首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到5条相似文献,搜索用时 0 毫秒
1.
We quantify characteristics of the informational architecture of two representative biological networks: the Boolean network model for the cell-cycle regulatory network of the fission yeast Schizosaccharomyces pombe (Davidich et al. 2008 PLoS ONE 3, e1672 (doi:10.1371/journal.pone.0001672)) and that of the budding yeast Saccharomyces cerevisiae (Li et al. 2004 Proc. Natl Acad. Sci. USA 101, 4781–4786 (doi:10.1073/pnas.0305937101)). We compare our results for these biological networks with the same analysis performed on ensembles of two different types of random networks: Erdös–Rényi and scale-free. We show that both biological networks share features in common that are not shared by either random network ensemble. In particular, the biological networks in our study process more information than the random networks on average. Both biological networks also exhibit a scaling relation in information transferred between nodes that distinguishes them from random, where the biological networks stand out as distinct even when compared with random networks that share important topological properties, such as degree distribution, with the biological network. We show that the most biologically distinct regime of this scaling relation is associated with a subset of control nodes that regulate the dynamics and function of each respective biological network. Information processing in biological networks is therefore interpreted as an emergent property of topology (causal structure) and dynamics (function). Our results demonstrate quantitatively how the informational architecture of biologically evolved networks can distinguish them from other classes of network architecture that do not share the same informational properties.  相似文献   

2.
A network structure metric is herein suggested for the investigation of the behaviour of epidemic spreading processes in general network-structured populations. This simple measure, based on the algebraic powers of the adjacency matrix associated with the network in question, is shown to admit a heuristic interpretation as a representation of a spreading process similar to standard epidemic models. It is further shown that the values of this metric may be of use in understanding the dynamic pattern of epidemic spread on networks of greatly varying structural properties (e.g. the degree distribution, the assortativity/dissortativity and the clustering).  相似文献   

3.
This paper reports evidence from a survey, aimed at testing whether and how Information and Communication Technologies (ICTs), which enable the adoption of product-service systems, can contribute to value creation. This analysis builds on previous contributions, according to which companies that are enriching their product offering through value-added services (the so-called servitisation strategy) often report lower levels of profitability, owing to the poor performance of their operating process. A wide stream of research claims that companies that invest in ICTs can enjoy valuable outcomes, since the adoption of such technologies results in processes that are more efficient and more responsive. Our hypothesis concerns the possibility of leveraging ICTs at operating process level so as to pursue a servitisation strategy. The in-field analysis presented in this paper concerns a sample of 109 companies located in Italy; data collected through the survey have been analysed using the structural equation modelling approach. The evidence presented demonstrates that ICTs can have a relevant impact on value creation because they lead to superior responsiveness of operating processes and to sound improvements in the product offering. In particular, companies that are able to embed such superior responsiveness into their product offering can further boost value creation.  相似文献   

4.
In this paper, risk modeling was conducted based on the defined risk elements of a conceptual risk framework. This model allows for the estimation of a variety of risks, including human error probability, operational risk, financial risk, technological risk, commercial risk, health risk, and social and environmental risks. Bayesian network (BN) structure learning techniques were used to determine the relationships among the model variables. By solving a bi-objective optimization problem applying the genetic algorithm (GA) with the Pareto ranking approach, the network structure was learned. Then, risk modeling was performed for a petroleum refinery focusing on HydroDeSulfurization (HDS) technology throughout its life cycle. To extend the model horizontally and make it possible to evaluate the risk trend throughout the technology life cycle, we developed a dynamic Bayesian network (DBN) with three-time slices. A two-way forward and backward approach was used to analyze the model. The model validation was performed by applying the leave-one-out cross-validation method.  相似文献   

5.
Both systems of innovation and cluster theories emphasize the importance of institutions that facilitate learning and information diffusion as well as community building for the continuous success of industrial systems. Nevertheless, they fail to combine their insights into a general system-level understanding. In order to fill this gap the concept of collaborative public space (CPS) is defined. It is then used to analyze the Israeli military's role within the Israeli IT industry, employing the case study method to analyze a specific section of the military—MAMRAM—the main programming, software engineering, and computer users training unit. The paper's main findings are that, contrary to the commonly argued view, which sees the military mainly as a supplier of factors of production such as high skilled labor, or technological spin-offs, the military has been playing a critical role in the continuing success of the high-tech industry by providing it with a CPS. The military acts as an important center of information gathering, processing, and dissemination for the Israeli software innovation system, as the originator and strengthener of many social networks, and as the connecting node between various weakly tied social networks.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号