-
Analogue simulations of quantum gravity with fluids
Authors:
Samuel L. Braunstein,
Mir Faizal,
Lawrence M. Krauss,
Francesco Marino,
Naveed A. Shah
Abstract:
The recent technological advances in controlling and manipulating fluids have enabled the experimental realization of acoustic analogues of gravitational black holes. A flowing fluid provides an effective curved spacetime on which sound waves can propagate, allowing the simulation of gravitational geometries and related phenomena. The last decade has witnessed a variety of hydrodynamic experiments…
▽ More
The recent technological advances in controlling and manipulating fluids have enabled the experimental realization of acoustic analogues of gravitational black holes. A flowing fluid provides an effective curved spacetime on which sound waves can propagate, allowing the simulation of gravitational geometries and related phenomena. The last decade has witnessed a variety of hydrodynamic experiments testing disparate aspects of black hole physics culminating in the recent experimental evidence of Hawking radiation and Penrose superradiance. In this Perspective, we discuss the potential use of analogue hydrodynamic systems beyond classical general relativity towards the exploration of quantum gravitational effects. These include possible insights into the information-loss paradox, black hole physics with Planck-scale quantum corrections, emergent gravity scenarios and the regularization of curvature singularities. We aim at bridging the gap between the non-overlapping communities of experimentalists working with classical and quantum fluids and quantum-gravity theorists, illustrating the opportunities made possible by the latest experimental and theoretical developments in these important areas of research
△ Less
Submitted 25 February, 2024;
originally announced February 2024.
-
Critical behavior of cascading failures in overloaded networks
Authors:
Ignacio A. Perez,
Dana Ben Porath,
Cristian E. La Rocca,
Lidia A. Braunstein,
Shlomo Havlin
Abstract:
While network abrupt breakdowns due to overloads and cascading failures have been studied extensively, the critical exponents and the universality class of such phase transitions have not been discussed. Here, we study breakdowns triggered by failures of links and overloads in networks with a spatial characteristic link length $ζ$. Our results indicate that this abrupt transition has features and…
▽ More
While network abrupt breakdowns due to overloads and cascading failures have been studied extensively, the critical exponents and the universality class of such phase transitions have not been discussed. Here, we study breakdowns triggered by failures of links and overloads in networks with a spatial characteristic link length $ζ$. Our results indicate that this abrupt transition has features and critical exponents similar to those of interdependent networks, suggesting that both systems are in the same universality class. For weakly embedded systems (i.e., $ζ$ of the order of the system size $L$) we observe a mixed-order transition, where the order parameter collapses following a long critical plateau. On the other hand, strongly embedded systems (i.e., $ζ\ll L$) exhibit a pure first-order transition, involving nucleation and the growth of damage. The system's critical behavior in both limits is similar to that observed in interdependent networks.
△ Less
Submitted 6 March, 2024; v1 submitted 10 July, 2023;
originally announced July 2023.
-
Sciama's argument on life in a random universe: Distinguishing apples from oranges
Authors:
Zhi-Wei Wang,
Samuel L. Braunstein
Abstract:
Dennis Sciama argued that the existence of life depended on many quantities, the fundamental constants, so in a random universe life should be highly unlikely. However, without full knowledge of these constants, his argument implies a universe that would appear to be `intelligently designed.'
Dennis Sciama argued that the existence of life depended on many quantities, the fundamental constants, so in a random universe life should be highly unlikely. However, without full knowledge of these constants, his argument implies a universe that would appear to be `intelligently designed.'
△ Less
Submitted 26 June, 2023;
originally announced June 2023.
-
Epidemic control in networks with cliques
Authors:
L. D. Valdez,
L. Vassallo,
L. A. Braunstein
Abstract:
Social units, such as households and schools, can play an important role in controlling epidemic outbreaks. In this work, we study an epidemic model with a prompt quarantine measure on networks with cliques (a $clique$ is a fully connected subgraph representing a social unit). According to this strategy, newly infected individuals are detected and quarantined (along with their close contacts) with…
▽ More
Social units, such as households and schools, can play an important role in controlling epidemic outbreaks. In this work, we study an epidemic model with a prompt quarantine measure on networks with cliques (a $clique$ is a fully connected subgraph representing a social unit). According to this strategy, newly infected individuals are detected and quarantined (along with their close contacts) with probability $f$. Numerical simulations reveal that epidemic outbreaks in networks with cliques are abruptly suppressed at a transition point $f_c$. However, small outbreaks show features of a second-order phase transition around $f_c$. Therefore, our model can exhibit properties of both discontinuous and continuous phase transitions. Next, we show analytically that the probability of small outbreaks goes continuously to 1 at $f_c$ in the thermodynamic limit. Finally, we find that our model exhibits a backward bifurcation phenomenon.
△ Less
Submitted 25 May, 2023; v1 submitted 16 February, 2023;
originally announced February 2023.
-
Peak fraction of infected in epidemic spreading for multi-community networks
Authors:
Jing Ma,
Xiangyi Meng,
Lidia A. Braunstein
Abstract:
One of the most effective strategies to mitigate the global spreading of a pandemic (e.g., COVID-19) is to shut down international airports. From a network theory perspective, this is since international airports and flights, essentially playing the roles of bridge nodes and bridge links between countries as individual communities, dominate the epidemic spreading characteristics in the whole multi…
▽ More
One of the most effective strategies to mitigate the global spreading of a pandemic (e.g., COVID-19) is to shut down international airports. From a network theory perspective, this is since international airports and flights, essentially playing the roles of bridge nodes and bridge links between countries as individual communities, dominate the epidemic spreading characteristics in the whole multi-community system. Among all epidemic characteristics, the peak fraction of infected, $I_{\max}$, is a decisive factor in evaluating an epidemic strategy given limited capacity of medical resources, but is seldom considered in multi-community models. In this paper, we study a general two-community system interconnected by a fraction $r$ of bridge nodes and its dynamic properties, especially $I_{\max}$, under the evolution of the Susceptible-Infected-Recovered (SIR) model. Comparing the characteristic time scales of different parts of the system allows us to analytically derive the asymptotic behavior of $I_{\max}$ with $r$, as $r\rightarrow 0$, which follows different power-law relations in each regime of the phase diagram. We also detect crossovers when $I_{\max}$ changes from one power law to another, crossing different power-law regimes as driven by $r$. Our results enable a better prediction of the effectiveness of strategies acting on bridge nodes, denoted by the power-law exponent $ε_I$ as in $I_{\max}\propto r^{1/ε_I}$.
△ Less
Submitted 20 June, 2022; v1 submitted 12 January, 2022;
originally announced January 2022.
-
Cascading failures in isotropic and anisotropic spatial networks induced by localized attacks and overloads
Authors:
I. A. Perez,
D. Vaknin Ben Porath,
C. E. La Rocca,
S. V. Buldyrev,
L. A. Braunstein,
S. Havlin
Abstract:
In this paper we study the Motter-Lai model of cascading failures induced by overloads in both isotropic and anisotropic spatial networks, generated by placing nodes in a square lattice and using various distributions of link lengths and angles. Anisotropy has not been earlier considered in the Motter-Lai model and is a real feature that may affect the cascading failures. This could reflect the ex…
▽ More
In this paper we study the Motter-Lai model of cascading failures induced by overloads in both isotropic and anisotropic spatial networks, generated by placing nodes in a square lattice and using various distributions of link lengths and angles. Anisotropy has not been earlier considered in the Motter-Lai model and is a real feature that may affect the cascading failures. This could reflect the existence of a preferred direction in which a given attribute of the system manifests, such as power lines that follow a city built parallel to the coast. We show that the anisotropy causes a greater spread of damage along the preferential direction of links. We also identify the critical linear size, $l_c$, for a square shaped localized attack, which satisfies with high probability that above $l_c$ the cascading disrupts the giant component of functional nodes, while below $l_c$ the damage does not spread. We find that, for networks with any characteristic link length, their robustness decreases with the strength of the anisotropy. We show that the value of $l_c$ is finite and independent of the system size (for large systems), both for isotropic and anisotropic networks. Thus, in contrast to random attacks, where the critical fraction of nodes that survive the initial attack, $p_c$, is usually below 1, here $p_c = 1$. Note that the analogy to $p_c = 1$ is also found for localized attacks in interdependent spatial networks. Finally, we measure the final distribution of functional cluster sizes and find a power-law behavior, with exponents similar to regular percolation. This indicates that, after the cascade which destroys the giant component, the system is at a percolation critical point. Additionally, we observe a crossover in the value of the distribution exponent, from critical percolation in a two-dimensional lattice for strong spatial embedding, to mean-field percolation for weak embedding.
△ Less
Submitted 16 March, 2022; v1 submitted 21 December, 2021;
originally announced December 2021.
-
Emergent networks in fractional percolation
Authors:
L. D. Valdez,
L. A. Braunstein
Abstract:
Real networks are vulnerable to random failures and malicious attacks. However, when a node is harmed or damaged, it may remain partially functional, which helps to maintain the overall network structure and functionality. In this paper, we study the network structure for a fractional percolation process [Shang, Phys. Rev. E 89, 012813 (2014)], in which the state of a node can be either fully func…
▽ More
Real networks are vulnerable to random failures and malicious attacks. However, when a node is harmed or damaged, it may remain partially functional, which helps to maintain the overall network structure and functionality. In this paper, we study the network structure for a fractional percolation process [Shang, Phys. Rev. E 89, 012813 (2014)], in which the state of a node can be either fully functional (FF), partially functional (PF), or dysfunctional (D). We develop new equations to calculate the relative size of the percolating cluster of FF and PF nodes, that are in agreement with our stochastic simulations. In addition, we find a regime in which the percolating cluster can be described as a coarse-grained bipartite network, namely, as a set of finite groups of FF nodes connected by PF nodes. Moreover, these groups behave as a set of "supernodes" with a power-law degree distribution. Finally, we show how this emergent structure explains the values of several critical exponents around the percolation threshold.
△ Less
Submitted 10 January, 2022; v1 submitted 5 October, 2021;
originally announced October 2021.
-
Life in a random universe: Sciama's argument reconsidered
Authors:
Zhi-Wei Wang,
Samuel L. Braunstein
Abstract:
Random sampling in high dimensions has successfully been applied to phenomena as diverse as nuclear resonances, neural networks and black hole evaporation. Here we revisit an elegant argument by the British physicist Dennis Sciama, which demonstrated that were our universe random, it would almost certainly have a negligible chance for life. Under plausible assumptions, we show that a random univer…
▽ More
Random sampling in high dimensions has successfully been applied to phenomena as diverse as nuclear resonances, neural networks and black hole evaporation. Here we revisit an elegant argument by the British physicist Dennis Sciama, which demonstrated that were our universe random, it would almost certainly have a negligible chance for life. Under plausible assumptions, we show that a random universe can masquerade as `intelligently designed,' with the fundamental constants instead appearing to be fined tuned to be achieve the highest probability for life to occur. For our universe, this mechanism may only require there to be around a dozen currently unknown fundamental constants. We speculate on broader applications for the mechanism we uncover.
△ Less
Submitted 22 February, 2024; v1 submitted 10 September, 2021;
originally announced September 2021.
-
Cascading failures in anisotropic interdependent networks of spatial modular structures
Authors:
Dana Vaknin,
Amir Bashan,
Lidia A. Braunstein,
Sergey V. Buldyrev,
Shlomo Havlin
Abstract:
The structure of real-world multilayer infrastructure systems usually exhibits anisotropy due to constraints of the embedding space. For example, geographical features like mountains, rivers and shores influence the architecture of critical infrastructure networks. Moreover, such spatial networks are often non-homogeneous but rather have a modular structure with dense connections within communitie…
▽ More
The structure of real-world multilayer infrastructure systems usually exhibits anisotropy due to constraints of the embedding space. For example, geographical features like mountains, rivers and shores influence the architecture of critical infrastructure networks. Moreover, such spatial networks are often non-homogeneous but rather have a modular structure with dense connections within communities and sparse connections between neighboring communities. When the networks of the different layers are interdependent, local failures and attacks may propagate throughout the system. Here we study the robustness of spatial interdependent networks which are both anisotropic and heterogeneous. We also evaluate the effect of localized attacks having different geometrical shapes. We find that anisotropic networks are more robust against localized attacks and that anisotropic attacks, surprisingly, even on isotropic structures, are more effective than isotropic attacks.
△ Less
Submitted 26 June, 2021;
originally announced June 2021.
-
An epidemic model for COVID-19 transmission in Argentina: Exploration of the alternating quarantine and massive testing strategies
Authors:
Lautaro Vassallo,
Ignacio A. Perez,
Lucila G. Alvarez-Zuzek,
Julián Amaya,
Marcos F. Torres,
Lucas D. Valdez,
Cristian E. La Rocca,
Lidia A. Braunstein
Abstract:
The COVID-19 pandemic has challenged authorities at different levels of government administration around the globe. When faced with diseases of this severity, it is useful for the authorities to have prediction tools to estimate in advance the impact on the health system and the human, material, and economic resources that will be necessary. In this paper, we construct an extended Susceptible-Expo…
▽ More
The COVID-19 pandemic has challenged authorities at different levels of government administration around the globe. When faced with diseases of this severity, it is useful for the authorities to have prediction tools to estimate in advance the impact on the health system and the human, material, and economic resources that will be necessary. In this paper, we construct an extended Susceptible-Exposed-Infected-Recovered model that incorporates the social structure of Mar del Plata, the $4^\circ$ most inhabited city in Argentina and head of the Municipality of General Pueyrredón. Moreover, we consider detailed partitions of infected individuals according to the illness severity, as well as data of local health resources, to bring these predictions closer to the local reality. Tuning the corresponding epidemic parameters for COVID-19, we study an alternating quarantine strategy, in which a part of the population can circulate without restrictions at any time, while the rest is equally divided into two groups and goes on successive periods of normal activity and lockdown, each one with a duration of $τ$ days. Besides, we implement a random testing strategy over the population. We found that $τ= 7$ is a good choice for the quarantine strategy since it matches with the weekly cycle as it reduces the infected population. Focusing on the health system, projecting from the situation as of September 30, we foresee a difficulty to avoid saturation of ICU, given the extremely low levels of mobility that would be required. In the worst case, our model estimates that four thousand deaths would occur, of which 30\% could be avoided with proper medical attention. Nonetheless, we found that aggressive testing would allow an increase in the percentage of people that can circulate without restrictions, being the equipment required to deal with the additional critical patients relatively low.
△ Less
Submitted 16 July, 2021; v1 submitted 4 December, 2020;
originally announced December 2020.
-
Cascading Failures in Complex Networks
Authors:
Lucas D. Valdez,
Louis Shekhtman,
Cristian E. La Rocca,
Xin Zhang,
Sergey V. Buldyrev,
Paul A. Trunfio,
Lidia A. Braunstein,
Shlomo Havlin
Abstract:
Cascading failure is a potentially devastating process that spreads on real-world complex networks and can impact the integrity of wide-ranging infrastructures, natural systems, and societal cohesiveness. One of the essential features that create complex network vulnerability to failure propagation is the dependency among their components, exposing entire systems to significant risks from destabil…
▽ More
Cascading failure is a potentially devastating process that spreads on real-world complex networks and can impact the integrity of wide-ranging infrastructures, natural systems, and societal cohesiveness. One of the essential features that create complex network vulnerability to failure propagation is the dependency among their components, exposing entire systems to significant risks from destabilizing hazards such as human attacks, natural disasters or internal breakdowns. Developing realistic models for cascading failures as well as strategies to halt and mitigate the failure propagation can point to new approaches to restoring and strengthening real-world networks. In this review, we summarize recent progress on models developed based on physics and complex network science to understand the mechanisms, dynamics and overall impact of cascading failures. We present models for cascading failures in single networks and interdependent networks and explain how different dynamic propagation mechanisms can lead to an abrupt collapse and a rich dynamic behavior. Finally, we close the review with novel emerging strategies for containing cascades of failures and discuss open questions that remain to be addressed.
△ Less
Submitted 21 July, 2020;
originally announced July 2020.
-
Detecting and tracking bacteria with quantum light
Authors:
Gaetana Spedalieri,
Lolita Piersimoni,
Omar Laurino,
Samuel L. Braunstein,
Stefano Pirandola
Abstract:
The field of quantum sensing aims at improving the detection and estimation of classical parameters that are encoded in physical systems by resorting to quantum sources of light and quantum detection strategies. The same approach can be used to improve the current classical measurements that are performed on biological systems. Here we consider the scenario of two bacteria (E. coli and Salmonella)…
▽ More
The field of quantum sensing aims at improving the detection and estimation of classical parameters that are encoded in physical systems by resorting to quantum sources of light and quantum detection strategies. The same approach can be used to improve the current classical measurements that are performed on biological systems. Here we consider the scenario of two bacteria (E. coli and Salmonella) growing in a Luria Bertani broth and monitored by classical spectrophotometers. Their concentration can be related to the optical transmissivity via the Beer-Lambert-Bouguer's law and their growth curves can be described by means of Gompertz functions. Starting from experimental data points, we extrapolate the growth curves of the two bacteria and we study the theoretical performance that would be achieved with a quantum setup. In particular, we discuss how the bacterial growth can, in principle, be tracked by irradiating the samples with orders of magnitude fewer photons, identifying the clear superiority of quantum light in the early stages of growth. We then show the superiority and the limits of quantum resources in two basic tasks: (i) the early detection of bacterial growth and (ii) the early discrimination between two bacteria species.
△ Less
Submitted 24 October, 2020; v1 submitted 23 June, 2020;
originally announced June 2020.
-
Role of bridge nodes in epidemic spreading: Different regimes and crossovers
Authors:
Jing Ma,
Lucas D. Valdez,
Lidia A. Braunstein
Abstract:
Power-law behaviors are common in many disciplines, especially in network science. Real-world networks, like disease spreading among people, are more likely to be interconnected communities, and show richer power-law behaviors than isolated networks. In this paper, we look at the system of two communities which are connected by bridge links between a fraction $r$ of bridge nodes, and study the eff…
▽ More
Power-law behaviors are common in many disciplines, especially in network science. Real-world networks, like disease spreading among people, are more likely to be interconnected communities, and show richer power-law behaviors than isolated networks. In this paper, we look at the system of two communities which are connected by bridge links between a fraction $r$ of bridge nodes, and study the effect of bridge nodes to the final state of the Susceptible-Infected-Recovered model, by mapping it to link percolation. By keeping a fixed average connectivity, but allowing different transmissibilities along internal and bridge links, we theoretically derive different power-law asymptotic behaviors of the total fraction of the recovered $R$ in the final state as $r$ goes to zero, for different combinations of internal and bridge link transmissibilities. We also find crossover points where $R$ follows different power-law behaviors with $r$ on both sides when the internal transmissibility is below but close to its critical value, for different bridge link transmissibilities. All of these power-law behaviors can be explained through different mechanisms of how finite clusters in each community are connected into the giant component of the whole system, and enable us to pick effective epidemic strategies and to better predict their impacts.
△ Less
Submitted 28 September, 2020; v1 submitted 28 May, 2020;
originally announced May 2020.
-
Disease spreading with social distancing: A prevention strategy in disordered multiplex networks
Authors:
I. A. Perez,
M. A. Di Muro,
C. E. La Rocca,
L. A. Braunstein
Abstract:
The frequent emergence of diseases with the potential to become threats at local and global scales, such as influenza A(H1N1), SARS, MERS, and recently COVID-19 disease, makes it crucial to keep designing models of disease propagation and strategies to prevent or mitigate their effects in populations. Since isolated systems are exceptionally rare to find in any context, especially in human contact…
▽ More
The frequent emergence of diseases with the potential to become threats at local and global scales, such as influenza A(H1N1), SARS, MERS, and recently COVID-19 disease, makes it crucial to keep designing models of disease propagation and strategies to prevent or mitigate their effects in populations. Since isolated systems are exceptionally rare to find in any context, especially in human contact networks, here we examine the susceptible-infected-recovered model of disease spreading in a multiplex network formed by two distinct networks or layers, interconnected through a fraction $q$ of shared individuals (overlap). We model the interactions through weighted networks, because person-to-person interactions are diverse (or disordered); weights represent the contact times of the interactions. Using branching theory supported by simulations, we analyze a social distancing strategy that reduces the average contact time in both layers, where the intensity of the distancing is related to the topology of the layers. We find that the critical values of the distancing intensities, above which an epidemic can be prevented, increase with the overlap $q$. Also we study the effect of the social distancing on the mutual giant component of susceptible individuals, which is crucial to keep the functionality of the system. In addition, we find that for relatively small values of the overlap $q$, social distancing policies might not be needed at all to maintain the functionality of the system.
△ Less
Submitted 26 August, 2020; v1 submitted 22 April, 2020;
originally announced April 2020.
-
Environment-assisted bosonic quantum communications
Authors:
Stefano Pirandola,
Carlo Ottaviani,
Christian S. Jacobsen,
Gaetana Spedalieri,
Samuel L. Braunstein,
Tobias Gehring,
Ulrik L. Andersen
Abstract:
We consider a quantum relay which is used by two parties to perform several continuous-variable protocols of quantum communication, from entanglement distribution (swapping and distillation), to quantum teleportation, and quantum key distribution. The theory of these protocols is suitably extended to a non-Markovian model of decoherence characterized by correlated Gaussian noise in the bosonic env…
▽ More
We consider a quantum relay which is used by two parties to perform several continuous-variable protocols of quantum communication, from entanglement distribution (swapping and distillation), to quantum teleportation, and quantum key distribution. The theory of these protocols is suitably extended to a non-Markovian model of decoherence characterized by correlated Gaussian noise in the bosonic environment. In the worst case scenario where bipartite entanglement is completely lost at the relay, we show that the various protocols can be reactivated by the assistance of classical (separable) correlations in the environment. In fact, above a critical amount, these correlations are able to guarantee the distribution of a weaker form of entanglement (quadripartite), which can be localized by the relay into a stronger form (bipartite) that is exploitable by the parties. Our findings are confirmed by a proof-of-principle experiment where we show, for the first time, that memory effects in the environment can drastically enhance the performance of a quantum relay, well beyond the single-repeater bound for quantum and private communications.
△ Less
Submitted 20 March, 2020;
originally announced March 2020.
-
Reversible bootstrap percolation: Fake news and fact checking
Authors:
M. A. Di Muro,
S. V. Buldyrev,
L. A. Braunstein
Abstract:
Bootstrap percolation has been used to describe opinion formation in society and other social and natural phenomena. The formal equation of the bootstrap percolation may have more than one solution, corresponding to several stable fixed points of the corresponding iteration process. We construct a reversible bootstrap percolation process, which converges to these extra solutions displaying a hyste…
▽ More
Bootstrap percolation has been used to describe opinion formation in society and other social and natural phenomena. The formal equation of the bootstrap percolation may have more than one solution, corresponding to several stable fixed points of the corresponding iteration process. We construct a reversible bootstrap percolation process, which converges to these extra solutions displaying a hysteresis typical of discontinuous phase transitions. This process provides a reasonable model for fake news spreading and the effectiveness of fact checking. We show that sometimes it is not sufficient to discard all the sources of fake news in order to reverse the belief of a population that formed under the influence of these sources.
△ Less
Submitted 6 May, 2020; v1 submitted 21 October, 2019;
originally announced October 2019.
-
Epidemic spreading on modular networks: The fear to declare a pandemic
Authors:
L. D. Valdez,
L. A. Braunstein,
S. Havlin
Abstract:
In the past few decades, the frequency of pandemics has been increased due to the growth of urbanization and mobility among countries. Since a disease spreading in one country could become a pandemic with a potential worldwide humanitarian and economic impact, it is important to develop models to estimate the probability of a worldwide pandemic. In this paper, we propose a model of disease spreadi…
▽ More
In the past few decades, the frequency of pandemics has been increased due to the growth of urbanization and mobility among countries. Since a disease spreading in one country could become a pandemic with a potential worldwide humanitarian and economic impact, it is important to develop models to estimate the probability of a worldwide pandemic. In this paper, we propose a model of disease spreading in a structural modular complex network (having communities) and study how the number of bridge nodes $n$ that connect communities affects disease spread. We find that our model can be described at a global scale as an infectious transmission process between communities with global infectious and recovery time distributions that depend on the internal structure of each community and $n$. We find that near the critical point as $n$ increases, the disease reaches most of the communities, but each community has only a small fraction of recovered nodes. In addition, we obtain that in the limit $n \to \infty$, the probability of a pandemic increases abruptly at the critical point. This scenario could make the decision on whether to launch a pandemic alert or not more difficult. Finally, we show that link percolation theory can be used at a global scale to estimate the probability of a pandemic since the global transmissibility between communities has a weak dependence on the global recovery time.
△ Less
Submitted 23 March, 2020; v1 submitted 20 September, 2019;
originally announced September 2019.
-
Controlling distant contacts to reduce disease spreading on disordered complex networks
Authors:
Ignacio A. Perez,
Paul A. Trunfio,
Cristian E. La Rocca,
Lidia A. Braunstein
Abstract:
In real social networks, person-to-person interactions are known to be heterogeneous, which can affect the way a disease spreads through a population, reaches a tipping point in the fraction of infected individuals, and becomes an epidemic. This property, called disorder, is usually associated with contact times between individuals and can be modeled by a weighted network, where the weights are re…
▽ More
In real social networks, person-to-person interactions are known to be heterogeneous, which can affect the way a disease spreads through a population, reaches a tipping point in the fraction of infected individuals, and becomes an epidemic. This property, called disorder, is usually associated with contact times between individuals and can be modeled by a weighted network, where the weights are related to normalized contact times $ω$. In this paper, we study the SIR model for disease spreading when both close and distant types of interactions are present. We develop a mitigation strategy that reduces only the time duration of distant contacts, which are easier to alter in practice. Using branching theory, supported by simulations, we found that the effectiveness of the strategy increases when the density $f_1$ of close contacts decreases. Moreover, we found a threshold $\tilde{f}_1 = T_c / β$ below which the strategy can bring the system from an epidemic to a non-epidemic phase, even when close contacts have the longest time durations.
△ Less
Submitted 11 May, 2020; v1 submitted 16 August, 2019;
originally announced August 2019.
-
On the growth of non-motile bacteria colonies: an agent-based model for pattern formation
Authors:
Lautaro Vassallo,
David Hansmann,
Lidia A. Braunstein
Abstract:
In the growth of bacterial colonies, a great variety of complex patterns are observed in experiments, depending on external conditions and the bacterial species. Typically, existing models employ systems of reaction-diffusion equations or consist of growth processes based on rules, and are limited to a discrete lattice. In contrast, the two-dimensional model proposed here is an off-lattice simulat…
▽ More
In the growth of bacterial colonies, a great variety of complex patterns are observed in experiments, depending on external conditions and the bacterial species. Typically, existing models employ systems of reaction-diffusion equations or consist of growth processes based on rules, and are limited to a discrete lattice. In contrast, the two-dimensional model proposed here is an off-lattice simulation, where bacteria are modelled as rigid circles and nutrients are point-like, Brownian particles. Varying the nutrient diffusion and concentration, we simulate a wide range of morphologies compatible with experimental observations, from round and compact to extremely branched patterns. A scaling relationship is found between the number of cells in the interface and the total number of cells, with two characteristic regimes. These regimes correspond to the compact and branched patterns, which are exhibited for sufficiently small and large colonies, respectively. In addition, we characterise the screening effect observed in the structures by analysing the multifractal properties of the growth probability.
△ Less
Submitted 11 November, 2019; v1 submitted 10 May, 2019;
originally announced May 2019.
-
Containing misinformation spreading in temporal social networks
Authors:
Wei Wang,
Yuanhui Ma,
Tao Wu,
Yang Dai,
Xingshu Chen,
Lidia A. Braunstein
Abstract:
Many researchers from a variety of fields including computer science, network science and mathematics have focused on how to contain the outbreaks of Internet misinformation that threaten social systems and undermine societal health. Most research on this topic treats the connections among individuals as static, but these connections change in time, and thus social networks are also temporal netwo…
▽ More
Many researchers from a variety of fields including computer science, network science and mathematics have focused on how to contain the outbreaks of Internet misinformation that threaten social systems and undermine societal health. Most research on this topic treats the connections among individuals as static, but these connections change in time, and thus social networks are also temporal networks. Currently there is no theoretical approach to the problem of containing misinformation outbreaks in temporal networks. We thus propose a misinformation spreading model for temporal networks and describe it using a new theoretical approach. We propose a heuristic-containing (HC) strategy based on optimizing final outbreak size that outperforms simplified strategies such as those that are random-containing (RC) and targeted-containing (TC). We verify the effectiveness of our HC strategy on both artificial and real-world networks by performing extensive numerical simulations and theoretical analyses. We find that the HC strategy greatly increases the outbreak threshold and decreases the final outbreak threshold.
△ Less
Submitted 24 April, 2019;
originally announced April 2019.
-
Insights into bootstrap percolation: Its equivalence with k-core percolation and the giant component
Authors:
M. A. Di Muro,
L. D. Valdez,
S. V. Buldyrev,
H. E. Stanley,
L. A. Braunstein
Abstract:
K-core and bootstrap percolation are widely studied models that have been used to represent and understand diverse deactivation and activation processes in natural and social systems. Since these models are considerably similar, it has been suggested in recent years that they could be complementary. In this manuscript we provide a rigorous analysis that shows that for any degree and threshold dist…
▽ More
K-core and bootstrap percolation are widely studied models that have been used to represent and understand diverse deactivation and activation processes in natural and social systems. Since these models are considerably similar, it has been suggested in recent years that they could be complementary. In this manuscript we provide a rigorous analysis that shows that for any degree and threshold distributions heterogeneous bootstrap percolation can be mapped into heterogeneous k-core percolation and vice versa, if the functionality thresholds in both processes satisfy a complementary relation. Another interesting problem in bootstrap and k-core percolation is the fraction of nodes belonging to their giant connected components $P_{\infty b}$ and $P_{\infty c}$, respectively. We solve this problem analytically for arbitrary randomly connected graphs and arbitrary threshold distributions, and we show that $P_{\infty b}$ and $P_{\infty c}$ are not complementary. Our theoretical results coincide with computer simulations in the limit of very large graphs. In bootstrap percolation, we show that when using the branching theory to compute the size of the giant component, we must consider two different types of links, which are related to distinct spanning branches of active nodes.
△ Less
Submitted 24 February, 2019; v1 submitted 9 November, 2018;
originally announced November 2018.
-
Symmetric and asymmetric discrimination of bosonic loss: Toy applications to biological samples and photo-degradable materials
Authors:
Gaetana Spedalieri,
Stefano Pirandola,
Samuel L. Braunstein
Abstract:
We consider quantum discrimination of bosonic loss based on both symmetric and asymmetric hypothesis testing. In both approaches, an entangled resource is able to outperform any classical strategy based on coherent-state transmitters in the regime of low photon numbers. In the symmetric case, we then consider the low energy detection of bacterial growth in culture media. Assuming an exponential gr…
▽ More
We consider quantum discrimination of bosonic loss based on both symmetric and asymmetric hypothesis testing. In both approaches, an entangled resource is able to outperform any classical strategy based on coherent-state transmitters in the regime of low photon numbers. In the symmetric case, we then consider the low energy detection of bacterial growth in culture media. Assuming an exponential growth law for the bacterial concentration and the Beer-Lambert law for the optical transmissivity of the sample, we find that the use of entanglement allows one to achieve a much faster detection of growth with respect to the use of coherent states. This performance is also studied by assuming an exponential photo-degradable model, where the concentration is reduced by increasing the number of photons irradiated over the sample. This investigation is then extended to the readout of classical information from suitably-designed photo-degradable optical memories.
△ Less
Submitted 25 November, 2018; v1 submitted 25 May, 2018;
originally announced May 2018.
-
Multiple outbreaks in epidemic spreading with local vaccination and limited vaccines
Authors:
M. A. Di Muro,
L. G. Alvarez-Zuzek,
S. Havlin,
L. A. Braunstein
Abstract:
How to prevent the spread of human diseases is a great challenge for the scientific community and so far there are many studies in which immunization strategies have been developed. However, these kind of strategies usually do not consider that medical institutes may have limited vaccine resources available. In this manuscript, we explore the Susceptible-Infected-Recovered (SIR) model with local d…
▽ More
How to prevent the spread of human diseases is a great challenge for the scientific community and so far there are many studies in which immunization strategies have been developed. However, these kind of strategies usually do not consider that medical institutes may have limited vaccine resources available. In this manuscript, we explore the Susceptible-Infected-Recovered (SIR) model with local dynamic vaccination, and considering limited vaccines. In this model, susceptibles in contact with an infected individual, are vaccinated -with probability $ω$- and then get infected -with probability $β$. However, when the fraction of immunized individuals reaches a threshold $V_L$, the vaccination stops, after which only the infection is possible. In the steady state, besides the critical points $β_c$ and $ω_c$ that separate a non-epidemic from an epidemic phase, we find for a range of $V_L$ another transition points, $β^*>β_c$ and $ω^*<ω_c$, which correspond to a novel discontinuous phase transition. This critical value separates a phase where the amount of vaccines is sufficient, from a phase where the disease is strong enough to exhaust all the vaccination units. For a disease with fixed $β$, the vaccination probability $ω$ can be controlled in order to drastically reduce the number of infected individuals, using efficiently the available vaccines.
Furthermore, the temporal evolution of the system close to $β^*$ or $ω^*$, shows that after a peak of infection the system enters into a quasi-stationary state, with only a few infected cases. But if there are no more vaccines, these few infected individuals could originate a second outbreak, represented by a second peak of infection. This state of apparent calm, could be dangerous since it may lead to misleading conclusions and to an abandon of the strategies to control the disease.
△ Less
Submitted 21 August, 2018; v1 submitted 3 May, 2018;
originally announced May 2018.
-
Optimal community structure for social contagions
Authors:
Zhen Su,
Wei Wang,
Lixiang Li,
H. Eugene Stanley,
Lidia A. Braunstein
Abstract:
Community structure is an important factor in the behavior of real-world networks because it strongly affects the stability and thus the phase transition order of the spreading dynamics. We here propose a reversible social contagion model of community networks that includes the factor of social reinforcement. In our model an individual adopts a social contagion when the number of received units of…
▽ More
Community structure is an important factor in the behavior of real-world networks because it strongly affects the stability and thus the phase transition order of the spreading dynamics. We here propose a reversible social contagion model of community networks that includes the factor of social reinforcement. In our model an individual adopts a social contagion when the number of received units of information exceeds its adoption threshold. We use mean-field approximation to describe our proposed model, and the results agree with numerical simulations. The numerical simulations and theoretical analyses both indicate that there is a first-order phase transition in the spreading dynamics, and that a hysteresis loop emerges in the system when there is a variety of initially-adopted seeds. We find an optimal community structure that maximizes spreading dynamics. We also find a rich phase diagram with a triple point that separates the no-diffusion phase from the two diffusion phases.
△ Less
Submitted 1 May, 2018;
originally announced May 2018.
-
Dynamic vaccination in partially overlapped multiplex network
Authors:
L. G. Alvarez-Zuzek,
M. A. Di Muro,
S. Havlin,
L. A. Braunstein
Abstract:
In this work we propose and investigate a new strategy of vaccination, which we call "dynamic vaccination". In our model, susceptible people become aware that one or more of their contacts are infected, and thereby get vaccinated with probability $ω$, before having physical contact with any infected patient. Then, the non-vaccinated individuals will be infected with probability $β$. We apply the s…
▽ More
In this work we propose and investigate a new strategy of vaccination, which we call "dynamic vaccination". In our model, susceptible people become aware that one or more of their contacts are infected, and thereby get vaccinated with probability $ω$, before having physical contact with any infected patient. Then, the non-vaccinated individuals will be infected with probability $β$. We apply the strategy to the SIR epidemic model in a multiplex network composed by two networks, where a fraction $q$ of the nodes acts in both networks. We map this model of dynamic vaccination into bond percolation model, and use the generating functions framework to predict theoretically the behavior of the relevant magnitudes of the system at the steady state. We find a perfect agreement between the solutions of the theoretical equations and the results of stochastic simulations. In addition, we find an interesting phase diagram in the plane $β-ω$, which is composed by an epidemic and a non-epidemic phases, separated by a critical threshold line $β_c$, which depends on $q$. Wefind that, for all values of $q$, a region in the diagram where the vaccination is so efficient that, regardless of the virulence of the disease, it never becomes an epidemic. We compare our strategy with random immunization and find that using the same amount of vaccines for both scenarios, we obtain that the spread of the disease is much lower in the case of dynamic vaccination when compared to random immunization. Furthermore, we also compare our strategy with targeted immunization and we find that, depending on $ω$, dynamic vaccination will perform significantly better, and in some cases will stop the disease before it becomes an epidemic.
△ Less
Submitted 8 January, 2019; v1 submitted 27 April, 2018;
originally announced April 2018.
-
Strategy for stopping failure cascades in interdependent networks
Authors:
Cristian E. La Rocca,
H. Eugene Stanley,
Lidia A. Braunstein
Abstract:
Interdependencies are ubiquitous throughout the world. Every real-world system interacts with and is dependent on other systems, and this interdependency affects their performance. In particular, interdependencies among networks make them vulnerable to failure cascades, the effects of which are often catastrophic. Failure propagation fragments network components, disconnects them, and may cause co…
▽ More
Interdependencies are ubiquitous throughout the world. Every real-world system interacts with and is dependent on other systems, and this interdependency affects their performance. In particular, interdependencies among networks make them vulnerable to failure cascades, the effects of which are often catastrophic. Failure propagation fragments network components, disconnects them, and may cause complete systemic failure. We propose a strategy of avoiding or at least mitigating the complete destruction of a system of interdependent networks experiencing a failure cascade. Starting with a fraction $1-p$ of failing nodes in one network, we reconnect with a probability $γ$ every isolated component to a functional giant component (GC), the largest connected cluster. We find that as $γ$ increases the resilience of the system to cascading failure also increases. We also find that our strategy is more effective when it is applied in a network of low average degree. We solve the problem theoretically using percolation theory, and we find that the solution agrees with simulation results.
△ Less
Submitted 6 July, 2018; v1 submitted 4 April, 2018;
originally announced April 2018.
-
Optimal resource diffusion for suppressing disease spreading in multiplex networks
Authors:
Xiaolong Chen,
Wei Wang,
Shimin Cai,
H. Eugene Stanley,
Lidia A. Braunstein
Abstract:
Resource diffusion is an ubiquitous phenomenon, but how it impacts epidemic spreading has received little study. We propose a model that couples epidemic spreading and resource diffusion in multiplex networks. The spread of disease in a physical contact layer and the recovery of the infected nodes are both strongly dependent upon resources supplied by their counterparts in the social layer. The ge…
▽ More
Resource diffusion is an ubiquitous phenomenon, but how it impacts epidemic spreading has received little study. We propose a model that couples epidemic spreading and resource diffusion in multiplex networks. The spread of disease in a physical contact layer and the recovery of the infected nodes are both strongly dependent upon resources supplied by their counterparts in the social layer. The generation and diffusion of resources in the social layer are in turn strongly dependent upon the state of the nodes in the physical contact layer. Resources diffuse preferentially or randomly in this model. To quantify the degree of preferential diffusion, a bias parameter that controls the resource diffusion is proposed. We conduct extensive simulations and find that the preferential resource diffusion can change phase transition type of the fraction of infected nodes. When the degree of interlayer correlation is below a critical value, increasing the bias parameter changes the phase transition from double continuous to single continuous. When the degree of interlayer correlation is above a critical value, the phase transition changes from multiple continuous to first discontinuous and then to hybrid. We find hysteresis loops in the phase transition. We also find that there is an optimal resource strategy at each fixed degree of interlayer correlation where the threshold reaches a maximum and under which the disease can be maximally suppressed. In addition, the optimal controlling parameter increases as the degree of inter-layer correlation increases.
△ Less
Submitted 10 January, 2018;
originally announced January 2018.
-
Channel Simulation in Quantum Metrology
Authors:
Riccardo Laurenza,
Cosmo Lupo,
Gaetana Spedalieri,
Samuel L. Braunstein,
Stefano Pirandola
Abstract:
In this review we discuss how channel simulation can be used to simplify the most general protocols of quantum parameter estimation, where unlimited entanglement and adaptive joint operations may be employed. Whenever the unknown parameter encoded in a quantum channel is completely transferred in an environmental program state simulating the channel, the optimal adaptive estimation cannot beat the…
▽ More
In this review we discuss how channel simulation can be used to simplify the most general protocols of quantum parameter estimation, where unlimited entanglement and adaptive joint operations may be employed. Whenever the unknown parameter encoded in a quantum channel is completely transferred in an environmental program state simulating the channel, the optimal adaptive estimation cannot beat the standard quantum limit. In this setting, we elucidate the crucial role of quantum teleportation as a primitive operation which allows one to completely reduce adaptive protocols over suitable teleportation-covariant channels and derive matching upper and lower bounds for parameter estimation. For these channels, we may express the quantum Cramér Rao bound directly in terms of their Choi matrices. Our review considers both discrete- and continuous-variable systems, also presenting some new results for bosonic Gaussian channels using an alternative sub-optimal simulation. It is an open problem to design simulations for quantum channels that achieve the Heisenberg limit.
△ Less
Submitted 17 April, 2018; v1 submitted 18 December, 2017;
originally announced December 2017.
-
Teleportation simulation of bosonic Gaussian channels: Strong and uniform convergence
Authors:
Stefano Pirandola,
Riccardo Laurenza,
Samuel L. Braunstein
Abstract:
We consider the Braunstein-Kimble protocol for continuous variable teleportation and its application for the simulation of bosonic channels. We discuss the convergence properties of this protocol under various topologies (strong, uniform, and bounded-uniform) clarifying some typical misinterpretations in the literature. We then show that the teleportation simulation of an arbitrary single-mode Gau…
▽ More
We consider the Braunstein-Kimble protocol for continuous variable teleportation and its application for the simulation of bosonic channels. We discuss the convergence properties of this protocol under various topologies (strong, uniform, and bounded-uniform) clarifying some typical misinterpretations in the literature. We then show that the teleportation simulation of an arbitrary single-mode Gaussian channel is uniformly convergent to the channel if and only if its noise matrix has full rank. The various forms of convergence are then discussed within adaptive protocols, where the simulation error must be propagated to the output of the protocol by means of a "peeling" argument, following techniques from PLOB [arXiv:1510.08863]. Finally, as an application of the peeling argument and the various topologies of convergence, we provide complete rigorous proofs for recently-claimed strong converse bounds for private communication over Gaussian channels.
△ Less
Submitted 1 August, 2018; v1 submitted 5 December, 2017;
originally announced December 2017.
-
Theory of channel simulation and bounds for private communication
Authors:
Stefano Pirandola,
Samuel L. Braunstein,
Riccardo Laurenza,
Carlo Ottaviani,
Thomas P. W. Cope,
Gaetana Spedalieri,
Leonardo Banchi
Abstract:
We review recent results on the simulation of quantum channels, the reduction of adaptive protocols (teleportation stretching), and the derivation of converse bounds for quantum and private communication, as established in PLOB [Pirandola, Laurenza, Ottaviani, Banchi, arXiv:1510.08863]. We start by introducing a general weak converse bound for private communication based on the relative entropy of…
▽ More
We review recent results on the simulation of quantum channels, the reduction of adaptive protocols (teleportation stretching), and the derivation of converse bounds for quantum and private communication, as established in PLOB [Pirandola, Laurenza, Ottaviani, Banchi, arXiv:1510.08863]. We start by introducing a general weak converse bound for private communication based on the relative entropy of entanglement. We discuss how combining this bound with channel simulation and teleportation stretching, PLOB established the two-way quantum and private capacities of several fundamental channels, including the bosonic lossy channel. We then provide a rigorous proof of the strong converse property of these bounds by adopting a correct use of the Braunstein-Kimble teleportation protocol for the simulation of bosonic Gaussian channels. This analysis provides a full justification of claims presented in the follow-up paper WTB [Wilde, Tomamichel, Berta, arXiv:1602.08898] whose upper bounds for Gaussian channels would be otherwise infinitely large. Besides clarifying contributions in the area of channel simulation and protocol reduction, we also present some generalizations of the tools to other entanglement measures and novel results on the maximum excess noise which is tolerable in quantum key distribution.
△ Less
Submitted 19 June, 2018; v1 submitted 27 November, 2017;
originally announced November 2017.
-
Suppressing epidemic spreading in multiplex networks with social-support
Authors:
Xiaolong Chen,
Ruijie Wang,
Ming Tang,
Shimin Cai,
H. Eugene Stanley,
Lidia A. Braunstein
Abstract:
Although suppressing the spread of a disease is usually achieved by investing in public resources, in the real world only a small percentage of the population have access to government assistance when there is an outbreak, and most must rely on resources from family or friends. We study the dynamics of disease spreading in social-contact multiplex networks when the recovery of infected nodes depen…
▽ More
Although suppressing the spread of a disease is usually achieved by investing in public resources, in the real world only a small percentage of the population have access to government assistance when there is an outbreak, and most must rely on resources from family or friends. We study the dynamics of disease spreading in social-contact multiplex networks when the recovery of infected nodes depends on resources from healthy neighbors in the social layer. We investigate how degree heterogeneity affects the spreading dynamics. Using theoretical analysis and simulations we find that degree heterogeneity promotes disease spreading. The phase transition of the infected density is hybrid and increases smoothly from zero to a finite small value at the first invasion threshold and then suddenly jumps at the second invasion threshold. We also find a hysteresis loop in the transition of the infected density. We further investigate how an overlap in the edges between two layers affects the spreading dynamics. We find that when the amount of overlap is smaller than a critical value the phase transition is hybrid and there is a hysteresis loop, otherwise the phase transition is continuous and the hysteresis loop vanishes. In addition, the edge overlap allows an epidemic outbreak when the transmission rate is below the first invasion threshold, but suppresses any explosive transition when the transmission rate is above the first invasion threshold.
△ Less
Submitted 8 August, 2017;
originally announced August 2017.
-
Social contagions with communication channels alternation on multiplex networks
Authors:
Wei Wang,
Ming Tang,
H. Eugene Stanley,
Lidia A. Braunstein
Abstract:
Internet communication channels, e.g., Facebook, Twitter, and email, are multiplex networks that facilitate interaction and information-sharing among individuals. During brief time periods users often use a single communication channel, but then communication channel alteration (CCA) occurs. This means that we must refine our understanding of the dynamics of social contagions. We propose a non-Mar…
▽ More
Internet communication channels, e.g., Facebook, Twitter, and email, are multiplex networks that facilitate interaction and information-sharing among individuals. During brief time periods users often use a single communication channel, but then communication channel alteration (CCA) occurs. This means that we must refine our understanding of the dynamics of social contagions. We propose a non-Markovian behavior spreading model in multiplex networks that takes into account the CCA mechanism, and we develop a generalized edge-based compartmental method to describe the spreading dynamics. Through extensive numerical simulations and theoretical analyses we find that the time delays induced by CCA slow the behavior spreading but do not affect the final adoption size. We also find that the CCA suppresses behavior spreading. On two coupled random regular networks, the adoption size exhibits hybrid growth, i.e., it grows first continuously and then discontinuously with the information transmission probability. CCA in ER-SF multiplex networks in which two subnetworks are Erdős-Rényi (ER) and scale-free (SF) introduces a crossover from continuous to hybrid growth in adoption size versus information transmission probability. Our results extend our understanding of the role of CCA in spreading dynamics, and may elicit further research.
△ Less
Submitted 19 December, 2018; v1 submitted 5 August, 2017;
originally announced August 2017.
-
Cascading Failures in Interdependent Networks with Multiple Supply-Demand Links and Functionality Thresholds
Authors:
M. A. Di Muro,
L. D. Valdez,
H. H. A. Rêgo,
S. V. Buldyrev,
H. E. Stanley,
L. A. Braunstein
Abstract:
Various social, financial, biological and technological systems can be modeled by interdependent networks. It has been assumed that in order to remain functional, nodes in one network must receive the support from nodes belonging to different networks. So far these models have been limited to the case in which the failure propagates across networks only if the nodes lose all their supply nodes. In…
▽ More
Various social, financial, biological and technological systems can be modeled by interdependent networks. It has been assumed that in order to remain functional, nodes in one network must receive the support from nodes belonging to different networks. So far these models have been limited to the case in which the failure propagates across networks only if the nodes lose all their supply nodes. In this paper we develop a more realistic model for two interdependent networks in which each node has its own supply threshold, i.e., they need the support of a minimum number of supply nodes to remain functional. In addition, we analyze different conditions of internal node failure due to disconnection from nodes within its own network. We show that several local internal failure conditions lead to similar nontrivial results. When there are no internal failures the model is equivalent to a bipartite system, which can be useful to model a financial market. We explore the rich behaviors of these models that include discontinuous and continuous phase transitions. Using the generating functions formalism, we analytically solve all the models in the limit of infinitely large networks and find an excellent agreement with the stochastic simulations.
△ Less
Submitted 30 November, 2017; v1 submitted 1 August, 2017;
originally announced August 2017.
-
Epidemic spreading in multiplex networks influenced by opinion exchanges on vaccination
Authors:
L. G. Alvarez-Zuzek,
Cristian E. La Rocca,
J. R. Iglesias,
L. A. Braunstein
Abstract:
We study the changes of opinions about vaccination together with the evolution of a disease. In our model we consider a multiplex network consisting of two layers. One of the layers corresponds to a social network where people share their opinions and influence others opinions. The social model that rules the dynamic is the M-model, which takes into account two different processes that occurs in a…
▽ More
We study the changes of opinions about vaccination together with the evolution of a disease. In our model we consider a multiplex network consisting of two layers. One of the layers corresponds to a social network where people share their opinions and influence others opinions. The social model that rules the dynamic is the M-model, which takes into account two different processes that occurs in a society: persuasion and compromise. This two processes are related through a parameter $r$, $r<1$ describes a moderate and committed society, for $r>1$ the society tends to have extremist opinions, while $r=1$ represents a neutral society. This social network may be of real or virtual contacts. On the other hand, the second layer corresponds to a network of physical contacts where the disease spreading is described by the SIR-Model. In this model the individuals may be in one of the following four states: Susceptible ($S$), Infected($I$), Recovered ($R$) or Vaccinated ($V$). A Susceptible individual can: i) get vaccinated, if his opinion in the other layer is totally in favor of the vaccine, ii) get infected, with probability $β$ if he is in contact with an infected neighbor. Those $I$ individuals recover after a certain period $t_r=6$. Vaccinated individuals have an extremist positive opinion that does not change. We consider that the vaccine has a certain effectiveness $ω$ and as a consequence vaccinated nodes can be infected with probability $β(1 - ω)$ if they are in contact with an infected neighbor. In this case, if the infection process is successful, the new infected individual changes his opinion from extremist positive to totally against the vaccine. We find that depending on the trend in the opinion of the society, which depends on $r$, different behaviors in the spread of the epidemic occurs. An epidemic threshold was found.
△ Less
Submitted 30 November, 2017; v1 submitted 23 May, 2017;
originally announced May 2017.
-
Promoting information spreading by using contact memory
Authors:
Lei Gao,
Wei Wang,
Panpan Shu,
Hui Gao,
Lidia A. Braunstein
Abstract:
Promoting information spreading is a booming research topic in network science community. However, the exiting studies about promoting information spreading seldom took into account the human memory, which plays an important role in the spreading dynamics. In this paper we propose a non-Markovian information spreading model on complex networks, in which every informed node contacts a neighbor by u…
▽ More
Promoting information spreading is a booming research topic in network science community. However, the exiting studies about promoting information spreading seldom took into account the human memory, which plays an important role in the spreading dynamics. In this paper we propose a non-Markovian information spreading model on complex networks, in which every informed node contacts a neighbor by using the memory of neighbor's accumulated contact numbers in the past. We systematically study the information spreading dynamics on uncorrelated configuration networks and a group of $22$ real-world networks, and find an effective contact strategy of promoting information spreading, i.e., the informed nodes preferentially contact neighbors with small number of accumulated contacts. According to the effective contact strategy, the high degree nodes are more likely to be chosen as the contacted neighbors in the early stage of the spreading, while in the late stage of the dynamics, the nodes with small degrees are preferentially contacted. We also propose a mean-field theory to describe our model, which qualitatively agrees well with the stochastic simulations on both artificial and real-world networks.
△ Less
Submitted 19 March, 2017;
originally announced March 2017.
-
Unification of theoretical approaches for epidemic spreading on complex networks
Authors:
Wei Wang,
Ming Tang,
H. Eugene Stanley,
Lidia A. Braunstein
Abstract:
Models of epidemic spreading on complex networks have attracted great attention among researchers in physics, mathematics, and epidemiology due to their success in predicting and controlling scenarios of epidemic spreading in real-world scenarios. To understand the interplay between epidemic spreading and the topology of a contact network, several outstanding theoretical approaches have been devel…
▽ More
Models of epidemic spreading on complex networks have attracted great attention among researchers in physics, mathematics, and epidemiology due to their success in predicting and controlling scenarios of epidemic spreading in real-world scenarios. To understand the interplay between epidemic spreading and the topology of a contact network, several outstanding theoretical approaches have been developed. An accurate theoretical approach describing the spreading dynamics must take both the network topology and dynamical correlations into consideration at the expense of increasing the complexity of the equations. In this short survey we unify the most widely used theoretical approaches for epidemic spreading on complex networks in terms of increasing complexity, including the mean-field, the heterogeneous mean-field, the quench mean-field, dynamical message-passing, link percolation, and pairwise approximation. We build connections among these approaches to provide new insights into developing an accurate theoretical approach to spreading dynamics on complex networks.
△ Less
Submitted 13 December, 2016;
originally announced December 2016.
-
Failure-recovery model with competition between failures in complex networks: a dynamical approach
Authors:
L. D. Valdez,
M. A. Di Muro,
L. A. Braunstein
Abstract:
Real systems are usually composed by units or nodes whose activity can be interrupted and restored intermittently due to complex interactions not only with the environment, but also with the same system. Majdandžić $et\;al.$ [Nature Physics 10, 34 (2014)] proposed a model to study systems in which active nodes fail and recover spontaneously in a complex network and found that in the steady state t…
▽ More
Real systems are usually composed by units or nodes whose activity can be interrupted and restored intermittently due to complex interactions not only with the environment, but also with the same system. Majdandžić $et\;al.$ [Nature Physics 10, 34 (2014)] proposed a model to study systems in which active nodes fail and recover spontaneously in a complex network and found that in the steady state the density of active nodes can exhibit an abrupt transition and hysteresis depending on the values of the parameters. Here we investigate a model of recovery-failure from a dynamical point of view. Using an effective degree approach we find that the systems can exhibit a temporal sharp decrease in the fraction of active nodes. Moreover we show that, depending on the values of the parameters, the fraction of active nodes has an oscillatory regime which we explain as a competition between different failure processes. We also find that in the non-oscillatory regime, the critical fraction of active nodes presents a discontinuous drop which can be related to a "targeted" k-core percolation process. Finally, using mean field equations we analyze the space of parameters at which hysteresis and oscillatory regimes can be found.
△ Less
Submitted 19 September, 2016; v1 submitted 10 June, 2016;
originally announced June 2016.
-
Fluctuations of a surface relaxation model in interacting scale free networks
Authors:
Marcos F. Torres,
Cristian E. La Rocca,
Lidia A. Braunstein
Abstract:
Isolated complex networks have been studied deeply in the last decades due to the fact that many real systems can be modeled using these types of structures. However, it is well known that the behavior of a system not only depends on itself, but usually also depends on the dynamics of other structures. For this reason, interacting complex networks and the processes developed on them have been the…
▽ More
Isolated complex networks have been studied deeply in the last decades due to the fact that many real systems can be modeled using these types of structures. However, it is well known that the behavior of a system not only depends on itself, but usually also depends on the dynamics of other structures. For this reason, interacting complex networks and the processes developed on them have been the focus of study of many researches in the last years. One of the most studied subjects in this type of structures is the Synchronization problem, which is important in a wide variety of processes in real systems. In this manuscript we study the synchronization of two interacting scale-free networks, in which each node has $ke$ dependency links with different nodes in the other network. We map the synchronization problem with an interface growth, by studying the fluctuations in the steady state of a scalar field defined in both networks.
We find that as $ke$ slightly increases from $ke=0$, there is a really significant decreasing in the fluctuations of the system. However, this considerable improvement takes place mainly for small values of $ke$, when the interaction between networks becomes stronger there is only a slight change in the fluctuations. We characterize how the dispersion of the scalar field depends on the internal degree, and we show that a combination between the decreasing of this dispersion and the integer nature of our growth model are the responsible for the behavior of the fluctuations with $ke$.
△ Less
Submitted 10 August, 2016; v1 submitted 3 June, 2016;
originally announced June 2016.
-
Interacting social processes on interconnected networks
Authors:
L. G. Alvarez-Zuzek,
C. E. La Rocca,
F. Vazquez,
L. A. Braunstein
Abstract:
We propose and study a model for the interplay between two different dynamical processes --one for opinion formation and the other for decision making-- on two interconnected networks $A$ and $B$. The opinion dynamics on network $A$ corresponds to that of the M-model, where the state of each agent can take one of four possible values ($S=-2,-1,1,2$), describing its level of agreement on a given is…
▽ More
We propose and study a model for the interplay between two different dynamical processes --one for opinion formation and the other for decision making-- on two interconnected networks $A$ and $B$. The opinion dynamics on network $A$ corresponds to that of the M-model, where the state of each agent can take one of four possible values ($S=-2,-1,1,2$), describing its level of agreement on a given issue. The likelihood to become an extremist ($S=\pm 2$) or a moderate ($S=\pm 1$) is controlled by a reinforcement parameter $r \ge 0$. The decision making dynamics on network $B$ is akin to that of the Abrams-Strogatz model, where agents can be either in favor ($S=+1$) or against ($S=-1$) the issue. The probability that an agent changes its state is proportional to the fraction of neighbors that hold the opposite state raised to a power $β$. Starting from a polarized case scenario in which all agents of network $A$ hold positive orientations while all agents of network $B$ have a negative orientation, we explore the conditions under which one of the dynamics prevails over the other, imposing its initial orientation. We find that, for a given value of $β$, the two-network system reaches a consensus in the positive state (initial state of network $A$) when the reinforcement overcomes a crossover value $r^*(β)$, while a negative consensus happens for $r<r^*(β)$. In the $r-β$ phase space, the system displays a transition at a critical threshold $β_c$, from a coexistence of both orientations for $β<β_c$ to a dominance of one orientation for $β>β_c$. We develop an analytical mean-field approach that gives an insight into these regimes and shows that both dynamics are equivalent along the crossover line $(r^*,β^*)$.
△ Less
Submitted 2 October, 2016; v1 submitted 25 April, 2016;
originally announced April 2016.
-
Suppressing disease spreading by using information diffusion on multiplex networks
Authors:
Wei Wang,
Quan-Hui Liu,
Shi-Min Cai,
Ming Tang,
Lidia A. Braunstein,
H. Eugene Stanley
Abstract:
Although there is always an interplay between the dynamics of information diffusion and disease spreading, the empirical research on the systemic coevolution mechanisms connecting these two spreading dynamics is still lacking. Here we investigate the coevolution mechanisms and dynamics between information and disease spreading by utilizing real data and a proposed spreading model on multiplex netw…
▽ More
Although there is always an interplay between the dynamics of information diffusion and disease spreading, the empirical research on the systemic coevolution mechanisms connecting these two spreading dynamics is still lacking. Here we investigate the coevolution mechanisms and dynamics between information and disease spreading by utilizing real data and a proposed spreading model on multiplex network. Our empirical analysis finds asymmetrical interactions between the information and disease spreading dynamics. Our results obtained from both the theoretical framework and extensive stochastic numerical simulations suggest that an information outbreak can be triggered in a communication network by its own spreading dynamics or by a disease outbreak on a contact network, but that the disease threshold is not affected by information spreading. Our key finding is that there is an optimal information transmission rate that markedly suppresses the disease spreading. We find that the time evolution of the dynamics in the proposed model qualitatively agrees with the real-world spreading processes at the optimal information transmission rate.
△ Less
Submitted 3 June, 2016; v1 submitted 6 April, 2016;
originally announced April 2016.
-
Cascading failures in interdependent networks with finite functional components
Authors:
M. A. Di Muro,
S. V. Buldyrev,
H. E. Stanley,
L. A. Braunstein
Abstract:
We present a cascading failure model of two interdependent networks in which functional nodes belong to components of size greater than or equal to $s$. We find theoretically and via simulation that in complex networks with random dependency links the transition is first-order for $s\geq 3$ and second-order for $s=2$. We find for two square lattices with a distance constraint $r$ in the dependency…
▽ More
We present a cascading failure model of two interdependent networks in which functional nodes belong to components of size greater than or equal to $s$. We find theoretically and via simulation that in complex networks with random dependency links the transition is first-order for $s\geq 3$ and second-order for $s=2$. We find for two square lattices with a distance constraint $r$ in the dependency links that increasing $r$ moves the system from a regime without a phase transition to one with a second-order transition. As $r$ continues to increase the system collapses in a first-order transition. Each regime is associated with a different structure of domain formation of functional nodes.
△ Less
Submitted 14 October, 2016; v1 submitted 23 March, 2016;
originally announced March 2016.
-
Thermal quantum metrology in memoryless and correlated environments
Authors:
Gaetana Spedalieri,
Cosmo Lupo,
Samuel L. Braunstein,
Stefano Pirandola
Abstract:
In bosonic quantum metrology, the estimate of a loss parameter is typically performed by means of pure states, such as coherent, squeezed or entangled states, while mixed thermal probes are discarded for their inferior performance. Here we show that thermal sources with suitable correlations can be engineered in such a way to approach, or even surpass, the error scaling of coherent states in the p…
▽ More
In bosonic quantum metrology, the estimate of a loss parameter is typically performed by means of pure states, such as coherent, squeezed or entangled states, while mixed thermal probes are discarded for their inferior performance. Here we show that thermal sources with suitable correlations can be engineered in such a way to approach, or even surpass, the error scaling of coherent states in the presence of general Gaussian decoherence. Our findings pave the way for practical quantum metrology with thermal sources in optical instruments (e.g., photometers) or at different wavelengths (e.g., far infrared, microwave or X-ray) where the generation of quantum features, such as coherence, squeezing or entanglement, may be extremely challenging.
△ Less
Submitted 12 June, 2018; v1 submitted 18 February, 2016;
originally announced February 2016.
-
Recovery of Interdependent Networks
Authors:
M. A. Di Muro,
C. E. La Rocca,
H. E. Stanley,
S. Havlin,
L. A. Braunstein
Abstract:
Recent network research has focused on the cascading failures in a system of interdependent networks and the necessary preconditions for system collapse. An important question that has not been addressed is how to repair a failing system before it suffers total breakdown. Here we introduce a recovery strategy of nodes and develop an analytic and numerical framework for studying the concurrent fail…
▽ More
Recent network research has focused on the cascading failures in a system of interdependent networks and the necessary preconditions for system collapse. An important question that has not been addressed is how to repair a failing system before it suffers total breakdown. Here we introduce a recovery strategy of nodes and develop an analytic and numerical framework for studying the concurrent failure and recovery of a system of interdependent networks based on an efficient and practically reasonable strategy. Our strategy consists of repairing a fraction of failed nodes, with probability of recovery $γ$, that are neighbors of the largest connected component of each constituent network. We find that, for a given initial failure of a fraction $1-p$ of nodes, there is a critical probability of recovery above which the cascade is halted and the system fully restores to its initial state and below which the system abruptly collapses. As a consequence we find in the plane $γ-p$ of the phase diagram three distinct phases. A phase in which the system never collapses without being restored, another phase in which the recovery strategy avoids the breakdown, and a phase in which even the repairing process cannot avoid the system collapse.
△ Less
Submitted 25 January, 2016; v1 submitted 8 December, 2015;
originally announced December 2015.
-
Quantum fidelity for arbitrary Gaussian states
Authors:
Leonardo Banchi,
Samuel L. Braunstein,
Stefano Pirandola
Abstract:
We derive a computable analytical formula for the quantum fidelity between two arbitrary multimode Gaussian states which is simply expressed in terms of their first- and second-order statistical moments. We also show how such a formula can be written in terms of symplectic invariants and used to derive closed forms for a variety of basic quantities and tools, such as the Bures metric, the quantum…
▽ More
We derive a computable analytical formula for the quantum fidelity between two arbitrary multimode Gaussian states which is simply expressed in terms of their first- and second-order statistical moments. We also show how such a formula can be written in terms of symplectic invariants and used to derive closed forms for a variety of basic quantities and tools, such as the Bures metric, the quantum Fisher information and various fidelity-based bounds. Our result can be used to extend the study of continuous-variable protocols, such as quantum teleportation and cloning, beyond the current one-mode or two-mode analyses, and paves the way to solve general problems in quantum metrology and quantum hypothesis testing with arbitrary multimode Gaussian resources.
△ Less
Submitted 7 July, 2015;
originally announced July 2015.
-
Epidemic spreading and immunization strategy in multiplex networks
Authors:
Lucila G. Alvarez Zuzek,
Camila Buono,
Lidia A. Braunstein
Abstract:
A more connected world has brought major consequences such as facilitate the spread of diseases all over the world to quickly become epidemics, reason why researchers are concentrated in modeling the propagation of epidemics and outbreaks in Multilayer Networks. In this networks all nodes interact in different layers with different type of links. However, in many scenarios such as in the society,…
▽ More
A more connected world has brought major consequences such as facilitate the spread of diseases all over the world to quickly become epidemics, reason why researchers are concentrated in modeling the propagation of epidemics and outbreaks in Multilayer Networks. In this networks all nodes interact in different layers with different type of links. However, in many scenarios such as in the society, a Multiplex Network framework is not completely suitable since not all individuals participate in all layers. In this paper, we use a partially overlapped Multiplex Network where only a fraction of the individuals are shared by the layers. We develop a mitigation strategy for stopping a disease propagation, considering the Susceptible-Infected-Recover model, in a system consisted by two layers. We consider a random immunization in one of the layers and study the effect of the overlapping fraction in both, the propagation of the disease and the immunization strategy. Using branching theory, we study this scenario theoretically and via simulations and find a lower epidemic threshold than in the case without strategy.
△ Less
Submitted 7 July, 2015;
originally announced July 2015.
-
MDI-QKD: Continuous- versus discrete-variables at metropolitan distances
Authors:
Stefano Pirandola,
Carlo Ottaviani,
Gaetana Spedalieri,
Christian Weedbrook,
Samuel L. Braunstein,
Seth Lloyd,
Tobias Gehring,
Christian S. Jacobsen,
Ulrik L. Andersen
Abstract:
In a comment, Xu, Curty, Qi, Qian, and Lo claimed that discrete-variable (DV) measurement device independent (MDI) quantum key distribution (QKD) would compete with its continuous-variable (CV) counterpart at metropolitan distances. Actually, Xu et al.'s analysis supports exactly the opposite by showing that the experimental rate of our CV protocol (achieved with practical room-temperature devices…
▽ More
In a comment, Xu, Curty, Qi, Qian, and Lo claimed that discrete-variable (DV) measurement device independent (MDI) quantum key distribution (QKD) would compete with its continuous-variable (CV) counterpart at metropolitan distances. Actually, Xu et al.'s analysis supports exactly the opposite by showing that the experimental rate of our CV protocol (achieved with practical room-temperature devices) remains one order of magnitude higher than their purely-numerical and over-optimistic extrapolation for qubits, based on nearly-ideal parameters and cryogenic detectors (unsuitable solutions for a realistic metropolitan network, which is expected to run on cheap room-temperature devices, potentially even mobile). The experimental rate of our protocol (expressed as bits per relay use) is confirmed to be two-three orders of magnitude higher than the rate of any realistic simulation of practical DV-MDI-QKD over short-medium distances. Of course this does not mean that DV-MDI-QKD networks should not be investigated or built, but increasing their rate is a non-trivial practical problem clearly beyond the analysis of Xu et al. Finally, in order to clarify the facts, we also refute a series of incorrect arguments against CV-MDI-QKD and, more generally, CV-QKD, which were made by Xu et al. with the goal of supporting their thesis.
△ Less
Submitted 1 August, 2015; v1 submitted 22 June, 2015;
originally announced June 2015.
-
Continuous-variable quantum cryptography with an untrusted relay: Detailed security analysis of the symmetric configuration
Authors:
Carlo Ottaviani,
Gaetana Spedalieri,
Samuel L. Braunstein,
Stefano Pirandola
Abstract:
We consider the continuous-variable protocol of Pirandola et al. [Nature Photonics 9, 397-402 (2015), see also arXiv.1312.4104] where the secret-key is established by the measurement of an untrusted relay. In this network protocol, two authorized parties are connected to an untrusted relay by insecure quantum links. Secret correlations are generated by a continuous-variable Bell detection performe…
▽ More
We consider the continuous-variable protocol of Pirandola et al. [Nature Photonics 9, 397-402 (2015), see also arXiv.1312.4104] where the secret-key is established by the measurement of an untrusted relay. In this network protocol, two authorized parties are connected to an untrusted relay by insecure quantum links. Secret correlations are generated by a continuous-variable Bell detection performed on incoming coherent states. In the present work we provide a detailed study of the symmetric configuration, where the relay is midway between the parties. We analyze symmetric eavesdropping strategies against the quantum links explicitly showing that, at fixed transmissivity and thermal noise, two-mode coherent attacks are optimal, manifestly outperforming one-mode collective attacks based on independent entangling cloners. Such an advantage is shown both in terms of security threshold and secret-key rate.
△ Less
Submitted 18 June, 2015; v1 submitted 17 June, 2015;
originally announced June 2015.
-
Advances in Quantum Teleportation
Authors:
Stefano Pirandola,
Jens Eisert,
Christian Weedbrook,
Akira Furusawa,
Samuel L. Braunstein
Abstract:
Quantum teleportation is one of the most important protocols in quantum information. By exploiting the physical resource of entanglement, quantum teleportation serves as a key primitive in a variety of quantum information tasks and represents an important building block for quantum technologies, with a pivotal role in the continuing progress of quantum communication, quantum computing and quantum…
▽ More
Quantum teleportation is one of the most important protocols in quantum information. By exploiting the physical resource of entanglement, quantum teleportation serves as a key primitive in a variety of quantum information tasks and represents an important building block for quantum technologies, with a pivotal role in the continuing progress of quantum communication, quantum computing and quantum networks. Here we review the basic theoretical ideas behind quantum teleportation and its variant protocols. We focus on the main experiments, together with the technical advantages and disadvantages associated with the use of the various technologies, from photonic qubits and optical modes to atomic ensembles, trapped atoms, and solid-state systems. Analysing the current state-of-the-art, we finish by discussing open issues, challenges and potential future implementations.
△ Less
Submitted 28 May, 2015;
originally announced May 2015.
-
Non-Markovian Reactivation of Quantum Relays
Authors:
Stefano Pirandola,
Carlo Ottaviani,
Christian S. Jacobsen,
Gaetana Spedalieri,
Samuel L. Braunstein,
Tobias Gehring,
Ulrik L. Andersen
Abstract:
We consider a quantum relay which is used by two parties to perform several continuous-variable protocols: Entanglement swapping, distillation, quantum teleportation, and quantum key distribution. The theory of these protocols is extended to a non-Markovian model of decoherence characterized by correlated Gaussian noise. Even if bipartite entanglement is completely lost at the relay, we show that…
▽ More
We consider a quantum relay which is used by two parties to perform several continuous-variable protocols: Entanglement swapping, distillation, quantum teleportation, and quantum key distribution. The theory of these protocols is extended to a non-Markovian model of decoherence characterized by correlated Gaussian noise. Even if bipartite entanglement is completely lost at the relay, we show that the various protocols can progressively be reactivated by the separable noise-correlations of the environment. In fact, above a critical amount, these correlations are able to restore the distribution of quadripartite entanglement, which can be localized into an exploitable bipartite form by the action of the relay. Our findings are confirmed by a proof-of-principle experiment and show the potential advantages of non-Markovian effects in a quantum network architecture.
△ Less
Submitted 27 May, 2015;
originally announced May 2015.
-
Synchronization in interacting Scale Free Networks
Authors:
M. F. Torres,
M. A. Di Muro,
C. E. La Rocca,
L. A. Braunstein
Abstract:
We study the fluctuations of the interface, in the steady state, of the Surface Relaxation Model (SRM) in two scale free interacting networks where a fraction $q$ of nodes in both networks interact one to one through external connections. We find that as $q$ increases the fluctuations on both networks decrease and thus the synchronization reaches an improvement of nearly $40\%$ when $q=1$. The dec…
▽ More
We study the fluctuations of the interface, in the steady state, of the Surface Relaxation Model (SRM) in two scale free interacting networks where a fraction $q$ of nodes in both networks interact one to one through external connections. We find that as $q$ increases the fluctuations on both networks decrease and thus the synchronization reaches an improvement of nearly $40\%$ when $q=1$. The decrease of the fluctuations on both networks is due mainly to the diffusion through external connections which allows to reducing the load in nodes by sending their excess mostly to low-degree nodes, which we report have the lowest heights. This effect enhances the matching of the heights of low-and high-degree nodes as $q$ increases reducing the fluctuations. This effect is almost independent of the degree distribution of the networks which means that the interconnection governs the behavior of the process over its topology.
△ Less
Submitted 5 April, 2016; v1 submitted 3 May, 2015;
originally announced May 2015.