-
Numerical solution of the wave equation outside a sphere
Authors:
Michael J. Carley
Abstract:
A method is presented for the fast evaluation of the transient acoustic field generated outside a spherical surface by sources inside the surface. The method employs Lebedev quadratures, which are the optimal method for spatial integration, and Lagrange interpolation and differentiation in an advanced time algorithm for the evaluation of the transient field. Numerical testing demonstrates that the…
▽ More
A method is presented for the fast evaluation of the transient acoustic field generated outside a spherical surface by sources inside the surface. The method employs Lebedev quadratures, which are the optimal method for spatial integration, and Lagrange interpolation and differentiation in an advanced time algorithm for the evaluation of the transient field. Numerical testing demonstrates that the approach gives near machine-precision accuracy and a speed-up in evaluation time which depends on the order of quadrature rule employed but breaks even with direct evaluation at a number of field points about 1.15 times the number of surface quadrature nodes.
△ Less
Submitted 5 June, 2025;
originally announced June 2025.
-
Appeal and Scope of Misinformation Spread by AI Agents and Humans
Authors:
Lynnette Hui Xian Ng,
Wenqi Zhou,
Kathleen M. Carley
Abstract:
This work examines the influence of misinformation and the role of AI agents, called bots, on social network platforms. To quantify the impact of misinformation, it proposes two new metrics based on attributes of tweet engagement and user network position: Appeal, which measures the popularity of the tweet, and Scope, which measures the potential reach of the tweet. In addition, it analyzes 5.8 mi…
▽ More
This work examines the influence of misinformation and the role of AI agents, called bots, on social network platforms. To quantify the impact of misinformation, it proposes two new metrics based on attributes of tweet engagement and user network position: Appeal, which measures the popularity of the tweet, and Scope, which measures the potential reach of the tweet. In addition, it analyzes 5.8 million misinformation tweets on the COVID-19 vaccine discourse over three time periods: Pre-Vaccine, Vaccine Launch, and Post-Vaccine. Results show that misinformation was more prevalent during the first two periods. Human-generated misinformation tweets tend to have higher appeal and scope compared to bot-generated ones. Tweedie regression analysis reveals that human-generated misinformation tweets were most concerning during Vaccine Launch week, whereas bot-generated misinformation reached its highest appeal and scope during the Pre-Vaccine period.
△ Less
Submitted 6 May, 2025;
originally announced May 2025.
-
A Fast Multipole Method for axisymmetric domains
Authors:
Michael J. Carley
Abstract:
The Fast Multipole Method (FMM) for the Poisson equation is extended to the case of non-axisymmetric problems in an axisymmetric domain, described by cylindrical coordinates. The method is based on a Fourier decomposition of the source into a modal expansion and the evaluation of the corresponding modes of the field using a two-dimensional tree decomposition in the radial and axial coordinate. The…
▽ More
The Fast Multipole Method (FMM) for the Poisson equation is extended to the case of non-axisymmetric problems in an axisymmetric domain, described by cylindrical coordinates. The method is based on a Fourier decomposition of the source into a modal expansion and the evaluation of the corresponding modes of the field using a two-dimensional tree decomposition in the radial and axial coordinate. The field coefficients are evaluated using a modal Green's function which can be evaluated using well-known recursions for the Legendre function of the second kind, and whose derivatives can be found recursively using the Laplace equation in cylindrical coordinates. The principal difference between the cylindrical and Cartesian problems is the lack of translation invariance in the evaluation of local interactions, leading to an increase in computational effort for the axisymmetric domain. Results are presented for solution accuracy and convergence and for computation time compared to direct evaluation. The method is found to converge well, with ten digit accuracy being achieved for the test cases presented. Computation time is controlled by the balance between initialization and the evaluation of local interactions between source and field points, and is about two orders of magnitude less than that required for direct evaluation, depending on expansion order.
△ Less
Submitted 3 January, 2023;
originally announced January 2023.
-
Online Coordination: Methods and Comparative Case Studies of Coordinated Groups across Four Events in the United States
Authors:
Lynnette Hui Xian Ng,
Kathleen M. Carley
Abstract:
Coordinated groups of user accounts working together in online social media can be used to manipulate the online discourse and thus is an important area of study. In this study, we work towards a general theory of coordination. There are many ways to coordinate groups online: semantic, social, referral and many more. Each represents a coordination dimension, where the more dimensions of coordinati…
▽ More
Coordinated groups of user accounts working together in online social media can be used to manipulate the online discourse and thus is an important area of study. In this study, we work towards a general theory of coordination. There are many ways to coordinate groups online: semantic, social, referral and many more. Each represents a coordination dimension, where the more dimensions of coordination are present for one event, the stronger the coordination present. We build on existing approaches that detect coordinated groups by identifying high levels of synchronized actions within a specified time window. A key concern with this approach is the selection of the time window. We propose a method that selects the optimal window size to accurately capture local coordination while avoiding the capture of coincidental synchronicity. With this enhanced method of coordination detection, we perform a comparative study across four events: US Elections Primaries 2020, Reopen America 2020, Capitol Riots 2021 and COVID Vaccine Release 2021. Herein, we explore the following three dimensions of coordination for each event -- semantic, referral and social coordination -- and perform group and user analysis within and among the events. This allows us to expose different user coordination behavior patterns and identify narratives and user support themes, hence estimating the degree and theme of coordination.
△ Less
Submitted 21 June, 2022;
originally announced June 2022.
-
Shielding of rotor noise by plates and wings
Authors:
Michael Carley
Abstract:
A method of noise reduction proposed for the next generation of aircraft is to shield noise from the propulsion system, by positioning the noise source over a wing or another surface. In this paper, an approximate analysis is developed for the acoustic field far from a circular source placed near the edge of a semi-infinite plate, a model problem for shielding of noise by a wing and for scattering…
▽ More
A method of noise reduction proposed for the next generation of aircraft is to shield noise from the propulsion system, by positioning the noise source over a wing or another surface. In this paper, an approximate analysis is developed for the acoustic field far from a circular source placed near the edge of a semi-infinite plate, a model problem for shielding of noise by a wing and for scattering by a trailing edge. The approximation is developed for a source of small radius and is found to be accurate when compared to full numerical evaluation of the field.
△ Less
Submitted 13 May, 2022; v1 submitted 28 February, 2022;
originally announced February 2022.
-
Multi-modal Networks Reveal Patterns of Operational Similarity of Terrorist Organizations
Authors:
Gian Maria Campedelli,
Iain J. Cruickshank,
Kathleen M. Carley
Abstract:
Capturing dynamics of operational similarity among terrorist groups is critical to provide actionable insights for counter-terrorism and intelligence monitoring. Yet, in spite of its theoretical and practical relevance, research addressing this problem is currently lacking. We tackle this problem proposing a novel computational framework for detecting clusters of terrorist groups sharing similar b…
▽ More
Capturing dynamics of operational similarity among terrorist groups is critical to provide actionable insights for counter-terrorism and intelligence monitoring. Yet, in spite of its theoretical and practical relevance, research addressing this problem is currently lacking. We tackle this problem proposing a novel computational framework for detecting clusters of terrorist groups sharing similar behaviors, focusing on groups' yearly repertoire of deployed tactics, attacked targets, and utilized weapons. Specifically considering those organizations that have plotted at least 50 attacks from 1997 to 2018, accounting for a total of 105 groups responsible for more than 42,000 events worldwide, we offer three sets of results. First, we show that over the years global terrorism has been characterized by increasing operational cohesiveness. Second, we highlight that year-to-year stability in co-clustering among groups has been particularly high from 2009 to 2018, indicating temporal consistency of similarity patterns in the last decade. Third, we demonstrate that operational similarity between two organizations is driven by three factors: (a) their overall activity; (b) the difference in the diversity of their operational repertoires; (c) the difference in a combined measure of diversity and activity. Groups' operational preferences, geographical homophily and ideological affinity have no consistent role in determining operational similarity.
△ Less
Submitted 15 December, 2021;
originally announced December 2021.
-
The Role of Masks in Mitigating Viral Spread on Networks
Authors:
Yurun Tian,
Anirudh Sridhar,
Chai Wah Wu,
Simon A. Levin,
Kathleen M. Carley,
H. Vincent Poor,
Osman Yagan
Abstract:
Masks have remained an important mitigation strategy in the fight against COVID-19 due to their ability to prevent the transmission of respiratory droplets between individuals. In this work, we provide a comprehensive quantitative analysis of the impact of mask-wearing. To this end, we propose a novel agent-based model of viral spread on networks where agents may either wear no mask or wear one of…
▽ More
Masks have remained an important mitigation strategy in the fight against COVID-19 due to their ability to prevent the transmission of respiratory droplets between individuals. In this work, we provide a comprehensive quantitative analysis of the impact of mask-wearing. To this end, we propose a novel agent-based model of viral spread on networks where agents may either wear no mask or wear one of several types of masks with different properties (e.g., cloth or surgical). We derive analytical expressions for three key epidemiological quantities: the probability of emergence, the epidemic threshold, and the expected epidemic size. In particular, we show how the aforementioned quantities depend on the structure of the contact network, viral transmission dynamics, and the distribution of the different types of masks within the population. Through extensive simulations, we then investigate the impact of different allocations of masks within the population and trade-offs between the outward efficiency and inward efficiency of the masks. Interestingly, we find that masks with high outward efficiency and low inward efficiency are most useful for controlling the spread in the early stages of an epidemic, while masks with high inward efficiency but low outward efficiency are most useful in reducing the size of an already large spread. Lastly, we study whether degree-based mask allocation is more effective in reducing the probability of epidemic as well as epidemic size compared to random allocation. The result echoes the previous findings that mitigation strategies should differ based on the stage of the spreading process, focusing on source control before the epidemic emerges and on self-protection after the emergence.
△ Less
Submitted 6 June, 2023; v1 submitted 8 October, 2021;
originally announced October 2021.
-
Sound from rotors in non-uniform flow
Authors:
Michael Carley
Abstract:
An analysis is presented for the evaluation of the acoustic field of a rotating source in a non-uniform potential flow. Other than the restriction to low flow Mach numbers, the method is exact and general. The variation in radiation properties with source position is handled by representation as a Fourier series in source angle, giving rise to an asymmetrically varying acoustic field evaluated by…
▽ More
An analysis is presented for the evaluation of the acoustic field of a rotating source in a non-uniform potential flow. Other than the restriction to low flow Mach numbers, the method is exact and general. The variation in radiation properties with source position is handled by representation as a Fourier series in source angle, giving rise to an asymmetrically varying acoustic field evaluated by summation of the series. The method is used to develop an exact solution for the model problem of a rotor operating near a cylinder in cross-flow and sample calculations demonstrate the accuracy of the technique when compared to full numerical evaluation. The calculations show changes of greater than one decibel in the acoustic field due to flow non-uniformity at a flow Mach number of 0.15, a typical speed for propeller aircraft at take-off.
△ Less
Submitted 17 March, 2020; v1 submitted 8 January, 2020;
originally announced January 2020.
-
The Effects of Evolutionary Adaptations on Spreading Processes in Complex Networks
Authors:
Rashad Eletreby,
Yong Zhuang,
Kathleen M. Carley,
Osman Yağan,
H. Vincent Poor
Abstract:
A common theme among the proposed models for network epidemics is the assumption that the propagating object, i.e., a virus or a piece of information, is transferred across the nodes without going through any modification or evolution. However, in real-life spreading processes, pathogens often evolve in response to changing environments and medical interventions and information is often modified b…
▽ More
A common theme among the proposed models for network epidemics is the assumption that the propagating object, i.e., a virus or a piece of information, is transferred across the nodes without going through any modification or evolution. However, in real-life spreading processes, pathogens often evolve in response to changing environments and medical interventions and information is often modified by individuals before being forwarded. In this paper, we investigate the evolution of spreading processes on complex networks with the aim of i) revealing the role of evolution on the threshold, probability, and final size of epidemics; and ii) exploring the interplay between the structural properties of the network and the dynamics of evolution. In particular, we develop a mathematical theory that accurately predicts the epidemic threshold and the expected epidemic size as functions of the characteristics of the spreading process, the evolutionary dynamics of the pathogen, and the structure of the underlying contact network. In addition to the mathematical theory, we perform extensive simulations on random and real-world contact networks to verify our theory and reveal the significant shortcomings of the classical mathematical models that do not capture evolution. Our results reveal that the classical, single-type bond-percolation models may accurately predict the threshold and final size of epidemics, but their predictions on the probability of emergence are inaccurate on both random and real-world networks. This inaccuracy sheds the light on a fundamental disconnect between the classical bond-percolation models and real-life spreading processes that entail evolution. Finally, we consider the case when co-infection is possible and show that co-infection could lead the order of phase transition to change from second-order to first-order.
△ Less
Submitted 2 November, 2019; v1 submitted 10 October, 2018;
originally announced October 2018.
-
Is the Sample Good Enough? Comparing Data from Twitter's Streaming API with Twitter's Firehose
Authors:
Fred Morstatter,
Jürgen Pfeffer,
Huan Liu,
Kathleen M. Carley
Abstract:
Twitter is a social media giant famous for the exchange of short, 140-character messages called "tweets". In the scientific community, the microblogging site is known for openness in sharing its data. It provides a glance into its millions of users and billions of tweets through a "Streaming API" which provides a sample of all tweets matching some parameters preset by the API user. The API service…
▽ More
Twitter is a social media giant famous for the exchange of short, 140-character messages called "tweets". In the scientific community, the microblogging site is known for openness in sharing its data. It provides a glance into its millions of users and billions of tweets through a "Streaming API" which provides a sample of all tweets matching some parameters preset by the API user. The API service has been used by many researchers, companies, and governmental institutions that want to extract knowledge in accordance with a diverse array of questions pertaining to social media. The essential drawback of the Twitter API is the lack of documentation concerning what and how much data users get. This leads researchers to question whether the sampled data is a valid representation of the overall activity on Twitter. In this work we embark on answering this question by comparing data collected using Twitter's sampled API service with data collected using the full, albeit costly, Firehose stream that includes every single published tweet. We compare both datasets using common statistical metrics as well as metrics that allow us to compare topics, networks, and locations of tweets. The results of our work will help researchers and practitioners understand the implications of using the Streaming API.
△ Less
Submitted 21 June, 2013;
originally announced June 2013.
-
Quadrature for second-order triangles in the Boundary Element Method
Authors:
Michael Carley
Abstract:
A quadrature method for second-order, curved triangular elements in the Boundary Element Method (BEM) is presented, based on a polar coordinate transformation, combined with elementary geometric operations. The numerical performance of the method is presented using results from solution of the Laplace equation on a cat's eye geometry which show an error of order $P^{-1.6}$, where $P$ is the number…
▽ More
A quadrature method for second-order, curved triangular elements in the Boundary Element Method (BEM) is presented, based on a polar coordinate transformation, combined with elementary geometric operations. The numerical performance of the method is presented using results from solution of the Laplace equation on a cat's eye geometry which show an error of order $P^{-1.6}$, where $P$ is the number of elements.
△ Less
Submitted 25 February, 2013;
originally announced February 2013.
-
Potential integrals on triangles
Authors:
Michael Carley
Abstract:
The problem of evaluating potential integrals on planar triangular elements has been addressed using a polar coordinate decomposition. The resulting formulae are general, exact, easily implemented, and have only one special case, that of a field point lying in the plane of the element. Results are presented for the evaluation of the potential and its gradients, where the integrals must be treated…
▽ More
The problem of evaluating potential integrals on planar triangular elements has been addressed using a polar coordinate decomposition. The resulting formulae are general, exact, easily implemented, and have only one special case, that of a field point lying in the plane of the element. Results are presented for the evaluation of the potential and its gradients, where the integrals must be treated as principal values or finite parts, for elements with constant and linearly varying source terms. These results are tested by application to a single triangular element to the evaluation of the potential gradient outside the unit cube. In both cases, the method is shown to be accurate and convergent.
△ Less
Submitted 24 January, 2012;
originally announced January 2012.
-
The radiating part of circular sources
Authors:
Michael Carley
Abstract:
An analysis is developed linking the form of the sound field from a circular source to the radial structure of the source, without recourse to far-field or other approximations. It is found that the information radiated into the field is limited, with the limit fixed by the wavenumber of source multiplied by the source radius (Helmholtz number). The acoustic field is found in terms of the elementa…
▽ More
An analysis is developed linking the form of the sound field from a circular source to the radial structure of the source, without recourse to far-field or other approximations. It is found that the information radiated into the field is limited, with the limit fixed by the wavenumber of source multiplied by the source radius (Helmholtz number). The acoustic field is found in terms of the elementary fields generated by a set of line sources whose form is given by Chebyshev polynomials of the second kind, and whose amplitude is found to be given by weighted integrals of the radial source term. The analysis is developed for tonal sources, such as rotors, and, for Helmholtz number less than two, for random disk sources. In this case, the analysis yields the cross-spectrum between two points in the acoustic field. The analysis is applied to the problems of tonal radiation, random source radiation as a model problem for jet noise, and to noise cancellation, as in active control of noise from rotors. It is found that the approach gives an accurate model for the radiation problem and explicitly identifies those parts of a source which radiate.
△ Less
Submitted 20 September, 2010;
originally announced September 2010.
-
Radial cancellation in spinning sound fields
Authors:
Michael Carley
Abstract:
The radiating part of a circular acoustic source is determined on the basis of an exact analysis of the radiation properties of a source with angular dependence $\exp \J nθ$ and arbitrary radial dependence. It is found that the number of degrees of freedom in the radiated field is no greater than $k-n$, where $k$ is the wavenumber. The radiating part of the source at low frequency is the wavenumbe…
▽ More
The radiating part of a circular acoustic source is determined on the basis of an exact analysis of the radiation properties of a source with angular dependence $\exp \J nθ$ and arbitrary radial dependence. It is found that the number of degrees of freedom in the radiated field is no greater than $k-n$, where $k$ is the wavenumber. The radiating part of the source at low frequency is the wavenumber. The radiating part of the source at low frequency is explicitly stated and used to analyze noise cancellation. The results are applied to the identification of sources in jet noise and an explanation for the low order structure of jet noise fields is proposed.
△ Less
Submitted 10 May, 2010;
originally announced May 2010.
-
Series expansion for the sound field of a ring source
Authors:
Michael Carley
Abstract:
An exact series expansion for the field radiated by a monopole ring source with angular variation in source strength is derived from a previously developed expression for the field from a finite disk. The derived series can be used throughout the field, via the use of a reciprocity relation, and can be readily integrated to find the field radiated by arbitrary circular sources of finite extent,…
▽ More
An exact series expansion for the field radiated by a monopole ring source with angular variation in source strength is derived from a previously developed expression for the field from a finite disk. The derived series can be used throughout the field, via the use of a reciprocity relation, and can be readily integrated to find the field radiated by arbitrary circular sources of finite extent, and differentiated to find the field due to higher order sources such as dipoles and quadrupoles.
△ Less
Submitted 20 April, 2010;
originally announced April 2010.
-
Information in spinning sound fields
Authors:
Michael Carley
Abstract:
The information content of a spinning sound field is analyzed using a combination of exact and asymptotic results, in order to set limits on how accurately source identification can be carried out. Using a transformation of the circular source to an exactly equivalent set of line source modes, given by Chebyshev polynomials, it is found that the line source modes of order greater than the source…
▽ More
The information content of a spinning sound field is analyzed using a combination of exact and asymptotic results, in order to set limits on how accurately source identification can be carried out. Using a transformation of the circular source to an exactly equivalent set of line source modes, given by Chebyshev polynomials, it is found that the line source modes of order greater than the source wavenumber generate exponentially small fields. Asymptotic analysis shows that the remaining, lower order, modes radiate efficiently only into a region around the source plane, with this region shrinking as the mode order is increased. The results explain the ill-conditioning of source identification methods; the successful use of low order models in active noise control; and the low radiation efficiency of subsonic jets.
△ Less
Submitted 20 April, 2010;
originally announced April 2010.
-
BEM3D: a free adaptive fast multipole boundary element library
Authors:
Michael Carley
Abstract:
The design, implementation and analysis of a free library for boundary element calculations is presented. The library is free in the sense of the GNU General Public Licence and is intended to allow users to solve a wide range of problems using the boundary element method. The library incorporates a fast multipole method which is tailored to boundary elements of order higher than zero, taking acc…
▽ More
The design, implementation and analysis of a free library for boundary element calculations is presented. The library is free in the sense of the GNU General Public Licence and is intended to allow users to solve a wide range of problems using the boundary element method. The library incorporates a fast multipole method which is tailored to boundary elements of order higher than zero, taking account of the finite extent of the elements in the generation of the domain tree. The method is tested on a sphere and on a cube, to test its ability to handle sharp edges, and is found to be accurate, efficient and convergent.
△ Less
Submitted 5 August, 2009;
originally announced August 2009.
-
Inversion of spinning sound fields
Authors:
Michael Carley
Abstract:
A method is presented for the reconstruction of rotating monopole source distributions using acoustic pressures measured on a sideline parallel to the source axis. The method requires no \textit{a priori} assumptions about the source other than that its strength at the frequency of interest vary sinusoidally in azimuth on the source disc so that the radiated acoustic field is composed of a singl…
▽ More
A method is presented for the reconstruction of rotating monopole source distributions using acoustic pressures measured on a sideline parallel to the source axis. The method requires no \textit{a priori} assumptions about the source other than that its strength at the frequency of interest vary sinusoidally in azimuth on the source disc so that the radiated acoustic field is composed of a single circumferential mode. When multiple azimuthal modes are present, the acoustic field can be decomposed into azimuthal modes and the method applied to each mode in sequence.
The method proceeds in two stages, first finding an intermediate line source derived from the source distribution and then inverting this line source to find the radial variation of source strength. A far-field form of the radiation integrals is derived, showing that the far field pressure is a band-limited Fourier transform of the line source, establishing a limit on the quality of source reconstruction which can be achieved using far-field measurements. The method is applied to simulated data representing wind-tunnel testing of a ducted rotor system (tip Mach number~0.74) and to control of noise from an automotive cooling fan (tip Mach number~0.14), studies which have appeared in the literature of source identification.
△ Less
Submitted 3 November, 2008; v1 submitted 30 September, 2008;
originally announced September 2008.