tag:blogger.com,1999:blog-2429838311680791328.post1805051660527436965..comments2015-05-06T03:51:49.801-07:00Comments on Web Science and the Mind: Stevan Harnadnoreply@blogger.comBlogger31125tag:blogger.com,1999:blog-2429838311680791328.post-35996662286015731952014-08-27T18:14:04.980-07:002014-08-27T18:14:04.980-07:00This also has interesting implications for BCI/dee...This also has interesting implications for BCI/deep brain stimulation or even TMS in that, were we to be able to map specific areas in the brain that can act as sensor or control nodes, it would be possible to actively monitor electrical dynamics in the brain such that electrical stimulation could be applied to control nodes in order to shift the network from a pathological state to a more manageable one.Derek Alberthttps://www.blogger.com/profile/00699644269684089709noreply@blogger.comtag:blogger.com,1999:blog-2429838311680791328.post-86247311435131655142014-07-19T12:51:37.516-07:002014-07-19T12:51:37.516-07:00Thank you for an interesting talk. It was interest...Thank you for an interesting talk. It was interesting to see that control ability and observability depend primarily on topological characteristic of a network. I wonder about cases where the network is not controllable can you device algorithms that will indicate the minimal changes in the network topology that are needed to achive control ability. Spaceweaverhttps://www.blogger.com/profile/10897180849660972797noreply@blogger.comtag:blogger.com,1999:blog-2429838311680791328.post-62748624668422067012014-07-16T12:33:43.317-07:002014-07-16T12:33:43.317-07:00I tried to be concise with my question but have pe...I tried to be concise with my question but have perhaps neglected the interdisciplinary nature of it. Perhaps these resources will help your formulate an opinion. The article's is 10 years old and the video is from March this year. <br /><br />Raz, A. (2004). <a href="http://onlinelibrary.wiley.com/doi/10.1002/ar.b.20035/full#bib76" rel="nofollow">Anatomy of Attentional Networks</a><br /><br />http://www.ted.com/talks/david_chalmers_how_do_you_explain_consciousnessNick Kirwanhttps://www.blogger.com/profile/07619425725400334193noreply@blogger.comtag:blogger.com,1999:blog-2429838311680791328.post-39315707950624845282014-07-16T10:50:33.027-07:002014-07-16T10:50:33.027-07:00Thank for the response and reference, Dr. Liu!
A ...Thank for the response and reference, Dr. Liu! <br />A follow-up question I have would be which of the two strategies you just outlined (increasing robustness with redundancy versus using control theoretical approaches to address attack detection) makes more sense? Maybe both should be used in tandem. Do you have a preference for one or the other? Maxwell J. D. Ramsteadhttps://www.blogger.com/profile/05202615079054948989noreply@blogger.comtag:blogger.com,1999:blog-2429838311680791328.post-25718215384979668162014-07-15T06:26:26.124-07:002014-07-15T06:26:26.124-07:00Hi Dr. Liu, I'd recommend getting in touch wit...Hi Dr. Liu, I'd recommend getting in touch with Dr. Alan Evans who gave a talk on mapping the brain connectome on the first day of the conference. He mentioned to me a model of disease progression in dementia that his group is working on that includes a "clearance" term, providing his model with a more accurate picture of disease. Looking forward to your results! Could you give any more detail on how you apply control theory to disease progression in dementia? Are you using modelling a particular pharmacological agent? Ishan Walpolahttps://www.blogger.com/profile/01254132467814944980noreply@blogger.comtag:blogger.com,1999:blog-2429838311680791328.post-62682173038294234042014-07-14T19:53:47.487-07:002014-07-14T19:53:47.487-07:00Thank you!Thank you!Clélia Sèvehttps://www.blogger.com/profile/08012414306522293143noreply@blogger.comtag:blogger.com,1999:blog-2429838311680791328.post-32739616363356045542014-07-14T16:07:24.096-07:002014-07-14T16:07:24.096-07:00That’s a tough question. If we have a very quantit...That’s a tough question. If we have a very quantitative understanding of the dynamics of the interaction between the mind and the web technologies, then perhaps we can apply control theory. <br />Also, fuzzy control theory might be potentially useful. <br />FYI: http://www.site.uottawa.ca/~petriu/Fuzzy-tutor.PDF<br />Yang-Yu Liuhttps://www.blogger.com/profile/13038514244015333092noreply@blogger.comtag:blogger.com,1999:blog-2429838311680791328.post-82191152473525976492014-07-14T16:01:20.105-07:002014-07-14T16:01:20.105-07:00e studied the algebraic observability of nonlinear...e studied the algebraic observability of nonlinear (rational or polynomial) dynamic systems. For controllability of nonlinear dynamical systems, we don’t have concrete results yet. And I wonder if any general statements can be made about the impact of network structure on the nonlinear controllability of a general nonlinear dynamical systems. <br /> Yang-Yu Liuhttps://www.blogger.com/profile/13038514244015333092noreply@blogger.comtag:blogger.com,1999:blog-2429838311680791328.post-71171236251425145222014-07-14T16:00:47.621-07:002014-07-14T16:00:47.621-07:00This question is about how to infer the network st...This question is about how to infer the network structure. If you consider network structure itself (e.g., the edge presence/absence or edge weights) is a state variable, we can formalize the inference problem as an observability problem.<br />This paper (http://arxiv.org/abs/1308.5261) has addressed this question in a very satisfactory manner. Yang-Yu Liuhttps://www.blogger.com/profile/13038514244015333092noreply@blogger.comtag:blogger.com,1999:blog-2429838311680791328.post-3326939599310028962014-07-14T15:59:33.312-07:002014-07-14T15:59:33.312-07:00It reminds us that for linear dynamics, network st...It reminds us that for linear dynamics, network structure plays a very important role in controlling the network. And many analytical results can be obtained. The linear dynamics we studied may be suitable for the consensus or agreement dynamics in multi-agent networks. <br />Yang-Yu Liuhttps://www.blogger.com/profile/13038514244015333092noreply@blogger.comtag:blogger.com,1999:blog-2429838311680791328.post-52962390883852785362014-07-14T15:59:11.016-07:002014-07-14T15:59:11.016-07:00I didn’t show any books on structural control theo...I didn’t show any books on structural control theory. :) But here is a nice review paper on structural control theory:<br />“Generic properties and control of linear structured systems: a survey”<br />Jean-Michel Diona, Christian Commaulta, Jacob van der Woudeb<br />Yang-Yu Liuhttps://www.blogger.com/profile/13038514244015333092noreply@blogger.comtag:blogger.com,1999:blog-2429838311680791328.post-35240027229861371702014-07-14T15:58:45.298-07:002014-07-14T15:58:45.298-07:00That’s the price we need to pay. Scale-free networ...That’s the price we need to pay. Scale-free networks are robust to random failure, but fragile to targeted attack. There is not much we can do. This paper tried to address this question from the design prospective: <br />http://link.springer.com/article/10.1140%2Fepjb%2Fe2004-00112-3<br />(But I am not sure if we are allowed to make this high-level or centralized decision to construct scale-free networks. Many networks are constructed in a self-organized or decentralized manner.)<br />Yang-Yu Liuhttps://www.blogger.com/profile/13038514244015333092noreply@blogger.comtag:blogger.com,1999:blog-2429838311680791328.post-61065204891422987552014-07-14T15:58:13.105-07:002014-07-14T15:58:13.105-07:00The linear dynamics we studied may be suitable for...The linear dynamics we studied may be suitable for the consensus or agreement dynamics in multi- agent networks, e.g., social media. Hubs are nodes that have high degree (connectivity). Driver users can be identified using the maximum matching algorithm, provided that we know the structure of the social network and the structure does not vary over time. For dense and homogeneous networks with linear time-invariant dynamics, in principle we do need less driver nodes. But in reality, it may require lots of “energy” to fully control the system. FYI: <br />http://journals.aps.org/prl/abstract/10.1103/PhysRevLett.108.218703<br />Yang-Yu Liuhttps://www.blogger.com/profile/13038514244015333092noreply@blogger.comtag:blogger.com,1999:blog-2429838311680791328.post-28181919540736936582014-07-14T15:57:40.752-07:002014-07-14T15:57:40.752-07:00Definitely. It is a fantastic research topic. An i...Definitely. It is a fantastic research topic. An interesting paper “A network diffusion model of disease progression in dementia” written by Raj et al. inspired us to explore the potential application of control theory to disease progression. We are still working on that. No concrete results yet.Yang-Yu Liuhttps://www.blogger.com/profile/13038514244015333092noreply@blogger.comtag:blogger.com,1999:blog-2429838311680791328.post-46734693258611064772014-07-14T15:57:16.221-07:002014-07-14T15:57:16.221-07:00It is not a little question. :) I could not find a...It is not a little question. :) I could not find any papers talking about the application of control theory to semantics. The word “control” used in linguistics (e.g., in this paper<br />http://web.mit.edu/susi/www/research/files/CGSW15.pdf) seems to have a completely different meaning from the control notion used in control theory. I am not sure about the applicability of control theory to linguistics. (I wish I could be more optimistic. :( )<br />Yang-Yu Liuhttps://www.blogger.com/profile/13038514244015333092noreply@blogger.comtag:blogger.com,1999:blog-2429838311680791328.post-37772020184075871292014-07-14T15:56:51.202-07:002014-07-14T15:56:51.202-07:00This is a very interesting question. In the contex...This is a very interesting question. In the context of structural controllability, our approach can be used to classify links into critical, redundant, and ordinary. In engineered systems, this classification implies that in order to make controllability more robust, one can simply double (or triple) each critical link, formally making each of these links redundant and therefore ensuring there is no critical link in the controlled system. <br /><br />But your question is about attack prevention, rather than the robustness of structural controllability. Here is a fair recent paper “Attack Detection and Identification in Cyber-Physical Systems” written by Pasqualetti et al. They use control theoretical approach to address the attack detection problem. Hopefully, it can be used to protect WWW from targeted attacks. <br /><br />Also, this paper tried to address this question from the design prospective: <br />http://link.springer.com/article/10.1140%2Fepjb%2Fe2004-00112-3<br />(I am not sure if we are allowed to make this high-level or centralized decision to construct WWW. The construction of WWW sounds more like a self-organized or decentralized process.)<br />Yang-Yu Liuhttps://www.blogger.com/profile/13038514244015333092noreply@blogger.comtag:blogger.com,1999:blog-2429838311680791328.post-21135042046026070352014-07-14T15:55:57.833-07:002014-07-14T15:55:57.833-07:00Thanks for sharing this interesting article. I hav...Thanks for sharing this interesting article. I have never thought about the potential application of control theory to software engineering. And I could not find any peer-reviewed journal articles discussing this point. It sounds a rather tough problem to me, because I/we don’t know how to write down a reasonable dynamic model for software engineering. If this is doable, then a bunch of control theoretical concepts can be applied, e.g., optimal control, adaptive control, etc. <br />Yang-Yu Liuhttps://www.blogger.com/profile/13038514244015333092noreply@blogger.comtag:blogger.com,1999:blog-2429838311680791328.post-89520199942065469272014-07-14T14:47:50.969-07:002014-07-14T14:47:50.969-07:00The end of the lecture focused on directional aspe...The end of the lecture focused on directional aspects of complex networks. Could you apply this analysis to the concepts of top-down and bottom up processing. In the context of controllability and observability, where you you look to better understand the mind and its interaction with web technologies?Nick Kirwanhttps://www.blogger.com/profile/07619425725400334193noreply@blogger.comtag:blogger.com,1999:blog-2429838311680791328.post-33179432722177196092014-07-14T10:47:05.797-07:002014-07-14T10:47:05.797-07:00I'd wager Dr. Liu's works on controlabilit...I'd wager Dr. Liu's works on controlability would give a priori constraints, which would limit the search space when trying to find suitable interventions to bring a dynamic system to a desired state.Louis Chartrandhttps://www.blogger.com/profile/02273862171816691623noreply@blogger.comtag:blogger.com,1999:blog-2429838311680791328.post-38281769944336539112014-07-14T08:48:53.593-07:002014-07-14T08:48:53.593-07:00Translation:
Network control theory is reminiscen...<b>Translation:</b><br /><br />Network control theory is reminiscent of state transitions in a computational system: Has control theory been applied to software engineering? e.g. <a href="http://www.theserverside.com/feature/Applying-control-theory-concepts-in-software-applications" rel="nofollow">http://www.theserverside.com/feature/Applying-control-theory-concepts-in-software-applications</a>Stevan Harnadhttps://www.blogger.com/profile/08246824164400922565noreply@blogger.comtag:blogger.com,1999:blog-2429838311680791328.post-75900278476218061122014-07-14T08:23:36.341-07:002014-07-14T08:23:36.341-07:00Very enjoyable talk. I'm wondering if there is...Very enjoyable talk. I'm wondering if there is a way to connect some of the things from this talk to the previous talk about network dynamics? Nicole Telidishttps://www.blogger.com/profile/17630209059650997324noreply@blogger.comtag:blogger.com,1999:blog-2429838311680791328.post-7123691371181457072014-07-14T08:10:46.177-07:002014-07-14T08:10:46.177-07:00Using cactus structure to reduce a complexity of n...Using cactus structure to reduce a complexity of network its wonderful way to make it controllable. My question it’s about complexes networks that we do not know all the interaction between nodes, can we apply this reduction by ignoring unknown relations or do we have another way to do it !!Eltaani Redhahttps://www.blogger.com/profile/02446895812954223724noreply@blogger.comtag:blogger.com,1999:blog-2429838311680791328.post-78488405012276377122014-07-14T08:07:44.411-07:002014-07-14T08:07:44.411-07:00I don’t know much about controllability theory and...I don’t know much about controllability theory and I am wondering what could be a concrete use or impact for this study?Clélia Sèvehttps://www.blogger.com/profile/08012414306522293143noreply@blogger.comtag:blogger.com,1999:blog-2429838311680791328.post-89246675174184080042014-07-14T08:05:08.972-07:002014-07-14T08:05:08.972-07:00Thank you YANG-YU LIU. You show me an example abou...Thank you YANG-YU LIU. You show me an example about a simple dynamic system. I would like to know more about cactus structure. It is possible to see it, in the last book, showed in the last slide?Albert Monterhttps://www.blogger.com/profile/06013149371103682864noreply@blogger.comtag:blogger.com,1999:blog-2429838311680791328.post-39742898259348766752014-07-14T08:03:26.155-07:002014-07-14T08:03:26.155-07:00I did not know much about structural control theor...I did not know much about structural control theory and I found this talk very informative. <br />You said hubs were the "Achilles heel" of scale-free networks. Is there anything we, as web scientists/network theorists, can do to prevent this? Or are scale-free networks powerful enough that we should ignore this weak point?Rachelhttps://www.blogger.com/profile/01754405859837644620noreply@blogger.com