Protein domain networks: analysis of attack tolerance under varied circumstances

Oğuz, Şaziye Deniz
Recently, there has been much interest in the resilience of complex networks to random failures and intentional attacks. The study of the network robustness is particularly important by several occasions. In one hand a higher degree of robustness to errors and attacks may be desired for maintaining the information flow in communication networks under attacks. On the other hand planning a very limited attack aimed at fragmenting a network by removal of minimum number of the most important nodes might have significant usage in drug design. Many real world networks were found to display scale free topology including WWW, the internet, social networks or regulatory gene and protein networks. In the recent studies it was shown that while these networks have a surprising error tolerance, their scale-free topology makes them fragile under intentional attack, leaving the scientists a challenge on how to improve the networks robustness against attacks. In this thesis, we studied the protein domain co-occurrence network of yeast which displays scale free topology generated with data from Biomart which links to Pfam database. Several networks obtained from protein domain co-occurrence network having exactly the same connectivity distribution were compared under attacks to investigate the assumption that the different networks with the same connectivity distribution do not need to have the same attack tolerances. In addition to this, we considered that the networks with the same connectivity distribution have higher attack tolerance as we organize the same resources in a better way. Then, we checked for the variations of attack tolerance of the networks with the same connectiviy distributions. Furthermore, we investigated whether there is an evolutionary mechanism for having networks with higher or lower attack tolerances for the same connectivity distribution. As a result of these investigations, the different networks with the same connectivity distribution do not have the same attack tolerances under attack. In addition to this, it was observed that the networks with the same connectivity distribution have higher attack tolerances as organizing the same resources in a better way which implies that there is an evolutionary mechanism for having networks with higher attack tolerance for the same connectivity distribution.


Computation of fault-tolerant supervisors for discrete event systems ?
Sülek, Ayşe Nur; Schmidt, Klaus Verner (2013-10-21)
Fault-tolerance addresses the problem of operating a system even in case of faults. In this paper, we study fault-tolerance in the supervisory control framework for discrete event systems (DES). We consider DES, where certain events might no longer be possible in case a fault happens. In this setting, we first identify necessary and sufficient conditions for the existence of a supervisor that realizes a given behavioral specification both in the non-faulty and in the faulty case. We further show that it is ...
Development of experimental test setups for bladed disks and non-linear vibration
Öney, Eren; Ciğeroğlu, Ender; Department of Mechanical Engineering (2019)
High-cycle fatigue is one of the most frequent reason of failure for turbomachines and in early design process, so it is crucial to predict the vibration levels. Various finite element modelling techniques for bladed-disk systems appear in the literature, including both reducing large size FEM and describing the frictional contact interface. However, not only having a large size FEM but also including the nonlinear friction to models makes the task very struggling and time consuming. In order to enhance the...
Sparse Attack Construction and State Estimation in the Smart Grid: Centralized and Distributed Models
Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatoş Tunay; Kulkarni, Sanjeev R.; Poor, H. Vincent (Institute of Electrical and Electronics Engineers (IEEE), 2013-07-01)
New methods that exploit sparse structures arising in smart grid networks are proposed for the state estimation problem when data injection attacks are present. First, construction strategies for unobservable sparse data injection attacks on power grids are proposed for an attacker with access to all network information and nodes. Specifically, novel formulations for the optimization problem that provide a flexible design of the trade-off between performance and false alarm are proposed. In addition, the ce...
Aygün, Atakan; Karakuş, Ali (2022-10-01)
Physics-informed neural networks (PINNs) have drawn attention in recent years in engineering problems due to their effectiveness and ability to tackle problems without generating complex meshes. PINNs use automatic differentiation to evaluate differential operators in conservation laws and hence do not need a discretization scheme. Using this ability, PINNs satisfy governing laws of physics in the loss function without any training data. In this work, we solve various incompressible thermal convection probl...
Fragility based assessment of lowrise and midrise reinforced concrete frame buildings in Turkey
Ay, Bekir Özer; Erberik, Murat Altuğ; Department of Civil Engineering (2006)
In this study, structural vulnerability of reinforced concrete frame structures by considering the countryspecific characteristics is investigated to manage the earthquake risk and to develop strategies for disaster mitigation. Lowrise and midrise reinforced concrete structures, which constitute approximately 75% of the total building stock in Turkey, are focused in this fragilitybased assessment. The seismic design of 3, 5, 7 and 9story reinforced concrete frame structures are carried out according to the ...
Citation Formats
Ş. D. Oğuz, “Protein domain networks: analysis of attack tolerance under varied circumstances ,” M.S. - Master of Science, Middle East Technical University, 2010.