期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
MODELING AND SIMULATION OF THE VULNERABILITY OF INTERDEPENDENT POWER-WATER INFRASTRUCTURE NETWORKS TO CASCADING FAILURES 被引量:9
1
作者 Yanlu Zhang Naiding Yang Upmanu Lall 《Journal of Systems Science and Systems Engineering》 SCIE EI CSCD 2016年第1期102-118,共17页
Critical infrastructures are becoming increasingly interdependent and vulnerable to cascading failures. Existing studies have analyzed the vulnerability of interdependent networks to cascading failures from the static... Critical infrastructures are becoming increasingly interdependent and vulnerable to cascading failures. Existing studies have analyzed the vulnerability of interdependent networks to cascading failures from the static perspective of network topology structure. This paper develops a more realistic cascading failures model that considers the dynamic redistribution of load in power network to explore the vulnerability of interdependent power-water networks. In this model, the critical tolerance threshold is originally proposed to indicate the vulnerability of network to cascading failures. In addition, some key parameters that are important to network vulnerability are identified and quantified through numerical simulation. Results show that cascading failures can be prevented when the values of tolerance parameter are above a critical tolerance threshold. Otherwise interdependent networks collapse after attacking a critical fraction of power nodes. Interdependent networks become more vulnerable with the increase in interdependence strength, which implies the importance of protecting those interconnected nodes to reduce the consequences of cascading failures. Interdependent networks are most vulnerable under high-load attack, which shows the significance of protecting high-load nodes. 展开更多
关键词 Interdependent infrastructure networks VULNERABILITY cascading failures complex network numerical simulation
原文传递
A Survey on Event Mining for ICT Network Infrastructure Management 被引量:1
2
作者 LIU Zheng LI Tao WANG Junchang 《ZTE Communications》 2016年第2期47-55,共9页
1 IntroductionNowadays in China, there are more than six hundred million netizens [1]. On April 11, 2015, the nmnbet of simultaneous online users of the Chinese instant message application QQ reached two hundred milli... 1 IntroductionNowadays in China, there are more than six hundred million netizens [1]. On April 11, 2015, the nmnbet of simultaneous online users of the Chinese instant message application QQ reached two hundred million [2]. The fast growth ol the lnternet pusnes me rapid development of information technology (IT) and communication technology (CT). Many traditional IT service and CT equipment providers are facing the fusion of IT and CT in the age of digital transformation, and heading toward ICT enterprises. Large global ICT enterprises, such as Apple, Google, Microsoft, Amazon, Verizon, and AT&T, have been contributing to the performance improvement of IT service and CT equipment. 展开更多
关键词 event mining failure prediction log analysis network infrastructure management root cause analysis
下载PDF
ZTE is Top 3 Global LTE Network Infrastructure Vendor
3
作者 Gartner 《ZTE Communications》 2009年第3期68-68,共1页
ZTE Corporation,a leading global provider of telecommunications equipment and network solutions,has been named a Top 3 LTE Network Infrastructure Vendor by Gartner,the world’s leading information technology research
关键词 LTE ZTE is Top 3 Global LTE network infrastructure Vendor
下载PDF
Opportunity Cost Model of Infrastructure Access Charges for Chinese Railways 被引量:1
4
作者 Bo Lu Xin He 《Chinese Business Review》 2005年第2期34-38,共5页
For the suppliers of concerned services, theories about infrastructure pricing: SAT (Stand Alone economists such as Laffont, Tirole, etc. developed Test), ECPR (Efficient Component Pricing Rule). Especially, Sida... For the suppliers of concerned services, theories about infrastructure pricing: SAT (Stand Alone economists such as Laffont, Tirole, etc. developed Test), ECPR (Efficient Component Pricing Rule). Especially, Sidak, Spulber, put forward M-ECPR (Market Efficient Component Pricing Rule) method for bottleneck infrastructures. In this article, we bring the M-ECPR principles into the study of Chinese railways pricing of its network infrastructures. Combined with our Engineer Model and Opportunity Cost Model, we analyzed the special conditions faced by Chinese railways, and developed a model for sharing infrastructure fees among freight and passenger transportations. Engineer Model split Variable Cost (VC) and Fixed Cost (FC) into freight and passenger activities, and Opportunity Cost Model take the insufficient supply of infrastructure capacity into consideration. Of course, the subsidy from the government greatly affected the price standard for bottleneck facilities, or so-called network infrastructures. 展开更多
关键词 network infrastructure essential facilities access charges
下载PDF
Optimization Processes of Tangible and Intangible Networks through the Laplace Problems for Regular Lattices with Multiple Obstacles along the Way
5
作者 Giuseppe Caristi Sabrina Lo Bosco 《Journal of Business Administration Research》 2020年第3期30-41,共12页
A systematic approach is proposed to the theme of safety,reliability and global quality of complex networks(material and immaterial)by means of special mathematical tools that allow an adequate geometric characterizat... A systematic approach is proposed to the theme of safety,reliability and global quality of complex networks(material and immaterial)by means of special mathematical tools that allow an adequate geometric characterization and study of the operation,even in the presence of multiple obstacles along the path.To that end,applying the theory of graphs to the problem under study and using a special mathematical model based on stochastic geometry,in this article we consider some regular lattices in which it is possible to schematize the elements of the network,with the fundamental cell with six,eight or 2(n+2)obstacles,calculating the probability of Laplace.In this way it is possible to measure the“degree of impedance”exerted by the anomalies along the network by the obstacles examined.The method can be extended to other regular and/or irregular geometric figures,whose union together constitutes the examined network,allowing to optimize the functioning of the complex system considered. 展开更多
关键词 Mathematical models Tangible and intangible network infrastructures Safety Reliability Stochastic geometry Random sets Random convex sets and Integral geometry Logistics and transport Social network Analysis WEB resilience analysis critical network infrastructure transport systems simulation EMERGENCY
下载PDF
Research on Logistics Network Infrastructures Based on DEA-PCA Approach:Evidence from the Yangtze River Delta Region in China 被引量:3
6
作者 琚春华 蒋长兵 陈明瑶 《Journal of Shanghai Jiaotong university(Science)》 EI 2012年第1期98-107,共10页
Compared with the extensive research on logistics network infrastructures(LNIs)in the developed world,empirical research is still scarce in China.In this paper the theory of LNIs is firstly overviewed.Then a new evalu... Compared with the extensive research on logistics network infrastructures(LNIs)in the developed world,empirical research is still scarce in China.In this paper the theory of LNIs is firstly overviewed.Then a new evaluation index system for LNIs is set up which contains factors that reflect the economic development level,transportation accessibility and turnover volume of freight traffc.An empirical study is carried out by using data envelopment analysis(DEA)and principal component analysis(PCA)approach to classify LNIs into 4 clusters for 25 cities in the Yangtze River Delta Region of China.According to the characteristics of the 4 clusters,suggestions are proposed for improving their LNIs.Finally,after comparing different LNIs of 25 cities in the Yangtze River Delta Region of China,this paper proposes that different LNIs including hub,central distribution center or cross docking center,regional distribution center or distribution center should be built reasonably in order to meet the customer's requirement in the four different cluster cities. 展开更多
关键词 logistics network infrastructures(LNIs) PERFORMANCE data envelopment analysis(DEA) principal component analysis(PCA)
原文传递
Reversible data hiding based on histogram and prediction error for sharing secret data
7
作者 Chaidir Chalaf Islamy Tohari Ahmad Royyana Muslim Ijtihadie 《Cybersecurity》 EI CSCD 2023年第4期109-122,共14页
With the advancement of communication technology,a large number of data are constantly transmitted through the internet for various purposes,which are prone to be illegally accessed by third parties.Therefore,securing... With the advancement of communication technology,a large number of data are constantly transmitted through the internet for various purposes,which are prone to be illegally accessed by third parties.Therefore,securing such data is crucial to protect the transmitted information from falling into the wrong hands.Among data protection schemes,Secret Image Sharing is one of the most popular methods.It protects critical messages or data by embedding them in an image and sharing it with some users.Furthermore,it combines the security concepts in that private data are embedded into a cover image and then secured using the secret-sharing method.Despite its advantages,this method may produce noise,making the resulting stego file much different from its cover.Moreover,the size of private data that can be embedded is limited.This research works on these problems by utilizing prediction-error expansion and histogram-based approaches to embed the data.To recover the cover image,the SS method based on the Chinese remainder theorem is used.The experimental results indicate that this proposed method performs better than similar methods in several cover images and scenarios. 展开更多
关键词 Data hiding Secret image sharing Prediction error expansion Histogram-based embedding network infrastructure
原文传递
Quantification of disaster resilience in civil engineering:A review 被引量:6
8
作者 Xinzheng Lu Wenjie Liao +5 位作者 Dongping Fang Kaiqi Lin Yuan Tian Chi Zhang Zhe Zheng Pengju Zhao 《Journal of Safety Science and Resilience》 2020年第1期19-30,共12页
Resistance to unexpected disasters and rapid post-disaster recovery(i.e.,disaster resilience)of cities are extremely necessary owing to the concentrated risk of urbanization.Resilience quantification can adequately re... Resistance to unexpected disasters and rapid post-disaster recovery(i.e.,disaster resilience)of cities are extremely necessary owing to the concentrated risk of urbanization.Resilience quantification can adequately reflect the capacity of a city to withstand disasters.Many existing studies have focused on and proposed several frameworks on the quantitative measures of disaster resilience,and the corresponding research objects include different types of disasters(e.g.,earthquake,hurricane,flood,and fire),various domains(e.g.,engineering,social,and economic),and multiple levels(e.g.,city,community,and building).Among these research objects,studies on seismic resilience in civil engineering are relatively comprehensive.Specifically,studies on resilience in civil engineering have paid significant attention to the dynamics of engineering facilities and the engineering-related social and economic functions,including city-scale engineering,social,and economic functionalities,and essential functionalities of building,transportation,lifeline,and nonphysical subsystems of a city.Consequently,based on the review of resilience studies carried out in recent years,the framework and specifications for the quantification of disaster resilience of civil engineering systems subjected to earthquakes and other unexpected disasters are elaborated.Methods of disaster resilience assessment of cities and the corresponding subsystems are discussed.Furthermore,several case studies are reviewed,and resilience limit-state analyses of communities and buildings are performed. 展开更多
关键词 Resilience quantification in civil engineering Urban system infrastructure and distributed network Single structure Resilience limit state
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部