Boswellbrink3889

Z Iurium Wiki

This paper is devoted to the study of an averaging principle for fractional stochastic differential equations in Rn with Lévy motion, using an integral transform method. HDAC inhibitor We obtain a time-averaged effective equation under suitable assumptions. Furthermore, we show that the solutions of the averaged equation approach the solutions of the original equation. Our results provide a better understanding for effective approximation of fractional dynamical systems with non-Gaussian Lévy noise.The coronavirus 2019 (COVID-19) respiratory disease is caused by the novel coronavirus SARS-CoV-2 (severe acute respiratory syndrome coronavirus 2), which uses the enzyme ACE2 to enter human cells. This disease is characterized by important damage at a multi-organ level, partially due to the abundant expression of ACE2 in practically all human tissues. However, not every organ in which ACE2 is abundant is affected by SARS-CoV-2, which suggests the existence of other multi-organ routes for transmitting the perturbations produced by the virus. We consider here diffusive processes through the protein-protein interaction (PPI) network of proteins targeted by SARS-CoV-2 as an alternative route. We found a subdiffusive regime that allows the propagation of virus perturbations through the PPI network at a significant rate. By following the main subdiffusive routes across the PPI network, we identify proteins mainly expressed in the heart, cerebral cortex, thymus, testis, lymph node, kidney, among others of the organs reported to be affected by COVID-19.Adversarial attacks have been alerting the artificial intelligence community recently since many machine learning algorithms were found vulnerable to malicious attacks. This paper studies adversarial attacks on Broido and Clauset classification for scale-free networks to test its robustness in terms of statistical measures. In addition to the well-known random link rewiring (RLR) attack, two heuristic attacks are formulated and simulated degree-addition-based link rewiring (DALR) and degree-interval-based link rewiring (DILR). These three strategies are applied to attack a number of strong scale-free networks of various sizes generated from the Barabási-Albert model and the uncorrelated configuration model. It is found that both DALR and DILR are more effective than RLR in the sense that rewiring a smaller number of links can succeed in the same attack. However, DILR is as concealed as RLR in the sense that they both are introducing a relatively small change on several typical structural properties, such as the average shortest path-length, the average clustering coefficient, the average diagonal distance, and the Kolmogorov-Smirnov test of the degree distribution. The results of this paper suggest that to classify a network to be scale-free, one has to be very careful from the viewpoint of adversarial attack effects.We perform a large scale analysis of a list of fintech terms in (i) news and blogs in the English language and (ii) professional descriptions of companies operating in many countries. The occurrence and the co-occurrence of fintech terms and locutions show a progressive evolution of the list of fintech terms in a compact and coherent set of terms used worldwide to describe fintech business activities. By using methods of complex networks that are specifically designed to deal with heterogeneous systems, our analysis of a large set of professional descriptions of companies shows that companies having fintech terms in their description present over-expressions of specific attributes of country, municipality, and economic sector. By using the approach of statistically validated networks, we detect geographical and economic over-expressions of a set of companies related to the multi-industry, geographically, and economically distributed fintech movement.Increasing empirical evidence in recent years has shown that bots or malicious users in a social network play a critical role in the propagation of false information, while a theoretical modeling of such a problem has been largely ignored. In this paper, applying a simple contagion model, we study the effect of malicious nodes on the spreading of false information by incorporating the smart nodes who perform better than normal nodes in discerning false information. The malicious nodes, however, will always repost (or adopt) the false message as long as they receive it. We show analytically that, for a random distribution of malicious nodes, there is a critical number of malicious nodes above which the false information could outbreak in a random network. We further study three different distribution strategies of selecting malicious nodes for false information spreading. We find that malicious nodes that have large degrees, or are tightly connected, can enhance the spread. However, when they are close to the smart nodes, the spreading of false information can either be promoted or inhibited, depending on the network structure.Business cycles are oscillations in the economy because of recessions and expansions. In this paper we investigate the oscillation of the gross domestic product as a result of its relations with the other main macroeconomic variables such as capital, consumption, and investment. There is a long-standing debate about chaos and non-linear dynamics in economy and even the usefulness of those concepts has been questioned. Stochastic modeling has proven to be able to simulate reality fairly well. However, a stochastic behavior implies that reality is about exogenous randomness, while a chaotic behavior means that reality is deterministic and non-linearities are endogenous. Here we compare an Ornstein-Uhlenbeck stochastic process with a Kaldor-Kalecki deterministic chaotic model to understand which one fits better real data. We show that our chaotic model is able to represent reality as well as the stochastic model taken into consideration. Furthermore, our model may reproduce an extreme event (black swans).The connectivity of complex networks is usually determined by a small fraction of key nodes. Earlier works successfully identify an influential single node, yet have some problems for the case of multiple ones. In this paper, based on the matrix spectral theory, we propose the collective influence of multiple nodes. An interesting finding is that some traditionally influential nodes have strong internal coupling interactions that reduce their collective influence. We then propose a greedy algorithm to dismantle complex networks by optimizing the collective influence of multiple nodes. Experimental results show that our proposed method outperforms the state of the art methods in terms of the principal eigenvalue and the giant component of the remaining networks.

Autoři článku: Boswellbrink3889 (Olesen Hunter)