Network science  

Network types  
Graphs  


Models  


 
Complex systems 

Topics 
Network science is an academic field which studies complex networks such as telecommunication networks, computer networks, biological networks, cognitive and semantic networks, and social networks, considering distinct elements or actors represented by nodes (or vertices) and the connections between the elements or actors as links (or edges). The field draws on theories and methods including graph theory from mathematics, statistical mechanics from physics, data mining and information visualization from computer science, inferential modeling from statistics, and social structure from sociology. The United States National Research Council defines network science as "the study of network representations of physical, biological, and social phenomena leading to predictive models of these phenomena."^{[1]}
Background and history
The study of networks has emerged in diverse disciplines as a means of analyzing complex relational data. The earliest known paper in this field is the famous Seven Bridges of Königsberg written by Leonhard Euler in 1736. Euler's mathematical description of vertices and edges was the foundation of graph theory, a branch of mathematics that studies the properties of pairwise relations in a network structure. The field of graph theory continued to develop and found applications in chemistry (Sylvester, 1878).
Dénes Kőnig, a Hungarian mathematician and professor, wrote the first book in Graph Theory, entitled "Theory of finite and infinite graphs", in 1936 ^{[2]}
In the 1930s Jacob Moreno, a psychologist in the Gestalt tradition, arrived in the United States. He developed the sociogram and presented it to the public in April 1933 at a convention of medical scholars. Moreno claimed that "before the advent of sociometry no one knew what the interpersonal structure of a group 'precisely' looked like" (Moreno, 1953). The sociogram was a representation of the social structure of a group of elementary school students. The boys were friends of boys and the girls were friends of girls with the exception of one boy who said he liked a single girl. The feeling was not reciprocated. This network representation of social structure was found so intriguing that it was printed in The New York Times (April 3, 1933, page 17). The sociogram has found many applications and has grown into the field of social network analysis.
Probabilistic theory in network science developed as an offshoot of graph theory with Paul Erdős and Alfréd Rényi's eight famous papers on random graphs. For social networks the exponential random graph model or p* is a notational framework used to represent the probability space of a tie occurring in a social network. An alternate approach to network probability structures is the network probability matrix, which models the probability of edges occurring in a network, based on the historic presence or absence of the edge in a sample of networks.
In 1998, David Krackhardt and Kathleen Carley introduced the idea of a metanetwork with the PCANS Model. They suggest that "all organizations are structured along these three domains, Individuals, Tasks, and Resources". Their paper introduced the concept that networks occur across multiple domains and that they are interrelated. This field has grown into another subdiscipline of network science called dynamic network analysis.
More recently other network science efforts have focused on mathematically describing different network topologies. Duncan Watts and Steven Strogatz reconciled empirical data on networks with mathematical representation, describing the smallworld network. AlbertLászló Barabási and Reka Albert developed the scalefree network which is a loosely defined network topology that contains hub vertices with many connections, that grow in a way to maintain a constant ratio in the number of the connections versus all other nodes. In the context of citation networks, the scalefree network model is an undirected version of the earlier directed Price model. There is significant disagreement within the scientific community as to whether real world networks are scalefree or not, with some arguing that they are ubiquitous,^{[3]} and others arguing that they are rare.^{[4]} Many in the network science community argue that knowledge of whether the degree distribution is fat tailed or not is more important than knowing whether the distribution fits the stricter criteria of being scalefree.^{[5]}^{[6]}
Department of Defense initiatives
The U.S. military first became interested in networkcentric warfare as an operational concept based on network science in 1996. John A. Parmentola, the U.S. Army Director for Research and Laboratory Management, proposed to the Army's Board on Science and Technology (BAST) on December 1, 2003 that Network Science become a new Army research area. The BAST, the Division on Engineering and Physical Sciences for the National Research Council (NRC) of the National Academies, serves as a convening authority for the discussion of science and technology issues of importance to the Army and oversees independent Armyrelated studies conducted by the National Academies. The BAST conducted a study to find out whether identifying and funding a new field of investigation in basic research, Network Science, could help close the gap between what is needed to realize NetworkCentric Operations and the current primitive state of fundamental knowledge of networks.
As a result, the BAST issued the NRC study in 2005 titled Network Science (referenced above) that defined a new field of basic research in Network Science for the Army. Based on the findings and recommendations of that study and the subsequent 2007 NRC report titled Strategy for an Army Center for Network Science, Technology, and Experimentation, Army basic research resources were redirected to initiate a new basic research program in Network Science. To build a new theoretical foundation for complex networks, some of the key Network Science research efforts now ongoing in Army laboratories address:
 Mathematical models of network behavior to predict performance with network size, complexity, and environment
 Optimized human performance required for networkenabled warfare
 Networking within ecosystems and at the molecular level in cells.
As initiated in 2004 by Frederick I. Moxley with support he solicited from David S. Alberts, the Department of Defense helped to establish the first Network Science Center in conjunction with the U.S. Army at the United States Military Academy (USMA). Under the tutelage of Dr. Moxley and the faculty of the USMA, the first interdisciplinary undergraduate courses in Network Science were taught to cadets at West Point. In order to better instill the tenets of network science among its cadre of future leaders, the USMA has also instituted a fivecourse undergraduate minor in Network Science.
In 2006, the U.S. Army and the United Kingdom (UK) formed the Network and Information Science International Technology Alliance, a collaborative partnership among the Army Research Laboratory, UK Ministry of Defense and a consortium of industries and universities in the U.S. and UK. The goal of the alliance is to perform basic research in support of Network Centric Operations across the needs of both nations.
In 2009, the U.S. Army formed the Network Science CTA, a collaborative research alliance among the Army Research Laboratory, CERDEC, and a consortium of about 30 industrial R&D labs and universities in the U.S. The goal of the alliance is to develop a deep understanding of the underlying commonalities among intertwined social/cognitive, information, and communications networks, and as a result improve our ability to analyze, predict, design, and influence complex systems interweaving many kinds of networks.
Subsequently, as a result of these efforts, the U.S. Department of Defense has sponsored numerous research projects that support Network Science.
Network properties
Often, networks have certain attributes that can be calculated to analyze the properties & characteristics of the network. The behavior of these network properties often define network models and can be used to analyze how certain models contrast to each other. Many of the definitions for other terms used in network science can be found in Glossary of graph theory.
Size
The size of a network can refer to the number of nodes or, less commonly, the number of edges which (for connected graphs with no multiedges) can range from (a tree) to (a complete graph). In the case of a simple graph (a network in which at most one (undirected) edge exists between each pair of vertices, and in which no vertices connect to themselves), we have ; for directed graphs (with no selfconnected nodes), ; for directed graphs with selfconnections allowed, . In the circumstance of a graph within which multiple edges may exist between a pair of vertices, .
Density
The density of a network is defined as a ratio of the number of edges to the number of possible edges in a network with nodes, given (in the case of simple graphs) by the binomial coefficient , giving Another possible equation is whereas the ties are unidirectional (Wasserman & Faust 1994).^{[7]} This gives a better overview over the network density, because unidirectional relationships can be measured.
Planar Network Density
The density of a network, where there is no intersection between edges, is defined as a ratio of the number of edges to the number of possible edges in a network with nodes, given by a graph with no intersecting edges , giving
Average degree
The degree of a node is the number of edges connected to it. Closely related to the density of a network is the average degree, (or, in the case of directed graphs, , the former factor of 2 arising from each edge in an undirected graph contributing to the degree of two distinct vertices). In the ER random graph model () we can compute the expected value of (equal to the expected value of of an arbitrary vertex): a random vertex has other vertices in the network available, and with probability , connects to each. Thus, .
Average shortest path length (or characteristic path length)
The average shortest path length is calculated by finding the shortest path between all pairs of nodes, and taking the average over all paths of the length thereof (the length being the number of intermediate edges contained in the path, i.e., the distance between the two vertices within the graph). This shows us, on average, the number of steps it takes to get from one member of the network to another. The behavior of the expected average shortest path length (that is, the ensemble average of the average shortest path length) as a function of the number of vertices of a random network model defines whether that model exhibits the smallworld effect; if it scales as , the model generates smallworld nets. For fasterthanlogarithmic growth, the model does not produce small worlds. The special case of is known as ultrasmall world effect.
Optimal path
When the links or nodes are weighted one can consider the optimal path between nodes.^{[8]}
Diameter of a network
As another means of measuring network graphs, we can define the diameter of a network as the longest of all the calculated shortest paths in a network. It is the shortest distance between the two most distant nodes in the network. In other words, once the shortest path length from every node to all other nodes is calculated, the diameter is the longest of all the calculated path lengths. The diameter is representative of the linear size of a network. If node ABCD are connected, going from A>D this would be the diameter of 3 (3hops, 3links).^{[citation needed]}
Clustering coefficient
The clustering coefficient is a measure of an "allmyfriendsknoweachother" property. This is sometimes described as the friends of my friends are my friends. More precisely, the clustering coefficient of a node is the ratio of existing links connecting a node's neighbors to each other to the maximum possible number of such links. The clustering coefficient for the entire network is the average of the clustering coefficients of all the nodes. A high clustering coefficient for a network is another indication of a small world.
The clustering coefficient of the 'th node is
where is the number of neighbours of the 'th node, and is the number of connections between these neighbours. The maximum possible number of connections between neighbors is, then,
From a probabilistic standpoint, the expected local clustering coefficient is the likelihood of a link existing between two arbitrary neighbors of the same node.
Connectedness
The way in which a network is connected plays a large part into how networks are analyzed and interpreted. Networks are classified in four different categories:
 Clique/Complete Graph: a completely connected network, where all nodes are connected to every other node. These networks are symmetric in that all nodes have inlinks and outlinks from all others.
 Giant Component: A single connected component which contains most of the nodes in the network.
 Weakly Connected Component: A collection of nodes in which there exists a path from any node to any other, ignoring directionality of the edges.
 Strongly Connected Component: A collection of nodes in which there exists a directed path from any node to any other.
Node centrality
Centrality indices produce rankings which seek to identify the most important nodes in a network model. Different centrality indices encode different contexts for the word "importance." The betweenness centrality, for example, considers a node highly important if it form bridges between many other nodes. The eigenvalue centrality, in contrast, considers a node highly important if many other highly important nodes link to it. Hundreds of such measures have been proposed in the literature.
Centrality indices are only accurate for identifying the most central nodes. The measures are seldom, if ever, meaningful for the remainder of network nodes. ^{[9]} ^{[10]} Also, their indications are only accurate within their assumed context for importance, and tend to "get it wrong" for other contexts.^{[11]} For example, imagine two separate communities whose only link is an edge between the most junior member of each community. Since any transfer from one community to the other must go over this link, the two junior members will have high betweenness centrality. But, since they are junior, (presumably) they have few connections to the "important" nodes in their community, meaning their eigenvalue centrality would be quite low.
The concept of centrality in the context of static networks was extended, based on empirical and theoretical research, to dynamic centrality^{[12]} in the context of timedependent and temporal networks.^{[13]}^{[14]}^{[15]}
Nodes centrality can be evaluated by the kshell method. The kshell method was applied successfully to the Internet identifying the central of the different nodes.^{[16]} The method is found useful to identify influential spreaders in a network .^{[17]}
Node influence
Limitations to centrality measures have led to the development of more general measures. Two examples are the accessibility, which uses the diversity of random walks to measure how accessible the rest of the network is from a given start node,^{[18]} and the expected force, derived from the expected value of the force of infection generated by a node.^{[9]} Both of these measures can be meaningfully computed from the structure of the network alone.
Community structure
Nodes in a network may be partitioned into groups representing communities. Depending on the context, communities may be distinct or overlapping. Typically, nodes in such communities will be strongly connected to other nodes in the same community, but weakly connected to nodes outside the community. In the absence of a ground truth describing the community structure of a specific network, several algorithms have been developed to infer possible community structures using either supervised of unsupervised clustering methods.
Network models
Network models serve as a foundation to understanding interactions within empirical complex networks. Various random graph generation models produce network structures that may be used in comparison to realworld complex networks.
Erdős–Rényi random graph model
The Erdős–Rényi model, named for Paul Erdős and Alfréd Rényi, is used for generating random graphs in which edges are set between nodes with equal probabilities. It can be used in the probabilistic method to prove the existence of graphs satisfying various properties, or to provide a rigorous definition of what it means for a property to hold for almost all graphs.
To generate an Erdős–Rényi model two parameters must be specified: the total number of nodes n and the probability p that a random pair of nodes has an edge.
Because the model is generated without bias to particular nodes, the degree distribution is binomial: for a randomly chosen vertex ,
In this model the clustering coefficient is 0 a.s. The behavior of can be broken into three regions.
Subcritical : All components are simple and very small, the largest component has size ;
Critical : ;
Supercritical : where is the positive solution to the equation .
The largest connected component has high complexity. All other components are simple and small .
Configuration model
The configuration model takes a degree sequence^{[19]}^{[20]} or degree distribution^{[21]} (which subsequently is used to generate a degree sequence) as the input, and produces randomly connected graphs in all respects other than the degree sequence. This means that for a given choice of the degree sequence, the graph is chosen uniformly at random from the set of all graphs that comply with this degree sequence. The degree of a randomly chosen vertex is an independent and identically distributed random variable with integer values. When , the configuration graph contains the giant connected component, which has infinite size.^{[20]} The rest of the components have finite sizes, which can be quantified with the notion of the size distribution. The probability that a randomly sampled node is connected to a component of size is given by convolution powers of the degree distribution:^{[22]}
In the directed configuration model, the degree of a node is given by two numbers, indegree and outdegree , and consequently, the degree distribution is twovariate. The expected number of inedges and outedges coincides, so that . The directed configuration model contains the giant component iff^{[24]}
for outcomponents.
Watts–Strogatz small world model
The Watts and Strogatz model is a random graph generation model that produces graphs with smallworld properties.
An initial lattice structure is used to generate a Watts–Strogatz model. Each node in the network is initially linked to its closest neighbors. Another parameter is specified as the rewiring probability. Each edge has a probability that it will be rewired to the graph as a random edge. The expected number of rewired links in the model is .
As the Watts–Strogatz model begins as nonrandom lattice structure, it has a very high clustering coefficient along with high average path length. Each rewire is likely to create a shortcut between highly connected clusters. As the rewiring probability increases, the clustering coefficient decreases slower than the average path length. In effect, this allows the average path length of the network to decrease significantly with only slightly decreases in clustering coefficient. Higher values of p force more rewired edges, which in effect makes the Watts–Strogatz model a random network.
Barabási–Albert (BA) preferential attachment model
The Barabási–Albert model is a random network model used to demonstrate a preferential attachment or a "richgetricher" effect. In this model, an edge is most likely to attach to nodes with higher degrees. The network begins with an initial network of m_{0} nodes. m_{0} ≥ 2 and the degree of each node in the initial network should be at least 1, otherwise it will always remain disconnected from the rest of the network.
In the BA model, new nodes are added to the network one at a time. Each new node is connected to existing nodes with a probability that is proportional to the number of links that the existing nodes already have. Formally, the probability p_{i} that the new node is connected to node i is^{[26]}
where k_{i} is the degree of node i. Heavily linked nodes ("hubs") tend to quickly accumulate even more links, while nodes with only a few links are unlikely to be chosen as the destination for a new link. The new nodes have a "preference" to attach themselves to the already heavily linked nodes.
The degree distribution resulting from the BA model is scale free, in particular, it is a power law of the form:
Hubs exhibit high betweenness centrality which allows short paths to exist between nodes. As a result, the BA model tends to have very short average path lengths. The clustering coefficient of this model also tends to 0. While the diameter, D, of many models including the Erdős Rényi random graph model and several small world networks is proportional to log N, the BA model exhibits D~loglogN (ultrasmall world).^{[28]} Note that the average path length scales with N as the diameter.
Nonlinear preferential attachment
In nonlinear preferential attachment (NLPA), existing nodes in the network gain new edges proportionally to the node degree raised to a constant positive power, .^{[29]} Formally, this means that the probability that node gains a new edge is given by
If , NLPA reduces to the BA model and is referred to as "linear". If , NLPA is referred to as "sublinear" and the degree distribution of the network tends to a stretched exponential distribution. If , NLPA is referred to as "superlinear" and a small number of nodes connect to almost all other nodes in the network. For both and , the scalefree property of the network is broken in the limit of infinite system size. However, if is only slightly larger than , NLPA may result in degree distributions which appear to be transiently scale free.^{[30]}
Mediationdriven attachment (MDA) model
In the mediationdriven attachment (MDA) model in which a new node coming with edges picks an existing connected node at random and then connects itself not with that one but with of its neighbors chosen also at random. The probability that the node of the existing node picked is
The factor is the inverse of the harmonic mean (IHM) of degrees of the neighbors of a node . Extensive numerical investigation suggest that for an approximately the mean IHM value in the large limit becomes a constant which means . It implies that the higher the links (degree) a node has, the higher its chance of gaining more links since they can be reached in a larger number of ways through mediators which essentially embodies the intuitive idea of rich get richer mechanism (or the preferential attachment rule of the Barabasi–Albert model). Therefore, the MDA network can be seen to follow the PA rule but in disguise.^{[31]}
However, for it describes the winner takes it all mechanism as we find that almost of the total nodes have degree one and one is superrich in degree. As value increases the disparity between the super rich and poor decreases and as we find a transition from rich get super richer to rich get richer mechanism.
Fitness model
Another model where the key ingredient is the nature of the vertex has been introduced by Caldarelli et al.^{[32]} Here a link is created between two vertices with a probability given by a linking function of the fitnesses of the vertices involved. The degree of a vertex i is given by ^{[33]}
If is an invertible and increasing function of , then the probability distribution is given by
As a result, if the fitnesses are distributed as a power law, then also the node degree does.
Less intuitively with a fast decaying probability distribution as together with a linking function of the kind
with a constant and the Heavyside function, we also obtain scalefree networks.
Such model has been successfully applied to describe trade between nations by using GDP as fitness for the various nodes and a linking function of the kind ^{[34]} ^{[35]}
Network analysis
Social network analysis
Social network analysis examines the structure of relationships between social entities.^{[36]} These entities are often persons, but may also be groups, organizations, nation states, web sites, scholarly publications.
Since the 1970s, the empirical study of networks has played a central role in social science, and many of the mathematical and statistical tools used for studying networks have been first developed in sociology.^{[37]} Amongst many other applications, social network analysis has been used to understand the diffusion of innovations, news and rumors. Similarly, it has been used to examine the spread of both diseases and healthrelated behaviors. It has also been applied to the study of markets, where it has been used to examine the role of trust in exchange relationships and of social mechanisms in setting prices. Similarly, it has been used to study recruitment into political movements and social organizations. It has also been used to conceptualize scientific disagreements as well as academic prestige. More recently, network analysis (and its close cousin traffic analysis) has gained a significant use in military intelligence, for uncovering insurgent networks of both hierarchical and leaderless nature.^{[38]}^{[39]} In criminology, it is being used to identify influential actors in criminal gangs, offender movements, cooffending, predict criminal activities and make policies.^{[40]}
Dynamic network analysis
Dynamic network analysis examines the shifting structure of relationships among different classes of entities in complex sociotechnical systems effects, and reflects social stability and changes such as the emergence of new groups, topics, and leaders.^{[12]}^{[13]}^{[14]}^{[15]}^{[41]} Dynamic Network Analysis focuses on metanetworks composed of multiple types of nodes (entities) and multiple types of links. These entities can be highly varied.^{[12]} Examples include people, organizations, topics, resources, tasks, events, locations, and beliefs.
Dynamic network techniques are particularly useful for assessing trends and changes in networks over time, identification of emergent leaders, and examining the coevolution of people and ideas.
Biological network analysis
With the recent explosion of publicly available high throughput biological data, the analysis of molecular networks has gained significant interest. The type of analysis in this content are closely related to social network analysis, but often focusing on local patterns in the network. For example, network motifs are small subgraphs that are overrepresented in the network. Activity motifs are similar overrepresented patterns in the attributes of nodes and edges in the network that are over represented given the network structure. The analysis of biological networks has led to the development of network medicine, which looks at the effect of diseases in the interactome.^{[42]}
Link analysis
Link analysis is a subset of network analysis, exploring associations between objects. An example may be examining the addresses of suspects and victims, the telephone numbers they have dialed and financial transactions that they have partaken in during a given timeframe, and the familial relationships between these subjects as a part of police investigation. Link analysis here provides the crucial relationships and associations between very many objects of different types that are not apparent from isolated pieces of information. Computerassisted or fully automatic computerbased link analysis is increasingly employed by banks and insurance agencies in fraud detection, by telecommunication operators in telecommunication network analysis, by medical sector in epidemiology and pharmacology, in law enforcement investigations, by search engines for relevance rating (and conversely by the spammers for spamdexing and by business owners for search engine optimization), and everywhere else where relationships between many objects have to be analyzed.
Network robustness
The structural robustness of networks^{[43]} is studied using percolation theory. When a critical fraction of nodes is removed the network becomes fragmented into small clusters. This phenomenon is called percolation^{[44]} and it represents an orderdisorder type of phase transition with critical exponents.
Pandemic analysis
The SIR model is one of the most well known algorithms on predicting the spread of global pandemics within an infectious population.
Susceptible to infected
The formula above describes the "force" of infection for each susceptible unit in an infectious population, where β is equivalent to the transmission rate of said disease.
To track the change of those susceptible in an infectious population:
Infected to recovered
Over time, the number of those infected fluctuates by: the specified rate of recovery, represented by but deducted to one over the average infectious period , the numbered of infectious individuals, , and the change in time, .
Infectious period
Whether a population will be overcome by a pandemic, with regards to the SIR model, is dependent on the value of or the "average people infected by an infected individual."
Web link analysis
Several Web search ranking algorithms use linkbased centrality metrics, including (in order of appearance) Marchiori's Hyper Search, Google's PageRank, Kleinberg's HITS algorithm, the CheiRank and TrustRank algorithms. Link analysis is also conducted in information science and communication science in order to understand and extract information from the structure of collections of web pages. For example, the analysis might be of the interlinking between politicians' web sites or blogs.
PageRank
PageRank works by randomly picking "nodes" or websites and then with a certain probability, "randomly jumping" to other nodes. By randomly jumping to these other nodes, it helps PageRank completely traverse the network as some webpages exist on the periphery and would not as readily be assessed.
Each node, , has a PageRank as defined by the sum of pages that link to times one over the outlinks or "outdegree" of times the "importance" or PageRank of .
Random jumping
As explained above, PageRank enlists random jumps in attempts to assign PageRank to every website on the internet. These random jumps find websites that might not be found during the normal search methodologies such as BreadthFirst Search and DepthFirst Search.
In an improvement over the aforementioned formula for determining PageRank includes adding these random jump components. Without the random jumps, some pages would receive a PageRank of 0 which would not be good.
The first is , or the probability that a random jump will occur. Contrasting is the "damping factor", or .
Another way of looking at it:
Centrality measures
Information about the relative importance of nodes and edges in a graph can be obtained through centrality measures, widely used in disciplines like sociology. Centrality measures are essential when a network analysis has to answer questions such as: "Which nodes in the network should be targeted to ensure that a message or information spreads to all or most nodes in the network?" or conversely, "Which nodes should be targeted to curtail the spread of a disease?". Formally established measures of centrality are degree centrality, closeness centrality, betweenness centrality, eigenvector centrality, and katz centrality. The objective of network analysis generally determines the type of centrality measure(s) to be used.^{[36]}
 Degree centrality of a node in a network is the number of links (vertices) incident on the node.
 Closeness centrality determines how "close" a node is to other nodes in a network by measuring the sum of the shortest distances (geodesic paths) between that node and all other nodes in the network.
 Betweenness centrality determines the relative importance of a node by measuring the amount of traffic flowing through that node to other nodes in the network. This is done by measuring the fraction of paths connecting all pairs of nodes and containing the node of interest. Group Betweenness centrality measures the amount of traffic flowing through a group of nodes.^{[45]}
 Eigenvector centrality is a more sophisticated version of degree centrality where the centrality of a node not only depends on the number of links incident on the node but also the quality of those links. This quality factor is determined by the eigenvectors of the adjacency matrix of the network.
 Katz centrality of a node is measured by summing the geodesic paths between that node and all (reachable) nodes in the network. These paths are weighted, paths connecting the node with its immediate neighbors carry higher weights than those which connect with nodes farther away from the immediate neighbors.
Spread of content in networks
Content in a complex network can spread via two major methods: conserved spread and nonconserved spread.^{[46]} In conserved spread, the total amount of content that enters a complex network remains constant as it passes through. The model of conserved spread can best be represented by a pitcher containing a fixed amount of water being poured into a series of funnels connected by tubes. Here, the pitcher represents the original source and the water is the content being spread. The funnels and connecting tubing represent the nodes and the connections between nodes, respectively. As the water passes from one funnel into another, the water disappears instantly from the funnel that was previously exposed to the water. In nonconserved spread, the amount of content changes as it enters and passes through a complex network. The model of nonconserved spread can best be represented by a continuously running faucet running through a series of funnels connected by tubes. Here, the amount of water from the original source is infinite. Also, any funnels that have been exposed to the water continue to experience the water even as it passes into successive funnels. The nonconserved model is the most suitable for explaining the transmission of most infectious diseases.
The SIR model
In 1927, W. O. Kermack and A. G. McKendrick created a model in which they considered a fixed population with only three compartments, susceptible: , infected, , and recovered, . The compartments used for this model consist of three classes:
 is used to represent the number of individuals not yet infected with the disease at time t, or those susceptible to the disease
 denotes the number of individuals who have been infected with the disease and are capable of spreading the disease to those in the susceptible category
 is the compartment used for those individuals who have been infected and then recovered from the disease. Those in this category are not able to be infected again or to transmit the infection to others.
The flow of this model may be considered as follows:
Using a fixed population, , Kermack and McKendrick derived the following equations:
Several assumptions were made in the formulation of these equations: First, an individual in the population must be considered as having an equal probability as every other individual of contracting the disease with a rate of , which is considered the contact or infection rate of the disease. Therefore, an infected individual makes contact and is able to transmit the disease with others per unit time and the fraction of contacts by an infected with a susceptible is . The number of new infections in unit time per infective then is , giving the rate of new infections (or those leaving the susceptible category) as (Brauer & CastilloChavez, 2001). For the second and third equations, consider the population leaving the susceptible class as equal to the number entering the infected class. However, infectives are leaving this class per unit time to enter the recovered/removed class at a rate per unit time (where represents the mean recovery rate, or the mean infective period). These processes which occur simultaneously are referred to as the Law of Mass Action, a widely accepted idea that the rate of contact between two groups in a population is proportional to the size of each of the groups concerned (Daley & Gani, 2005). Finally, it is assumed that the rate of infection and recovery is much faster than the time scale of births and deaths and therefore, these factors are ignored in this model.
More can be read on this model on the Epidemic model page.
The master equation approach
A master equation can express the behaviour of an undirected growing network where, at each time step, a new node is added to the network, linked to an old node (randomly chosen and without preference). The initial network is formed by two nodes and two links between them at time , this configuration is necessary only to simplify further calculations, so at time the network have nodes and links.
The master equation for this network is:
where is the probability to have the node with degree at time , and is the time step when this node was added to the network. Note that there are only two ways for an old node to have links at time :
 The node have degree at time and will be linked by the new node with probability
 Already has degree at time and will not be linked by the new node.
After simplifying this model, the degree distribution is ^{[47]}
Based on this growing network, an epidemic model is developed following a simple rule: Each time the new node is added and after choosing the old node to link, a decision is made: whether or not this new node will be infected. The master equation for this epidemic model is:
where represents the decision to infect () or not (). Solving this master equation, the following solution is obtained: ^{[48]}
Interdependent networks
An interdependent network is a system of coupled networks where nodes of one or more networks depend on nodes in other networks. Such dependencies are enhanced by the developments in modern technology. Dependencies may lead to cascading failures between the networks and a relatively small failure can lead to a catastrophic breakdown of the system. Blackouts are a fascinating demonstration of the important role played by the dependencies between networks. A recent study developed a framework to study the cascading failures in an interdependent networks system using percolation theory.^{[49]}^{[50]} A complementary study, considering a dynamical process on a network, addresses cascading failures of load in interdependent networks.^{[51]} Interdependent infrastructures which are spatially embedded have been modeled as interdependent lattice networks and their resilience has been analyzed.^{[52]}^{[53]}] A spatial multiplex model has introduced by Danziger et al ^{[54]} and was analyzed further by Vaknin et al.^{[55]}
Multilayer networks
Multilayer networks are networks with multiple kinds of relations. Attempts to model realworld systems as multidimensional networks have been used in various fields such as social network analysis, economics, history, urban and international transport, ecology, psychology, medicine, biology, commerce, climatology, physics, computational neuroscience, operations management, and finance.
Network optimization
Network problems that involve finding an optimal way of doing something are studied under the name of combinatorial optimization. Examples include network flow, shortest path problem, transport problem, transshipment problem, location problem, matching problem, assignment problem, packing problem, routing problem, Critical Path Analysis and PERT (Program Evaluation & Review Technique).
See also
 Climate as complex networks
 Collaborative innovation network
 Communicative ecology
 Complex network
 Coreperiphery structures in networks
 Dualphase evolution
 Erdős–Rényi model
 Glossary of graph theory
 Higher category theory
 Immune network theory
 Irregular warfare
 Network analyzer
 Network dynamics
 Network formation
 Network theory in risk assessment
 Network topology
 Networks in labor economics
 Nonlinear preferential attachment
 Percolation
 Policy network analysis
 Polytely
 Quantum complex network
 Random networks
 Rumor spread in social network
 Scalefree networks
 Sequential dynamical system
 Service network
 Smallworld networks
 Structural cutoff
 Systems theory
References
 ^ Committee on Network Science for Future Army Applications (2006). Network Science. National Research Council. doi:10.17226/11516. ISBN 9780309653886.
 ^ Dénes Kőnig (1990). Theory of finite and infinite graphs (PDF) (PDF). Birkhäuser Boston. pp. 45–421. doi:10.1007/9781468489712. ISBN 9781468489712.
 ^ Barabási, AlbertLászló (24 July 2009). "ScaleFree Networks: A Decade and Beyond". Science. 325 (5939): 412–413. Bibcode:2009Sci...325..412B. doi:10.1126/science.1173299. S2CID 43910070.
 ^ Broido, Anna D.; Clauset, Aaron (December 2019). "Scalefree networks are rare". Nature Communications. 10 (1): 1017. arXiv:1801.03400. Bibcode:2019NatCo..10.1017B. doi:10.1038/s41467019087465. PMC 6399239. PMID 30833554.
 ^ Holme, Petter (December 2019). "Rare and everywhere: Perspectives on scalefree networks". Nature Communications. 10 (1): 1016. Bibcode:2019NatCo..10.1016H. doi:10.1038/s41467019090388.
 ^ Stumpf, M. P. H.; Porter, M. A. (10 February 2012). "Critical Truths About Power Laws". Science. 335 (6069): 665–666. Bibcode:2012Sci...335..665S. doi:10.1126/science.1216142. S2CID 206538568.
 ^ http://psycnet.apa.org/journals/prs/9/4/172/
 ^ L. Braunstein, S.V. Buldyrev, R. Cohen, S. Havlin, H.E. Stanley (2003). "Optimal Paths in Disordered Complex Networks". Phys. Rev. Lett. 91 (16): 168701. arXiv:condmat/0305051. Bibcode:2003PhRvL..91p8701B. doi:10.1103/PhysRevLett.91.168701. PMID 14611445. S2CID 5060754.CS1 maint: multiple names: authors list (link)
 ^ ^{a} ^{b} Lawyer, Glenn (March 2015). "Understanding the spreading power of all nodes in a network". Scientific Reports. 5 (O8665): 8665. arXiv:1405.6707. Bibcode:2015NatSR...5E8665L. doi:10.1038/srep08665. PMC 4345333. PMID 25727453.
 ^ Sikic, Mile; Lancic, Alen; AntulovFantulin, Nino; Stefancic, Hrvoje (October 2013). "Epidemic centrality  is there an underestimated epidemic impact of network peripheral nodes?". European Physical Journal B. 86 (10): 440. arXiv:1110.2558. Bibcode:2013EPJB...86..440S. doi:10.1140/epjb/e2013310255. S2CID 12052238.
 ^ Borgatti, Stephen P. (2005). "Centrality and Network Flow". Social Networks. 27: 55–71. CiteSeerX 10.1.1.387.419. doi:10.1016/j.socnet.2004.11.008.
 ^ ^{a} ^{b} ^{c} Braha, D.; BarYam, Y. (2006). "From Centrality to Temporary Fame: Dynamic Centrality in Complex Networks". Complexity. 12 (2): 59–63. arXiv:physics/0611295. Bibcode:2006Cmplx..12b..59B. doi:10.1002/cplx.20156. S2CID 1776280.
 ^ ^{a} ^{b} Hill, S.A.; Braha, D. (2010). "Dynamic Model of TimeDependent Complex Networks". Physical Review E. 82 (4): 046105. arXiv:0901.4407. Bibcode:2010PhRvE..82d6105H. doi:10.1103/physreve.82.046105. PMID 21230343. S2CID 3219870.
 ^ ^{a} ^{b} Gross, T. and Sayama, H. (Eds.). 2009. Adaptive Networks: Theory, Models and Applications. Springer.
 ^ ^{a} ^{b} Holme, P. and Saramäki, J. 2013. Temporal Networks. Springer.
 ^ S. Carmi, S. Havlin, S. Kirkpatrick, Y. Shavitt, E. Shir (2007). "A model of Internet topology using kshell decomposition". PNAS. 104 (27): 11150–4. doi:10.1073/pnas.0701175104. PMC 1896135. PMID 17586683.CS1 maint: multiple names: authors list (link)
 ^ M. Kitsak, L. K. Gallos, S. Havlin, F. Liljeros, L. Muchnik, H. E. Stanley, H.A. Makse (2010). "Influential Spreaders in Networks". Nature Physics. 6: 888. doi:10.1038/nphys1746.CS1 maint: multiple names: authors list (link)
 ^ Travençolo, B. A. N.; da F. Costa, L. (2008). "Accessibility in complex networks". Physics Letters A. 373 (1): 89–95. Bibcode:2008PhLA..373...89T. doi:10.1016/j.physleta.2008.10.069.
 ^ Bender, Edward A; Canfield, E.Rodney (May 1978). "The asymptotic number of labeled graphs with given degree sequences". Journal of Combinatorial Theory, Series A. 24 (3): 296–307. doi:10.1016/00973165(78)900596. ISSN 00973165.
 ^ ^{a} ^{b} Molloy, Michael; Reed, Bruce (March 1995). "A critical point for random graphs with a given degree sequence". Random Structures & Algorithms. 6 (2–3): 161–180. CiteSeerX 10.1.1.24.6195. doi:10.1002/rsa.3240060204. ISSN 10429832.
 ^ ^{a} ^{b} Newman, M. E. J.; Strogatz, S. H.; Watts, D. J. (20010724). "Random graphs with arbitrary degree distributions and their applications". Physical Review E. 64 (2): 026118. arXiv:condmat/0007235. Bibcode:2001PhRvE..64b6118N. doi:10.1103/PhysRevE.64.026118. PMID 11497662. S2CID 360112.
 ^ Kryven, Ivan (20170502). "General expression for the component size distribution in infinite configuration networks". Physical Review E. 95 (5): 052303. arXiv:1703.05413. Bibcode:2017PhRvE..95e2303K. doi:10.1103/PhysRevE.95.052303. PMID 28618550. S2CID 8421307.
 ^ Kryven, Ivan (20180101). "Analytic results on the polymerisation random graph model". Journal of Mathematical Chemistry. 56 (1): 140–157. doi:10.1007/s1091001707851. ISSN 02599791.
 ^ Kryven, Ivan (20160727). "Emergence of the giant weak component in directed random graphs with arbitrary degree distributions". Physical Review E. 94 (1): 012315. arXiv:1607.03793. Bibcode:2016PhRvE..94a2315K. doi:10.1103/PhysRevE.94.012315. PMID 27575156. S2CID 206251373.
 ^ Kryven, Ivan (20171102). "Finite connected components in infinite directed and multiplex networks with arbitrary degree distributions". Physical Review E. 96 (5): 052304. arXiv:1709.04283. Bibcode:2017PhRvE..96e2304K. doi:10.1103/PhysRevE.96.052304. PMID 29347790. S2CID 20741516.
 ^ R. Albert; A.L. Barabási (2002). "Statistical mechanics of complex networks" (PDF). Reviews of Modern Physics. 74 (1): 47–97. arXiv:condmat/0106096. Bibcode:2002RvMP...74...47A. CiteSeerX 10.1.1.242.4753. doi:10.1103/RevModPhys.74.47. S2CID 60545. Archived from the original (PDF) on 20150824.
 ^ AlbertLászló Barabási & Réka Albert (October 1999). "Emergence of scaling in random networks" (PDF). Science. 286 (5439): 509–512. arXiv:condmat/9910332. Bibcode:1999Sci...286..509B. doi:10.1126/science.286.5439.509. PMID 10521342. S2CID 524106. Archived from the original (PDF) on 20120417.
 ^ Cohen, R.; Havlin, S. (2003). "Scalefree networks are ultrasmall". Phys. Rev. Lett. 90 (5): 058701. arXiv:condmat/0205476. Bibcode:2003PhRvL..90e8701C. doi:10.1103/PhysRevLett.90.058701. PMID 12633404. S2CID 10508339.
 ^ Krapivsky, P. L.; Redner, S.; Leyvraz, F. (20 November 2000). "Connectivity of Growing Random Networks". Physical Review Letters. 85 (21): 4629–4632. arXiv:condmat/0005139. Bibcode:2000PhRvL..85.4629K. doi:10.1103/PhysRevLett.85.4629. PMID 11082613. S2CID 16251662.
 ^ Krapivsky, Paul; Krioukov, Dmitri (21 August 2008). "Scalefree networks as preasymptotic regimes of superlinear preferential attachment". Physical Review E. 78 (2): 026114. arXiv:0804.1366. Bibcode:2008PhRvE..78b6114K. doi:10.1103/PhysRevE.78.026114. PMID 18850904. S2CID 14292535.
 ^ Hassan, M. K.; Islam, Liana; Arefinul Haque, Syed (March 2017). "Degree distribution, ranksize distribution, and leadership persistence in mediationdriven attachment networks". Physica A. 469: 23–30. arXiv:1411.3444. Bibcode:2017PhyA..469...23H. doi:10.1016/j.physa.2016.11.001. S2CID 51976352.
 ^ Caldarelli G., A. Capocci, P. De Los Rios, M.A. Muñoz, Physical Review Letters 89, 258702 (2002)
 ^ Servedio V.D.P., G. Caldarelli, P. Buttà, Physical Review E 70, 056126 (2004)
 ^ Garlaschelli D., M I Loffredo Physical Review Letters 93, 188701 (2004)
 ^ Cimini G., T. Squartini, D. Garlaschelli and A. Gabrielli, Scientific Reports 5, 15758 (2015)
 ^ ^{a} ^{b} Wasserman, Stanley and Katherine Faust. 1994. Social Network Analysis: Methods and Applications. Cambridge: Cambridge University Press.
 ^ Newman, M.E.J. Networks: An Introduction. Oxford University Press. 2010, ISBN 9780199206650
 ^ "Toward a Complex Adaptive Intelligence Community The Wiki and the Blog". D. Calvin Andrus. cia.gov. Retrieved 25 August 2012.
 ^ "Network analysis of terrorist networks". Archived from the original on 20121123. Retrieved 20111212.
 ^ PhD, Martin Bouchard; PhD, Aili Malm (20161102). "Social Network Analysis and Its Contribution to Research on Crime and Criminal Justice". doi:10.1093/oxfordhb/9780199935383.013.21. Cite journal requires
journal=
(help)  ^ Xanthos, Aris, Pante, Isaac, Rochat, Yannick, Grandjean, Martin (2016). Visualising the Dynamics of Character Networks. In Digital Humanities 2016: Jagiellonian University & Pedagogical University, Kraków, pp. 417–419.
 ^ Barabási, A. L.; Gulbahce, N.; Loscalzo, J. (2011). "Network medicine: a networkbased approach to human disease". Nature Reviews Genetics. 12 (1): 56–68. doi:10.1038/nrg2918. PMC 3140052. PMID 21164525.
 ^ R. Cohen; S. Havlin (2010). Complex Networks: Structure, Robustness and Function. Cambridge University Press.
 ^ A. Bunde; S. Havlin (1996). Fractals and Disordered Systems. Springer.
 ^ Puzis, R.; Yagil, D.; Elovici, Y.; Braha, D. (2009). "Collaborative attack on Internet users' anonymity" (PDF). Internet Research. 19: 1. CiteSeerX 10.1.1.219.3949. doi:10.1108/10662240910927821. Archived from the original (PDF) on 20131207. Retrieved 20150208.
 ^ Newman, M., Barabási, A.L., Watts, D.J. [eds.] (2006) The Structure and Dynamics of Networks. Princeton, N.J.: Princeton University Press.
 ^ Dorogovtsev, S N; Mendes, J F F (2003). Evolution of Networks: From Biological Nets to the Internet and WWW. New York, NY, USA: Oxford University Press, Inc. ISBN 9780198515906.
 ^ Cotacallapa, M; Hase, M O (2016). "Epidemics in networks: a master equation approach". Journal of Physics A. 49 (6): 065001. arXiv:1604.01049. Bibcode:2016JPhA...49f5001C. doi:10.1088/17518113/49/6/065001. S2CID 119206200.
 ^ S. V. Buldyrev; R. Parshani; G. Paul; H. E. Stanley; S. Havlin (2010). "Catastrophic cascade of failures in interdependent networks". Nature. 464 (7291): 1025–28. arXiv:0907.1182. Bibcode:2010Natur.464.1025B. doi:10.1038/nature08932. PMID 20393559. S2CID 1836955.
 ^ Gao, Jianxi; Buldyrev, Sergey V.; Havlin, Shlomo; Stanley, H. Eugene (2011). "Robustness of a Network of Networks". Phys. Rev. Lett. 107 (19): 195701. arXiv:1010.5829. Bibcode:2011PhRvL.107s5701G. doi:10.1103/PhysRevLett.107.195701. PMID 22181627. S2CID 2464351.
 ^ Brummitt, Charles; D'Souza, Raissa; Leicht, Elizabeth (2012). "Suppressing cascades of load in interdependent networks". Proceedings of the National Academy of Sciences. 109 (12): E680–E689. doi:10.1073/pnas.1110586109. PMC 3311366. PMID 22355144.
 ^ Li, Wei; Bashan, Amir; Buldyrev, Sergey V.; Stanley, H. Eugene; Havlin, Shlomo (2012). "Cascading Failures in Interdependent Lattice Networks: The Critical Role of the Length of Dependency Links". Physical Review Letters. 108 (22): 228702. Bibcode:2012PhRvL.108v8702L. doi:10.1103/PhysRevLett.108.228702. PMID 23003664. S2CID 5233674.CS1 maint: uses authors parameter (link)
 ^ Bashan, Amir; Berezin, Yehiel; Buldyrev, Sergey V.; Havlin, Shlomo (2013). "The extreme vulnerability of interdependent spatially embedded networks". Nature Physics. 9 (10): 667–672. arXiv:1206.2062. Bibcode:2013NatPh...9..667B. doi:10.1038/nphys2727. S2CID 12331944.CS1 maint: uses authors parameter (link)
 ^ Danziger, Michael M.; Shekhtman, Louis M.; Berezin, Yehiel; Havlin, Shlomo (2016). "The effect of spatiality on multiplex networks". EPL. 115 (3): 36002. arXiv:1505.01688. Bibcode:2016EL....11536002D. doi:10.1209/02955075/115/36002.CS1 maint: uses authors parameter (link)
 ^ Vaknin, Dana; Danziger, Michael M; Havlin, Shlomo (2017). "Spreading of localized attacks in spatial multiplex networks". New Journal of Physics. 19 (7): 073037. arXiv:1704.00267. Bibcode:2017NJPh...19g3037V. doi:10.1088/13672630/aa7b09. S2CID 9121930.CS1 maint: uses authors parameter (link)
Further reading
 A First Course in Network Science, F. Menczer, S. Fortunato, C.A. Davis. (Cambridge University Press, 2020). ISBN 9781108471138. GitHub site with tutorials, datasets, and other resources
 "Connected: The Power of Six Degrees," https://web.archive.org/web/20111006191031/http://ivl.slis.indiana.edu/km/movies/2008talasconnected.mov
 Cohen, R.; Erez, K. (2000). "Resilience of the Internet to random breakdown". Phys. Rev. Lett. 85 (21): 4626–4628. arXiv:condmat/0007048. Bibcode:2000PhRvL..85.4626C. CiteSeerX 10.1.1.242.6797. doi:10.1103/physrevlett.85.4626. PMID 11082612. S2CID 15372152.
 Pu, CunLai; Wen; Pei, Jiang; Michaelson, Andrew (2012). "Robustness analysis of network controllability" (PDF). Physica A. 391 (18): 4420–4425. Bibcode:2012PhyA..391.4420P. doi:10.1016/j.physa.2012.04.019. Archived from the original (PDF) on 20161013. Retrieved 20130918.
 "Leader Profile: The Burgeoning Field of Network Science, The Military Engineer recently had the opportunity to speak with Frederick I. Moxley, Ph.D," https://web.archive.org/web/20190215025457/http://themilitaryengineer.com/index.php/item/160leaderprofiletheburgeoningfieldofnetworkscience
 S.N. Dorogovtsev and J.F.F. Mendes, Evolution of Networks: From biological networks to the Internet and WWW, Oxford University Press, 2003, ISBN 0198515901
 Linked: The New Science of Networks, A.L. Barabási (Perseus Publishing, Cambridge)
 'ScaleFree Networks, G. Caldarelli (Oxford University Press, Oxford)
 Network Science, Committee on Network Science for Future Army Applications, National Research Council. 2005. The National Academies Press (2005)ISBN 0309100267
 Network Science Bulletin, USMA (2007) ISBN 9781934808009
 The Structure and Dynamics of Networks Mark Newman, AlbertLászló Barabási, & Duncan J. Watts (The Princeton Press, 2006) ISBN 0691113572
 Dynamical processes on complex networks, Alain Barrat, Marc Barthelemy, Alessandro Vespignani (Cambridge University Press, 2008) ISBN 9780521879507
 Network Science: Theory and Applications, Ted G. Lewis (Wiley, March 11, 2009) ISBN 0470331887
 Nexus: Small Worlds and the Groundbreaking Theory of Networks, Mark Buchanan (W. W. Norton & Company, June 2003) ISBN 0393324427
 Six Degrees: The Science of a Connected Age, Duncan J. Watts (W. W. Norton & Company, February 17, 2004) ISBN 0393325423
 Kitsak, M.; Gallos, L. K.; Havlin, S.; Liljeros, F.; Muchnik, L.; Stanley, H. E.; Makse, H.A. (2010). "Influential Spreaders in Networks". Nature Physics. 6 (11): 888–893. arXiv:1001.5285. Bibcode:2010NatPh...6..888K. CiteSeerX 10.1.1.366.2543. doi:10.1038/nphys1746. S2CID 1294608.