CN112202611A - Similarity weight network stability evaluation index calculation method based on robustness analysis - Google Patents

Similarity weight network stability evaluation index calculation method based on robustness analysis Download PDF

Info

Publication number
CN112202611A
CN112202611A CN202011056318.3A CN202011056318A CN112202611A CN 112202611 A CN112202611 A CN 112202611A CN 202011056318 A CN202011056318 A CN 202011056318A CN 112202611 A CN112202611 A CN 112202611A
Authority
CN
China
Prior art keywords
network
stability
node
weight
attack
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011056318.3A
Other languages
Chinese (zh)
Inventor
柴立和
张智慧
孙静静
刘思彤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University
Original Assignee
Tianjin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University filed Critical Tianjin University
Priority to CN202011056318.3A priority Critical patent/CN112202611A/en
Publication of CN112202611A publication Critical patent/CN112202611A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/142Network analysis or design using statistical or mathematical methods

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Algebra (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Pure & Applied Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The 21 st century is a century of complexity and networking. Since the seventies of the 20 th century, research on complexity has attracted widespread attention both at home and abroad. Scientists from different disciplines in various countries, including physicists, biologists, computer scientists and economists, have no way to discuss and study the complexity of their respective fields. The method of complex network stability analysis requires new definitions to be found from a new perspective, thereby solving more problems, especially similar oriented networks related to the environmental economics related problems. The invention relates to network stability evaluation of a complex network model similarity weight network, fills the blank in the aspect of weighting the network when the network stability is evaluated by the traditional complex network model, and describes the definition and the calculation method of attack strength and stability under the selective attack condition of the similarity weight network by comprehensive robustness analysis and weight-degree correlation.

Description

Similarity weight network stability evaluation index calculation method based on robustness analysis
Technical Field
The invention relates to network stability evaluation of a complex network model similarity weight network, fills the blank in the aspect of weighting the network when the network stability is evaluated by the traditional complex network model, and describes the definition and the calculation method of attack strength and stability under the selective attack condition of the similarity weight network by comprehensive robustness analysis and weight-degree correlation.
Background
The 21 st century is a century of complexity and networking. Since the seventies of the 20 th century, the research on complexity has attracted extensive attention both at home and abroad, and the nonlinear science is interlaced with the complexity research on the chaotic dynamics thereof. Scientists from different disciplines in various countries, including physicists, biologists, computer scientists and economists, have no way to discuss and study the complexity of their respective fields.
The study of complex networks is also actively undertaken by scholars in the field of the environment, in particular those involved in the specialties of environmental economics. The method of complex network stability analysis requires new definitions to be found from a new perspective, thereby solving more problems, especially directed affinity networks related to environmental economics.
The traditional robustness calculation formula is
Figure BSA0000220684790000011
Wherein S (Q) is the scale of the maximum connected subgraph of the network after Q nodes fail, and the value range of R is
Figure BSA0000220684790000012
The larger R is, the stronger the network can resist the malicious attack, and conversely, the smaller R is, the weaker the network can resist the malicious attack. Q may be used to describe the attack scale, Q — qN, where Q is the node failure rate. And S (q) is the proportion of the number of nodes contained in the maximum connected subgraph of the network to the number of initial network nodes after the q-proportion nodes fail. Initially, s (q) is 1, and as the attack progresses, the proportion of failed nodes increases, the number of nodes disconnected from the maximum connected subgraph increases, and s (q) becomes smaller. The slower the reduction of s (q) is, the stronger the network's ability to resist malicious attacks, whereas the faster the reduction of s (q) is, the weaker the network's ability to resist malicious attacks.
Based on the principle of robustness analysis, the network fragmentation degree F after removing one or more nodes from the network is proposed in the united network analysis on the organization of an industrial metallic system published by the university of Tianjin Chaiqi and the subject group Zhang-Qijun, and the calculation method is that
Figure BSA0000220684790000021
Wherein lijIs the symbiotic relationship between nodes, if the symbiotic relationship exists between two nodes, it is lij1, otherwise, < i > lij0. F-0 indicates that the industrial symbiotic network is not destroyed, and F-1 indicates that the industrial symbiotic network is destroyedThe raw network has been completely destroyed. F can be considered a reasonable description of the stability of the industrial symbiotic network.
Disclosure of Invention
In order to make up for the defects of complex network models in the aspects of network stability, vulnerability and the like when the complex network models are applied to the environmental field, based on the network stability calculation method, the invention provides a network stability calculation method from the perspective of a similar weight network from the direction which is not proposed by previous scholars, constructs a new network stability index and is used for judging the stability of the similar weight complex network in the environmental ecological field. The method of the invention. The content of the calculation method is as follows:
n x n adjacency matrix for given complex similarity weight network
Figure BSA0000220684790000022
Step 1: calculating single-row through flow
Figure BSA0000220684790000023
It is expressed as the sum of the row vectors of the original adjacency matrix, which is the sum of the traffic from a certain node to all other nodes.
Step 2: calculating dominance
Figure BSA0000220684790000024
The scale condition of the system is described to be mutually constrained, and the advantage shows the flow order and regularity of the materials in the network.
And step 3: computing redundancy
Figure BSA0000220684790000031
The scale condition entropy is expressed, and the larger the redundancy rate is, the more complicated the system is, and the larger the communication quantity is.
And 4, step 4: the system capacity C is calculated as a + θ, representing the scale uncertainty at the overall system level, with the larger the capacity, the larger the network size.
And 5: computing tradition robustness
Figure BSA0000220684790000032
R represents robustness. The equation shows that the ability of a system to evolve or self-organize includes two aspects: it must be able to exert sufficient directional force (advantage) to maintain its integrity over time; at the same time, it must maintain a flexible mobile (redundant) store that can be used to cope with disturbing stresses.
Step 6: calculating dimensionless node connection quantity
Figure BSA0000220684790000033
Wherein
Figure BSA0000220684790000034
Representing the network mean weight value, MijIs the weight between node i and node j after dimensionless.
And 7: computing selection attack strength
Figure BSA0000220684790000035
Wherein T isiIs the traffic of node i; diThe connectivity of the node i represents the number of nodes which have weight relation with other nodes; i isiN is the number of network nodes in order to select the damage strength to the network, which will be caused when the node i of the network is to be removed.
And 8: computing selection attack stability
Figure BSA0000220684790000036
SiSelecting a stability under attack conditions for a network, SiThe larger the size, the higher the network stability when selecting the attacking node i.
And step 9: computing network stability
Figure BSA0000220684790000037
Indicating the stability of the network.
The invention has the following advantages:
1. by applying the complex network thought, the topological characteristics of the relation network between the environment and the industry can be deeply analyzed, and suggestions are provided for the environment direction optimization of the industry structure.
2. The weighting factors, especially the similar weight influence, are integrated into the traditional network stability algorithm, so that the defect of the conventional weightless network is overcome.
3. The traditional robustness is considered into a calculation formula, and the stability difference is amplified, so that the network stability is more credible.
Detailed Description
N x n adjacency matrix for given complex similarity weight network
Figure BSA0000220684790000041
Step 1: calculating single-row through flow
Figure BSA0000220684790000042
It is expressed as the sum of the row vectors of the original adjacency matrix, which is the sum of the traffic from a certain node to all other nodes.
Step 2: calculating dominance
Figure BSA0000220684790000043
The scale condition of the system is described to be mutually constrained, and the advantage shows the flow order and regularity of the materials in the network.
And step 3: computing redundancy
Figure BSA0000220684790000044
The scale condition entropy is expressed, and the larger the redundancy rate is, the more complicated the system is, and the larger the communication quantity is.
And 4, step 4: the system capacity C is calculated as a + θ, representing the scale uncertainty at the overall system level, with the larger the capacity, the larger the network size.
And 5: computing tradition robustness
Figure BSA0000220684790000045
R represents robustness. The equation shows that the ability of a system to evolve or self-organize includes two aspects: it must be able to exert sufficient directional force (advantage) to maintain its integrity over time; at the same time, it must maintain a flexible mobile (redundant) store for coping with disturbing stressesForce.
Step 6: calculating dimensionless node connection quantity
Figure BSA0000220684790000051
Wherein
Figure BSA0000220684790000052
Representing the network mean weight value, MijIs the weight between node i and node j after dimensionless.
And 7: computing selection attack strength
Figure BSA0000220684790000053
Wherein T isiIs the traffic of node i; diThe connectivity of the node i represents the number of nodes which have weight relation with other nodes; i isiN is the number of network nodes in order to select the damage strength to the network, which will be caused when the node i of the network is to be removed.
And 8: computing selection attack stability
Figure BSA0000220684790000054
SiSelecting a stability under attack conditions for a network, SiThe larger the size, the higher the network stability when selecting the attacking node i.
And step 9: computing network stability
Figure BSA0000220684790000055
Indicating the stability of the semblance network.
The above-described embodiments are merely illustrative and not restrictive, and those skilled in the art can now make various changes and modifications without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (6)

1. The method for calculating the stability evaluation index of the similarity weight network based on robustness analysis is applied to the similarity weight complex network, fills the blank of the robustness calculation of the traditional complex network system in the aspect of a weighting network, but the formula involved in the calculation process is not suitable for the calculation of the network stability of the different weight network and the system survivability under the condition of selective attack.
2. Computing with robustness
Figure FSA0000220684780000011
As a revised parameter in the calculation process, the difference in the stability calculation process is magnified.
3. Defining dimensionless node connection volumes
Figure FSA0000220684780000012
Wherein
Figure FSA0000220684780000013
Representing the network mean weight value, MijIs the weight between node i and node j after dimensionless.
4. Defining selection attack strength
Figure FSA0000220684780000014
Wherein T isiIs the traffic of node i; diThe connectivity of the node i represents the number of nodes which have weight relation with other nodes; i isiN is the number of network nodes in order to select the damage strength to the network, which will be caused when the node i of the network is to be removed.
5. Defining selection attack stability
Figure FSA0000220684780000015
SiSelecting a stability under attack conditions for a network, SiThe larger the size, the higher the network stability when selecting the attacking node i.
6. Defining computing network stability
Figure FSA0000220684780000016
Indicating the stability of the network.
CN202011056318.3A 2020-09-30 2020-09-30 Similarity weight network stability evaluation index calculation method based on robustness analysis Pending CN112202611A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011056318.3A CN112202611A (en) 2020-09-30 2020-09-30 Similarity weight network stability evaluation index calculation method based on robustness analysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011056318.3A CN112202611A (en) 2020-09-30 2020-09-30 Similarity weight network stability evaluation index calculation method based on robustness analysis

Publications (1)

Publication Number Publication Date
CN112202611A true CN112202611A (en) 2021-01-08

Family

ID=74008068

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011056318.3A Pending CN112202611A (en) 2020-09-30 2020-09-30 Similarity weight network stability evaluation index calculation method based on robustness analysis

Country Status (1)

Country Link
CN (1) CN112202611A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113452548A (en) * 2021-05-08 2021-09-28 浙江工业大学 Index evaluation method and system for network node classification and link prediction
CN113490267A (en) * 2021-05-18 2021-10-08 浙江传媒学院 Generalized pre-control method for robust stability

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113452548A (en) * 2021-05-08 2021-09-28 浙江工业大学 Index evaluation method and system for network node classification and link prediction
CN113452548B (en) * 2021-05-08 2022-07-19 浙江工业大学 Index evaluation method and system for network node classification and link prediction
CN113490267A (en) * 2021-05-18 2021-10-08 浙江传媒学院 Generalized pre-control method for robust stability
CN113490267B (en) * 2021-05-18 2023-11-07 浙江传媒学院 Generalized pre-control method for robust stability

Similar Documents

Publication Publication Date Title
CN107682195B (en) Communication network robustness evaluation method based on combination of complex network and big data
CN112202611A (en) Similarity weight network stability evaluation index calculation method based on robustness analysis
CN107633263A (en) Network embedding grammar based on side
CN105467839B (en) A kind of multi-agent system under hostile environments convergent control method safely
CN103324850B (en) Twice polycondensation parallel method of finite element two-stage subregion based on multifile stream
CN106960251A (en) A kind of Undirected networks based on node similitude connect side right value Forecasting Methodology
CN104102745A (en) Complex network community mining method based on local minimum edges
CN113422695B (en) Optimization method for improving robustness of topological structure of Internet of things
CN109903853B (en) Double-layer network propagation model construction method based on individual sensitivity and mass media influence
CN106204264A (en) A kind of credit guarantee network risks propagation model construction method
CN111260491B (en) Method and system for discovering network community structure
CN115719186A (en) Regional traffic network toughness assessment method and system
CN105301602A (en) Navigation satellite integrity key point comprehensive identification method based on grey relational degree
CN107133377A (en) Bolted modeling method and device
Yin et al. Splitting iterative methods for fuzzy system of linear equations
CN111815137A (en) Comprehensive assessment method for vulnerability of power system
CN115982374B (en) Multi-view learning entity alignment method and system for dam emergency response knowledge base linkage
CN116628524A (en) Community discovery method based on adaptive graph attention encoder
CN109033746B (en) Protein compound identification method based on node vector
CN107018027B (en) Link prediction method based on Bayesian estimation and common neighbor node degree
CN106533651A (en) Cost-based complex network side attack method under weight changing
CN107274488A (en) A kind of generation method of threedimensional model
Coelho et al. Extinction or coexistence in periodic Kolmogorov systems of competitive type
CN107231252B (en) Link prediction method based on Bayesian estimation and seed node neighbor set
CN105160436A (en) N neighboring Lipschitz supporting surface-based generalized augmented group global optimization method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210108

WD01 Invention patent application deemed withdrawn after publication