Characterizing and modeling subnational virtual water networks of US agricultural and industrial commodity flows

S Garcia, A Mejia - Advances in Water Resources, 2019 - Elsevier
Virtual water flows have been extensively analyzed at the national level using complex
network approaches. However, less is known about the regional structure of subnational …

Vulnerability of clustering under node failure in complex networks

A Kuhnle, NP Nguyen, TN Dinh, MT Thai - Social Network Analysis and …, 2017 - Springer
Robustness in response to unexpected events is always desirable for real-world networks.
To improve the robustness of any networked system, it is important to analyze vulnerability to …

Anomaly detection in online social networks: using data-mining techniques and fuzzy logic

R Hassanzadeh - 2014 - eprints.qut.edu.au
This research is a step forward in improving the accuracy of detecting anomaly in a data
graph representing connectivity between people in an online social network. The proposed …

Structural vulnerability assessment of community-based routing in opportunistic networks

MA Alim, X Li, NP Nguyen, MT Thai… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Opportunistic networks enable mobile devices to communicate with each other through
routes that are built dynamically, while messages are en route between the sender and the …

Disintegrating constant communities in complex networks

DK Singh, S Nandi, T Chakraborty… - Journal of Computational …, 2022 - Elsevier
Community detection in complex networks has been one of the major research areas since
last one decade. Most of the community detection algorithms are non-deterministic, thus …

Structural vulnerability analysis of overlapping communities in complex networks

MA Alim, NP Nguyen, TN Dinh… - 2014 IEEE/WIC/ACM …, 2014 - ieeexplore.ieee.org
Many complex networks commonly exhibit community structure in their underlying
organizations, ie, They contain multiple groups of nodes having more connections inside a …

Transitivity demolition and the fall of social networks

HT Nguyen, NP Nguyen, T Vu, HX Hoang… - IEEE Access, 2017 - ieeexplore.ieee.org
In this paper, we study crucial elements of a complex network, namely its nodes and
connections, which play a key role in maintaining the network's structure and function under …

Memristor-based (reram) data memory architecture in asip design

M Hartmann, P Raghavan… - … on Digital System …, 2013 - ieeexplore.ieee.org
Recently, multiple non-volatile emerging memories (NVMs) have been proposed and show
promising properties to replace SRAM-based memories in future SoCs. However, these new …

An Approach to Analyze the Vulnerability of Function-Based Social Networks Using Clustering Coefficient

M Mirzaie, M Nooraei Abadeh - Tabriz Journal of Electrical …, 2020 - tjee.tabrizu.ac.ir
Robustness in response to unexpected events is always ideal for real-world networks. In
order to improve the robustness of any network system, it is important to analyze the …

On the Vulnerability of Community Structure in Complex Networks

V Parimi, A Pal, S Ruj, P Kumaraguru… - Principles of Social …, 2022 - Springer
In this paper, we study the role of nodes and edges in a complex network in dictating the
robustness of a community structure toward structural perturbations. Specifically, we attempt …