Risk Diffusion Modeling and Vulnerability Quantification on Japanese Human Mobility Network from Complex Network Analysis Point of View
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 2
Abstract
The human mobility networks are vital infrastructure in recent social systems. Many efforts have been made to keep the healthy human mobility flows to maintain sustainable development of recent well-connected society. However, the inter-connectivity sometimes raises unintended diffusion and amplification of the intrinsic risks, which is difficult to forecast because of the complexity of the underlying networks. Therefore, it is believed that modeling and simulation of the risk diffusion in the human mobility networks are suggestive and meaningful. Also, recent improvement of usability of individual-level human mobility data and capabilities of high-performance computing technologies enable us to employ the data-driven approaches. In this paper, the risk diffusion dynamics is modeled based on the SIS epidemic model and the vulnerability index is defined to quantify the node-level easiness of suffering risks. We also conduct the link removal test to find the better risk mitigation methods.
Authors and Affiliations
Kiyotaka Ide, Hiroshi Sato, Tran Anh, Akira Namatame
Portable Facial Recognition Jukebox Using Fisherfaces (Frj)
A portable real-time facial recognition system that is able to play personalized music based on the identified person’s preferences was developed. The system is called Portable Facial Recognition Jukebox Using Fisherface...
Analysis of Software Tools for Longitudinal Studies in Psychology
Longitudinal studies allow to access the review of causal hypotheses directly. It means that they make possible causal relation between the order of impacts (i.e. life events, educational effects, etc.) and the consequen...
An Analysis on Host Vulnerability Evaluation of Modern Operating Systems
Security is a major concern in all computing environments. One way to achieve security is to deploy a secure operating system (OS). A trusted OS can actually secure all the resources and can resist the vulnerabilities an...
Robot Arm Analysis based on Master Device Pneumatic Actuators
Advances in technology have expanded the use of soft actuators in various fields especially in robotics, rehabilitation and medical field. Soft actuator development provides many advantages, primarily being simple struct...
The Failure of E-government in Jordan to Fulfill Potential
The aim of this paper is to uncover the reasons behind what so-called total failure in e-government project in Jordan. Reviewing the published papers in this context revealed that both citizens and employees do not under...