Scientists develop a novel algorithm inspired by bee colonies to … – Phys.Org

April 17, 2017 Credit: University of Granada

Researchers from the University of Granada (UGR) have designed an algorithm, inspired by the intelligent and social behavior of bee colonies, which allows law enforcement to attack and dismantle any type of social network that poses a threat, whether physical or virtual, such as social networks linked to organized crime and jihadist terrorism.

The possible applications of this new bio-inspired algorithm, which helps to make optimal decisions in order to dismantle any type of social network, are many and varied: from dismantling a criminal network to facilitating the design of vaccination strategies capable of containing the spread of a pandemic.

The tool designed by the UGR researchers automatically detects and identifies the most dangerous actors or nodes within a given social network and the density of the interconnected relationships between them, which may help law enforcement authorities make their decisions and act in the most efficient way possible.

As explained by one of the authors of this paper, Manuel Lozano Mrquez, from the Department of Computer Science and Artificial Intelligence at the UGR, "Bees form fairly well organized societies, in which each member has a specific role. There are three main types: scout bees, which are looking for food sources; worker bees, who collect food; and supervisor bees, who wait in the colony."

Data exchange and communication processes are established between those three roles, which makes the overall performance of the colony very profitable. The UGR scientists have simulated this behavior using in silico bees in order to find effective and efficient strategies to dismantle networks. The results of the experiments indicate that the proposed technique significantly improves, from a statistical point of view, the classic strategy used for attacking and dismantling social networks.

Social networks

Many complex interaction systems linked to nature and related to mankind are structured in a complex networkthat is, they are made up of a series of interrelated actors. Social networks are a very recent example of this. Some networks are pernicious because of their potential to cause harm to people, critical infrastructures and economic interests.

The classic (and also the most natural and intuitive) method for dismantling a network is to identify its main actors and take action on them. However, this strategy does not ensure that the resulting network is totally devoid of organizational and reconstructive power, and it may continue to cause harm.

"In order to find the most effective way of dismantling a network, it is necessary to develop and put into action an optimization process that analyzes a multitude of situations and selects the best option in the shortest time possible. It's similar to what a chess program does when identifying, predicting and checking the possible steps or paths that may occur in a game of chess from a given moment and movement," says Humberto Trujillo Mendoza from the Department of Methodology of Behavioral Sciences at the UGR and one of the authors of the paper.

As the authors explain, "The subtlety with which groups or colonies of relatively simple living beings (ants, termites, bees, etc.) are able to solve vital problems to survive is a proof of the effectiveness of evolution." By means of certain interrelationships among the members of a colony, a collective behavior emerges from that colony, and it allows them to efficiently react to problematic environmental situations. That task, applied by the UGR to the field of artificial intelligence, would be impossible to carry out by individual members of the colony.

At present, this research group is working on the development of other algorithms similar to the one described. This time, they are doing so to determine the nodes of the social network which certain "infiltrators" must connect to in order to increase the quantity and quality of the information gathered to improve the knowledge of the relations between the other actors, thus optimizing the dismantling of the network.

Explore further: Scientists develop new high-precision method for analysing and comparing functioning and structure of complex networks

More information: Manuel Lozano et al. Optimizing network attacks by artificial bee colony, Information Sciences (2017). DOI: 10.1016/j.ins.2016.10.014

Researchers at the Universitat Politcnica de Catalunya (UPC) and the University of Barcelona (UB) published a paper in Nature Communications presenting a scientific method for identifying, comparing and precisely determining ...

Sharks form strong social networks that are relatively unaffected when several members leave the group, and members also learn how to avoid capture, new research released today has found.

In mathematics, you need at most only four different colors to produce a map in which no two adjacent regions have the same color. Utah and Arizona are considered adjacent, but Utah and New Mexico, which only share a point, ...

The advent of online social networks has led to the rapid development of tools for understanding the interactions between members of the network, their activity, the connections, the hubs and nodes. But, any relationships ...

It's a familiar request in the digital age: one of your friends on social media has a friend who wants to be your friend. Frequent linking among friends of friends can cause a rapid increase in social network connectivity.

Social networks such as Facebook, LinkedIn and Twitter play an increasingly central role in our lives. Centrality is also an important concept in the theory of social networks. Centrality of an individual, called a "node" ...

Hyper-connectivity has changed the way we communicate, wait, and productively use our time. Even in a world of 5G wireless and "instant" messaging, there are countless moments throughout the day when we're waiting for messages, ...

Rice University computer scientists are mapping a new solution for interior navigational location detection by linking it to existing sensors in mobile devices. Their results were presented in a paper at last month's 2017 ...

Your partner comes in and slams a door. What was that about? Something you did? What if you knew to anticipate it because you were notified in advance from an automated text message that he/she didn't have a great day at ...

Alphabet's life sciences unit Verily on Friday unveiled a wrist-worn "Study Watch" designed to gather complex health data in clinical studies.

Scientists at the U.S. Department of Energy's National Renewable Energy Laboratory (NREL) have developed a proof-of-principle photoelectrochemical cell capable of capturing excess photon energy normally lost to generating ...

Apple has joined the list of companies with permits to test self-driving cars in California, according to an updated roster released on Friday by state officials.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

View post:
Scientists develop a novel algorithm inspired by bee colonies to ... - Phys.Org

Related Posts

Comments are closed.