期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Influential Node Ranking and Invulnerability of Air Traffic Cyber Physical System 被引量:6
1
作者 WANG Xinglong HE Min 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2021年第2期288-297,共10页
To ensure flight safety,the complex network method is used to study the influence and invulnerability of air traffic cyber physical system(CPS)nodes.According to the rules of air traffic management,the logical couplin... To ensure flight safety,the complex network method is used to study the influence and invulnerability of air traffic cyber physical system(CPS)nodes.According to the rules of air traffic management,the logical coupling relationship between routes and sectors is analyzed,an air traffic CPS network model is constructed,and the indicators of node influence and invulnerability are established.The K-shell algorithm is improved to identify node influence,and the invulnerability is analyzed under random and selective attacks.Taking Airspace in Eastern China as an example,its influential nodes are sorted by degree,namely,K-shell,the improved K-shell(IKS)and betweenness centrality.The invulnerability of air traffic CPS under different attacks is analyzed.Results show that IKS can effectively identify the influential nodes in the air traffic CPS network,and IKS and betweenness centrality are the two key indicators that affect the invulnerability of air traffic CPS. 展开更多
关键词 complex network air traffic cyber physical system improved K-shell algorithm influential node ranking invulnerability
下载PDF
Optimal Deployment of Heterogeneous Nodes to Enhance Network Invulnerability
2
作者 Qian Sun Fengbo Yang +6 位作者 Xiaoyi Wang Jiping Xu Huiyan Zhang Li Wang Jiabin Yu Xiao Peng Ruichao Wang 《Computers, Materials & Continua》 SCIE EI 2022年第11期3081-3097,共17页
Wireless sensor networks(WSN)can be used in many fields.In wireless sensor networks,sensor nodes transmit data in multi hop mode.The large number of hops required by data transmission will lead to unbalanced energy co... Wireless sensor networks(WSN)can be used in many fields.In wireless sensor networks,sensor nodes transmit data in multi hop mode.The large number of hops required by data transmission will lead to unbalanced energy consumption and large data transmission delay of the whole network,which greatly affects the invulnerability of the network.Therefore,an optimal deployment of heterogeneous nodes(ODHN)algorithm is proposed to enhance the invulnerability of the wireless sensor networks.The algorithm combines the advantages of DEEC(design of distributed energy efficient clustering)clustering algorithm and BAS(beetle antenna search)optimization algorithm to find the globally optimal deployment locations of heterogeneous nodes.Then,establish a shortcut to communicate with sink nodes through heterogeneous nodes.Besides,considering the practical deployment operation,we set the threshold of the mobile location of heterogeneous nodes,which greatly simplifies the deployment difficulty.Simulation results show that compared with traditional routing protocols,the proposed algorithm can make the network load more evenly,and effectively improve energy-utilization and the fault tolerance of the whole network,which can greatly improve the invulnerability of the wireless sensor networks. 展开更多
关键词 Wireless sensor networks invulnerability small world characteristic heterogeneous node DEPLOYMENT
下载PDF
Network Invulnerability Enhancement Algorithm Based on WSN Closeness Centrality
3
作者 Qian Sun Fengbo Yang +7 位作者 Xiaoyi Wang Jing Li Jiping Xu Huiyan Zhang Li Wang Jiabin Yu Xiao Peng Ruichao Wang 《Computers, Materials & Continua》 SCIE EI 2022年第11期3021-3038,共18页
Wireless Sensor Network(WSN)is an important part of the Internet of Things(IoT),which are used for information exchange and communication between smart objects.In practical applications,WSN lifecycle can be influenced... Wireless Sensor Network(WSN)is an important part of the Internet of Things(IoT),which are used for information exchange and communication between smart objects.In practical applications,WSN lifecycle can be influenced by the unbalanced distribution of node centrality and excessive energy consumption,etc.In order to overcome these problems,a heterogeneous wireless sensor network model with small world characteristics is constructed to balance the centrality and enhance the invulnerability of the network.Also,a new WSN centrality measurement method and a new invulnerability measurement model are proposed based on the WSN data transmission characteristics.Simulation results show that the life cycle and data transmission volume of the network can be improved with a lower network construction cost,and the invulnerability of the network is effectively enhanced. 展开更多
关键词 Wireless sensor networks invulnerability small world characteristics heterogeneous nodes node centrality
下载PDF
The Invulnerability of Directed Interdependent Networks with Multiple Dependency Relations
4
作者 Hanbing Gao Zhiming Ma 《Applied Mathematics》 2018年第10期1104-1115,共12页
The paper aims to study the invulnerability of directed interdependent networks with multiple dependency relations: dependent and supportive. We establish three models and simulate in three network systems to deal wit... The paper aims to study the invulnerability of directed interdependent networks with multiple dependency relations: dependent and supportive. We establish three models and simulate in three network systems to deal with this question. To improve network invulnerability, we’d better avoid dependent relations transmission and add supportive relations symmetrically. 展开更多
关键词 Interdependent NETWORKS DEPENDENCY RELATIONS invulnerability
下载PDF
Analysis on Chinese Airline Network Invulnerability 被引量:4
5
作者 Yong YANG Kaijun XU Honghui XIANG 《Journal of Systems Science and Information》 CSCD 2019年第4期359-372,共14页
Air transportation systems are often subject to failures or attacks induced by unexpected abominable weather or temporal airspace occupation, while complex networks have been springing up as a convenient yet efficient... Air transportation systems are often subject to failures or attacks induced by unexpected abominable weather or temporal airspace occupation, while complex networks have been springing up as a convenient yet efficient tool to represent and analyze various realistic complex systems such as realistic airline system. In terms of Chinese airline network formed during the spring festival timespan, structural empirical research and invulnerability simulation analysis against various deliberate attack strategies were made using complex network theory, where nodes and edges denotes domestic airports and direct flights between them respectively. The analysis results indicate: The presented airline network is a small net-work with scale-free characteristics, and correlation shows remarkable hierarchical structure and obvious assortative characteristics;The network shows obvious invulnerability under deliberate node attack, while shows partly robustness under edge attack even with obvious attack effects against various attack strategies. 展开更多
关键词 COMPLEX networks invulnerability simulation CHINESE AIRLINE network ATTACK STRATEGIES
原文传递
Complex systems and network science:a survey
6
作者 YANG Kewei LI Jichao +5 位作者 LIU Maidi LEI Tianyang XU Xueming WU Hongqian CAO Jiaping QI Gaoxin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2023年第3期543-573,共31页
Complex systems widely exist in nature and human society.There are complex interactions between system elements in a complex system,and systems show complex features at the macro level,such as emergence,self-organizat... Complex systems widely exist in nature and human society.There are complex interactions between system elements in a complex system,and systems show complex features at the macro level,such as emergence,self-organization,uncertainty,and dynamics.These complex features make it difficult to understand the internal operation mechanism of complex systems.Networked modeling of complex systems is a favorable means of understanding complex systems.It not only represents complex interactions but also reflects essential attributes of complex systems.This paper summarizes the research progress of complex systems modeling and analysis from the perspective of network science,including networked modeling,vital node analysis,network invulnerability analysis,network disintegration analysis,resilience analysis,complex network link prediction,and the attacker-defender game in complex networks.In addition,this paper presents some points of view on the trend and focus of future research on network analysis of complex systems. 展开更多
关键词 complex system complex network invulnerability and resilience network disintegration link prediction attackerdefender game theory
下载PDF
Analysis of robustness of urban bus network 被引量:3
7
作者 任涛 王一帆 +1 位作者 刘苗苗 徐艳杰 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第2期1-12,共12页
In this paper, the invulnerability and cascade failures are discussed for the urban bus network. Firstly, three static models(bus stop network, bus transfer network, and bus line network) are used to analyse the str... In this paper, the invulnerability and cascade failures are discussed for the urban bus network. Firstly, three static models(bus stop network, bus transfer network, and bus line network) are used to analyse the structure and invulnerability of urban bus network in order to understand the features of bus network comprehensively. Secondly, a new way is proposed to study the invulnerability of urban bus network by modelling two layered networks, i.e., the bus stop-line network and the bus line-transfer network and then the interactions between different models are analysed. Finally, by modelling a new layered network which can reflect the dynamic passenger flows, the cascade failures are discussed. Then a new load redistribution method is proposed to study the robustness of dynamic traffic. In this paper, the bus network of Shenyang City which is one of the biggest cities in China, is taken as a simulation example. In addition, some suggestions are given to improve the urban bus network and provide emergency strategies when traffic congestion occurs according to the numerical simulation results. 展开更多
关键词 complex network urban bus network layered network invulnerability cascade failures
下载PDF
Effective Methods and Performance Analysis on Data Transmission Security with Blind Source Separation in Space-Based AIS 被引量:1
8
作者 Chengjie Li Lidong Zhu +2 位作者 Zhongqiang Luo Zhen Zhang Ying Yang 《China Communications》 SCIE CSCD 2022年第4期154-165,共12页
In space-based Automatic Identification Systems(AIS), due to high satellite orbits, several Ad Hoc cells within the observation range of the satellite are vulnerable to interference by an external signal.To increase e... In space-based Automatic Identification Systems(AIS), due to high satellite orbits, several Ad Hoc cells within the observation range of the satellite are vulnerable to interference by an external signal.To increase efficiency in target detection and improve system security, a blind source separation method is adopted for processing the conflicting signals received by satellites. Compared to traditional methods, we formulate the separation problem as a clustering problem. Since our algorithm is affected by the sparseness of source signals, to get satisfactory results, our algorithm assumes that the distance between two arbitrary mixed-signal vectors is less than the doubled sum of variances of distribution of the corresponding mixtures. Signal sparsity is overcome by computing the Short-Time Fourier Transform, and the mixed source signals are separated using the improved PSO clustering. We evaluated the performance and the robustness of the proposed network architecture by several simulations. The experimental results demonstrate the effectiveness of the proposed method in not only improving satellite signal receiving ability but also in enhancing space-based AIS security. 展开更多
关键词 space-based automatic identification systems tolerance rough set particle swarm optimization invulnerability performance
下载PDF
A survey of routing techniques for satellite networks 被引量:5
9
作者 QI Xiaogang MA Jiulong +2 位作者 WU Dan LIU Lifang HU Shaolin 《Journal of Communications and Information Networks》 2016年第4期66-85,共20页
Satellite networks have many advantages over traditional terrestrial networks.However,it is very difficult to design a satellite network with excellent performance.The paper briefly summarizes some existing satellite ... Satellite networks have many advantages over traditional terrestrial networks.However,it is very difficult to design a satellite network with excellent performance.The paper briefly summarizes some existing satellite network routing technologies from the perspective of both single-layer and multilayer satellite constellations,and focuses on the main ideas,characteristics,and existing problems of these routing technologies.For single-layer satellite networks,two routing strategies are discussed,virtual node strategy and virtual topology strategy.Moreover,considering the deficiency of existing multilayer satellite network routing,we discuss the topic invulnerability.Finally,the challenges and problems faced by the satellite network are analyzed and the trend of future development is predicted. 展开更多
关键词 satellite network routing technology virtual node virtual topology invulnerability
原文传递
EFFECT OF KAIROMONE ON PREDATOR-PREY DYNAMICS -- A DELAY MODEL 被引量:2
10
作者 SUDIP SAMANTA JOYDEV CHATTOPADHYA* 《International Journal of Biomathematics》 2013年第5期149-188,共40页
In most of the predator-prey systems, prey individuals make transitions between vulnerable and invulnerable states or locations. This transition is regulated by various inducible defense mechanisms. Diel vertical migr... In most of the predator-prey systems, prey individuals make transitions between vulnerable and invulnerable states or locations. This transition is regulated by various inducible defense mechanisms. Diel vertical migration (DVM) in zooplankton is the most effective and instantaneous defense observed in zooplankton population. Zooplankton shows downward vertical migration in the daytime in the presence of predators (or predator kairomones) to avoid predation (i.e. refuge use), and it enters into the surface water again at night to graze phytoplankton. The dynamics of the planktonic ecosystem under DVM of zooplankton along with fish kairomone and the multiple delays due to migration for vulnerable and invulnerable prey and reproduction in the predator population is of considerable interest both in theoretical and experimental ecologists. By developing mathematical model, we analyze such a system. The conditions for which the system enters into Hopf-bifurcation are obtained. Moreover, the conditions for which the bifurcating branches are supercritical are also derived. Our results indicate that DVM along with the effect of kairomone and multiple delays with a certain range are responsible to enhance the stability of the system around the positive interior equilibrium point. 展开更多
关键词 KAIROMONE diel vertical migration vulnerable and invulnerable prey timedelay stability analysis HOPF-BIFURCATION numerical simulations.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部