from a set of initially active nodes called seeds. Recursively, currently active nodes can activate t…
▽ More
The Independent Cascade Model (ICM) is a widely studied model that aims to capture the dynamics of the information diffusion in social networks and in general complex networks. In this model, we can distinguish between active nodes which spread the information and inactive ones. The process starts from a set of initially active nodes called seeds. Recursively, currently active nodes can activate their neighbours according to a probability distribution on the set of edges. After a certain number of these recursive cycles, a large number of nodes might become active. The process terminates when no further node gets activated. Starting from the work of Domingos and Richardson, several studies have been conducted with the aim of shaping a given diffusion process so as to maximize the number of activated nodes at the end of the process. One of the most studied problems has been formalized by Kempe et al. and consists in finding a set of initial seeds that maximizes the expected number of active nodes under a budget constraint. In this paper we study a generalization of the problem of Kempe et al. in which we are allowed to spend part of the budget to create new edges incident to the seeds. That is, the budget can be spent to buy seeds or edges according to a cost function. The problem does not admin a PTAS, unless $P=NP$. We propose two approximation algorithms: the former one gives an approximation ratio that depends on the edge costs and increases when these costs are high; the latter algorithm gives a constant approximation guarantee which is greater than that of the first algorithm when the edge costs can be small.
△ Less
Submitted 19 June, 2017;
originally announced June 2017.
-
Recommending links through influence maximization
Authors:
Gianlorenzo D'Angelo,
Lorenzo Severini,
Yllka Velaj
Abstract:
The link recommendation problem consists in suggesting a set of links to the users of a social network in order to increase their social circles and the connectivity of the network. Link recommendation is extensively studied in the context of social networks and of general complex networks due to its wide range of applications. Most of the existing link recommendation methods estimate the likeliho…
▽ More
The link recommendation problem consists in suggesting a set of links to the users of a social network in order to increase their social circles and the connectivity of the network. Link recommendation is extensively studied in the context of social networks and of general complex networks due to its wide range of applications. Most of the existing link recommendation methods estimate the likelihood that a link is adopted by users and recommend links that are likely to be established. However, most of such methods overlook the impact that the suggested links have on the capability of the network to spread information. Indeed, such capability is directly correlated with both the engagement of a single user and the revenue of online social networks. In this paper, we study link recommendation systems from the point of view of information diffusion. In detail, we consider the problem in which we are allowed to spend a given budget to create new links so to suggest a bounded number of possible persons to whom become friend in order to maximize the influence of a given set of nodes. We model the influence diffusion in a network with the popular Independent Cascade model.
△ Less
Submitted 14 June, 2017;
originally announced June 2017.
-
Improving the betweenness centrality of a node by adding links
Authors:
Elisabetta Bergamini,
Pierluigi Crescenzi,
Gianlorenzo D'Angelo,
Henning Meyerhenke,
Lorenzo Severini,
Yllka Velaj
Abstract:
Betweenness is a well-known centrality measure that ranks the nodes according to their participation in the shortest paths of a network. In several scenarios, having a high betweenness can have a positive impact on the node itself. Hence, in this paper we consider the problem of determining how much a vertex can increase its centrality by creating a limited amount of new edges incident to it. In p…
▽ More
Betweenness is a well-known centrality measure that ranks the nodes according to their participation in the shortest paths of a network. In several scenarios, having a high betweenness can have a positive impact on the node itself. Hence, in this paper we consider the problem of determining how much a vertex can increase its centrality by creating a limited amount of new edges incident to it. In particular, we study the problem of maximizing the betweenness score of a given node -- Maximum Betweenness Improvement (MBI) -- and that of maximizing the ranking of a given node -- Maximum Ranking Improvement (MRI). We show that MBI cannot be approximated in polynomial-time within a factor $(1-\frac{1}{2e})$ and that MRI does not admit any polynomial-time constant factor approximation algorithm, both unless $P=NP$. We then propose a simple greedy approximation algorithm for MBI with an almost tight approximation ratio and we test its performance on several real-world networks. We experimentally show that our algorithm highly increases both the betweenness score and the ranking of a given node ant that it outperforms several competitive baselines. To speed up the computation of our greedy algorithm, we also propose a new dynamic algorithm for updating the betweenness of one node after an edge insertion, which might be of independent interest. Using the dynamic algorithm, we are now able to compute an approximation of MBI on networks with up to $10^5$ edges in most cases in a matter of seconds or a few minutes.
△ Less
Submitted 1 August, 2018; v1 submitted 17 February, 2017;
originally announced February 2017.