{"id":95580,"date":"2017-04-18T03:42:13","date_gmt":"2017-04-18T07:42:13","guid":{"rendered":"http:\/\/www.eugenesis.com\/scientists-develop-a-novel-algorithm-inspired-by-bee-colonies-to-phys-org\/"},"modified":"2017-04-18T03:42:13","modified_gmt":"2017-04-18T07:42:13","slug":"scientists-develop-a-novel-algorithm-inspired-by-bee-colonies-to-phys-org","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/behavioral-science\/scientists-develop-a-novel-algorithm-inspired-by-bee-colonies-to-phys-org.php","title":{"rendered":"Scientists develop a novel algorithm inspired by bee colonies to &#8230; &#8211; Phys.Org"},"content":{"rendered":"<p><p>April 17, 2017          Credit: University of Granada    <\/p>\n<p>      Researchers from the University of Granada (UGR) have      designed an algorithm, inspired by the intelligent and social      behavior of bee colonies, which allows law enforcement to      attack and dismantle any type of social network that poses a      threat, whether physical or virtual, such as social networks      linked to organized crime and jihadist terrorism.    <\/p>\n<p>    The possible applications of this new bio-inspired algorithm,    which helps to make optimal decisions in order to dismantle any    type of social network, are many and varied: from dismantling a    criminal network to facilitating the design of vaccination    strategies capable of containing the spread of a pandemic.  <\/p>\n<p>    The tool designed by the UGR researchers automatically detects    and identifies the most dangerous actors or nodes within a    given social network and the density of the interconnected    relationships between them, which may help law enforcement authorities make their decisions    and act in the most efficient way possible.  <\/p>\n<p>    As explained by one of the authors of this paper, Manuel Lozano    Mrquez, from the Department of Computer Science and Artificial    Intelligence at the UGR, \"Bees form fairly well organized    societies, in which each member has a specific role. There are    three main types: scout bees, which are looking for food    sources; worker bees, who collect food; and supervisor bees,    who wait in the colony.\"  <\/p>\n<p>    Data exchange and communication processes are established    between those three roles, which makes the overall performance    of the colony very profitable. The UGR scientists have    simulated this behavior using in silico bees in order to find    effective and efficient strategies to dismantle networks. The    results of the experiments indicate that the proposed technique    significantly improves, from a statistical point of view, the    classic strategy used for attacking and dismantling social    networks.  <\/p>\n<p>    Social networks  <\/p>\n<p>    Many complex interaction systems linked to nature and related    to mankind are structured in a complex networkthat is, they    are made up of a series of interrelated actors. Social networks    are a very recent example of this. Some networks are pernicious    because of their potential to cause harm to people, critical    infrastructures and economic interests.  <\/p>\n<p>    The classic (and also the most natural and intuitive) method    for dismantling a network is to identify its main actors and    take action on them. However, this strategy does not ensure    that the resulting network is totally devoid of organizational    and reconstructive power, and it may continue to cause harm.  <\/p>\n<p>    \"In order to find the most effective way of dismantling a    network, it is necessary to develop and put into action an    optimization process that analyzes a multitude of situations    and selects the best option in the shortest time possible. It's    similar to what a chess program does when identifying,    predicting and checking the possible steps or paths that may    occur in a game of chess from a given moment and movement,\"    says Humberto Trujillo Mendoza from the Department of    Methodology of Behavioral Sciences at the UGR and one of the    authors of the paper.  <\/p>\n<p>    As the authors explain, \"The subtlety with which groups or    colonies of relatively simple living beings (ants, termites,    bees, etc.) are able to solve vital problems to    survive is a proof of the effectiveness of evolution.\" By means    of certain interrelationships among the members of a colony, a    collective behavior emerges from that colony, and it allows    them to efficiently react to problematic environmental    situations. That task, applied by the UGR to the field of    artificial intelligence, would be    impossible to carry out by individual members of the colony.  <\/p>\n<p>    At present, this research group is working on the development    of other algorithms similar to the one described. This time,    they are doing so to determine the nodes of the social network    which certain \"infiltrators\" must connect to in order to    increase the quantity and quality of the information gathered    to improve the knowledge of the relations between the other    actors, thus optimizing the dismantling of the network.  <\/p>\n<p>     Explore further:        Scientists develop new high-precision method for analysing and    comparing functioning and structure of complex networks  <\/p>\n<p>    More information: Manuel Lozano et al. Optimizing    network attacks by artificial bee colony, Information    Sciences (2017). DOI: 10.1016\/j.ins.2016.10.014<\/p>\n<p>        Researchers at the Universitat Politcnica de Catalunya        (UPC) and the University of Barcelona (UB) published a        paper in Nature Communications presenting a scientific        method for identifying, comparing and precisely determining        ...      <\/p>\n<p>        Sharks form strong social networks that are relatively        unaffected when several members leave the group, and        members also learn how to avoid capture, new research        released today has found.      <\/p>\n<p>        In mathematics, you need at most only four different colors        to produce a map in which no two adjacent regions have the        same color. Utah and Arizona are considered adjacent, but        Utah and New Mexico, which only share a point, ...      <\/p>\n<p>        The advent of online social networks has led to the rapid        development of tools for understanding the interactions        between members of the network, their activity, the        connections, the hubs and nodes. But, any relationships ...      <\/p>\n<p>        It's a familiar request in the digital age: one of your        friends on social media has a friend who wants to be your        friend. Frequent linking among friends of friends can cause        a rapid increase in social network connectivity.      <\/p>\n<p>        Social networks such as Facebook, LinkedIn and Twitter play        an increasingly central role in our lives. Centrality is        also an important concept in the theory of social networks.        Centrality of an individual, called a \"node\" ...      <\/p>\n<p>        Hyper-connectivity has changed the way we communicate,        wait, and productively use our time. Even in a world of 5G        wireless and \"instant\" messaging, there are countless        moments throughout the day when we're waiting for messages,        ...      <\/p>\n<p>        Rice University computer scientists are mapping a new        solution for interior navigational location detection by        linking it to existing sensors in mobile devices. Their        results were presented in a paper at last month's 2017 ...      <\/p>\n<p>        Your partner comes in and slams a door. What was that        about? Something you did? What if you knew to anticipate it        because you were notified in advance from an automated text        message that he\/she didn't have a great day at ...      <\/p>\n<p>        Alphabet's life sciences unit Verily on Friday unveiled a        wrist-worn \"Study Watch\" designed to gather complex health        data in clinical studies.      <\/p>\n<p>        Scientists at the U.S. Department of Energy's National        Renewable Energy Laboratory (NREL) have developed a        proof-of-principle photoelectrochemical cell capable of        capturing excess photon energy normally lost to generating        ...      <\/p>\n<p>        Apple has joined the list of companies with permits to test        self-driving cars in California, according to an updated        roster released on Friday by state officials.      <\/p>\n<p>      Please sign      in to add a comment. Registration is free, and takes less      than a minute. Read more    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View post:<br \/>\n<a target=\"_blank\" href=\"https:\/\/phys.org\/news\/2017-04-scientists-algorithm-bee-colonies-dismantling.html\" title=\"Scientists develop a novel algorithm inspired by bee colonies to ... - Phys.Org\">Scientists develop a novel algorithm inspired by bee colonies to ... - Phys.Org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> April 17, 2017 Credit: University of Granada Researchers from the University of Granada (UGR) have designed an algorithm, inspired by the intelligent and social behavior of bee colonies, which allows law enforcement to attack and dismantle any type of social network that poses a threat, whether physical or virtual, such as social networks linked to organized crime and jihadist terrorism. The possible applications of this new bio-inspired algorithm, which helps to make optimal decisions in order to dismantle any type of social network, are many and varied: from dismantling a criminal network to facilitating the design of vaccination strategies capable of containing the spread of a pandemic. The tool designed by the UGR researchers automatically detects and identifies the most dangerous actors or nodes within a given social network and the density of the interconnected relationships between them, which may help law enforcement authorities make their decisions and act in the most efficient way possible <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/behavioral-science\/scientists-develop-a-novel-algorithm-inspired-by-bee-colonies-to-phys-org.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":57,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[577410],"tags":[],"class_list":["post-95580","post","type-post","status-publish","format-standard","hentry","category-behavioral-science"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/95580"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/57"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=95580"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/95580\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=95580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=95580"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=95580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}