A new complex network model and convergence dynamics for reputation computation in virtual organizations

Size: px
Start display at page:

Download "A new complex network model and convergence dynamics for reputation computation in virtual organizations"

Transcription

1 Physics Letters A 356 (26) A new complex network model and convergence dynamics for reputation computation in virtual organizations Jinde Cao a Wenwu Yu a Yuzhong Qu b a Department of Mathematics Southeast University Nanjing 2196 China b Department of Computer Science & Engineering Southeast University Nanjing 2196 China Received 8 December 25; received in revised form 26 March 26; accepted 3 April 26 Available online 18 April 26 Communicated by J. Flouquet Abstract In this Letter a new complex network model is established for reputation computation in virtual organizations and its dynamics is investigated. Several sufficient conditions have been derived to ensure the global asymptotical stability of the new complex network model by using Lyapunov method and linear matrix inequality (LMI) technique the stability means that the reputation degrees of entities can tend to some fixed constants as time evolves. Also for this new model some other dynamical phenomena such as bifurcation and chaos synchronization are proposed for our consideration in the future. This may open a new research branch in the area. 26 Elsevier B.V. All rights reserved. Keywords: Complex network; Reputation computation; Virtual organization; Lyapunov method; Trust; Reputation degree; LMI; Convergence dynamics; Stability; Semantic web; Semantic grid 1. Introduction The next generation of the internet is called the semantic web or semantic grid [1 3] which provides an environment that allows more intelligent knowledge management and data mining. The semantic web or semantic grid is becoming popular for sharing information and resources over the internet through web services or grid services which are being developed based on the semantic grid [45]. Semantic grid allows anyone around the world to develop their own tools to interact with the resources on semantic grid easily. A virtual organization (VO) is a collection of users in the same administrative domain. A user can belong to many virtual organizations and has a different role (user client administrator and so on) in each of them. The main problem in virtual organization is its security which includes how to identify a user and how to evaluate the actions that a user can perform. Virtual organizations [67] which allow access to large amount of computing resources have become increasingly popular. The real and specific problem that underlies the grid concept is to coordinate resources-sharing and problem-solving dynamically among multi-institutional virtual organizations. The sharing that we are concerned with is not primarily files exchange but rather direct access to computers software data and other resources as is required by a range of collaborative problem-solving and resourcebrokering strategies emerging in industry engineering and technology. For implementing secure and reliable high-performance computing services it is necessary to know how to support the security infrastructure for virtual organizations. Security in virtual organizations [8 1] has attracted increasing attentions from various research communities in recent years due to the unique ability of marshalling collections of heterogeneous computers and resources enabling easy access to diverse resources and services that This work was supported by the 973 Program of China under Grant 23CB3174 and the National Natural Science Foundation of China under Grant * Corresponding author. addresses: jdcao@seu.edu.cn (J. Cao) yzqu@seu.edu.cn (Y. Qu) /$ see front matter 26 Elsevier B.V. All rights reserved. doi:1.116/j.physleta

2 J. Cao et al. / Physics Letters A 356 (26) otherwise could not be possible without a good computational model. However the concept of virtual organizations does introduce its own set of security challenges as users and resource providers can come from mutually distributed administrative domains and some participants can behave maliciously. These malicious attacks can generally compromise the resource provider node and the shared resources node may be malicious or compromised to harm the user s job running on the supporting platform. Recently in [1] the reputation has been recognized as an important factor for security of virtual organization. However to the best of our knowledge no models have been given for integrating computational systems into virtual organizations. In this Letter we establish a new complex network model for the reputation computation of virtual organizations. It is well known that complex networks (which include world wide web food webs telephone call graphs electrical power grids neural networks co-authorship and citation networks of scientists cellular and metabolic networks etc.) exist in all fields of sciences and humanities and have been intensively studied [11 14]. Some properties of real-world complex networks can be well understood by considering internal interactions or coupling of the network and their basic properties are mainly determined by the way of the connections among the nodes. Based on sound reasoning or evidence we can use complex network model to study the reputation degrees for virtual organizations. Recently in [1516] the authors studied a dynamical complex network model and also discussed its synchronization. For the concerned issue of synchronization there exist some recent publications refer to [17 28]. In this Letter we will try to propose a new complex network model for solving the problem of reputation computation in virtual organizations. 2. Preliminaries and model formulation In order to establish a new model for reputation computation in virtual organizations the concept of trust and reputation [29] are introduced. The notion of trust is a complex subject relating to a firm belief in attributes such as reliability honesty and competence of the trusted entity. Here we use the definition of the trust from [29]: Definition 1. Trust is the firm belief in the competence of an entity to act as expected such that this firm belief is not a fixed value associated with the entity but rather it is subject to the entity s behavior and applies only within a specific context at a given time. That is the firm belief is a dynamic value and spans over a set of values ranging from very trustworthy to every untrustworthy. The trust level is built on past experiences given for a specific context and specified for a given time because the trust level today between two entities may not be necessarily the same trust lever a year ago. When making trust-based decisions entities can rely on others for information pertaining to a specific entity. For example if entity x wants to make a decision whether to have a transaction with entity y which is unknown to x then x can rely on the reputation of y. The definition of reputation that we will use is also introduced in [29] as follows: Definition 2. The reputation of an entity is an expectation of its behavior based on other entities observations or the collective information about the entity s past behavior within a specific context at a given time. Now we try to establish a new complex network model for computing reputation degrees in virtual organizations. In [1516] a complex dynamical network which consists of N linearly and diffusively coupled identical nodes is considered with each node being an n-dimensional dynamical system of the form: ẋ i (t) = f ( x i (t) ) + c G ij Γ ( x j (t) x i (t) ) j i i = N (1) x i (t) = (x i1 (t) x i2 (t)...x in (t)) T R n is the state vector representing the state vectors of node i i = N f : R n R n is continuously differentiable the constant c is the coupling strength Γ = diag(γ 1 γ 2...γ n ) R n n is a constant 1 matrix linking the coupled variables with γ i = 1 for a specific i and γ j = (j i) that is there is only one 1 in the diagonal of matrix Γ and all the other components of Γ are zeros G = (G ij ) N N is the coupling configuration matrix representing the coupling strengths and topological structure of the network in which G ij is defined as follows: if there is a connection from node i to nodej (j i) then the elements of coupling matrix G ij = G ji = 1; otherwise G ij = G ji = (j i) and the diagonal elements of matrix G are defined by G ii = G ij = G ji. j i j i (2)

3 416 J. Cao et al. / Physics Letters A 356 (26) Then in this case the complex network (1) reduces to the model ẋ i (t) = f ( x i (t) ) + c G ij Γx j (t) i = N. (3) Hereafter suppose that the network (3) is connected in the sense that there are no isolated clusters so the coupling configuration G is an irreducible matrix. In [25] a time-varying coupling was introduced into the complex network model thus the network (3) can be extended as: ẋ i (t) = f ( x i (t) ) + G ij (t)a(t)x j (t) i = N. (4) As a special case the coupling linking matrix A(t) can be a constant 1 matrix in the form Γ = diag(γ 1 γ 2...γ n ) R n n and the coupling configuration matrix G(t) = c(g ij ) N N for all time t c is a constant and G ij satisfies the following condition: if there is a connection between node i and node j(i j) then G ij = G ji = 1; otherwise G ij = G ji = (j i). Then in this case the time-varying network (4) reduces to the model (3). It is noted that most of the real-world complex dynamical networks are time-varying evolving networks which implies that the coupling configuration matrix G(t) = (G ij (t)) N N and the inner coupling matrix A(t) = (a ij (t)) N N are functions with respect to time t. Moreover real-world complex dynamical networks may be directed networks such as WWW whose coupling configuration G(t) is not symmetric. Although model (3) reflects the complexity from the structure of networks it is a simple uniform dynamical network without time-varying or delay coupling. Considering the existence of delays in spreading due to the finite speeds of transmission as well as traffic congestions so it is inevitable that time delays should be modelled or introduced for simulating more realistic networks. In [24] the following complex dynamical network model with delay coupling is formulated: ẋ i (t) = f ( x i (t) ) + c G ij Γx j (t τ) i = N (5) τ is a time delay. As the coupling matrix G is irreducible symmetric all the off-diagonal elements of G are nonnegative and satisfying (2) in[24 26] the local stability or local synchronization has been studied via linearized technique. In [221] a distance between any point and synchronization manifold is defined which was used to discuss global convergence for complete regular coupling configuration and a synchronization scheme is considered for an array of linearly coupled dynamical systems. In [17 19] the global asymptotical synchronization is investigated for the following complex network of the form: ẋ i (t) = Cx i (t) + Af ( x i (t) ) + Bf ( x i (t τ) ) + I(t)+ c G ij Γx j (t) i = N (6) C = diag(c 1 c 2...c n ) R n n is a diagonal matrix with positive diagonal entries c i > i = n A = (a ij ) n n and B = (b ij ) n n are weight and delayed weight matrices respectively I(t)= (I 1 (t) I 2 (t)... I n (t)) T R n is the external input vector Γ = diag(γ 1 γ 2...γ n ) R n n f(x i (t)) = (f 1 (x i1 (t)) f 2 (x i2 (t))... f n (x in (t))) T R n are the activation functions of the nodes. Equivalently the system (6) can be written as: n ( ẋ ik (t) = c k x ik (t) + a kl f l xil (t) ) n ( + b kl f l xil (t τ) ) + I k (t) + c G ij γ k x jk (t) i = N; k = n. l=1 l=1 (7) Based on above discussions and descriptions to formulate or compute the reputation degrees in virtual organizations we propose a new model of the following array of N nonlinearly coupled complex network model of the type: ẋ i (t) = Cx i (t) + Af ( x i (t) ) + B K(t s)f ( x i (s) ) ds + I i + ( t d ij [Γ ( g ( x j (t) ) g ( x i (t) )) + Λ K(t s)g ( x j (s) ) ds j i i = N K(t s)g ( x i (s) ) )] ds (8)

4 J. Cao et al. / Physics Letters A 356 (26) or equivalently ẋ ik (t) = c k x ik (t) + + n ( a kl f l xil (t) ) + l=1 n l=1 b kl [ ( ( d ij γ k gk xjk (t) ) ( g k xik (t) )) ( + λ k i = N; k = n K l (t s)f l ( xil (s) ) ds + I ik t K k (t s)g k ( xjk (s) ) ds K k (t s)g k ( xik (s) ) ds )] (9) x i (t) = (x i1 (t) x i2 (t)...x in (t)) T R n is the state vector of the ith node of the network i = N C = diag(c 1 c 2...c n ) R n n is a diagonal matrix with positive diagonal entries c i > i = n A = (a ij ) n n and B = (b ij ) n n are weight and delayed weight matrices respectively f(x i (t)) = (f 1 (x i1 (t)) f 2 (x i2 (t))... f n (x in (t))) T R n and g(x j (t)) = (g 1 (x j1 (t)) g 2 (x j2 (t))...g n (x jn (t))) T R n represent the output of the node i and j respectively I i = (I i1 I i2...i in ) T R n is an external input vector Γ = diag(γ 1 γ 2...γ n ) R n n and Λ = diag(λ 1 λ 2...λ n ) R n n are diagonal matrices which implies that the rth state variable of the ith node of the network is only affected by the rth state variables of the other nodes of the networks and the weight function K(t) = diag(k 1 (t) K 2 (t)... K n (t)) R n n is a nonnegative bounded function defined on [ + ) reflecting the influence of the past states on the current dynamics and the coupling matrix D = (d ij ) N N is the coupling configuration matrix representing the coupling strengths and topological structure of the network in which d ij is defined as follows: if there is a connection from node i to node j(j i) then the coupling strength d ij [ 1] and the diagonal elements of matrix D is defined similarly as (2) by d ii = d ij. j i The coupled complex network model (8) can be rewritten as: ẋ i (t) = Cx i (t) + Af ( x i (t) ) + B K(t s)f ( x i (s) ) ds + I i + d ij [Γg ( x j (t) ) + Λ i = N K(t s)g ( x j (s) ) ] ds (1) (11) or equivalently ẋ ik (t) = c k x ik (t) + + n ( a kl f l xil (t) ) + l=1 ( d ij [γ k g k xjk (t) ) + λ k n l=1 b kl K l (t s)f l ( xil (s) ) ds + I ik K k (t s)g k ( xjk (s) ) ds ] i = N; k = n. In fact the proposed complex model (8) can describe the dynamical evolution of the reputation for virtual organizations in which let x i (t) denote the reputation degree of the ith entity at time t x ij (t) (j = n) be the jth index of the reputation degree x i (t) C A B be the inner coupling matrices C is the restraint of the reputation degree A is the weight matrix representing the influence of the present reputation degree and B is the weight matrix representing the influence of the past reputation degree. Also let I be the external influence the coupling configuration matrix D describe the interaction between entities Γ be the weight matrix of the influence of other entities s reputation degree compared to a certain entity s own reputation degree at present time and Λ be the weight matrix of the influence of other entities s past reputation degree compared to a certain entity s own past reputation degree assume that Γ and Λ are the diagonal matrices for simplicity which imply that the index of the reputation degree of each entity is mostly influenced by the same indexes of the other entities. From new model (8) one can see that the reputation degree that an entity holds is based on its own present reputation degree past reputation degree and the relationships with other entities as well as their reputation degrees and past reputation degrees. Now we define several special kernel matrix functions K( ). Let (12) K i (s) = δ(s τ) τ > i = n (13)

5 418 J. Cao et al. / Physics Letters A 356 (26) δ( ) is the Dirac function then the system (11) can be written as: ẋ i (t) = Cx i (t) + Af ( x i (t) ) + Bf ( x i (t τ) ) + I i + which is a model of delay coupling. Let { s τ K i (s) = i = n 1 s <τ τ is a positive constant then the model (11) can be written as: ẋ i (t) = Cx i (t) + Af ( x i (t) ) + B [ ( d ij Γg xj (t) ) + Λg ( x j (t τ) )] K(t s)f ( x i (s) ) ds + I + d ij [Γg ( x j (t) ) + Λ i = N K(t s)g ( x j (s) ) ds i = N (16) which implies that the long-term past reputation degree of an entity is not considered. Also K i ( ) could be a decaying function which is decreasing with the time variable such as K i (s) = αe αs α> i = n which satisfies + K i (s) ds = 1 i = n. For this new model (11) there are some interesting dynamical phenomena such as stability synchronization bifurcation and chaos. As a start on this new model here we only discuss its stability which implies the reputation degree of all entities tend to some fixed constants. Also chaos means that the reputation degree of entities are random and changeable which will be discussed in the near future. We impose the following assumption: (A 1 ) f i ( ) g j ( ) (ij= n)are nondecreasing and Lipschitz continuous; that is there exist constants F i G j such that fi (x) f i (y) Fi x y g j (x) g j (y) G j x y xy R. (19) Assume that the model (16) has an equilibrium x = (x1 x 2...x N ) for a given I. To simplify the proofs we shift the equilibrium point x of (16) to the origin. Using the following transformation y i (t) = x i (t) x i i = N. The model (16) can be transformed into the following form: ẏ i (t) = Cy i (t) + Ah ( y i (t) ) + B i = N K(t s)h ( y i (s) ) ds + d ij [Γl ( y j (t) ) + Λ K(t s)l ( y j (s) ) ds h(y i (t)) = (h 1 (y i1 (t)) h 2 (y i2 (t))...h n (y in (t))) T R n h(y i (t)) = f(y i (t) + xi ) f(x i ) h() = and l(y i(t)) = (l 1 (y i1 (t)) l 2 (y i2 (t))...l n (y in (t))) T R n l(y i (t)) = g(y i (t) + xi ) g(x i ) l() = (i = N). Moreover from (19) we know that h k (y ik ) F k y ik y ik R i = N k= n (21) l k (y ik ) G k y ik y ik R i = N k= n. (22) In this Letter the following two elementary lemmas are needed: Lemma 1 (Schur complement [3]). The following linear matrix inequality (LMI) ( ) Q(x) S(x) S(x) T > R(x) Q(x) = Q(x) T R(x) = R(x) T is equivalent to one of the following conditions: ] ] (14) (15) (17) (18) (2)

6 J. Cao et al. / Physics Letters A 356 (26) (i) Q(x) > R(x) S(x) T Q(x) 1 S(x) > (ii) R(x) > Q(x) S(x)R(x) 1 S(x) T >. Lemma 2 (Jensen inequality [31]). For any constant matrix W R m m W = W T scalar r> vector function ω: [r] R m m such that the integrations concerned are well defined then r ( r T ( r ) r ω(s)wω(s)ds ω(s)ds) W ω(s)ds. 3. Stability in the complex network model In this section several new global stability criteria are derived for the complex network (2) satisfying (17) which means that the long-term past reputation degrees of entities are not under consideration. To simplify the proof we give some notations let A B denote the Kronecker product of matrices A and B let C = E N C Ā = E N A B = E N B Γ = D Γ Λ = D Λ K = E N K y i (t) = ( y i1 (t) y i2 (t)...y in (t) ) T i = N (24) y(t) = ( y1 T (t) yt 2 (t)...yt N (t)) T (25) h ( y(t) ) = ( h T ( y 1 (t) ) h T ( y 2 (t) )...h T ( y N (t) )) T l ( y(t) ) = ( l T ( y 1 (t) ) l T ( y 2 (t) )...l T ( y N (t) )) T E N is the N-dimensional identity matrix. Then the complex network (2) can be rewritten as ẏ(t) = Cy(t) + Ā h ( y(t) ) + B K(t s) h ( y(s) ) ds + Γ l ( y(t) ) + Λ K(t s) l ( y(s) ) ds i = N. Theorem 1. Under assumption (A 1 ) the equilibrium point of model (28) is globally asymptotically stable if there are positive definite diagonal matrices H = diag( H 1 H 2... H Nn ) R Nn Nn J = diag( J 1 J 2... J Nn ) R Nn Nn and positive definite matrices P = ( p ij ) Nn Nn Q = ( q ij ) Nn Nn R = ( r ij ) Nn Nn such that 2P C P Ā + F H P B P Γ + ḠJ P Λ Ā T P + H F τ 2 K T () Q K() 2H N = B T P Q (29) Γ T P + J Ḡ τ 2 K T () R K() 2J Λ T P R F = diag(f 1 F 2...F n ) R n n F = E N F G= diag(g 1 G 2...G n ) R n n Ḡ = E N G. Proof. Consider the following Lyapunov functional: (23) (26) (27) (28) i=3 V(t)= V i (t) i=1 V 1 (t) = y T (t) P y(t) V 2 (t) = τ V 3 (t) = τ τ t+s τ t+s ( K(t θ) h ( y(θ) ))T Q ( K(t θ) h ( y(θ) )) dθ ds ( K(t θ) l ( y(θ) ))T R ( K(t θ) l ( y(θ) )) dθ ds (3) (31) (32) (33)

7 42 J. Cao et al. / Physics Letters A 356 (26) P = ( p ij ) Nn Nn Q = ( q ij ) Nn Nn and R = ( r ij ) Nn Nn are positive definite matrices. Computing the derivative of V(y)along the trajectory of system (28) we obtain V 1 (t) (28) = 2y T (t) P ẏ(t) = 2y T (t) P Cy(t) + 2y T (t) P Ā h ( y(t) ) + 2y T (t) P B K(t s) h ( y(s) ) ds + 2y T (t) P Γ l ( y(t) ) + 2y T (t) P Λ K(t s) l ( y(s) ) ds = 2y T (t) P Cy(t) + y T (t) P Ā h ( y(t) ) + h T ( y(t) ) Ā T Py(t)+ y T (t) P B K(t s) h ( y(s) ) ds + ( t K(t s) h ( y(s) ) T ds) B T Py(t)+ y T (t) P Γ l ( y(t) ) + l T ( y(t) ) Γ T Py(t) + y T (t) P Λ K(t s) l ( y(s) ) ds + ( t K(t s) l ( y(s) ) ds) T Λ T P y(t). (34) According to Lemma 2wehave V 2 (t) (28) = τ ( K() h ( y(t) ))T Q ( K() h ( y(t) )) ds τ τ τ + 2τ τ t+s ( d K(t θ) h ( y(θ) )) T ( Q K(t θ) h ( y(θ) )) dθ ds dt = τ 2 h T ( y(t) ) K T () Q K() h ( y(t) ) τ 2ατ ( K(t θ) h ( y(θ) ))T Q ( K(t θ) h ( y(θ) )) dθ ds ( K( s) h ( y(t + s) ))T Q ( K( s) h ( y(t + s) )) ds ( K(t s) h ( y(s) ))T Q ( K(t s) h ( y(s) )) ds τ t+s ( t ( t ) τ 2 h T ( y(t) ) K T () Q K() h ( y(t) ) K(t s) h ( y(s) ) ds) T Q K(t s) h ( y(s) ) ds. (35) Similarly ( t ( t ) V 3 (t) (28) τ 2 l T ( y(t) ) K T () R K() l ( y(t) ) K(t s) l ( y(s) ) ds) T R K(t s) l ( y(s) ) ds. (36) From assumption (A 1 ) it follows that h T ( y(t) ) H Fy(t) h T ( y(t) ) H h ( y(t) ) (37) and l T ( y(t) ) J Ḡy(t) l T ( y(t) ) J l ( y(t) ) (38) H = diag( H 1 H 2... H Nn ) R Nn Nn J = diag( J 1 J 2... J Nn ) R Nn Nn F = diag(f 1 F 2...F n ) R n n F = E N F

8 J. Cao et al. / Physics Letters A 356 (26) G = diag(g 1 G 2...G n ) R n n are positive definite diagonal matrices. Combining (34) (38) we obtain Ḡ = E N G V(t) (28) η T Nη η = ( y T (t) h T ( y(t) ) ( t K(t s) h ( y(s) ) ds) T l T ( y(t) ) ( t K(t s) l ( y(s) ) ds) T ) T. Therefore from (39) we know that under the given condition (29) V(y(t))= if and only if y(t) = otherwise V(y(t)). Moreover on the other hand V(y)is radially unbounded since V(y(t)) as y(t). So we conclude that the equilibrium of (28) is globally asymptotically stable. This completes the proof. Note that the matrix given in condition (29) is a high dimension-matrix as the complex network is large (i.e. N is a large number). In the following we give another theorem which only need to verify a lower dimension matrix-condition based on Lemma 1. Theorem 2. Under Assumption (A 1 ) the equilibrium point of model (28) is globally asymptotically stable if there are positive definite diagonal matrices H = diag( H 1 H 2... H Nn ) R Nn Nn J = diag( J 1 J 2... J Nn ) R Nn Nn and positive definite matrices P = ( p ij ) Nn Nn Q = ( q ij ) Nn Nn R = ( r ij ) Nn Nn such that 2P C ( Ā T P + H F )( τ 2 K T () Q K() 2H ) 1(ĀT P + H F ) T ( + B T P ) Q 1( B T P ) T ( Γ T P + J Ḡ )( τ 2 K T () R K() 2 J ) 1( Γ T P + J Ḡ ) T + ( Λ T P ) R 1( Λ T τ 2 K T () Q K() 2H< τ 2 K T () R K() 2J< F = diag(f 1 F 2...F n ) R n n F = E N F G = diag(g 1 G 2...G n ) R n n Ḡ = E N G. (39) (4) P ) T < (41) (42) Proof. Let and Q = 2 P C R = S = ( P Ā + F H P B P Γ + ḠJ P Λ) τ 2 K T () Q K() 2 H Q τ 2 K T () R K() 2J R Using Lemma 1 one can see that the condition (29) is equivalent to conditions (4) (42). This completes the proof.. Moreover we note that the dimension of condition (29) in Theorem 1 is higher than (4) (42) in Theorem 2 but it is solvable using the LMI-toolbox in Matlab. The following theorem provides the tradeoff between the matrix-dimension and solving by LMI. Theorem 3. Under assumption (A 1 ) the equilibrium point of model (28) is globally asymptotically stable if there are positive definite diagonal matrices H = diag( H 1 H 2... H Nn ) R Nn Nn J = diag( J 1 J 2... J Nn ) R Nn Nn and positive definite matrices P = ( p ij ) Nn Nn Q = ( q ij ) Nn Nn R = ( r ij ) Nn Nn such that P C P Ā + F H P B N 1 = Ā T P + H F τ 2 K T () Q K() 2H < (43) B T P Q P C P Γ + ḠJ P Λ N 2 = Γ T P + J Ḡ τ 2 K T () R K() 2J < (44) Λ T P R

9 422 J. Cao et al. / Physics Letters A 356 (26) F = diag(f 1 F 2...F n ) R n n F = E N F G = diag(g 1 G 2...G n ) R n n Ḡ = E N G. Proof. Choose the same Lyapunov functional as in (3) (33). Similar to (39) we can obtain V(t) (28) (y T (t) h T ( y(t) ) ( t K(t s) h ( y(s) ) ) T ) T y(t) ds N 1 h(y(t)) K(t s) h(y(s)) ds + (y T (t) l T ( y(t) ) ( t K(t s) l ( y(s) ) ) T ) T y(t) ds N 2 l(y(t)). K(t s) l(y(s))ds The remaining proof is similar to the proof of Theorem 1 we omit it. This completes the proof. (45) Moreover in order to simplify the conditions in (43) we have the following theorem: Theorem 4. Under assumption (A 1 ) the equilibrium point of model (28) is globally asymptotically stable if there are positive definite diagonal matrices H = diag(h 1 H 2...H n ) R n n J = diag( J 1 J 2... J Nn ) R Nn Nn and positive definite matrices P = (p ij ) n n Q = (q ij ) n n R = ( r ij ) Nn Nn such that PC PA+ FH PB N 1 = AP + HF τ 2 K T ()QK() 2H < (46) B T P Q P C P Γ + ḠJ P Λ N 2 = Γ T P + J Ḡ τ 2 K T () R K() 2J < (47) Λ T P R F = diag(f 1 F 2...F n ) R n n F = E N F G = diag(g 1 G 2...G n ) R n n Ḡ = E N G. Proof. Let P = E N P H = E N H and Q = E N Q in Theorem 3 then we can easily get (y T (t) h T ( y(t)q ) ( t K(t s) h ( y(s) ) ) T ) T y(t) ds N 1 h(y(t)) K(t s) h(y(s)) ds i=1 i=n = (y Ti (t) ( ht y i (t) ) ( t The remaining proof is straightforward and hence omitted. K(t s)h ( y i (s) ) ) T ) T ds N 1 y i (t) h(y i (t)) K(t s)h(y i(s)) ds Remark 1. Since N 1 in (46) and N 1 in (43) are 3n 3n and 3Nn 3Nn matrices respectively one can see that Theorem 4 may be more useful and simple as the nodes number N of the network is large. Remark 2. For semantic grid or virtual organizations there are very few models that can be used to discuss their reputation computation. Since a node in the new complex network is a fundamental unit with detailed contents about an entity in the virtual organizations we can use it to study the reputation computation for virtual organizations. It is a new method to solve this problem based on our new network model which can well show the dynamics for reputation degrees in virtual organizations. Remark 3. Stability of complex network model implies that the reputation degrees of entities converge to some fixed constants. Also as is known to all that there are some other dynamical behaviors in the complex network model such as bifurcation chaos which indicate that the reputation degrees of entities change irregularly. However synchronization means that we may consider some entities as alliances. The reputation degree of the same alliances may change but they change in the same way..

10 J. Cao et al. / Physics Letters A 356 (26) A numerical example In this section we give a simulation example to verify the results obtained in this Letter. Example. Consider the following complex network: ẋ i (t) = Cx i (t) + Af ( x i (t) ) + B i = N ( ) ( ) C = A= ( ) tanh(xi1 ) f(x i ) = g(x j ) = tanh(x i2 ) ( ) 1 Γ = Λ= 1 K(t s)f ( x i (s) ) ds + I i + (.2.4 B =.2.1 ) ( tanh(xj1 ) tanh(x j2 ) ( ) 1 K(s)= 1 d ij [Γg ( x j (t) ) + Λ ) I 1 = (i j = 1 2 3) τ = 1 D= ( e s ) e s ( ).1 I 2 = It is obvious to see that F = G = ( ) 1 1. Using LMI toolbox in Matlab from Theorem 1 we obtain P = Q = R = H = J = K(t s)g ( x j (s) ) ds ( ).7 I 3 =.6 ] (48) ( ).4.3

11 424 J. Cao et al. / Physics Letters A 356 (26) Fig. 1. Trajectories of nodes in complex network. By Theorem 1 we conclude the complex network model (48) is globally asymptotically stable. The simulation result is given in Fig. 1 which shows the correctness of the results given in this Letter. 5. Conclusions In recent years the semantic grid and virtual organizations have become a hot topics but the corresponding results especially the dynamical models and convergence dynamics for their reputation computation of virtual organizations or semantic gird are still lacking. In this Letter a new complex network model has been built for computing or formulating the reputation degrees for virtual organizations. Some simple convergence dynamics have been discussed for the reputation degrees of entities in virtual organizations and the stability have showed that the reputation degrees of entities can tend to some fixed constants as time evolves. As a start on this new model here we have only presented some simple analysis such as stability further research on this new model will be addressed in the near future. References [1] C. Goble R. Stevens S. Bechhofer Drug Discovery Today: Technologies 2 (3) (25) 225. [2] D. Bell C. Bussler J. Yang The semantic web and web services Inform. Systems in press. [3] S. Agarwal S. Handschuh S. Staab J. Web Sem. 2 (1) (24) 31. [4] D. Roure N.R. Jennings N.R. Shadbolt Proc. IEEE 93 (3) (25). [5] H. Zhuge Semantics resource and grid Future Generation Computer Systems 2 (24) 1 Editorial. [6] Y. Lee A dynamic virtual organization solution for web-services based grid middleware in: Proceedings of the 16th International Workshop on Database and Expert Systems Applications 25. [7] M. Niinimaki J. White W. Cerff J. Hahala Using virtual organizations membership system with EDGs grid security and database access in: Proceedings of the 15th International Workshop on Database and Expert Systems Applications 24. [8] X. Gui B. Xie Y. Li D. Qian Study on the behavior-based trust model in grid security system in: Proceedings of the 24 IEEE International Conference on Service Computing 24 pp [9] C. Lin V. Varadharajan Y. Wang Enhancing grid security with trust management in: Proceedings of the 24 IEEE International Conference on Service Computing 24. [1] J. Golbeck J. Hendler Inferring reputation on the semantic web in: WWW 24 New York NY USA May 24. [11] S.H. Strogatz Nature 41 (21) 268. [12] D.J. Watts S.H. Strogatz Nature 393 (1998) 44. [13] C. Li G. Chen Phys. Rev. E 68 (23) [14] D.J. Watts Small-Worlds: The Dynamics of Networks Between Order and Randomness Princeton Univ. Press Princeton NJ [15] X. Wang G. Chen IEEE Trans. Circuits Systems-I 49 (22) 54. [16] X. Wang G. Chen Int. J. Bifur. Chaos 12 (22) 187. [17] W. Lu T. Chen IEEE Trans. Circuits Systems-I 51 (12) (24) [18] W. Wang J. Cao Physica A 366 (26) 197. [19] G. Chen J. Zhou Z. Liu Int. J. Bifur. Chaos 14 (7) (24) [2] C. Wu L.O. Chua IEEE Trans. Circuits Systems-I 42 (8) (1995) 43. [21] C. Wu IEEE Trans. Circuits Systems-II 52 (5) (25) 282. [22] C. Li S. Li X. Liao J. Yu Physica A 335 (24) 365. [23] C. Li H. Xu X. Liao J. Yu Physica A 335 (24) 359. [24] C. Li G. Chen Physica A 343 (24) 263. [25] J. Lü X. Yu G. Chen Physica A 334 (24) 281.

12 J. Cao et al. / Physics Letters A 356 (26) [26] Z. Li G. Chen Phys. Lett. A 324 (24) 166. [27] J. Cao P. Li W. Wang Phys. Lett. A 353 (4) (26) 318. [28] J. Cao J. Lu Chaos 16 (26) [29] F. Azzedin M. Maheswaran Integrating trust into grid resource management systems in: Proceedings of the International Conference on Parallel Processing 22 pp [3] S. Boyd L.E. Ghaoui E. Feron V. Balakrishnan Linear Matrix Inequalities in System and Control Theory SIAM Philadelphia PA [31] K.Q. Gu V.L. Kharitonov J. Chen Stability of Time-Delay Systems Birkhäuser Boston 23.

Routing on a weighted scale-free network

Routing on a weighted scale-free network Physica A 387 (2008) 4967 4972 Contents lists available at ScienceDirect Physica A journal homepage: www.elsevier.com/locate/physa Routing on a weighted scale-free network Mao-Bin Hu a,b,, Rui Jiang a,

More information

On the D-Stability of Linear and Nonlinear Positive Switched Systems

On the D-Stability of Linear and Nonlinear Positive Switched Systems On the D-Stability of Linear and Nonlinear Positive Switched Systems V. S. Bokharaie, O. Mason and F. Wirth Abstract We present a number of results on D-stability of positive switched systems. Different

More information

Fuzzy Differential Systems and the New Concept of Stability

Fuzzy Differential Systems and the New Concept of Stability Nonlinear Dynamics and Systems Theory, 1(2) (2001) 111 119 Fuzzy Differential Systems and the New Concept of Stability V. Lakshmikantham 1 and S. Leela 2 1 Department of Mathematical Sciences, Florida

More information

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem

More information

Mathematics Course 111: Algebra I Part IV: Vector Spaces

Mathematics Course 111: Algebra I Part IV: Vector Spaces Mathematics Course 111: Algebra I Part IV: Vector Spaces D. R. Wilkins Academic Year 1996-7 9 Vector Spaces A vector space over some field K is an algebraic structure consisting of a set V on which are

More information

Francesco Sorrentino Department of Mechanical Engineering

Francesco Sorrentino Department of Mechanical Engineering Master stability function approaches to analyze stability of the synchronous evolution for hypernetworks and of synchronized clusters for networks with symmetries Francesco Sorrentino Department of Mechanical

More information

Lecture 13 Linear quadratic Lyapunov theory

Lecture 13 Linear quadratic Lyapunov theory EE363 Winter 28-9 Lecture 13 Linear quadratic Lyapunov theory the Lyapunov equation Lyapunov stability conditions the Lyapunov operator and integral evaluating quadratic integrals analysis of ARE discrete-time

More information

GENERATING AN ASSORTATIVE NETWORK WITH A GIVEN DEGREE DISTRIBUTION

GENERATING AN ASSORTATIVE NETWORK WITH A GIVEN DEGREE DISTRIBUTION International Journal of Bifurcation and Chaos, Vol. 18, o. 11 (2008) 3495 3502 c World Scientific Publishing Company GEERATIG A ASSORTATIVE ETWORK WITH A GIVE DEGREE DISTRIBUTIO JI ZHOU, XIAOKE XU, JIE

More information

Nonlinear Systems and Control Lecture # 15 Positive Real Transfer Functions & Connection with Lyapunov Stability. p. 1/?

Nonlinear Systems and Control Lecture # 15 Positive Real Transfer Functions & Connection with Lyapunov Stability. p. 1/? Nonlinear Systems and Control Lecture # 15 Positive Real Transfer Functions & Connection with Lyapunov Stability p. 1/? p. 2/? Definition: A p p proper rational transfer function matrix G(s) is positive

More information

Modeling and Performance Evaluation of Computer Systems Security Operation 1

Modeling and Performance Evaluation of Computer Systems Security Operation 1 Modeling and Performance Evaluation of Computer Systems Security Operation 1 D. Guster 2 St.Cloud State University 3 N.K. Krivulin 4 St.Petersburg State University 5 Abstract A model of computer system

More information

Example 4.1 (nonlinear pendulum dynamics with friction) Figure 4.1: Pendulum. asin. k, a, and b. We study stability of the origin x

Example 4.1 (nonlinear pendulum dynamics with friction) Figure 4.1: Pendulum. asin. k, a, and b. We study stability of the origin x Lecture 4. LaSalle s Invariance Principle We begin with a motivating eample. Eample 4.1 (nonlinear pendulum dynamics with friction) Figure 4.1: Pendulum Dynamics of a pendulum with friction can be written

More information

2.3 Convex Constrained Optimization Problems

2.3 Convex Constrained Optimization Problems 42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions

More information

Inner Product Spaces and Orthogonality

Inner Product Spaces and Orthogonality Inner Product Spaces and Orthogonality week 3-4 Fall 2006 Dot product of R n The inner product or dot product of R n is a function, defined by u, v a b + a 2 b 2 + + a n b n for u a, a 2,, a n T, v b,

More information

Linear Maps. Isaiah Lankham, Bruno Nachtergaele, Anne Schilling (February 5, 2007)

Linear Maps. Isaiah Lankham, Bruno Nachtergaele, Anne Schilling (February 5, 2007) MAT067 University of California, Davis Winter 2007 Linear Maps Isaiah Lankham, Bruno Nachtergaele, Anne Schilling (February 5, 2007) As we have discussed in the lecture on What is Linear Algebra? one of

More information

Functional-Repair-by-Transfer Regenerating Codes

Functional-Repair-by-Transfer Regenerating Codes Functional-Repair-by-Transfer Regenerating Codes Kenneth W Shum and Yuchong Hu Abstract In a distributed storage system a data file is distributed to several storage nodes such that the original file can

More information

Section 6.1 - Inner Products and Norms

Section 6.1 - Inner Products and Norms Section 6.1 - Inner Products and Norms Definition. Let V be a vector space over F {R, C}. An inner product on V is a function that assigns, to every ordered pair of vectors x and y in V, a scalar in F,

More information

NOTES ON LINEAR TRANSFORMATIONS

NOTES ON LINEAR TRANSFORMATIONS NOTES ON LINEAR TRANSFORMATIONS Definition 1. Let V and W be vector spaces. A function T : V W is a linear transformation from V to W if the following two properties hold. i T v + v = T v + T v for all

More information

Some stability results of parameter identification in a jump diffusion model

Some stability results of parameter identification in a jump diffusion model Some stability results of parameter identification in a jump diffusion model D. Düvelmeyer Technische Universität Chemnitz, Fakultät für Mathematik, 09107 Chemnitz, Germany Abstract In this paper we discuss

More information

Parabolic Equations. Chapter 5. Contents. 5.1.2 Well-Posed Initial-Boundary Value Problem. 5.1.3 Time Irreversibility of the Heat Equation

Parabolic Equations. Chapter 5. Contents. 5.1.2 Well-Posed Initial-Boundary Value Problem. 5.1.3 Time Irreversibility of the Heat Equation 7 5.1 Definitions Properties Chapter 5 Parabolic Equations Note that we require the solution u(, t bounded in R n for all t. In particular we assume that the boundedness of the smooth function u at infinity

More information

A Passivity Measure Of Systems In Cascade Based On Passivity Indices

A Passivity Measure Of Systems In Cascade Based On Passivity Indices 49th IEEE Conference on Decision and Control December 5-7, Hilton Atlanta Hotel, Atlanta, GA, USA A Passivity Measure Of Systems In Cascade Based On Passivity Indices Han Yu and Panos J Antsaklis Abstract

More information

Using the Theory of Reals in. Analyzing Continuous and Hybrid Systems

Using the Theory of Reals in. Analyzing Continuous and Hybrid Systems Using the Theory of Reals in Analyzing Continuous and Hybrid Systems Ashish Tiwari Computer Science Laboratory (CSL) SRI International (SRI) Menlo Park, CA 94025 Email: ashish.tiwari@sri.com Ashish Tiwari

More information

Using Congestion Graphs to Analyze the Stability of Network Congestion Control

Using Congestion Graphs to Analyze the Stability of Network Congestion Control INTERNATIONAL JOURNAL OF INTELLIGENT CONTROL AND SYSTEMS VOL. 14, NO. 2, JUNE 29, 125-133 Using Congestion Graphs to Analyze the Stability of Network Congestion Control Damian Hobson-Garcia and Tomohisa

More information

Finite dimensional C -algebras

Finite dimensional C -algebras Finite dimensional C -algebras S. Sundar September 14, 2012 Throughout H, K stand for finite dimensional Hilbert spaces. 1 Spectral theorem for self-adjoint opertors Let A B(H) and let {ξ 1, ξ 2,, ξ n

More information

3. INNER PRODUCT SPACES

3. INNER PRODUCT SPACES . INNER PRODUCT SPACES.. Definition So far we have studied abstract vector spaces. These are a generalisation of the geometric spaces R and R. But these have more structure than just that of a vector space.

More information

BANACH AND HILBERT SPACE REVIEW

BANACH AND HILBERT SPACE REVIEW BANACH AND HILBET SPACE EVIEW CHISTOPHE HEIL These notes will briefly review some basic concepts related to the theory of Banach and Hilbert spaces. We are not trying to give a complete development, but

More information

No: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics

No: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics No: 10 04 Bilkent University Monotonic Extension Farhad Husseinov Discussion Papers Department of Economics The Discussion Papers of the Department of Economics are intended to make the initial results

More information

DATA ANALYSIS II. Matrix Algorithms

DATA ANALYSIS II. Matrix Algorithms DATA ANALYSIS II Matrix Algorithms Similarity Matrix Given a dataset D = {x i }, i=1,..,n consisting of n points in R d, let A denote the n n symmetric similarity matrix between the points, given as where

More information

A QUICK GUIDE TO THE FORMULAS OF MULTIVARIABLE CALCULUS

A QUICK GUIDE TO THE FORMULAS OF MULTIVARIABLE CALCULUS A QUIK GUIDE TO THE FOMULAS OF MULTIVAIABLE ALULUS ontents 1. Analytic Geometry 2 1.1. Definition of a Vector 2 1.2. Scalar Product 2 1.3. Properties of the Scalar Product 2 1.4. Length and Unit Vectors

More information

Høgskolen i Narvik Sivilingeniørutdanningen STE6237 ELEMENTMETODER. Oppgaver

Høgskolen i Narvik Sivilingeniørutdanningen STE6237 ELEMENTMETODER. Oppgaver Høgskolen i Narvik Sivilingeniørutdanningen STE637 ELEMENTMETODER Oppgaver Klasse: 4.ID, 4.IT Ekstern Professor: Gregory A. Chechkin e-mail: chechkin@mech.math.msu.su Narvik 6 PART I Task. Consider two-point

More information

IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL. 1. Introduction

IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL. 1. Introduction IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL R. DRNOVŠEK, T. KOŠIR Dedicated to Prof. Heydar Radjavi on the occasion of his seventieth birthday. Abstract. Let S be an irreducible

More information

Exact Inference for Gaussian Process Regression in case of Big Data with the Cartesian Product Structure

Exact Inference for Gaussian Process Regression in case of Big Data with the Cartesian Product Structure Exact Inference for Gaussian Process Regression in case of Big Data with the Cartesian Product Structure Belyaev Mikhail 1,2,3, Burnaev Evgeny 1,2,3, Kapushev Yermek 1,2 1 Institute for Information Transmission

More information

STABILITY GUARANTEED ACTIVE FAULT TOLERANT CONTROL OF NETWORKED CONTROL SYSTEMS. Shanbin Li, Dominique Sauter, Christophe Aubrun, Joseph Yamé

STABILITY GUARANTEED ACTIVE FAULT TOLERANT CONTROL OF NETWORKED CONTROL SYSTEMS. Shanbin Li, Dominique Sauter, Christophe Aubrun, Joseph Yamé SABILIY GUARANEED ACIVE FAUL OLERAN CONROL OF NEWORKED CONROL SYSEMS Shanbin Li, Dominique Sauter, Christophe Aubrun, Joseph Yamé Centre de Recherche en Automatique de Nancy Université Henri Poincaré,

More information

THE NUMBER OF GRAPHS AND A RANDOM GRAPH WITH A GIVEN DEGREE SEQUENCE. Alexander Barvinok

THE NUMBER OF GRAPHS AND A RANDOM GRAPH WITH A GIVEN DEGREE SEQUENCE. Alexander Barvinok THE NUMBER OF GRAPHS AND A RANDOM GRAPH WITH A GIVEN DEGREE SEQUENCE Alexer Barvinok Papers are available at http://www.math.lsa.umich.edu/ barvinok/papers.html This is a joint work with J.A. Hartigan

More information

t := maxγ ν subject to ν {0,1,2,...} and f(x c +γ ν d) f(x c )+cγ ν f (x c ;d).

t := maxγ ν subject to ν {0,1,2,...} and f(x c +γ ν d) f(x c )+cγ ν f (x c ;d). 1. Line Search Methods Let f : R n R be given and suppose that x c is our current best estimate of a solution to P min x R nf(x). A standard method for improving the estimate x c is to choose a direction

More information

ON SEQUENTIAL CONTINUITY OF COMPOSITION MAPPING. 0. Introduction

ON SEQUENTIAL CONTINUITY OF COMPOSITION MAPPING. 0. Introduction ON SEQUENTIAL CONTINUITY OF COMPOSITION MAPPING Abstract. In [1] there was proved a theorem concerning the continuity of the composition mapping, and there was announced a theorem on sequential continuity

More information

Experiments on the local load balancing algorithms; part 1

Experiments on the local load balancing algorithms; part 1 Experiments on the local load balancing algorithms; part 1 Ştefan Măruşter Institute e-austria Timisoara West University of Timişoara, Romania maruster@info.uvt.ro Abstract. In this paper the influence

More information

Solving polynomial least squares problems via semidefinite programming relaxations

Solving polynomial least squares problems via semidefinite programming relaxations Solving polynomial least squares problems via semidefinite programming relaxations Sunyoung Kim and Masakazu Kojima August 2007, revised in November, 2007 Abstract. A polynomial optimization problem whose

More information

Inner Product Spaces

Inner Product Spaces Math 571 Inner Product Spaces 1. Preliminaries An inner product space is a vector space V along with a function, called an inner product which associates each pair of vectors u, v with a scalar u, v, and

More information

Quasi Contraction and Fixed Points

Quasi Contraction and Fixed Points Available online at www.ispacs.com/jnaa Volume 2012, Year 2012 Article ID jnaa-00168, 6 Pages doi:10.5899/2012/jnaa-00168 Research Article Quasi Contraction and Fixed Points Mehdi Roohi 1, Mohsen Alimohammady

More information

Solution of Linear Systems

Solution of Linear Systems Chapter 3 Solution of Linear Systems In this chapter we study algorithms for possibly the most commonly occurring problem in scientific computing, the solution of linear systems of equations. We start

More information

Lecture 4: BK inequality 27th August and 6th September, 2007

Lecture 4: BK inequality 27th August and 6th September, 2007 CSL866: Percolation and Random Graphs IIT Delhi Amitabha Bagchi Scribe: Arindam Pal Lecture 4: BK inequality 27th August and 6th September, 2007 4. Preliminaries The FKG inequality allows us to lower bound

More information

Network Traffic Modelling

Network Traffic Modelling University of York Dissertation submitted for the MSc in Mathematics with Modern Applications, Department of Mathematics, University of York, UK. August 009 Network Traffic Modelling Author: David Slade

More information

4 Lyapunov Stability Theory

4 Lyapunov Stability Theory 4 Lyapunov Stability Theory In this section we review the tools of Lyapunov stability theory. These tools will be used in the next section to analyze the stability properties of a robot controller. We

More information

THREE DIMENSIONAL GEOMETRY

THREE DIMENSIONAL GEOMETRY Chapter 8 THREE DIMENSIONAL GEOMETRY 8.1 Introduction In this chapter we present a vector algebra approach to three dimensional geometry. The aim is to present standard properties of lines and planes,

More information

Inner products on R n, and more

Inner products on R n, and more Inner products on R n, and more Peyam Ryan Tabrizian Friday, April 12th, 2013 1 Introduction You might be wondering: Are there inner products on R n that are not the usual dot product x y = x 1 y 1 + +

More information

Hydrodynamic Limits of Randomized Load Balancing Networks

Hydrodynamic Limits of Randomized Load Balancing Networks Hydrodynamic Limits of Randomized Load Balancing Networks Kavita Ramanan and Mohammadreza Aghajani Brown University Stochastic Networks and Stochastic Geometry a conference in honour of François Baccelli

More information

A characterization of trace zero symmetric nonnegative 5x5 matrices

A characterization of trace zero symmetric nonnegative 5x5 matrices A characterization of trace zero symmetric nonnegative 5x5 matrices Oren Spector June 1, 009 Abstract The problem of determining necessary and sufficient conditions for a set of real numbers to be the

More information

Functional Optimization Models for Active Queue Management

Functional Optimization Models for Active Queue Management Functional Optimization Models for Active Queue Management Yixin Chen Department of Computer Science and Engineering Washington University in St Louis 1 Brookings Drive St Louis, MO 63130, USA chen@cse.wustl.edu

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT

More information

OPTIMAl PREMIUM CONTROl IN A NON-liFE INSURANCE BUSINESS

OPTIMAl PREMIUM CONTROl IN A NON-liFE INSURANCE BUSINESS ONDERZOEKSRAPPORT NR 8904 OPTIMAl PREMIUM CONTROl IN A NON-liFE INSURANCE BUSINESS BY M. VANDEBROEK & J. DHAENE D/1989/2376/5 1 IN A OPTIMAl PREMIUM CONTROl NON-liFE INSURANCE BUSINESS By Martina Vandebroek

More information

Weakly Secure Network Coding

Weakly Secure Network Coding Weakly Secure Network Coding Kapil Bhattad, Student Member, IEEE and Krishna R. Narayanan, Member, IEEE Department of Electrical Engineering, Texas A&M University, College Station, USA Abstract In this

More information

Some Problems of Second-Order Rational Difference Equations with Quadratic Terms

Some Problems of Second-Order Rational Difference Equations with Quadratic Terms International Journal of Difference Equations ISSN 0973-6069, Volume 9, Number 1, pp. 11 21 (2014) http://campus.mst.edu/ijde Some Problems of Second-Order Rational Difference Equations with Quadratic

More information

Stochastic Inventory Control

Stochastic Inventory Control Chapter 3 Stochastic Inventory Control 1 In this chapter, we consider in much greater details certain dynamic inventory control problems of the type already encountered in section 1.3. In addition to the

More information

Reference: Introduction to Partial Differential Equations by G. Folland, 1995, Chap. 3.

Reference: Introduction to Partial Differential Equations by G. Folland, 1995, Chap. 3. 5 Potential Theory Reference: Introduction to Partial Differential Equations by G. Folland, 995, Chap. 3. 5. Problems of Interest. In what follows, we consider Ω an open, bounded subset of R n with C 2

More information

A New Nature-inspired Algorithm for Load Balancing

A New Nature-inspired Algorithm for Load Balancing A New Nature-inspired Algorithm for Load Balancing Xiang Feng East China University of Science and Technology Shanghai, China 200237 Email: xfeng{@ecusteducn, @cshkuhk} Francis CM Lau The University of

More information

(Quasi-)Newton methods

(Quasi-)Newton methods (Quasi-)Newton methods 1 Introduction 1.1 Newton method Newton method is a method to find the zeros of a differentiable non-linear function g, x such that g(x) = 0, where g : R n R n. Given a starting

More information

Similarity and Diagonalization. Similar Matrices

Similarity and Diagonalization. Similar Matrices MATH022 Linear Algebra Brief lecture notes 48 Similarity and Diagonalization Similar Matrices Let A and B be n n matrices. We say that A is similar to B if there is an invertible n n matrix P such that

More information

EXISTENCE AND NON-EXISTENCE RESULTS FOR A NONLINEAR HEAT EQUATION

EXISTENCE AND NON-EXISTENCE RESULTS FOR A NONLINEAR HEAT EQUATION Sixth Mississippi State Conference on Differential Equations and Computational Simulations, Electronic Journal of Differential Equations, Conference 5 (7), pp. 5 65. ISSN: 7-669. UL: http://ejde.math.txstate.edu

More information

Effects of node buffer and capacity on network traffic

Effects of node buffer and capacity on network traffic Chin. Phys. B Vol. 21, No. 9 (212) 9892 Effects of node buffer and capacity on network traffic Ling Xiang( 凌 翔 ) a), Hu Mao-Bin( 胡 茂 彬 ) b), and Ding Jian-Xun( 丁 建 勋 ) a) a) School of Transportation Engineering,

More information

FINITE DIFFERENCE METHODS

FINITE DIFFERENCE METHODS FINITE DIFFERENCE METHODS LONG CHEN Te best known metods, finite difference, consists of replacing eac derivative by a difference quotient in te classic formulation. It is simple to code and economic to

More information

Nonparametric adaptive age replacement with a one-cycle criterion

Nonparametric adaptive age replacement with a one-cycle criterion Nonparametric adaptive age replacement with a one-cycle criterion P. Coolen-Schrijner, F.P.A. Coolen Department of Mathematical Sciences University of Durham, Durham, DH1 3LE, UK e-mail: Pauline.Schrijner@durham.ac.uk

More information

Lecture 7: Finding Lyapunov Functions 1

Lecture 7: Finding Lyapunov Functions 1 Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.243j (Fall 2003): DYNAMICS OF NONLINEAR SYSTEMS by A. Megretski Lecture 7: Finding Lyapunov Functions 1

More information

Bargaining Solutions in a Social Network

Bargaining Solutions in a Social Network Bargaining Solutions in a Social Network Tanmoy Chakraborty and Michael Kearns Department of Computer and Information Science University of Pennsylvania Abstract. We study the concept of bargaining solutions,

More information

SF2940: Probability theory Lecture 8: Multivariate Normal Distribution

SF2940: Probability theory Lecture 8: Multivariate Normal Distribution SF2940: Probability theory Lecture 8: Multivariate Normal Distribution Timo Koski 24.09.2015 Timo Koski Matematisk statistik 24.09.2015 1 / 1 Learning outcomes Random vectors, mean vector, covariance matrix,

More information

Metric Spaces. Chapter 7. 7.1. Metrics

Metric Spaces. Chapter 7. 7.1. Metrics Chapter 7 Metric Spaces A metric space is a set X that has a notion of the distance d(x, y) between every pair of points x, y X. The purpose of this chapter is to introduce metric spaces and give some

More information

MATH 425, PRACTICE FINAL EXAM SOLUTIONS.

MATH 425, PRACTICE FINAL EXAM SOLUTIONS. MATH 45, PRACTICE FINAL EXAM SOLUTIONS. Exercise. a Is the operator L defined on smooth functions of x, y by L u := u xx + cosu linear? b Does the answer change if we replace the operator L by the operator

More information

LABEL PROPAGATION ON GRAPHS. SEMI-SUPERVISED LEARNING. ----Changsheng Liu 10-30-2014

LABEL PROPAGATION ON GRAPHS. SEMI-SUPERVISED LEARNING. ----Changsheng Liu 10-30-2014 LABEL PROPAGATION ON GRAPHS. SEMI-SUPERVISED LEARNING ----Changsheng Liu 10-30-2014 Agenda Semi Supervised Learning Topics in Semi Supervised Learning Label Propagation Local and global consistency Graph

More information

TOPIC 4: DERIVATIVES

TOPIC 4: DERIVATIVES TOPIC 4: DERIVATIVES 1. The derivative of a function. Differentiation rules 1.1. The slope of a curve. The slope of a curve at a point P is a measure of the steepness of the curve. If Q is a point on the

More information

Factorization Theorems

Factorization Theorems Chapter 7 Factorization Theorems This chapter highlights a few of the many factorization theorems for matrices While some factorization results are relatively direct, others are iterative While some factorization

More information

Arithmetic complexity in algebraic extensions

Arithmetic complexity in algebraic extensions Arithmetic complexity in algebraic extensions Pavel Hrubeš Amir Yehudayoff Abstract Given a polynomial f with coefficients from a field F, is it easier to compute f over an extension R of F than over F?

More information

Continuity of the Perron Root

Continuity of the Perron Root Linear and Multilinear Algebra http://dx.doi.org/10.1080/03081087.2014.934233 ArXiv: 1407.7564 (http://arxiv.org/abs/1407.7564) Continuity of the Perron Root Carl D. Meyer Department of Mathematics, North

More information

Hacking-proofness and Stability in a Model of Information Security Networks

Hacking-proofness and Stability in a Model of Information Security Networks Hacking-proofness and Stability in a Model of Information Security Networks Sunghoon Hong Preliminary draft, not for citation. March 1, 2008 Abstract We introduce a model of information security networks.

More information

15.062 Data Mining: Algorithms and Applications Matrix Math Review

15.062 Data Mining: Algorithms and Applications Matrix Math Review .6 Data Mining: Algorithms and Applications Matrix Math Review The purpose of this document is to give a brief review of selected linear algebra concepts that will be useful for the course and to develop

More information

Cyber-Security Analysis of State Estimators in Power Systems

Cyber-Security Analysis of State Estimators in Power Systems Cyber-Security Analysis of State Estimators in Electric Power Systems André Teixeira 1, Saurabh Amin 2, Henrik Sandberg 1, Karl H. Johansson 1, and Shankar Sastry 2 ACCESS Linnaeus Centre, KTH-Royal Institute

More information

Math 4310 Handout - Quotient Vector Spaces

Math 4310 Handout - Quotient Vector Spaces Math 4310 Handout - Quotient Vector Spaces Dan Collins The textbook defines a subspace of a vector space in Chapter 4, but it avoids ever discussing the notion of a quotient space. This is understandable

More information

Network synchronizability analysis: A graph-theoretic approach

Network synchronizability analysis: A graph-theoretic approach CHAOS 8, 070 008 Network synchronizability analysis: A graph-theoretic approach Guanrong Chen,,a and Zhisheng Duan,b State Key Laboratory for Turbulence and Complex Systems, Department of Mechanics and

More information

GENERATING SETS KEITH CONRAD

GENERATING SETS KEITH CONRAD GENERATING SETS KEITH CONRAD 1 Introduction In R n, every vector can be written as a unique linear combination of the standard basis e 1,, e n A notion weaker than a basis is a spanning set: a set of vectors

More information

OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION

OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION Sérgio Pequito, Stephen Kruzick, Soummya Kar, José M. F. Moura, A. Pedro Aguiar Department of Electrical and Computer Engineering

More information

ON NONNEGATIVE SOLUTIONS OF NONLINEAR TWO-POINT BOUNDARY VALUE PROBLEMS FOR TWO-DIMENSIONAL DIFFERENTIAL SYSTEMS WITH ADVANCED ARGUMENTS

ON NONNEGATIVE SOLUTIONS OF NONLINEAR TWO-POINT BOUNDARY VALUE PROBLEMS FOR TWO-DIMENSIONAL DIFFERENTIAL SYSTEMS WITH ADVANCED ARGUMENTS ON NONNEGATIVE SOLUTIONS OF NONLINEAR TWO-POINT BOUNDARY VALUE PROBLEMS FOR TWO-DIMENSIONAL DIFFERENTIAL SYSTEMS WITH ADVANCED ARGUMENTS I. KIGURADZE AND N. PARTSVANIA A. Razmadze Mathematical Institute

More information

NP-Hardness Results Related to PPAD

NP-Hardness Results Related to PPAD NP-Hardness Results Related to PPAD Chuangyin Dang Dept. of Manufacturing Engineering & Engineering Management City University of Hong Kong Kowloon, Hong Kong SAR, China E-Mail: mecdang@cityu.edu.hk Yinyu

More information

Math 312 Homework 1 Solutions

Math 312 Homework 1 Solutions Math 31 Homework 1 Solutions Last modified: July 15, 01 This homework is due on Thursday, July 1th, 01 at 1:10pm Please turn it in during class, or in my mailbox in the main math office (next to 4W1) Please

More information

Duality of linear conic problems

Duality of linear conic problems Duality of linear conic problems Alexander Shapiro and Arkadi Nemirovski Abstract It is well known that the optimal values of a linear programming problem and its dual are equal to each other if at least

More information

1 Sets and Set Notation.

1 Sets and Set Notation. LINEAR ALGEBRA MATH 27.6 SPRING 23 (COHEN) LECTURE NOTES Sets and Set Notation. Definition (Naive Definition of a Set). A set is any collection of objects, called the elements of that set. We will most

More information

On duality of modular G-Riesz bases and G-Riesz bases in Hilbert C*-modules

On duality of modular G-Riesz bases and G-Riesz bases in Hilbert C*-modules Journal of Linear and Topological Algebra Vol. 04, No. 02, 2015, 53-63 On duality of modular G-Riesz bases and G-Riesz bases in Hilbert C*-modules M. Rashidi-Kouchi Young Researchers and Elite Club Kahnooj

More information

Notes on Symmetric Matrices

Notes on Symmetric Matrices CPSC 536N: Randomized Algorithms 2011-12 Term 2 Notes on Symmetric Matrices Prof. Nick Harvey University of British Columbia 1 Symmetric Matrices We review some basic results concerning symmetric matrices.

More information

Labeling outerplanar graphs with maximum degree three

Labeling outerplanar graphs with maximum degree three Labeling outerplanar graphs with maximum degree three Xiangwen Li 1 and Sanming Zhou 2 1 Department of Mathematics Huazhong Normal University, Wuhan 430079, China 2 Department of Mathematics and Statistics

More information

Research Article Stability Analysis for Higher-Order Adjacent Derivative in Parametrized Vector Optimization

Research Article Stability Analysis for Higher-Order Adjacent Derivative in Parametrized Vector Optimization Hindawi Publishing Corporation Journal of Inequalities and Applications Volume 2010, Article ID 510838, 15 pages doi:10.1155/2010/510838 Research Article Stability Analysis for Higher-Order Adjacent Derivative

More information

19 LINEAR QUADRATIC REGULATOR

19 LINEAR QUADRATIC REGULATOR 19 LINEAR QUADRATIC REGULATOR 19.1 Introduction The simple form of loopshaping in scalar systems does not extend directly to multivariable (MIMO) plants, which are characterized by transfer matrices instead

More information

Stationary random graphs on Z with prescribed iid degrees and finite mean connections

Stationary random graphs on Z with prescribed iid degrees and finite mean connections Stationary random graphs on Z with prescribed iid degrees and finite mean connections Maria Deijfen Johan Jonasson February 2006 Abstract Let F be a probability distribution with support on the non-negative

More information

CITY UNIVERSITY LONDON. BEng Degree in Computer Systems Engineering Part II BSc Degree in Computer Systems Engineering Part III PART 2 EXAMINATION

CITY UNIVERSITY LONDON. BEng Degree in Computer Systems Engineering Part II BSc Degree in Computer Systems Engineering Part III PART 2 EXAMINATION No: CITY UNIVERSITY LONDON BEng Degree in Computer Systems Engineering Part II BSc Degree in Computer Systems Engineering Part III PART 2 EXAMINATION ENGINEERING MATHEMATICS 2 (resit) EX2005 Date: August

More information

1 Introduction to Matrices

1 Introduction to Matrices 1 Introduction to Matrices In this section, important definitions and results from matrix algebra that are useful in regression analysis are introduced. While all statements below regarding the columns

More information

Stability. Chapter 4. Topics : 1. Basic Concepts. 2. Algebraic Criteria for Linear Systems. 3. Lyapunov Theory with Applications to Linear Systems

Stability. Chapter 4. Topics : 1. Basic Concepts. 2. Algebraic Criteria for Linear Systems. 3. Lyapunov Theory with Applications to Linear Systems Chapter 4 Stability Topics : 1. Basic Concepts 2. Algebraic Criteria for Linear Systems 3. Lyapunov Theory with Applications to Linear Systems 4. Stability and Control Copyright c Claudiu C. Remsing, 2006.

More information

MATH 4330/5330, Fourier Analysis Section 11, The Discrete Fourier Transform

MATH 4330/5330, Fourier Analysis Section 11, The Discrete Fourier Transform MATH 433/533, Fourier Analysis Section 11, The Discrete Fourier Transform Now, instead of considering functions defined on a continuous domain, like the interval [, 1) or the whole real line R, we wish

More information

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin * Send Orders for Reprints to reprints@benthamscience.ae 766 The Open Electrical & Electronic Engineering Journal, 2014, 8, 766-771 Open Access Research on Application of Neural Network in Computer Network

More information

On the representability of the bi-uniform matroid

On the representability of the bi-uniform matroid On the representability of the bi-uniform matroid Simeon Ball, Carles Padró, Zsuzsa Weiner and Chaoping Xing August 3, 2012 Abstract Every bi-uniform matroid is representable over all sufficiently large

More information

A Uniform Asymptotic Estimate for Discounted Aggregate Claims with Subexponential Tails

A Uniform Asymptotic Estimate for Discounted Aggregate Claims with Subexponential Tails 12th International Congress on Insurance: Mathematics and Economics July 16-18, 2008 A Uniform Asymptotic Estimate for Discounted Aggregate Claims with Subexponential Tails XUEMIAO HAO (Based on a joint

More information

A Network Flow Approach in Cloud Computing

A Network Flow Approach in Cloud Computing 1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges

More information

24. The Branch and Bound Method

24. The Branch and Bound Method 24. The Branch and Bound Method It has serious practical consequences if it is known that a combinatorial problem is NP-complete. Then one can conclude according to the present state of science that no

More information