Robustness Analysis of Bipartite Task Assignment Networks: A Case Study in Hospital Logistics System

Task-oriented social systems involve workers and tasks, which can typically be modeled by bipartite networks. The absence of workers may cause some tasks cannot be finished in time, thus hampering the smoothing operation of the whole system. In this study, we focus on the robustness analysis of such bipartite task-oriented social networks under the absence of some workers. In particular, taking hospital logistics systems as an example, we propose four attack strategies: efficiency-based attack, centrality-based attack, diversity-based attack, and influence-based attack. The experiments on nine real hospital logistics systems show that these systems are especially vulnerable to the diversity-based attack. Different hospitals may present different patterns: some hospital logistics systems are relatively robust against these attacks while others are more vulnerable. The former hospitals are relatively small in size and adopt a global task assignment mode in which the workers can be easily replaced by others. On the contrary, the workers in the latter ones are highly professional and irreplaceable due to the large scale of the hospitals and the adoption of a regional task assignment mode. We also design two task reassignment mechanisms to model the cascading failure of such systems. In this case, the working load plays an important role in the robustness of these systems. Moreover, we find that the robustness and efficiency seem to be negatively correlated with each other, and how to balance the two in real systems still remains an open problem.

[1]  Zhongyuan Ruan,et al.  Kinetics of Social Contagion , 2015, Physical review letters.

[2]  Sushil Jajodia,et al.  Understanding complex network attack graphs through clustered adjacency matrices , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[3]  Hernán A. Makse,et al.  Collective Influence Algorithm to find influencers via optimal percolation in massively large social media , 2016, Scientific Reports.

[4]  Juhee Hahn,et al.  Does pay‐for‐performance enhance perceived distributive justice for collectivistic employees? , 2006 .

[5]  Hongzhong Deng,et al.  Vulnerability of complex networks under intentional attack with incomplete information , 2007 .

[6]  Amir Bashan,et al.  Articulation points in complex networks , 2016, Nature Communications.

[7]  Fengkuangtian Zhu,et al.  Improved collective influence of finding most influential nodes based on disjoint-set reinsertion , 2018, Scientific Reports.

[8]  E. Jenelius Network structure and travel patterns: explaining the geographical disparities of road network vulnerability , 2009 .

[9]  Qi Xuan,et al.  Fast Gradient Attack on Network Embedding , 2018, ArXiv.

[10]  王建伟,et al.  Effect Attack on Scale-Free Networks due to Cascading Failures , 2008 .

[11]  Zhongyuan Ruan,et al.  Risks of an epidemic in a two-layered railway-local area traveling network , 2013, The European Physical Journal B.

[12]  Jiajing Wu,et al.  Robustness of Interdependent Power Grids and Communication Networks: A Complex Network Perspective , 2018, IEEE Transactions on Circuits and Systems II: Express Briefs.

[13]  Lei Zhang,et al.  Node Importance Evaluation Method for Highway Network of Urban Agglomeration , 2011 .

[14]  Juan Carlos González-Avella,et al.  Fast Fragmentation of Networks Using Module-Based Attacks , 2015, PloS one.

[15]  Imtiaz Ahmed,et al.  Employee performance evaluation: a fuzzy approach , 2013 .

[16]  Qi Xuan,et al.  Information filtering by smart nodes in random networks. , 2018, Physical review. E.

[17]  Wu Jun,et al.  Effect of Eliminating Edges on Robustness of Scale-Free Networks under Intentional Attack , 2010 .

[18]  Zhongyuan Ruan,et al.  Epidemic spreading between two coupled subpopulations with inner structures. , 2017, Chaos.

[19]  Massimiliano Zanin,et al.  A comparative analysis of approaches to network-dismantling , 2018, Scientific Reports.

[20]  Sergey Brin,et al.  The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.

[21]  Hernán A. Makse,et al.  Influence maximization in complex networks through optimal percolation , 2015, Nature.

[22]  Xiao-Long Ren,et al.  Review of ranking nodes in complex networks , 2014 .

[23]  Stefano Battiston,et al.  The Network of Global Corporate Control , 2011, PloS one.

[24]  T. Killingback,et al.  Attack Robustness and Centrality of Complex Networks , 2013, PloS one.

[25]  Carlo Ricotta,et al.  Parametric Scaling from Species Relative Abundances to Absolute Abundances in the Computation of Biological Diversity: A First Proposal Using Shannon's Entropy , 2003, Acta biotheoretica.

[26]  Attila Szolnoki,et al.  Collective influence in evolutionary social dilemmas , 2016, ArXiv.

[27]  Guilhem Semerjian,et al.  Network dismantling , 2016, Proceedings of the National Academy of Sciences.

[28]  Qi Xuan,et al.  Social Synchrony on Complex Networks , 2018, IEEE Transactions on Cybernetics.

[29]  Matthieu Latapy,et al.  Basic notions for the analysis of large two-mode networks , 2008, Soc. Networks.

[30]  Ziyou Gao,et al.  Modeling cascading failures in congested complex networks , 2007 .

[31]  Hans J. Herrmann,et al.  Mitigation of malicious attacks on networks , 2011, Proceedings of the National Academy of Sciences.

[32]  Peng Zhang,et al.  Cascading failures in interconnected networks with dynamical redistribution of loads , 2015 .

[33]  Darren M. Scott,et al.  Network Robustness Index : a new method for identifying critical links and evaluating the performance of transportation networks , 2006 .

[34]  Qi Xuan,et al.  Link Weight Prediction Using Supervised Learning Methods and Its Application to Yelp Layered Network , 2018, IEEE Transactions on Knowledge and Data Engineering.

[35]  Qi He,et al.  TwitterRank: finding topic-sensitive influential twitterers , 2010, WSDM '10.

[36]  Qi Xuan,et al.  Temporal motifs reveal collaboration patterns in online task-oriented networks. , 2015, Physical review. E, Statistical, nonlinear, and soft matter physics.

[37]  A. Hamilton,et al.  Species diversity or biodiversity? , 2005, Journal of environmental management.

[38]  S Arianos,et al.  Power grid vulnerability: a complex network approach. , 2008, Chaos.

[39]  Petr Pyšek,et al.  Impact of invasive plants on the species richness, diversity and composition of invaded communities , 2009 .

[40]  Qiang Huang,et al.  Inferring domain-domain interactions from protein-protein interactions in the complex network conformation , 2012, BMC Systems Biology.

[41]  Zengwang Xu,et al.  Exploring the structure of the U.S. intercity passenger air transportation network: a weighted complex network approach , 2008 .

[42]  Kelly Blincoe,et al.  The Sky Is Not the Limit: Multitasking Across GitHub Projects , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE).

[43]  Peteris Daugulis A note on a generalization of eigenvector centrality for bipartite graphs and applications , 2012, Networks.

[44]  Carl T. Bergstrom Eigenfactor Measuring the value and prestige of scholarly journals , 2007 .

[45]  Fei Ma,et al.  Robustness analysis of interdependent networks under multiple-attacking strategies , 2017 .

[46]  Ke Sun,et al.  Complex Networks Theory: A New Method of Research in Power Grid , 2005, 2005 IEEE/PES Transmission & Distribution Conference & Exposition: Asia and Pacific.

[47]  Vito Latora,et al.  Modeling cascading failures in the North American power grid , 2005 .

[48]  Mauricio Barahona,et al.  Robustness of random graphs based on graph spectra. , 2012, Chaos.

[49]  Adem Göleç,et al.  A fuzzy model for competency-based employee evaluation and selection , 2007, Comput. Ind. Eng..

[50]  Massimo Marchiori,et al.  Error and attacktolerance of complex network s , 2004 .

[51]  Qi Xuan,et al.  Target Defense Against Link-Prediction-Based Attacks via Evolutionary Perturbations , 2018, IEEE Transactions on Knowledge and Data Engineering.

[52]  Jian Xu,et al.  Cascading failures in coupled map lattices. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[53]  Jing Ma,et al.  Angle Stability Analysis of Power System With Multiple Operating Conditions Considering Cascading Failure , 2017, IEEE Transactions on Power Systems.

[54]  Beom Jun Kim,et al.  Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[55]  M. Barthelemy Betweenness centrality in large complex networks , 2003, cond-mat/0309436.

[56]  Paul Erdös,et al.  On random graphs, I , 1959 .

[57]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[58]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[59]  Qi Xuan,et al.  Modern Food Foraging Patterns: Geography and Cuisine Choices of Restaurant Patrons on Yelp , 2018, IEEE Transactions on Computational Social Systems.