Scientific Computing: Terrorist networks form a structural hierarchy based on one-way information flow called a directed acyclic graph (DAG) that makes them similar to many companies and some social media networks. Counterterrorism is interested in stopping the flow of information. A group of mathematicians at Ryerson University in Toronto adapted a previous model of terrorist networks to examine the best counterterrorism actions. They used a specific DAG known as a partially ordered set, in which not all of the nodes are connected; the higher nodes represented the leaders and the lower nodes represented foot soldiers. They used two extreme variations of the networkâmdash;in one, each node had a regular number of connections, and in the other, the number of connections followed a power law. By applying a stochastic model of action to both the counterterrorist and terrorist networks, the researchers reinforced the idea that disrupting information at lower levels is less efficient than disrupting it at high levels. However, by accurately mapping the members and connections of an actual terrorist network, counterterrorist efforts could determine the most effective places for attempting to stop information flow.
The finding that the Saturnian moon may host layers of icy slush instead of a global ocean could change how planetary scientists think about other icy moons as well.
Modeling the shapes of tree branches, neurons, and blood vessels is a thorny problem, but researchers have just discovered that much of the math has already been done.
January 29, 2026 12:52 PM
Get PT in your inbox
PT The Week in Physics
A collection of PT's content from the previous week delivered every Monday.
One email per week
PT New Issue Alert
Be notified about the new issue with links to highlights and the full TOC.
One email per month
PT Webinars & White Papers
The latest webinars, white papers and other informational resources.