Skip to main content
PLOS One logoLink to PLOS One
. 2014 Dec 19;9(12):e115156. doi: 10.1371/journal.pone.0115156

Using Synchronous Boolean Networks to Model Several Phenomena of Collective Behavior

Stepan Kochemazov 1, Alexander Semenov 1,*
Editor: Lars Kaderali2
PMCID: PMC4272282  PMID: 25526612

Abstract

In this paper, we propose an approach for modeling and analysis of a number of phenomena of collective behavior. By collectives we mean multi-agent systems that transition from one state to another at discrete moments of time. The behavior of a member of a collective (agent) is called conforming if the opinion of this agent at current time moment conforms to the opinion of some other agents at the previous time moment. We presume that at each moment of time every agent makes a decision by choosing from the set Inline graphic (where 1-decision corresponds to action and 0-decision corresponds to inaction). In our approach we model collective behavior with synchronous Boolean networks. We presume that in a network there can be agents that act at every moment of time. Such agents are called instigators. Also there can be agents that never act. Such agents are called loyalists. Agents that are neither instigators nor loyalists are called simple agents. We study two combinatorial problems. The first problem is to find a disposition of instigators that in several time moments transforms a network from a state where the majority of simple agents are inactive to a state with the majority of active agents. The second problem is to find a disposition of loyalists that returns the network to a state with the majority of inactive agents. Similar problems are studied for networks in which simple agents demonstrate the contrary to conforming behavior that we call anticonforming. We obtained several theoretical results regarding the behavior of collectives of agents with conforming or anticonforming behavior. In computational experiments we solved the described problems for randomly generated networks with several hundred vertices. We reduced corresponding combinatorial problems to the Boolean satisfiability problem (SAT) and used modern SAT solvers to solve the instances obtained.

Introduction

In recent years the interest to the analysis of various phenomena of collective behavior has significantly increased. It can be explained by the fact that in almost all areas of human activity there are processes involving information exchange inside collectives. Such processes deeply affect the future behavior of a collective and can lead to positive or negative consequences not only for the collective considered but also for a much larger social formation. For example an intensive sale of shares on the stock exchange market by players that have a big influence on others can lead to a drastic drop of global economic indexes. Riots and revolutionary situations proceed in a similar fashion when a relatively small group of instigators activates such a large number of people that state security systems are not able to cope with it.

The active development of social networking services in later years greatly increased the possibilities in collective behavior manipulation. This thesis can be proved by analyzing such revolutionary phenomena as Arab Spring, 2011–13 Russian protests, Euromaidan etc. In the majority of these cases the corresponding actions were planned via social networks. It is worth mentioning that such processes are usually coordinated by small groups of designated activists.

The modeling of collective behavior was studied in a large number of papers. Following many other authors we base our work on the paper of M. Granovetter [1], in which threshold models of collective behavior were studied. The threshold behavior means that a state of every member of a group (agent) changes only when the value of a special function, that is associated with this agent, reaches some threshold. The simplest example of such behavior is following the decision of the majority. In Granovetter's model the network connecting the agents is specified by a complete graph – every agent takes into account the opinion of every other agent. In many real situations such approach cannot be used. For example, in real world social networks an agent usually bases its opinion on that of agents from some neighborhood. In this case the opinion of agents outside of such neighborhood would have no impact on the opinion of the agent considered. Similar situations can be observed in genetics: in many gene networks the amount of genes that directly affect each particular gene is small relative to the total number of genes in the network.

Similarities of dynamical processes that can be observed in gene networks and social networks led us to an idea to introduce and analyze models of collective behavior that are based on Boolean networks. The apparatus of Boolean networks have been used in mathematical biology for 50 years. Below we consider the so called synchronous Boolean networks (SBNs) first introduced by S. Kauffman in [2] with the purpose of analyzing dynamical properties of gene networks. In our approach we consider a collective as an SBN with special functions associated with the network vertices. From our point of view the language of Boolean networks is well suited for explaining a number of phenomena of collective behavior. For example, equilibrium states from [1] can be viewed as fixed points of a discrete function specified by the corresponding SBN. Another important feature of such models is that to solve combinatorial problems that arise during the analysis of SBNs, it is possible to use modern methods of solving large systems of Boolean equations. For this purpose in our paper we use algorithms for solving the Boolean satisfiability problem (SAT).

Let us present a brief outline of the paper. First we describe SBNs and define fixed points and cycles of discrete functions determined by these networks. Then we introduce two models of collective behavior that are based on SBNs. In the first model we consider a situation when each network agent at the next moment of time makes a decision to act if at least a specific amount of agents in its neighborhood are currently active. Otherwise the agent decides not to act. This form of collective behavior is usually referred to as conformity. The second model is used to illustrate the phenomenon of anticonformity - an agent decides not to act if at the present moment at least a specific amount of its neighbors decide to act and vice versa. After this, we extend the models proposed by introducing two special types of agents: instigators and loyalists. Instigators are the agents that always act regardless of other agents decisions. Loyalists are the agents that never act. For the extended models we formulate the following combinatorial problem: for a network with the majority of inactive agents to find such a disposition of small amount of instigators, that after several moments of time the majority of agents in this network becomes active. An opposite problem is also considered: for a previously activated network (with instigators) to find a disposition of a relatively small number of loyalists, such that after several moments of time the majority of agents becomes inactive. In the context of problems considered we state a number of theoretical properties of discrete functions defined by the corresponding SBNs. Then we note that modern combinatorial algorithms can be used to solve such problems. In particular, we use algorithms for solving SAT. Further we describe our computational experiments and discuss the results obtained. In these experiments we constructed SBNs according to widely known models of random graphs (Gilbert-Erdos-Renyi model, Watts-Strogatz model, Barabasi-Albert model). Using modern SAT solvers we managed to solve combinatorial problems outlined above for corresponding networks with 500 vertices and more. In the conclusion we give some final remarks and outline our future plans.

Related Works

As we already noted, the paper [1] is the fundamental work in the field of threshold models of collective behavior. In a number of later works, for example [3][5], the ideas from [1] were detailed and applied to analysis of various sociological situations.

In [6][9] and others it was shown that various phenomena of collective behavior may be studied from the game theory point of view. In particular, equilibrium states [1] in collectives can be considered as Nash equilibria. In this context we would like to mention the work [7] in which the conformity and anticonformity were considered from the game theory positions.

In the paper [10] the influence of thresholds distributions on the genesis and development of several phenomena (in particular, the so called bandwagon effect) in the networks with arbitrary structure is analyzed.

As we said above, synchronous Boolean networks were introduced by S. Kauffman in [2]. In that paper problems of analysis of fixed points and cycles of corresponding discrete functions were considered as important and helpful for the study of dynamics of real gene networks. Apparently, [11] is the first example of application of combinatorial algorithms to the search for cycles of discrete functions specified by Kauffman networks. Later the same authors used the SAT approach for similar purposes [12]. In [13] we considered the problem of search for fixed points of discrete functions specified by networks, in which vertex weight functions take natural values and at the same time act as threshold functions. In order to solve the corresponding problems, we used both SAT and ROBDD approaches. Also in [13] we studied an opposite problem: given fixed points of the function specified by some network, to restore the structure of the network.

In recent years there were published a lot of works about the analysis of structure of big networks and processes that can occur in them. Works [14] and [15] are quite complete reviews of relevant topics.

Models

Synchronous Boolean Networks

A Synchronous Boolean Network (SBN) is defined as a directed graph in which with each vertex there is associated a total function that takes values from Inline graphic at discrete moments of time. Hereinafter we will refer to such functions as vertex weight functions. The value of a weight function for an arbitrary vertex Inline graphic at moment Inline graphic is calculated based on the values of weight functions of some set of network vertices at moment Inline graphic. In SBNs values of all weight functions are updated simultaneously (synchronously). Note that the weight functions can be specified in various ways: by truth tables, Boolean formulas or predicates. Values of weight functions of all vertices at an arbitrary moment Inline graphic, Inline graphic can be considered as a result of computing a value of a discrete function that takes a Boolean vector of length Inline graphic as input and outputs a Boolean vector of length Inline graphic, where Inline graphic is the number of vertices in the network. We denote a Boolean vector consisting of weight functions values at moment Inline graphic as Inline graphic and call it a network state at moment Inline graphic. We will refer to Inline graphic as an initial network state. It is clear that an arbitrary SBN with Inline graphic vertices has Inline graphic different network states.

Thus, more formally, let us assume that Inline graphic is a directed graph with Inline graphic vertices that represents some SBN. Below we will consider only graphs without loops and without multiple arcs. For convenience let us mark vertices by natural numbers from Inline graphic to Inline graphic. With an arbitrary vertex Inline graphic, Inline graphic we associate a weight function Inline graphic, whose values are defined at discrete moments of time Inline graphic. We assume that at Inline graphic each weight function has some initial value. By Inline graphic we denote such a set of network vertices that for each Inline graphic, Inline graphic the graph Inline graphic has an arc Inline graphic. Essentially it means that Inline graphic contains vertices that directly affect Inline graphic. We also call Inline graphic a neighborhood of Inline graphic.

From here on by Inline graphic we mean the set of all possible binary words of length Inline graphic. The rules that specify each weight function Inline graphic, Inline graphic are the same at any moment of time. It means that in total these functions specify a vector function that is defined everywhere in Inline graphic and takes values from Inline graphic. We denote this function as Inline graphic and refer to it as a discrete function defined by network Inline graphic. The transitions between network states, represented by Boolean vectors from Inline graphic, can be naturally illustrated using special graphs called State Transition Graphs (STGs). We denote the STG of network Inline graphic as Inline graphic. An example of a simple SBN with 3 vertices where weight functions are specified by Boolean formulas is displayed in Fig. 1.

Figure 1. An example of a Kauffman network and its State Transition Graph.

Figure 1

The left part shows a simple Kauffman network with 3 vertices. Weight functions are specified by Boolean formulas in the right upper part of the figure. The lower right part demonstrates the state transition graph (STG) for the discrete function specified by this network. It contains one cycle of length 2 and one fixed point.

As we already noted, the amount of different states of an arbitrary SBN with Inline graphic vertices is Inline graphic, and the rules, according to which the network transitions from one state into another, do not depend on Inline graphic. Therefore, regardless of the network state at moment Inline graphic, there are such Inline graphic and Inline graphic, Inline graphic, that Inline graphic. In this situation we call the sequence of transitions Inline graphic a cycle of length Inline graphic [2]. In some works on the analysis of dynamical properties of gene networks the cycles are called "attractors". The cycle of length 1 is called a fixed point of function Inline graphic. For the network in Fig. 1 it is easy to see that Inline graphic is a fixed point, while a sequence Inline graphic forms a cycle of length 2. Note that the neighborhood of every vertex of the network in Fig. 1 is formed by other two vertices.

Models of Collective Behavior Based on Synchronous Boolean Networks

In this section we introduce and analyze two phenomena of collective behavior that can be observed in the real world. The first one is conforming behavior. It means that an agent agrees with the opinion of some agents from its neighborhood. It is easy to find many examples of conformity in real life: from riots and financial crises mentioned above to presidential elections, etc. The second phenomenon we study is anticonforming behavior. The agent demonstrating anticonforming behavior acts as an opposite to an agent with conforming behavior: it chooses not to act while certain amount of agents from its neighborhood are active and vice versa.

Let us consider an SBN Inline graphic with Inline graphic vertices interpreting agents. We will say that an arbitrary agent Inline graphic, Inline graphic is active (inactive) at moment Inline graphic if Inline graphic (Inline graphic, respectively). We assume that an arbitrary agent Inline graphic is associated with the weight function of one of the following two types:

graphic file with name pone.0115156.e067.jpg (1)
graphic file with name pone.0115156.e068.jpg (2)

where Inline graphic are called conformity threshold and anticonformity treshold, respectively.

Essentially, (1) means that the agent Inline graphic becomes active at moment Inline graphic only if at least Inline graphic agents from its neighborhood are active at moment Inline graphic. Otherwise Inline graphic becomes inactive at moment Inline graphic. Hereinafter we refer to such agents as conformists. Likewise (2) means that Inline graphic becomes inactive at moment Inline graphic if at least Inline graphic agents from its neighborhood are active at moment Inline graphic and becomes active otherwise. These agents will be refered to as anticonformists. Values Inline graphic and Inline graphic we will call conformity level and anticonformity level, respectively. Further we assume that if Inline graphic then the sum of corresponding weights is Inline graphic.

Let Inline graphic be a conformist with the conformity threshold Inline graphic and Inline graphic. Then it is clear that Inline graphic, i.e. that Inline graphic takes the value of Inline graphic at any moment Inline graphic. It means that agent Inline graphic is active at any moment regardless of decisions of agents in its neighborhood. We will refer to such agents as instigators.

Now let Inline graphic be an anticonformist with anticonformity threshold Inline graphic and Inline graphic. Following the similar reasoning we can conclude that such agent is inactive at any moment of time regardless of decisions of agents from its neighborhood. We call such agents loyalists.

To an arbitrary agent that is neither instigator nor loyalist we will refer as a simple agent. Thus an arbitrary simple agent Inline graphic is either a conformist with Inline graphic or an anticonformist with Inline graphic.

In Fig. 2 we demonstrate the notation that we use below.

Figure 2. Example of an SBN representing a collective with conforming behavior.

Figure 2

This figure shows a network with different types of vertices. Each vertex represents a member of a collective (an agent). Crimson vertices correspond to instigators – agents that are always active. Bright green vertices represent loyalists – agents that are always inactive. The vertex corresponding to simple agent is marked with orange if the agent is active and with blue otherwise. The arcs going from active agents (including instigators) are marked with red. The arcs going from inactive agents (including loyalists) are marked with green. Each simple agent has a conformity level.

The networks with described types of agents can often be observed in real life. Indeed, for example one can notice that on the early stage of every revolutionary situation there are instigators. Their purpose is to activate as many initially inactive simple agents-conformists as possible. Once they become active, conformists help activating other inactive agents-conformists in the following moments of time. This process gradually involves even agents that are not directly connected to instigators. The goal of loyalists in such situations is to launch the deactivation process aimed at making active simple agents inactive.

It should be noted that the disposition of instigators and loyalists in the network can significantly affect the activation/deactivation of the network. In Fig. 3 we display the behavior of the same network with two different dispositions of instigators at the initial time moment. The considered network does not have loyalists and all its simple agents are conformists. We assume that at the initial moment all the simple agents are inactive (i.e. for every simple agent Inline graphic). In the first case 5 instigators after 5 moments of time manage to activate only 17 simple agents. In the second case 3 instigators after 5 moments of time activate almost the whole network — 26 simple agents. An important detail here is that in the first case there is more instigators but their disposition is worse.

Figure 3. The behavioral dynamics of the network under the influence of two different dispositions of instigators.

Figure 3

In the initial state all simple agents are inactive. In the first case (left part of the figure), 5 instigators after 5 steps activate 17 simple agents. In the second case (right part of the figure) 3 instigators after 5 steps activate 26 simple agents.

Further we establish a number of theoretical results regarding the dynamical properties of SBNs with agents of the described types. The main achievement here consists in the justification of the fact that the networks in which all simple agents are conformists and networks where all simple agents are anticonformists can demonstrate significantly different activation/deactivation dynamics.

Conforming Behavior

Consider an arbitrary SBN Inline graphic with Inline graphic agents. We assume that all the simple agents in the network are conformists and that there can be instigators and loyalists. Hereinafter we study two problems that we believe to be interesting from the practical point of view.

In the context of the first problem (to which we will refer below as Problem 1) we consider a network with Inline graphic agents among which there can be Inline graphic, Inline graphic instigators, while all the other Inline graphic agents are simple agents-conformists. We assume that a priori Inline graphic instigators can be arbitrarily placed in the network. Also we assume that at the initial time moment Inline graphic all the simple agents are inactive. The goal is to find such disposition of instigators that starting from Inline graphic the network after some time moments transitions to the state with the majority of active agents.

The second problem (to which we will refer below as Problem 2) consists in the following: we consider the network with a fixed disposition of Inline graphic, Inline graphic instigators and all the other Inline graphic simple agents-conformists are active at the initial moment Inline graphic. We assume that it is possible to replace Inline graphic, Inline graphic arbitrary simple agents by loyalists. We need to find such disposition of these loyalists that starting from Inline graphic the network after some time moments transitions to the state with the majority of inactive simple agents.

Let us show that the following theorem holds.

Theorem 1

Consider an arbitrary SBN with Inline graphic agents among which there are Inline graphic , Inline graphic instigators and the remaining Inline graphic simple agents are conformists. We assume that at the initial time moment Inline graphic all Inline graphic simple agents are inactive. Then for any disposition of instigators and any conformity thresholds of simple agents the network starting from Inline graphic will transition to a fixed point after Inline graphic time moments.

Proof

Assume that Inline graphic is an SBN with Inline graphic vertices, weight functions (1), an arbitrary disposition of Inline graphic instigators and arbitrary conformity thresholds of simple agents. Suppose that all simple agents are inactive at Inline graphic. If after the transition from Inline graphic to Inline graphic none of simple agents have changed their decisions (Inline graphic) then we have a fixed point (since instigators do not change their decisions by definition). Now suppose that at moment Inline graphic some simple agents have changed their decisions from Inline graphic to Inline graphic. Let Inline graphic be one of them. It means that Inline graphic has changed its decision from Inline graphic to Inline graphic only because it had enough (relative to its conformity threshold) instigators in its neighborhood. But since instigators are always active then the number of active agents in the neighborhood of Inline graphic at any Inline graphic can not be less than that at Inline graphic. Therefore this agent will not change its decision Inline graphic at any of the following moments of time. If at moment Inline graphic none of simple agents have changed their decisions then we have a fixed point. Suppose Inline graphic is an arbitrary agent that has changed its decision during the transition from Inline graphic to Inline graphic. From the above it follows that Inline graphic changed decision from Inline graphic to Inline graphic. It could have occured only because it had enough (relative to its conformity threshold) instigators and active agents in its neighborhood. However all agents that have become active at Inline graphic cannot change their decisions at the following moments of time. Therefore agent Inline graphic will remain active at all Inline graphic. If we continue by analogy we can conclude that not later than after Inline graphic time moments our network will reach a fixed point. ▪

Using the reasoning technique from the proof of Theorem 1 it is easy to prove the following corollary.

Corollary 1

Consider an arbitrary SBN with Inline graphic agents among which there are Inline graphic , Inline graphic instigators and the remaining Inline graphic simple agents are conformists. Assume that some disposition of instigators is fixed and all simple agents are active at the initial time moment Inline graphic . Also assume that we can replace any Inline graphic , Inline graphic simple agents by loyalists. Then for any disposition of these Inline graphic loyalists and any conformity thresholds of remaining Inline graphic simple agents the network starting from Inline graphic will transition to a fixed point after Inline graphic time moments.

Note that the Theorem 1 despite its simplicity makes it possible to explain the situations when a relatively small number of instigators thanks to their advantageous disposition manage to activate quite a big network quickly. Apparently, the development of revolutionary situations, epidemics and critical processes in stock markets proceed in the similar fashion.

The principal possibility of the phenomenon when a small number of instigators can activate the network starting from the state in which all simple agents-conformists are inactive means that the network itself is vulnerable to instigators. Intuitively it is clear that such networks can be activated by instigators even faster if some simple agents are already active at the initial time moment. This thesis is proved by the following theorem.

Theorem 2

Assume Inline graphic is a state of an SBN with Inline graphic vertices with weight functions (1) and Inline graphic , Inline graphic instigators, in which all simple agents-conformists are inactive. Denote by Inline graphic a network state, with the same disposition of instigators as in Inline graphic , in which there is at least one active simple agent. By Inline graphic and Inline graphic we denote states reached by the network after Inline graphic time moments starting from Inline graphic and Inline graphic , respectively. Then for any Inline graphic

graphic file with name pone.0115156.e175.jpg

where Inline graphic stands for a Hamming weight of a Boolean vector Inline graphic.

Proof

Consider a state Inline graphic in which all simple agents are inactive and a state Inline graphic where some Inline graphic, Inline graphic simple agents are active. Denote these active agents as Inline graphic. We assume that the disposition of Inline graphic instigators is the same in both Inline graphic and Inline graphic. First let us prove that Inline graphic. Let us analyze all possible cases. First, both Inline graphic and Inline graphic can be fixed points of Inline graphic. In this case the property holds. If Inline graphic is a fixed point and Inline graphic is not, then even if all agents Inline graphic become inactive in Inline graphic it holds that Inline graphic. Now suppose that Inline graphic is not a fixed point, i.e. some simple agents in Inline graphic become active. It can only occur if they have enough instigators in their neighborhoods (relative to their conformity thresholds). But it means that the same simple agents will be active in Inline graphic. Additionally some (possibly all) agents from Inline graphic can become inactive or remain active in Inline graphic. Also in Inline graphic there can appear other active simple agents because Inline graphic are active in Inline graphic. In any case we have Inline graphic. Since Inline graphic is not a fixed point of Inline graphic then some simple agents in Inline graphic become active. Denote these agents as Inline graphic. From Theorem 1 it follows that these agents cannot become inactive in any of states Inline graphic. Consider an arbitrary agent Inline graphic, Inline graphic and let Inline graphic be its neighborhood. From the above the number of active agents in Inline graphic in states Inline graphic is not less than that in Inline graphic in the state Inline graphic. Therefore Inline graphic will be active in all states Inline graphic, Inline graphic. It means that Inline graphic and Inline graphic can be considered as initial states of the network with a set of Inline graphic instigators: this set is formed by Inline graphic original instigators and Inline graphic new instigators Inline graphic. After that by analogy we can show that Inline graphic, etc. ▪

Anticonforming Behavior

Consider an arbitrary SBN Inline graphic with Inline graphic agents. We assume that all simple agents in Inline graphic are anticonformists and also that the network can contain instigators and loyalists.

On the first glance it may seem that the dynamical processes we studied for the collectives of conformists should have some simple analogues in the collectives of anticonformists. However, more thorough investigation reveals that this is not the case. In particular, assume that Inline graphic is a network in which any agent Inline graphic has a nonempty neighborhood (Inline graphic. Also let this network contain neither instigators nor loyalists. Then it is easy to see that if all the agents in the network are conformists (with non-zero conformity thresholds), then the states Inline graphic and Inline graphic are fixed points. However, if all the agents are anticonformists (with non-zero anticonformity thresholds) then there is the cycle of length Inline graphic: Inline graphic. Indeed, let Inline graphic be the network for which all listed conditions are satisfied, all its simple agents are anticonformists and they are inactive at moment Inline graphic. Let Inline graphic be an arbitrary agent of the network and Inline graphic be its neighborhood. Since Inline graphic (by assumption), then at Inline graphic all the agents from Inline graphic have the Inline graphic state. Therefore for any value of Inline graphic we have: Inline graphic, so at moment Inline graphic the agent Inline graphic will switch its state to Inline graphic. Since Inline graphic is an arbitrary network agent, it means that at moment Inline graphic every agent of the network will switch to the state Inline graphic. Now let us consider what occurs at moment Inline graphic. Let Inline graphic be an arbitrary agent-anticonformist. Then at moment Inline graphic all the agents in Inline graphic are in the state 1. It means that for any Inline graphic the following holds: Inline graphic. In this situation at moment Inline graphic the agent Inline graphic switches to the state Inline graphic. But since Inline graphic is an arbitrary agent, then all the network agents switch to Inline graphic at Inline graphic. Therefore we have the cycle Inline graphic.

The following theorem describes the dynamics of collectives of anticonformists with the initial conditions similar to that in Theorem 1. It can be noted that in this situation, generally speaking, the collective of anticonformists has more complex behavior than that of the collective of conformists. In particular, if the network of anticonformists starts from an initial state in which all simple agents-anticonformists are inactive, then it may not reach an equilibrium state (a fixed point).

Theorem 3

Consider an arbitrary SBN with Inline graphic agents, where Inline graphic , Inline graphic agents are instigators and the remaining Inline graphic simple agents are anticonformists. Assume that at the initial moment Inline graphic all Inline graphic simple agents are inactive. Additionally we assume that if Inline graphic is a simple agent then Inline graphic . Then for any disposition of instigators and any anticonformity thresholds of simple agents the network starting from Inline graphic after Inline graphic time moments will either transition to a fixed point or will enter the cycle of length Inline graphic .

Proof

Let Inline graphic be an SBN with Inline graphic vertices, weight functions (2), an arbitrary disposition of Inline graphic instigators and arbitrary anticonformity thresholds of simple agents. Also we assume that all simple agents have nonempty neighborhoods. Below we denote the set of all vertices of Inline graphic as Inline graphic. Let Inline graphic be an initial state of a network with an arbitrary disposition of Inline graphic instigators and with inactive simple agents. Let Inline graphic be the state to which the network transitions from Inline graphic at moment Inline graphic. If in Inline graphic none of simple agents have changed their decisions (from Inline graphic to Inline graphic) then we have a fixed point. Suppose that Inline graphic, Inline graphic and Inline graphic, Inline graphic simple agents have switched from Inline graphic to Inline graphic. If Inline graphic, i.e. all simple agents have switched, then with the transition from Inline graphic to Inline graphic all these agents will switch back from Inline graphic to Inline graphic since in Inline graphic each of them has a neighborhood consisting only of active agents. Therefore in this case we have the following cycle of length Inline graphic: Inline graphic. Now suppose that Inline graphic. Consider Inline graphic, Inline graphic simple agents that have not switched from Inline graphic to Inline graphic with the transition from Inline graphic to Inline graphic. It could have occured only if in their neighborhoods there were enough (relative to their anticonformity thresholds) instigators (which are always active). But since instigators do not change their decisions, then each of these Inline graphic agents will not switch from Inline graphic to Inline graphic at any of the following time moments. Denote by Inline graphic, Inline graphic the set formed by all simple agents that have switched (Inline graphic) at moment Inline graphic. Note that every agent from Inline graphic does not change its state from Inline graphic to Inline graphic at time moments Inline graphic, Inline graphic. Further let us look only at the behavior of agents from Inline graphic. Consider moment Inline graphic. If none of agents from Inline graphic have switched (Inline graphic) then we have a fixed point (since all agents from Inline graphic do not change their decisions at any Inline graphic. Suppose that Inline graphic agents from Inline graphic, Inline graphic have switched at Inline graphic (Inline graphic). It is clear that if Inline graphic (all agents from Inline graphic have switched) then we have a cycle of length Inline graphic. Assume Inline graphic, by Inline graphic, Inline graphic denote the set of all Inline graphic agents that have not switched (Inline graphic) at moment Inline graphic. Consider an arbitrary agent Inline graphic. This agent has not changed its decision (Inline graphic) at Inline graphic only because at Inline graphic its neighborhood had enough inactive agents from Inline graphic (relative to Inline graphic anticonformity threshold). However these inactive agents could not belong to Inline graphic (since at Inline graphic all agents from Inline graphic are active). Therefore they must belong to Inline graphic. But as we noted above all such agents do not change their decisions from Inline graphic to Inline graphic at any of moments Inline graphic. It means that any agent Inline graphic will not change its decision at any of the following moments Inline graphic. The set containing Inline graphic, Inline graphic simple agents that have switched at Inline graphic from Inline graphic to Inline graphic we denote by Inline graphic and further analyze only the behavior of agents from Inline graphic. By analogy we note that each agent from Inline graphic does not change its decision at Inline graphic, etc. Thus at most after Inline graphic time moments the network considered will either reach a fixed point or enter a cycle of length 2. ▪

The reasoning technique from the proof of the Theorem 3 can be generalized for the cases of the networks with instigators, loyalists and simple agents-anticonformists with possibly empty neighborhoods. For all such situations one can show that starting from the initial state, in which either all simple agents-anticonformists are active or inactive, the network will transition to a fixed point or will enter the cycle of length Inline graphic after at most Inline graphic time moments, where Inline graphic stands for the amount of instigators and Inline graphic – for the amount of loyalists.

Final Remarks

In this part we presented several theoretical results regarding the conforming and the anticonforming behavior. From our point of view these results explain a number of phenomena observed in the real world. In particular, fast activation of a large network by a relatively small number of instigators can be explained not only by the network structure (for example by its strong connectivity) or by small conformity thresholds but also by advantageous disposition of instigators. If there exists such disposition of small number of instigators, that forces the network to transition from the state with inactive simple agents to the state with the majority of active agents, then this network is vulnerable to instigators. To determine the degree of such vulnerability for some particular disposition of Inline graphic instigators it is sufficient to study the behavioral dynamics of the network for at most Inline graphic time moments. This fact is the assertion of the Theorem 1. Evidently, for many real-world networks the vulnerability to instigators is highly undesirable. On the other hand, as it follows from the Corollary 1, even if the network was already activated by instigators, but there is a solution of Problem 2, then, roughly speaking, the situation can be improved by transforming a number of simple agents to loyalists.

Theorem 3 shows that the activation dynamics of collectives of anticonformists can significantly differ from that of the collectives of conformists even for the similar initial conditions. Unfortunately, we could not obtain any analogues of Theorems 1 and 3 for collectives in which simple agents are represented by both conformists and anticonformists. In the section about the experiments we give an example when such network displays more complex behavior.

SAT Approach to the Study of SBN-Based Models of Collective Behavior

Note that in the real world the conforming behavior is spread much more than the anticonforming. On the other hand, the collectives of anticonformists demonstrate more complex behavioral dynamics compared to that of collectives of conformists. It follows from theorems 1 and 3. That is why in our computational experiments we studied the collectives of conformists and concentrated our attention on Problem 1 and Problem 2, formulated above. We would like to point out the fact that the considered problems are combinatorial since they presume the analysis of many possible variants of dispositions of instigators and loyalists. We applied to Problem 1 and Problem 2 the algorithms that are used to solve the Boolean satisfiability problem (SAT). This choice is motivated by the fact, that modern SAT solving algorithms are very powerful computational methods that successfully cope with combinatorial problems from a wide spectrum of practical areas [16].

For an arbitrary Boolean formula the Boolean satisfiability problem (SAT) consists in answering a question if this formula is satisfiable, i.e. if there exists such an assignment to Boolean variables of this formula, that makes the formula true. This problem in the general case can be effectively (in polynomial time on the length of a binary encoding of the considered formula) reduced to the problem of deciding if a Boolean formula in a conjunctive normal form (CNF) is satisfiable. Taking this fact into account, below we consider SAT in the following formulation: for an arbitrary CNF Inline graphic over the set of Boolean variables Inline graphic we need to answer a question if Inline graphic is satisfiable, and if the answer is ‘yes’, to present a corresponding variable assignment that evaluates Inline graphic to Inline graphic. This problem is NP-hard, therefore, it cannot be solved in polynomial time if Inline graphic. Nevertheless, SAT is very important in a practical sense because a lot of industrial problems can be effectively reduced to it and solved using modern algorithms developed during recent 15 years. Basic algorithmic constructions used in solving SAT and main directions of development and applications of SAT approach are described in [16].

The reducibility of an arbitrary NP problem to SAT (in the form of decision problem) follows from the Cook theorem [17]. However, in practice the analysis of specific details of the considered problem makes it possible to significantly decrease the size of the CNF formula produced. A number of general techniques used to reduce combinatorial problems to SAT can be found in [18].

The SAT approach was successfully applied to the search for cycles of functions defined by Boolean networks in [12] and [19]. It should be noted, however, that networks studied in that papers have their own specifics motivated by the source of origin: essentially they are Kauffman networks in which the power of the neighborhood of an arbitrary agent does not exceed some relatively small number Inline graphic (usually Inline graphic). Also, weight functions used in [12] and [19] are completely different from the ones we use. That is why below we present a relatively detailed description of the SAT encoding process for problems outlined above.

Basic idea that is used to encode many combinatorial problems to SAT, including problems studied in our paper, is to represent the computation process for the considered discrete function (in our case it is Inline graphic) as a Boolean circuit Inline graphic formed by logical gates from a complete basis (for example Inline graphic). Formally, circuit Inline graphic is a directed acyclic graph where Inline graphic nodes are labeled as inputs. All other nodes of this graph are called inner nodes. Each inner node corresponds to logical gate from the chosen basis. Usually, nodes that form the output of the considered function are referred to as output gates. In our case circuit Inline graphic has Inline graphic output gates.

Circuit inputs are labeled by Boolean variables Inline graphic. Below we refer to these variables as input variables. An output of each logical gate Inline graphic is marked by an auxiliary variable Inline graphic. By Inline graphic we denote a set of Inline graphic variables corresponding to output gates. We refer to Inline graphic as output variables. Let Inline graphic be the set of all auxiliary variables. Then Inline graphic, Inline graphic. For circuit Inline graphic it is possible to effectively construct (in linear time on the total number of nodes in the circuit) a CNF Inline graphic, using the Tseitin transformations [20] procedure, described below.

Assume Inline graphic is an arbitrary gate in Inline graphic. If Inline graphic is a NOT-gate then it has a single input labeled by variable Inline graphic. Then for NOT-gate Inline graphic we construct a formula Inline graphic where by Inline graphic we mean logical equivalence. The CNF-representation of the Boolean function specified by formula Inline graphic is

graphic file with name pone.0115156.e407.jpg

If Inline graphic is an AND-gate, and Inline graphic are variables corresponding to its inputs, then for Inline graphic we construct formula Inline graphic and CNF

graphic file with name pone.0115156.e412.jpg

We say that CNFs constructed this way encode the corresponding logical gates. Then the CNF encoding circuit Inline graphic is

graphic file with name pone.0115156.e414.jpg

where Inline graphic is a CNF that encodes gate Inline graphic.

Once we have a CNF Inline graphic we can extend it by adding new constraints in the clausal form that specify function Inline graphic properties we are interested in. For example, a CNF

graphic file with name pone.0115156.e419.jpg

in which Inline graphic, Inline graphic specifies a fixed point of function Inline graphic. To be more precise, CNF Inline graphic is satisfiable if and only if function Inline graphic has fixed points. If Inline graphic is satisfiable and its satisfying assignment is obtained, then we can effectively extract the corresponding fixed point: it is sufficient to write down values of the input variables. To make a SAT instance that specifies the problem of finding a cycle of length Inline graphic we need to represent a superposition

graphic file with name pone.0115156.e427.jpg

as Boolean circuit Inline graphic, and construct the CNF of the kind Inline graphic.

Instead of logical gates we actually can use more complex basic Boolean functions, such as predicates over finite sets. In this case elements of the corresponding sets are represented by Boolean vectors. In fact this is what we do to encode functions Inline graphic for networks with weight functions (1) and (2).

Now let us consider an SBN with Inline graphic vertices and weight functions (1) that can have both instigators and loyalists. Assume that the network is functioning for Inline graphic time moments. The decision of agent Inline graphic, Inline graphic at moment Inline graphic we encode with Boolean variable Inline graphic.

We would like to stress out once more that a priori we do not know dispositions of instigators and loyalists in the network and therefore presume that any agent can take one of these roles. To take into account that an arbitrary vertex Inline graphic can be either an instigator, a loyalist or a simple agent, we introduce two additional sets of Boolean variables Inline graphic, Inline graphic. We assume that if Inline graphic, Inline graphic then Inline graphic is an instigator; if Inline graphic, Inline graphic, then it takes the role of a loyalist; if Inline graphic then our vertex represents a simple agent. The situation corresponding to Inline graphic would mean that the vertex is simultaneously an instigator and a loyalist. That is why it is forbidden by means of a clause Inline graphic.

Let Inline graphic be an arbitrary network vertex, Inline graphic and Inline graphic be a conformity level of Inline graphic. We introduce the following predicate

graphic file with name pone.0115156.e452.jpg (3)

Then from the above we can conclude that the decision of agent Inline graphic at moment Inline graphic is associated with the following formula:

graphic file with name pone.0115156.e455.jpg (4)

Additional constraints on the initial network state are encoded in a similar fashion. For example a constraint that specifies that an arbitrary agent Inline graphic at the initial state is active only if it is an instigator is equivalent to satisfiability of the following formula:

graphic file with name pone.0115156.e457.jpg (5)

In fact, all clauses of the kind Inline graphic are added to the result CNF only once.

By applying Tseitin transformations to formulas (4) and (5) we can produce CNFs that are satisfiable if and only if the original Boolean formulas are satisfiable. To do this we need to be able to effectively encode predicate (3). It can be represented as a Boolean circuit implementing a function that counts ones in a Boolean vector and then compares the obtained result with Inline graphic. Such circuit can then be encoded to CNF in accordance with the procedure described above. However, there are algorithms that produce more effective SAT encodings for predicates (3). These algorithms are based on various methods that work with so called cardinality constraints ([21][25]). In the present paper we encode predicates (3) using sorting networks. The main idea of the corresponding approach is very simple: we can sort bits in an arbitrary Boolean vector Inline graphic descending from left to right, as we consider them as natural numbers from the set Inline graphic. Let Inline graphic be a result of such sorting. Then it is clear that Inline graphic, Inline graphic if and only if Inline graphic. Essentially, in our work to sort Boolean vectors we used binary variants of Batcher sorting networks [26], [27]. A SAT encoding of such network with input Inline graphic and output Inline graphic requires Inline graphic auxiliary variables and Inline graphic clauses. SAT encodings for the constraints that specify that after Inline graphic time moments the network must contain at least Inline graphic, Inline graphic active agents and the constraints of the kind Inline graphic, Inline graphic are produced in a similar way.

It is easy to see that in the general case, if we encode the evolution of network Inline graphic with Inline graphic vertices during Inline graphic moments of time, then in the CNF obtained the number of variables and clauses will be upper-bounded by Inline graphic. Taking into account the theorems proved above for the combinatorial problems considered we can study only cases when Inline graphic.

We would like to briefly mention algorithms underlying the solvers that we have used to study the proposed models. As we said above, the book [16] is probably the most complete source of information about the algorithms for solving SAT. There are several classes of such algorithms and their effectiveness is justified by their ability to solve real practical problems. To solve SAT instances encoding the combinatorial problems outlined above we used modern CDCL solvers, basic design features of which are described in [28]. This choice is motivated first by the fact that CDCL solvers provide us with exact solutions, and, second, these particular algorithms successfully cope with many hard SAT instances, for example, with instances that encode some cryptanalysis problems.

Results and Discussion

Computational Experiments

In our computational experiments we constructed networks according to the known models of random graphs. In particular, we used the Gilbert model [29] also known as the Erdos-Renyi model [30] (see also [31]), the Watts-Strogatz model [32] and the Barabasi-Albert model [33].

Informally the process of constructing tests for combinatorial problems outlined above for SBNs in which simple agents are conformists (tests for networks of anticonformists are generated in a similar way) looks as follows.

  1. We generate a random oriented simple graph (without loops and without multiple arcs) with Inline graphic vertices, in the form of adjacency matrix where main diagonal is filled with zeros.

  2. For each of Inline graphic vertices we generate a conformity threshold that is randomly selected from Inline graphic according to the uniform distribution.

  3. For a fixed number of time moments Inline graphic we encode to SAT the problem of search for a disposition of instigators with given constraints on their number (Problem 1).

  4. The CNF obtained is given to a SAT solver.

  5. If the SAT solver managed to solve the instance, before exceeding the time limit, and found a satisfying assignment, then the corresponding disposition of instigators is extracted.

  6. For the instigators disposition obtained we encode the problem of search for a disposition of loyalists with given constraint on their number (Problem 2).

  7. The CNF obtained on the previous step is given to a SAT solver.

  8. If the SAT solver managed to solve the provided instance and found a satisfying assignment then a corresponding disposition of loyalists is extracted.

Now let us briefly describe random graph models that we used. In fact, original models generate undirected graphs, so we modified them to take into account all features of formulas (1) and (2) (the neighborhood Inline graphic of vertex Inline graphic is formed by vertices in Inline graphic that have arcs going to Inline graphic).

When generating a graph according to the Gilbert-Erdyos-Renyi model we fix the parameter Inline graphic that is the probability of an arc. Then an arbitrary element Inline graphic, Inline graphic of an adjacency matrix of graph Inline graphic takes the value of Inline graphic with probability Inline graphic and the value of Inline graphic with probability Inline graphic.

An important feature of the original Watts-Strogatz model is that random graphs generated according to this model have the small-world property that can often be observed in real world networks. The parameters of the Watts-Strogatz model include Inline graphic, Inline graphic and Inline graphic. First we generate a regular lattice network with Inline graphic vertices, where each vertex Inline graphic, Inline graphic is connected with an arc Inline graphic with Inline graphic vertices on either side of Inline graphic if Inline graphic is even. If Inline graphic is odd then we can consider Inline graphic and Inline graphic similar arcs Inline graphic. On the second stage of graph generation each arc Inline graphic with probability Inline graphic is rewired to Inline graphic, where Inline graphic is chosen according to the uniform distribution from some subset of Inline graphic in such a way that in the resulting graph there will be no loops and no multiple arcs.

The Barabasi-Albert model is important because it allows one to generate random networks with scale-free property. The construction of a network according to the Barabasi-Albert model can be considered as an iterative process consisting of Inline graphic steps. On the step Inline graphic an initial network Inline graphic with Inline graphic vertices is built. The result of each step Inline graphic is the network Inline graphic which is constructed by adding to Inline graphic one new vertex Inline graphic connected to Inline graphic existing vertices of Inline graphic. The procedure of constructing edges Inline graphic, Inline graphic is probabilistic and is referred to as preferential attachment. According to this procedure for Inline graphic and an arbitrary Inline graphic the edge Inline graphic is added to Inline graphic with probability

graphic file with name pone.0115156.e531.jpg

Step Inline graphic lasts, i.e. the corresponding probabilistic experiments are repeated, until vertex Inline graphic is connected with Inline graphic vertices of the graph Inline graphic. In our experiments we use the following modification of the Barabasi-Albert model. An open cycle, i.e. a cycle in which an edge connecting the first and the last vertices is removed, is used as an initial network Inline graphic. On each step Inline graphic the probabilistic experiment is carried out for all pairs of the kind Inline graphic where Inline graphic, and as a result of the step new vertex Inline graphic is connected with Inline graphic existing vertices. In the final network every edge Inline graphic is replaced by a pair of arcs Inline graphic and Inline graphic.

Defining the conformity thresholds of agents in real networks is a highly nontrivial task and in each particular case it requires a thorough analysis of the corresponding specifics. Since the main goal of our computational experiments was to test the general applicability of the SAT approach to the study of the considered models, we chose conformity thresholds for each vertex randomly (according to the uniform distribution on Inline graphic).

In the series of experiments we considered networks with 500 vertices. SAT instances were solved using the Plingeling SAT solver [34] working on 32 threads (two 16-core AMD Opteron 6276 CPUs with 64 GB RAM). The corresponding results are shown in tables 1, 2 and 3.

Table 1. Results of the computational experiments for Barabasi-Albert networks with 500 vertices.

Inline graphic Pr1 CNF size, Kb Pr1 solving time, sec. Pr2 CNF size, Kb Pr2 solving time, sec.
0 13911.9 31.46 14350.9 1.97
2 22514.6 8.61 22957,4 3.44
4 51694.2 15.81 52187.1 168.73
8 134728.8 57.11 135232.6 342.43

Results of the computational experiments for Barabasi-Albert networks, averaged for 10 tests (for each value of parameter Inline graphic). Pr1 and Pr2 stand for Problems 1 and 2 of finding dispositions of at most 50 instigators and at most 100 loyalists, respectively.

Table 2. Results of the computational experiments for Watts-Strogatz networks with 500 vertices.

Inline graphic Inline graphic Pr1 CNF size, Kb Pr1 solving time, sec. Pr2 CNF size, Kb Pr2 solving time, sec.
10 0.2 53531.1 148.34 54023.1 811.55
10 0.3 51997.7 26.79 52490.8 3098.48
10 0.4 50891.1 16.51 51387.4 172.37

Results of the computational experiments for Watts-Strogatz networks averaged for 10 tests (for each combination of values of parameters Inline graphic and Inline graphic). Pr1 and Pr2 stand for Problems 1 and 2 of finding dispositions of at most 50 instigators and at most 100 loyalists, respectively.

Table 3. Results of the computational experiments for Erdos-Renyi networks with 500 vertices.

Inline graphic Pr1 CNF size, Kb Pr1 solving time, sec. Pr2 CNF size, Kb Pr2 solving time, sec.
0.01 17983.2 5.63 18425.5 46.69
0.02 51423.8 14.79 51918.6 16.74
0.03 105791.8 25.2 106293.8 34.49

Results of the computational experiments for Erdos-Renyi networks, averaged for 10 tests (for each value of parameter Inline graphic). Pr1 and Pr2 stand for Problems 1 and 2 of finding dispositions of at most 50 instigators and at most 100 loyalists, respectively.

Below we demonstrate several figures that illustrate the dynamics of SBNs with 30 vertices modeling the conforming behavior under the influence of instigators and loyalists. In Fig. 4 the evolution of the network generated according to the Barabasi-Albert model is displayed. In Fig. 5 we show that some networks (the particular network displayed was generated in accordance with the Watts-Strogatz model) are highly vulnerable to the influence of instigators. For the network shown it is sufficient to place one instigator to activate the whole network in Inline graphic steps. However, it is possible to find such disposition of Inline graphic loyalists that transforms the network to a state with the majority of inactive agents.

Figure 4. The behavior of the Barabasi-Albert network with 30 vertices under the influence of instigators and loyalists.

Figure 4

In the upper part of the figure the functioning of the network under the influence of 3 instigators is shown. In the lower part of the figure the functioning of the network under the influence of 3 instigators and 7 loyalists is shown. Dispositions of instigators and loyalists were found as solutions of Problem 1 and Problem 2.

Figure 5. The behavior of the Watts-Strogatz network with 30 vertices under the influence of instigators and loyalists.

Figure 5

In the upper part of the figure the functioning of the network under the influence of 1 instigator is shown. In the lower part of the figure the functioning of the network under the influence of 1 instigator and 9 loyalists is shown. Dispositions of instigators and loyalists were found as solutions of Problem 1 and Problem 2.

Intuitively, one of the most natural strategies of constructing dispositions of instigators is to place them into vertices with the largest number of outgoing arcs. In Fig. 6 (the network is generated according to the Erdos-Renyi model) we show, that even if we forbid instigators to replace agents with the most advantageous positions (in the sense explained above), that does not exclude the existence of other possible variants of dispositions of instigators that transform the network into states with the majority of active agents. The corresponding constraints that forbid instigators and loyalists to take place of particular vertices are quite easily encoded into SAT.

Figure 6. The behavior of the Erdos-Renyi network with 30 vertices under the influence of instigators and loyalists.

Figure 6

In the upper part of the figure the functioning of the network under the influence of 4 instigators is shown. In the lower part of the figure the functioning of the network under the influence of 4 instigators and 6 loyalists is shown. Dispositions of instigators and loyalists were found as solutions of Problem 1 and Problem 2. Instigators could not take place of top 10 vertices with the largest number of outgoing arcs.

Also we considered optimization variants of Problem1 and Problem2, i.e. to find corresponding dispositions of instigators and loyalists of a minimal cardinality. These problems can also be effectively reduced to SAT using techniques described above. On the current stage we managed to solve corresponding problems for networks with 100–150 vertices.

In tables 1, 2 and 3 we present the information about the size of encodings and about the time required to solve Problems 1 and 2 on determining dispositions of instigators or loyalists. We considered networks with 500 vertices. For each value of parameter Inline graphic in case of Erdos-Renyi networks, combination of values of Inline graphic and Inline graphic in case of Watts-Strogatz networks, and Inline graphic in case of Barabasi-Albert networks we generated 10 different tests. Note, that solving time can greatly vary even within one test series (for a particular random graph model). From our point of view it can be explained by the fact that among randomly generated tests there can appear instances that are very complex for the particular SAT solver. However, such instances appear quite rarely while the majority of tests are solved relatively fast.

Additional Materials

In this section we propose some additional materials. In particular, there are videos that illustrate the dynamics of collectives of conformists under the influence of instigators and loyalists (in the context of Problems 1 and 2 outlined above). Corresponding collectives are represented by SBNs with 200 vertices. On S1 Video we show the behavior of the Barabasi-Albert network under the influence of 29 instigators and 60 loyalists. S2 Video demonstrates the dynamics of the Watts-Strogatz network with 10 instigators and 60 loyalists. On S3 Video the behavior of the Erdos-Renyi network under the influence of 16 instigators and 44 loyalists is shown.

Conclusions and Future Works

In the present paper we introduce the models of collective behavior, that are based on the synchronous Boolean networks, and study several phenomena related to conformity and anticonformity. In the context of the proposed models we formulate several combinatorial problems on the search for dispositions of agents with special properties (instigators and loyalists) in a network. To these combinatorial problems we applied modern algorithms for solving the Boolean satisfiability problem (SAT).

We do not pretend that the results of our paper can be directly applied to practice since all computational experiments were performed for artificially generated networks with a random structure. However, our main goal was to show the principal possibility of solving corresponding combinatorial problems for networks with hundreds of vertices.

We believe that the use of various SAT parallelization techniques will make it possible to develop our approach in such a way that it will be applicable to networks with 1000 and more vertices. The corresponding methods will be useful in the study of networks that represent strongly connected components extracted from the real world networks with a much greater number of vertices. The vulnerability of such strongly connected components to instigators in our opinion can have highly undesirable consequences for the corresponding large networks. To extract strongly connected components from real world networks, one can use methods from [35].

As we mentioned above, determining correct thresholds is probably the hardest stage of construction of any collective behavior model. In our experiments we generated such thresholds randomly. To study real world processes this task should be performed by a specialist in a relevant field of science (such as economy, biology, sociology, psychology, etc.).

Unfortunately we could not obtain the results similar to theorems 1 and 3 for the networks, in which simple agents are represented both by conformists and anticonformists. In Fig. 7 we show how such network starting from the state in which all simple agents are inactive enters the cycle of length 4. It means that these networks display more complex behavior than that described by theorems 1 and 3.

Figure 7. The cycle of length 4 for the network with both conformists and anticonformists.

Figure 7

The agents-conformists are marked with "C" and agents-anticonformists are marked with "A". The network contains 7 instigators (crimson vertices). At the initial time moment all simple agents are inactive.

Also it should be noted that the key condition in theorems 1 and 3 is that all simple agents must be either all inactive or all active at the initial time moment. If we drop this condition, the corresponding networks can display the behavior different from that described by Theorems 1 and 3. For example in Fig. 8 we demonstrate the cycle of length Inline graphic for the network with instigators, where all simple agents are conformists, but at the initial state there are both active and inactive simple agents.

Figure 8. The nontrivial cycle of length 3 for the network of conformists with instigators.

Figure 8

At the initial state in the network there are both active and inactive simple agents.

We would like to note that for the models proposed it is possible to study more complex dynamical properties using the formalism of quantified Boolean formulas with two quantification levels (2QBF) [36]. Suppose that Inline graphic is a disposition of instigators and Inline graphic is a disposition of loyalists. Then, for example, the condition that there exists such disposition of instigators, that for any disposition of loyalists the network, starting from the state with inactive simple agents after several time moments transitions to a state in which almost all simple agents are active, can be described using the 2QBF of the following kind:

graphic file with name pone.0115156.e563.jpg

This condition can be considered as an improved variant of condition describing the vulnerability of the network to instigators. To solve such problems one can use modern 2QBF-solvers [36], [37]. We can also take into account any constraints on the cardinality of Inline graphic and Inline graphic.

Finally, one natural extension of the proposed models is to assign various types of weights to network arcs and modify vertex weight functions accordingly. Arc weights can represent social pressure, authority, etc. for each particular member of a collective. In addition to that, it would be interesting to study the dynamics of networks in which weight function of a vertex can take into account the influence of vertices that are at a distance Inline graphic in Inline graphic from the vertex considered. All the listed aspects can be quite easily implemented into corresponding SAT encodings. We plan to do it in the nearest future.

Supporting Information

S1 Video

The behavior of the Barabasi-Albert network with 200 vertices under the influence of instigators and loyalists.

(MP4)

S2 Video

The behavior of the Watts-Strogatz network with 200 vertices under the influence of instigators and loyalists.

(MP4)

S3 Video

The behavior of the Erdos-Renyi network with 200 vertices under the influence of instigators and loyalists.

(MP4)

Acknowledgments

We are thankful to Ilya Otpuschennikov for his help with constructing SAT encodings of the considered problems.

We also thank D.A. Novikov and V.V. Breyer for their comments and suggestions made during discussions on the early variants of the present research.

We express our deep gratitude to A.A. Evdokimov for attracting our attention to the study of dynamical properties of discrete automaton functions. It is the development of early ideas from [13] that led us to the results of the present paper.

Data Availability

The authors confirm that all data underlying the findings are fully available without restriction. All relevant data are within the paper and its Supporting Information files.

Funding Statement

This work was partially supported by the Siberian Branch of the Russian Academy of Sciences in the Framework of the Interdisciplinary Integration Project No. 80 "Differential-Discrete and Integrodifferential Equations. Application to Problems of Natural Sciences", the Russian Foundation for Basic Research (projects No. 14-07-00403 and 14-07-31172mol) and the Council at the President of the Russian Federation for the State Maintenance of the Leading Scientific Schools (project No. 5007.2014.9). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.

References

  • 1. Granovetter M (1978) Threshold models of collective behavior. American Journal of Sociology 83:1420–1443. [Google Scholar]
  • 2. Kauffman S (1969) Metabolic stability and epigenesis in randomly constructed genetic nets. Journal of Theoretical Biology 22:437–467. [DOI] [PubMed] [Google Scholar]
  • 3. Granovetter M, Soong R (1983) Threshold models of diffusion and collective behavior. The Journal of Mathematical Sociology 9:165–179. [Google Scholar]
  • 4. Granovetter M, Soong R (1986) Threshold models of interpersonal effects in consumer demand. Journal of Economic Behavior & Organization 7:83–99. [Google Scholar]
  • 5. Braun N (1995) Individual thresholds and social diffusion. Rationality and Society 7:167–182. [Google Scholar]
  • 6. Chwe MSY (1999) Structure and strategy in collective action. American Journal of Sociology 105:128–156. [Google Scholar]
  • 7. Breer VV (2012) Game-theoretic models of collective conformity behavior. Automation and Remote Control 73:1680–1692. [Google Scholar]
  • 8.Novikov D (2013) Theory of Control in Organizations. Management science–theory and applications series. Nova Science Publishers, Incorporated.
  • 9.Novikov DA, Chkhartishvili AG (2014) Reflexion and Control: Mathematical Models. Communications in Cybernetics, Systems Science and Engineering. CRC Press.
  • 10. Chiang YS (2007) Birds of moderately different feathers: Bandwagon dynamics and the threshold heterogeneity of network neighbors. The Journal of Mathematical Sociology 31:47–69. [Google Scholar]
  • 11.Dubrova E, Teslenko M, Martinelli A (2005) Kauffman networks: analysis and applications. In:ICCAD. IEEE Computer Society, pp. 479–484.
  • 12. Dubrova E, Teslenko M (2011) A SAT-based algorithm for finding attractors in synchronous boolean networks. IEEE/ACM Trans Comput Biology Bioinform 8:1393–1399. [DOI] [PubMed] [Google Scholar]
  • 13. Evdokimov AA, Kochemazov SE, Semenov AA (2011) Application of symbolic computations to the study of discrete models of some gene networks [In Russian]. Computational technologies 16:30–47. [Google Scholar]
  • 14. Newman MEJ (2003) The structure and function of complex networks. Siam Review 45:167–256. [Google Scholar]
  • 15. Dorogovtsev SN, Goltsev AV, Mendes JFF (2008) Critical phenomena in complex networks. Rev Mod Phys 80:1275–1335. [Google Scholar]
  • 16.Biere A, Heule MJH, van Maaren H, Walsh Teditors 2009) Handbook of Satisfiability, volume 185 of Frontiers in Artificial Intelligence and Applications. IOS Press, 980 pp.
  • 17.Cook SA (1971) The complexity of theorem proving procedures. In:Proceedings of the Third Annual ACM Symposium. New York: ACM, pp.151–158. [Google Scholar]
  • 18.Prestwich S (2009) CNF Encodings, chapter 2. Volume 185 of Biere et al. [16], pp. 75–97.
  • 19. Guo W, Yang G, Wu W, He L, Sun M (2014) A parallel attractor finding algorithm based on boolean satisfiability for genetic regulatory networks. PLoS ONE 9:e94258. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 20.Tseitin GS (1983) On the complexity of derivation in propositional calculus. In:Siekmann J, Wrightson Geditors, Automation of Reasoning 2: Classical Papers on Computational Logic 1967–1970, Berlin, Heidelberg: Springer. pp. 466–483. [Google Scholar]
  • 21. Een N, Sorensson N (2006) Translating pseudo-boolean constraints into SAT. Journal on Satisfiability, Boolean Modeling and Computation 2:1–26. [Google Scholar]
  • 22.Sinz C (2005) Towards an optimal CNF encoding of boolean cardinality constraints. In:van BeekPeditor, Principles and Practice of Constraint Programming - CP 2005, Springer Berlin Heidelberg, volume 3709 of Lecture Notes in Computer Science. pp. 827–831.
  • 23.Marques-Silva JP, Lynce I (2007) Towards robust CNF encodings of cardinality constraints. In:Bessiere Ceditor, CP. Springer, volume 4741 of Lecture Notes in Computer Science, pp. 483–497.
  • 24.Bailleux O, Boufkhad Y (2003) Efficient CNF encoding of boolean cardinality constraints. In:Rossi Feditor, Principles and Practice of Constraint Programming CP 2003, Springer Berlin Heidelberg, volume 2833 of Lecture Notes in Computer Science. pp.108–122.
  • 25. Asin R, Nieuwenhuis R, Oliveras A, Rodriguez-Carbonell E (2011) Cardinality networks: a theoretical and empirical study. Constraints 16:195–221. [Google Scholar]
  • 26.Batcher KE (1968) Sorting networks and their applications. In:AFIPS Spring Joint Computing Conference. Thomson Book Company, Washington D.C., volume 32 of AFIPS Conference Proceedings, pp. 307–314.
  • 27.Cormen TH, Leiserson CE, Rivest RL, Stein C (2009) Introduction to Algorithms, Third Edition. The MIT Press.
  • 28.Marques-Silva JP, Lynce I, Malik S (2009) Conflict-Driven Clause Learning SAT Solvers, chapter 4. Volume 185 of Biere et al. [16], pp. 131–153.
  • 29. Gilbert EN (1959) Random graphs. Annals of Mathematical Statistics 30:1141–1144. [Google Scholar]
  • 30. Erdös P, Rényi A (1959) On random graphs. Publications Mathematicae 6:290–297. [Google Scholar]
  • 31. Solomonoff R, Rapoport A (1951) Connectivity of random nets. The bulletin of mathematical biophysics 13:107–117. [Google Scholar]
  • 32. Watts D, Strogatz S (1998) Collective dynamics of ‘small-world’ networks. Nature 393:440–442. [DOI] [PubMed] [Google Scholar]
  • 33. Barabasi AL, Albert R (1999) Emergence of scaling in random networks. Science 286:509–512. [DOI] [PubMed] [Google Scholar]
  • 34.Lingeling. URL http://fmv.jku.at/lingeling/.
  • 35. Vitali S, Glattfelder JB, Battiston S (2011) The network of global corporate control. PLoS ONE 6:e25995. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 36.Giunchiglia E, Marin P, Narizzano M (2009) Reasoning with Quantified Boolean Formulas, chapter 24. Volume 185 of Biere et al. [16], pp. 761–780.
  • 37.Janota M, Marques-Silva JP (2011) Abstraction-based algorithm for 2QBF. In:SakallahKA, SimonLeditors, SAT. Springer, volume 6695 of Lecture Notes in Computer Science, pp. 230–244.

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Supplementary Materials

S1 Video

The behavior of the Barabasi-Albert network with 200 vertices under the influence of instigators and loyalists.

(MP4)

S2 Video

The behavior of the Watts-Strogatz network with 200 vertices under the influence of instigators and loyalists.

(MP4)

S3 Video

The behavior of the Erdos-Renyi network with 200 vertices under the influence of instigators and loyalists.

(MP4)

Data Availability Statement

The authors confirm that all data underlying the findings are fully available without restriction. All relevant data are within the paper and its Supporting Information files.


Articles from PLoS ONE are provided here courtesy of PLOS

RESOURCES