Modelling of cluster supply network with cascading failure spread and its vulnerability analysis

Y Zeng, R Xiao - International Journal of Production Research, 2014 - Taylor & Francis
In this paper, a new entropy approach is developed to study the vulnerability of cluster
supply chain network during the cascading failure spread from a holistic point of view. We …

On maximizing the entropy of complex networks

MH Safar, IY Sorkhoh, HM Farahat, KA Mahdi - Procedia Computer Science, 2011 - Elsevier
This work explores the configurations of complex networks that would exhibit the maximum
entropy using both degree and cyclic entropies measures. Theoretical models for such …

Entropy characterization of random network models

PJ Zufiria, I Barriales-Valbuena - Entropy, 2017 - mdpi.com
This paper elaborates on the Random Network Model (RNM) as a mathematical framework
for modelling and analyzing the generation of complex networks. Such framework allows the …

A recursive clustering technique for color picture segmentation

M Celenk - Proceedings CVPR'88: The Computer Society …, 1988 - computer.org
The internal feedback structure exists in nonhierarchical complex networks in the form of
cycles. Diffusion of information from a node to reach out all the rest occurs through …

[PDF][PDF] Maximum entropy of fully connected social network

M Safar, K Mahdi, I Sorkhoh - IADIS international conference web …, 2008 - researchgate.net
With the advancement of the technology and the wide use of the Internet, a large number of
global social network websites emphasizing genuine friendships and the discovery of new …

[PDF][PDF] Cycle-Based versus Degree-based Classification of Social Networks.

K Mahdi, M Safar, I Sorkhoh, A Kassem - J. Digit. Inf. Manag., 2009 - researchgate.net
Complex networks can be classified in three main types: random networks, small-world
networks and scale-free networks. Two approaches are tested and compared to identify and …

Analysis of temporal evolution of social networks

K Mahdi, M Safar, H Farahat - Journal of Mobile …, 2009 - journals.riverpublishers.com
The article presents an analysis of dynamic social network where words, nodes and edges
appear and disappear through time. We study a popular virtual social network in the internet …

Detecting cycles in graphs using parallel capabilities of GPU

F Mahdi, M Safar, K Mahdi - … , DICTAP 2011, Dijon, France, June 21-23 …, 2011 - Springer
We present an approximation algorithm for detecting the number of cycles in an undirected
graph, using CUDA (Compute Unified Device Architecture) technology from NVIDIA and …

Cyclic entropy of complex networks

I Sorkhoh, K Mahdi, M Safar - 2012 IEEE/ACM International …, 2012 - ieeexplore.ieee.org
We calculate the cyclic entropy of a real virtual friendship network to have an insight on the
degree of its robustness. Upon counting the number of cycles of different sizes in the …

A networked approach to dynamic analysis of social system vulnerability

Y Zeng, R Xiao - Journal of Intelligent & Fuzzy Systems, 2015 - content.iospress.com
Given the high vulnerability of social system to disruptions, it is very critical to make scientific
analysis on the vulnerability of social system and further manage its vulnerability, especially …