Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  • articleNo Access

    Label propagation algorithm based on node similarity driven by local information

    Label propagation algorithm (LPA) attracts wide attention in community detection field for its near linear time complexity in large scale network. However, the algorithm adopts a random selection scheme in label updating strategy, which results in unstable division and poor accuracy. In this paper, five different indicators of node similarity are introduced based on network local information to distinguish nodes and a new label updating method is proposed. When there are multiple maximum neighbor labels in the propagation process, the maximum label corresponding to the most similar node is selected for updating instead of a random one. Five different forms of improved LPA are proposed which are named as SAL-LPA, SOR-LPA, JAC-LPA, SOR-LPA, HDI-LPA and HPI-LPA. The experiment results on real-world and artificial benchmark networks show that the improved LPA greatly improves the performance of the original algorithm, among which HPI-LPA is the best.

  • articleNo Access

    ATTACK VULNERABILITY OF COMPLEX NETWORKS BASED ON LOCAL INFORMATION

    We introduce a novel model for attack vulnerability of complex networks with a tunable attack information parameter. Based on the model, we study the attack vulnerability of complex networks based on local information. We employ the generating function formalism to derive the exact value of the critical removal fraction of nodes for the disintegration of networks and the size of the giant component based on local information. We show that hiding just a small fraction of nodes can prevent the breakdown of a network and that it is a cost-efficient strategy for enhancing the robustness of complex networks to hide the information of networks.

  • articleNo Access

    A LOCAL INFORMATION-BASED ROUTING STRATEGY ON THE SCALE-FREE NETWORK

    The efficiency of a routing strategy on complex networks can be reflected by two measurements, i.e. the system capacity and the average data packets travel time. In this paper, we propose a new routing strategy which is only based on local information of network topology. This strategy integrated the delivering capability and packets queue length of nodes for enhancing the efficiency of traffic on scale-free networks. The probability that a given node i with delivering capability Ci receives packets from its neighbors is proportional to (Ni+1)/Ci and Ni is the packets queue length of the node i. Simulation results show that there exists an optimal value by maximizing the networks delivering capability and minimizing the packet travel time. We simulated the strategy on BA network with different m (connectivity density) values and the results show that our strategy is more efficient than other local information-based routing strategies.

  • articleNo Access

    HOW TO EXPLOIT LOCAL INFORMATION WHEN DISTILLING ENTANGLEMENT

    Distillation protocols enable generation of high quality entanglement even in the presence of noise. Existing protocols ignore the presence of local information in mixed states produced from some noise sources such as photon loss, amplitude damping or thermalization. We propose new protocols that exploit local information in mixed states. Our protocols converge to higher fidelities in fewer rounds, and when local information is significant one of our protocols consistently improves yields by 10 fold or more. We demonstrate that our protocols can be compacted into an entanglement-pumping scheme, allowing quantum computation in distributed systems with a few qubits per location.