Complex networks permeate our daily lives. Their structures play a central role in social, biological, and economic interactions. By improving the accuracy of modeling network structures, we would achieve unprecedented improvements in controlling the destructive impacts of negative networks; such as criminal or cancer networks, or extending the scale of a good behavior in a complex network. Expectation-Maximization technique is applied along with maximum likelihood technique to improve the degree distribution estimates and, in the end, improve the accuracy of network structures. In addition to the networks' static structure, i.e. degree distribution, this study evaluates the network's structural change under random failures and targeted attacks. Removing nodes from a network is another challenge in complex network area. Six network performance metrics are introduced to quantify diffusion speed, diffusion scale, homogeneity, and diameter of a network. Moreover, ten heuristic node removal strategies are designed using different node centrality metrics including degree, betweenness, reciprocal closeness, complement-derived closeness, and eigenvector centrality. The experiments find that degree and betweenness could select more important nodes than the other node centrality metrics. Since calculating degree is computationally more reasonable than betweenness, we use this metric to remove nodes from September 11 hijackers' network, HIV network in Colorado Springs, and the power grid network in North America.
|Commitee:||Ko, Hoo Sang, Neath, Andrew|
|School:||Southern Illinois University at Edwardsville|
|Department:||Mechanical and Industrial Engineering|
|School Location:||United States -- Illinois|
|Source:||MAI 52/03M(E), Masters Abstracts International|
|Keywords:||Complex network, Expectation maximization, Maximum likelihood estimation, Node removal|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be