To ensure flight safety,the complex network method is used to study the influence and invulnerability of air traffic cyber physical system(CPS)nodes.According to the rules of air traffic management,the logical couplin...To ensure flight safety,the complex network method is used to study the influence and invulnerability of air traffic cyber physical system(CPS)nodes.According to the rules of air traffic management,the logical coupling relationship between routes and sectors is analyzed,an air traffic CPS network model is constructed,and the indicators of node influence and invulnerability are established.The K-shell algorithm is improved to identify node influence,and the invulnerability is analyzed under random and selective attacks.Taking Airspace in Eastern China as an example,its influential nodes are sorted by degree,namely,K-shell,the improved K-shell(IKS)and betweenness centrality.The invulnerability of air traffic CPS under different attacks is analyzed.Results show that IKS can effectively identify the influential nodes in the air traffic CPS network,and IKS and betweenness centrality are the two key indicators that affect the invulnerability of air traffic CPS.展开更多
Wireless sensor networks(WSN)can be used in many fields.In wireless sensor networks,sensor nodes transmit data in multi hop mode.The large number of hops required by data transmission will lead to unbalanced energy co...Wireless sensor networks(WSN)can be used in many fields.In wireless sensor networks,sensor nodes transmit data in multi hop mode.The large number of hops required by data transmission will lead to unbalanced energy consumption and large data transmission delay of the whole network,which greatly affects the invulnerability of the network.Therefore,an optimal deployment of heterogeneous nodes(ODHN)algorithm is proposed to enhance the invulnerability of the wireless sensor networks.The algorithm combines the advantages of DEEC(design of distributed energy efficient clustering)clustering algorithm and BAS(beetle antenna search)optimization algorithm to find the globally optimal deployment locations of heterogeneous nodes.Then,establish a shortcut to communicate with sink nodes through heterogeneous nodes.Besides,considering the practical deployment operation,we set the threshold of the mobile location of heterogeneous nodes,which greatly simplifies the deployment difficulty.Simulation results show that compared with traditional routing protocols,the proposed algorithm can make the network load more evenly,and effectively improve energy-utilization and the fault tolerance of the whole network,which can greatly improve the invulnerability of the wireless sensor networks.展开更多
Wireless Sensor Network(WSN)is an important part of the Internet of Things(IoT),which are used for information exchange and communication between smart objects.In practical applications,WSN lifecycle can be influenced...Wireless Sensor Network(WSN)is an important part of the Internet of Things(IoT),which are used for information exchange and communication between smart objects.In practical applications,WSN lifecycle can be influenced by the unbalanced distribution of node centrality and excessive energy consumption,etc.In order to overcome these problems,a heterogeneous wireless sensor network model with small world characteristics is constructed to balance the centrality and enhance the invulnerability of the network.Also,a new WSN centrality measurement method and a new invulnerability measurement model are proposed based on the WSN data transmission characteristics.Simulation results show that the life cycle and data transmission volume of the network can be improved with a lower network construction cost,and the invulnerability of the network is effectively enhanced.展开更多
The paper aims to study the invulnerability of directed interdependent networks with multiple dependency relations: dependent and supportive. We establish three models and simulate in three network systems to deal wit...The paper aims to study the invulnerability of directed interdependent networks with multiple dependency relations: dependent and supportive. We establish three models and simulate in three network systems to deal with this question. To improve network invulnerability, we’d better avoid dependent relations transmission and add supportive relations symmetrically.展开更多
Air transportation systems are often subject to failures or attacks induced by unexpected abominable weather or temporal airspace occupation, while complex networks have been springing up as a convenient yet efficient...Air transportation systems are often subject to failures or attacks induced by unexpected abominable weather or temporal airspace occupation, while complex networks have been springing up as a convenient yet efficient tool to represent and analyze various realistic complex systems such as realistic airline system. In terms of Chinese airline network formed during the spring festival timespan, structural empirical research and invulnerability simulation analysis against various deliberate attack strategies were made using complex network theory, where nodes and edges denotes domestic airports and direct flights between them respectively. The analysis results indicate: The presented airline network is a small net-work with scale-free characteristics, and correlation shows remarkable hierarchical structure and obvious assortative characteristics;The network shows obvious invulnerability under deliberate node attack, while shows partly robustness under edge attack even with obvious attack effects against various attack strategies.展开更多
Complex systems widely exist in nature and human society.There are complex interactions between system elements in a complex system,and systems show complex features at the macro level,such as emergence,self-organizat...Complex systems widely exist in nature and human society.There are complex interactions between system elements in a complex system,and systems show complex features at the macro level,such as emergence,self-organization,uncertainty,and dynamics.These complex features make it difficult to understand the internal operation mechanism of complex systems.Networked modeling of complex systems is a favorable means of understanding complex systems.It not only represents complex interactions but also reflects essential attributes of complex systems.This paper summarizes the research progress of complex systems modeling and analysis from the perspective of network science,including networked modeling,vital node analysis,network invulnerability analysis,network disintegration analysis,resilience analysis,complex network link prediction,and the attacker-defender game in complex networks.In addition,this paper presents some points of view on the trend and focus of future research on network analysis of complex systems.展开更多
In this paper, the invulnerability and cascade failures are discussed for the urban bus network. Firstly, three static models(bus stop network, bus transfer network, and bus line network) are used to analyse the str...In this paper, the invulnerability and cascade failures are discussed for the urban bus network. Firstly, three static models(bus stop network, bus transfer network, and bus line network) are used to analyse the structure and invulnerability of urban bus network in order to understand the features of bus network comprehensively. Secondly, a new way is proposed to study the invulnerability of urban bus network by modelling two layered networks, i.e., the bus stop-line network and the bus line-transfer network and then the interactions between different models are analysed. Finally, by modelling a new layered network which can reflect the dynamic passenger flows, the cascade failures are discussed. Then a new load redistribution method is proposed to study the robustness of dynamic traffic. In this paper, the bus network of Shenyang City which is one of the biggest cities in China, is taken as a simulation example. In addition, some suggestions are given to improve the urban bus network and provide emergency strategies when traffic congestion occurs according to the numerical simulation results.展开更多
In space-based Automatic Identification Systems(AIS), due to high satellite orbits, several Ad Hoc cells within the observation range of the satellite are vulnerable to interference by an external signal.To increase e...In space-based Automatic Identification Systems(AIS), due to high satellite orbits, several Ad Hoc cells within the observation range of the satellite are vulnerable to interference by an external signal.To increase efficiency in target detection and improve system security, a blind source separation method is adopted for processing the conflicting signals received by satellites. Compared to traditional methods, we formulate the separation problem as a clustering problem. Since our algorithm is affected by the sparseness of source signals, to get satisfactory results, our algorithm assumes that the distance between two arbitrary mixed-signal vectors is less than the doubled sum of variances of distribution of the corresponding mixtures. Signal sparsity is overcome by computing the Short-Time Fourier Transform, and the mixed source signals are separated using the improved PSO clustering. We evaluated the performance and the robustness of the proposed network architecture by several simulations. The experimental results demonstrate the effectiveness of the proposed method in not only improving satellite signal receiving ability but also in enhancing space-based AIS security.展开更多
Satellite networks have many advantages over traditional terrestrial networks.However,it is very difficult to design a satellite network with excellent performance.The paper briefly summarizes some existing satellite ...Satellite networks have many advantages over traditional terrestrial networks.However,it is very difficult to design a satellite network with excellent performance.The paper briefly summarizes some existing satellite network routing technologies from the perspective of both single-layer and multilayer satellite constellations,and focuses on the main ideas,characteristics,and existing problems of these routing technologies.For single-layer satellite networks,two routing strategies are discussed,virtual node strategy and virtual topology strategy.Moreover,considering the deficiency of existing multilayer satellite network routing,we discuss the topic invulnerability.Finally,the challenges and problems faced by the satellite network are analyzed and the trend of future development is predicted.展开更多
In most of the predator-prey systems, prey individuals make transitions between vulnerable and invulnerable states or locations. This transition is regulated by various inducible defense mechanisms. Diel vertical migr...In most of the predator-prey systems, prey individuals make transitions between vulnerable and invulnerable states or locations. This transition is regulated by various inducible defense mechanisms. Diel vertical migration (DVM) in zooplankton is the most effective and instantaneous defense observed in zooplankton population. Zooplankton shows downward vertical migration in the daytime in the presence of predators (or predator kairomones) to avoid predation (i.e. refuge use), and it enters into the surface water again at night to graze phytoplankton. The dynamics of the planktonic ecosystem under DVM of zooplankton along with fish kairomone and the multiple delays due to migration for vulnerable and invulnerable prey and reproduction in the predator population is of considerable interest both in theoretical and experimental ecologists. By developing mathematical model, we analyze such a system. The conditions for which the system enters into Hopf-bifurcation are obtained. Moreover, the conditions for which the bifurcating branches are supercritical are also derived. Our results indicate that DVM along with the effect of kairomone and multiple delays with a certain range are responsible to enhance the stability of the system around the positive interior equilibrium point.展开更多
基金This work was supported by the Fundamental Research Funds for the Central Universities(No.3122019191).
文摘To ensure flight safety,the complex network method is used to study the influence and invulnerability of air traffic cyber physical system(CPS)nodes.According to the rules of air traffic management,the logical coupling relationship between routes and sectors is analyzed,an air traffic CPS network model is constructed,and the indicators of node influence and invulnerability are established.The K-shell algorithm is improved to identify node influence,and the invulnerability is analyzed under random and selective attacks.Taking Airspace in Eastern China as an example,its influential nodes are sorted by degree,namely,K-shell,the improved K-shell(IKS)and betweenness centrality.The invulnerability of air traffic CPS under different attacks is analyzed.Results show that IKS can effectively identify the influential nodes in the air traffic CPS network,and IKS and betweenness centrality are the two key indicators that affect the invulnerability of air traffic CPS.
基金This research was funded by the National Natural Science Foundation of China,No.61802010Hundred-Thousand-Ten Thousand Talents Project of Beijing No.2020A28+1 种基金National Social Science Fund of China,No.19BGL184Beijing Excellent Talent Training Support Project for Young Top-Notch Team No.2018000026833TD01.
文摘Wireless sensor networks(WSN)can be used in many fields.In wireless sensor networks,sensor nodes transmit data in multi hop mode.The large number of hops required by data transmission will lead to unbalanced energy consumption and large data transmission delay of the whole network,which greatly affects the invulnerability of the network.Therefore,an optimal deployment of heterogeneous nodes(ODHN)algorithm is proposed to enhance the invulnerability of the wireless sensor networks.The algorithm combines the advantages of DEEC(design of distributed energy efficient clustering)clustering algorithm and BAS(beetle antenna search)optimization algorithm to find the globally optimal deployment locations of heterogeneous nodes.Then,establish a shortcut to communicate with sink nodes through heterogeneous nodes.Besides,considering the practical deployment operation,we set the threshold of the mobile location of heterogeneous nodes,which greatly simplifies the deployment difficulty.Simulation results show that compared with traditional routing protocols,the proposed algorithm can make the network load more evenly,and effectively improve energy-utilization and the fault tolerance of the whole network,which can greatly improve the invulnerability of the wireless sensor networks.
基金This research was funded by the National Natural Science Foundation of China,No.61802010Hundred-Thousand-Ten Thousand Talents Project of Beijing No.2020A28+2 种基金National Social Science Fund of China,No.19BGL184Beijing Excellent Talent Training Support Project for Young Top-Notch Team No.2018000026833TD01Academic Research Projects of Beijing Union University,No.ZK30202103.
文摘Wireless Sensor Network(WSN)is an important part of the Internet of Things(IoT),which are used for information exchange and communication between smart objects.In practical applications,WSN lifecycle can be influenced by the unbalanced distribution of node centrality and excessive energy consumption,etc.In order to overcome these problems,a heterogeneous wireless sensor network model with small world characteristics is constructed to balance the centrality and enhance the invulnerability of the network.Also,a new WSN centrality measurement method and a new invulnerability measurement model are proposed based on the WSN data transmission characteristics.Simulation results show that the life cycle and data transmission volume of the network can be improved with a lower network construction cost,and the invulnerability of the network is effectively enhanced.
文摘The paper aims to study the invulnerability of directed interdependent networks with multiple dependency relations: dependent and supportive. We establish three models and simulate in three network systems to deal with this question. To improve network invulnerability, we’d better avoid dependent relations transmission and add supportive relations symmetrically.
基金Supported by 2018 Education and Teaching Reform Special Fund in Central Colleges and Universities(E20180301)the Open Foundation of Civiation Aviation Flight University of China(J2015-02)
文摘Air transportation systems are often subject to failures or attacks induced by unexpected abominable weather or temporal airspace occupation, while complex networks have been springing up as a convenient yet efficient tool to represent and analyze various realistic complex systems such as realistic airline system. In terms of Chinese airline network formed during the spring festival timespan, structural empirical research and invulnerability simulation analysis against various deliberate attack strategies were made using complex network theory, where nodes and edges denotes domestic airports and direct flights between them respectively. The analysis results indicate: The presented airline network is a small net-work with scale-free characteristics, and correlation shows remarkable hierarchical structure and obvious assortative characteristics;The network shows obvious invulnerability under deliberate node attack, while shows partly robustness under edge attack even with obvious attack effects against various attack strategies.
基金supported by the State Key Program of National Natural Science Foundation of China(72231011)the National Natural Science Foundation of China(72071206,72001209,71971213)the Science Foundation for Outstanding Youth Scholars of Hunan Province(2022JJ20047).
文摘Complex systems widely exist in nature and human society.There are complex interactions between system elements in a complex system,and systems show complex features at the macro level,such as emergence,self-organization,uncertainty,and dynamics.These complex features make it difficult to understand the internal operation mechanism of complex systems.Networked modeling of complex systems is a favorable means of understanding complex systems.It not only represents complex interactions but also reflects essential attributes of complex systems.This paper summarizes the research progress of complex systems modeling and analysis from the perspective of network science,including networked modeling,vital node analysis,network invulnerability analysis,network disintegration analysis,resilience analysis,complex network link prediction,and the attacker-defender game in complex networks.In addition,this paper presents some points of view on the trend and focus of future research on network analysis of complex systems.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61473073,61374178,61104074,and 61203329)the Fundamental Research Funds for the Central Universities(Grant Nos.N130417006,L1517004)the Program for Liaoning Excellent Talents in University(Grant No.LJQ2014028)
文摘In this paper, the invulnerability and cascade failures are discussed for the urban bus network. Firstly, three static models(bus stop network, bus transfer network, and bus line network) are used to analyse the structure and invulnerability of urban bus network in order to understand the features of bus network comprehensively. Secondly, a new way is proposed to study the invulnerability of urban bus network by modelling two layered networks, i.e., the bus stop-line network and the bus line-transfer network and then the interactions between different models are analysed. Finally, by modelling a new layered network which can reflect the dynamic passenger flows, the cascade failures are discussed. Then a new load redistribution method is proposed to study the robustness of dynamic traffic. In this paper, the bus network of Shenyang City which is one of the biggest cities in China, is taken as a simulation example. In addition, some suggestions are given to improve the urban bus network and provide emergency strategies when traffic congestion occurs according to the numerical simulation results.
基金supported by National Natural Science Foundation of China (No. 61821001)fully supported by Natural Science Foundation of China Project (61871422)+5 种基金Science and Technology Program of Sichuan Province (2020YFH0071)National Natural Science Foundation of China under Grant (61801319)in part by Sichuan Science and Technology Program under Grant (2020JDJQ0061), (2021YFG0099)in part by the Sichuan University of Science and Engineering Talent Introduction Project under Grant (2020RC33)Innovation Fund of Chinese Universities under Grant (2020HYA04001)Technology Key Project of Guangdong Province, China (2019B010157001)。
文摘In space-based Automatic Identification Systems(AIS), due to high satellite orbits, several Ad Hoc cells within the observation range of the satellite are vulnerable to interference by an external signal.To increase efficiency in target detection and improve system security, a blind source separation method is adopted for processing the conflicting signals received by satellites. Compared to traditional methods, we formulate the separation problem as a clustering problem. Since our algorithm is affected by the sparseness of source signals, to get satisfactory results, our algorithm assumes that the distance between two arbitrary mixed-signal vectors is less than the doubled sum of variances of distribution of the corresponding mixtures. Signal sparsity is overcome by computing the Short-Time Fourier Transform, and the mixed source signals are separated using the improved PSO clustering. We evaluated the performance and the robustness of the proposed network architecture by several simulations. The experimental results demonstrate the effectiveness of the proposed method in not only improving satellite signal receiving ability but also in enhancing space-based AIS security.
基金This work is supported by the National Natural Science Foundation of China(Nos.61572435,61472305,61473222)the Natural Science Foundation of Shaanxi Province(Nos.2015JZ002,2015JM6311)+1 种基金the Natural Science Foundation of Zhejiang Province(No.LZ16F020001)Programs Supported by Ningbo Natural Science Foundation(No.2016A610035).
文摘Satellite networks have many advantages over traditional terrestrial networks.However,it is very difficult to design a satellite network with excellent performance.The paper briefly summarizes some existing satellite network routing technologies from the perspective of both single-layer and multilayer satellite constellations,and focuses on the main ideas,characteristics,and existing problems of these routing technologies.For single-layer satellite networks,two routing strategies are discussed,virtual node strategy and virtual topology strategy.Moreover,considering the deficiency of existing multilayer satellite network routing,we discuss the topic invulnerability.Finally,the challenges and problems faced by the satellite network are analyzed and the trend of future development is predicted.
文摘In most of the predator-prey systems, prey individuals make transitions between vulnerable and invulnerable states or locations. This transition is regulated by various inducible defense mechanisms. Diel vertical migration (DVM) in zooplankton is the most effective and instantaneous defense observed in zooplankton population. Zooplankton shows downward vertical migration in the daytime in the presence of predators (or predator kairomones) to avoid predation (i.e. refuge use), and it enters into the surface water again at night to graze phytoplankton. The dynamics of the planktonic ecosystem under DVM of zooplankton along with fish kairomone and the multiple delays due to migration for vulnerable and invulnerable prey and reproduction in the predator population is of considerable interest both in theoretical and experimental ecologists. By developing mathematical model, we analyze such a system. The conditions for which the system enters into Hopf-bifurcation are obtained. Moreover, the conditions for which the bifurcating branches are supercritical are also derived. Our results indicate that DVM along with the effect of kairomone and multiple delays with a certain range are responsible to enhance the stability of the system around the positive interior equilibrium point.