CN117294511A - Method for improving damage resistance of infrastructure network and application thereof - Google Patents
Method for improving damage resistance of infrastructure network and application thereof Download PDFInfo
- Publication number
- CN117294511A CN117294511A CN202311347567.1A CN202311347567A CN117294511A CN 117294511 A CN117294511 A CN 117294511A CN 202311347567 A CN202311347567 A CN 202311347567A CN 117294511 A CN117294511 A CN 117294511A
- Authority
- CN
- China
- Prior art keywords
- network
- nodes
- infrastructure
- infrastructure network
- edges
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 230000006378 damage Effects 0.000 title abstract description 7
- 238000010168 coupling process Methods 0.000 claims abstract description 44
- 238000005859 coupling reaction Methods 0.000 claims abstract description 44
- 230000008878 coupling Effects 0.000 claims abstract description 42
- 230000001419 dependent effect Effects 0.000 claims abstract description 13
- 238000004891 communication Methods 0.000 claims abstract description 12
- 238000004088 simulation Methods 0.000 claims abstract description 9
- 230000008569 process Effects 0.000 claims description 8
- 238000012216 screening Methods 0.000 claims description 3
- 238000004458 analytical method Methods 0.000 abstract description 2
- 238000000053 physical method Methods 0.000 abstract description 2
- 238000011161 development Methods 0.000 description 6
- 238000010276 construction Methods 0.000 description 3
- 238000013461 design Methods 0.000 description 3
- 230000015556 catabolic process Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000009792 diffusion process Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000013068 supply chain management Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/142—Network analysis or design using statistical or mathematical methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Algebra (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Probability & Statistics with Applications (AREA)
- Pure & Applied Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a method for improving the survivability of an infrastructure network and application thereof, wherein an infrastructure network model of multiple coupling dependent correlations is constructed; random attack simulation is carried out on the constructed infrastructure network model with multiple coupling dependent correlations, the infrastructure network model after the attack simulation is analyzed, and the optimal cluster size s and the number M of external supporting edges are found; and optimizing the infrastructure network model based on the optimal cluster size s and the number M of external supporting edges. The invention analyzes the established infrastructure network model of the multi-coupling dependent association based on a statistical physical method to find out the influence of different cluster sizes s and the number M of external supporting edges on the system destruction resistance. Analysis of infrastructure network survivability may provide a hint for designing a more resilient reality dependent system. And can be used for improving the survivability and stability of infrastructure network systems such as a power system, a traffic system, a communication network and the like, and has wide application prospect.
Description
Technical Field
The invention relates to the field of multi-layer network reliability, in particular to a method for improving the survivability of an infrastructure network and application thereof.
Background
In recent years, the rapid development of smart city construction has increased the demand for power networks. Various intelligent devices, sensors and systems in smart cities have higher requirements for stable and reliable power supply, which requires power networks to be extended and upgraded to meet the ever-increasing power demands. Meanwhile, the development of communication networks is also promoted by the construction of smart cities. Smart devices, sensors and systems require high-speed and reliable communication networks for data transmission and interconnection. Therefore, the communication network needs to be expanded and optimized to meet the interconnection requirements of large-scale intelligent devices, including increasing network bandwidth, improving network coverage, and improving reliability and security of the network. In addition, smart city construction has also facilitated the convergence of power and communication networks. The power network may utilize the infrastructure of the communication network to enable monitoring and control of the smart grid to improve the efficiency and sustainability of the power system. Meanwhile, the communication network can also provide more intelligent services and solutions for the smart city through integration with the power network.
With the rapid development of the smart city process, the coupling and the dependency relationship between the power network and the communication network are gradually strengthened, and the original system boundary is gradually blurred and broken, so that the interaction between the systems is gradually frequent, complex and changeable. While the mutual coupling communication among complex network systems enables the functionality of the network systems to be exerted to a greater extent, the interdependence relationship enables the faults to generate cascade sub-link diffusion when the systems are damaged and disturbed to different degrees, so that risks overflow and spread to the whole system. Once the connectivity of the entire system is broken, immeasurable damage will be caused. Thus, in the face of these challenges, improving the survivability of the network is of great importance. This may ensure reliability and connectivity of communications, as in communication networks, while it helps to ensure smoothness of logistics transportation and stability of supply chains in logistics and supply chain management.
In summary, there is a need to enhance the reliability of the system, reduce risks, increase the working efficiency and provide continued service by increasing the survivability of the network.
Disclosure of Invention
In order to solve the defects in the prior art, the application provides a method for improving the survivability of an infrastructure network and application thereof, and aims of improving the survivability, the reliability, the stability and the like of the system by optimizing the infrastructure network with multiple coupling dependent correlations.
The technical scheme adopted by the invention is as follows:
a method of improving the survivability of an infrastructure network, comprising the steps of:
s1, constructing an infrastructure network model of multiple coupling dependent correlations;
s2, carrying out random attack simulation on the infrastructure network model with multiple coupling dependency correlations constructed in the S1, analyzing the infrastructure network model after attack simulation, and searching the optimal cluster size S and the number M of external supporting edges;
and S3, optimizing the infrastructure network model based on the optimal cluster size S and the number M of the external supporting edges obtained in the step S2.
Further, the infrastructure network model is expressed as:
G=(A,B,V)
wherein, A and B are both undirected and unauthorized networks; network a is denoted as (V A ,E A ),V A Representing a set of all nodes in network A, E A Representing a set of all edges in network a; network B is denoted as (V B ,E B ),V B Representing a set of all nodes in the network, E B Representing a set of all edges in network B; v is a set of nodes of network a and network B; the node number of the network A is N A The node number of the network B is N B Network B has the same number of nodes as network a, i.e., N A =N B ;
In the coupling network composed of the networks A and B, a coupling connection edge exists between the network A and the network B, and the coupling connection edge has dependence.
Further, the process of S2 is as follows:
s2.1, when the infrastructure network model is attacked, the attacked node and the coupled node also fail; disconnecting the edges of all the fault nodes and the neighbor nodes thereof, and deleting all the fault nodes from the coupling network and the self network;
s2.2, initializing the number M of external support edges and the cluster size S, and screening out functional nodes from the networks A and B deleted fault nodes based on the M and the S respectively;
s2.3, continuously adjusting the cluster size S and the number M of external supporting edges, and comparing the failure rates of different networks; and aiming at reducing the failure rate of the network, searching the optimal cluster size s and the number M of external supporting edges.
Further, the process of S2.2 is as follows:
for the network A and the network B of the deleted fault node, firstly carrying out cluster division on the rest nodes, and obtaining the number of nodes in each cluster, if the number of the nodes in the divided cluster is lower than the cluster size s, deleting the cluster;
for the nodes in the rest clusters, if the number of the external supporting edges corresponding to the nodes in the rest clusters is smaller than M, deleting the nodes;
the final remaining nodes are functional nodes.
Further, the method for optimizing the infrastructure network model in S3 includes:
the functional nodes of the infrastructure network model require at least M external support edges;
the functional nodes need to be in local s clusters or more.
Further, the proportion of the active nodes having M external support edges at the nth step is expressed as follows:
wherein,the ratio of the nodes of the network A, B having at least M effective support links in the n phase; p is the ratio of the residual nodes of the initial network under attack, and 1-p is the initial networkThe proportion of nodes which are attacked and fail by the network; />Respectively representing the probability that a node in the coupled network has at least M valid support links from the B and a networks in the nth phase;respectively representing the probability that a node in the coupled network has at least M-1 valid support links from the B and a networks in the nth phase; k (K) A 、K B The average degree of the connecting edges supported by the network A and the network B in the coupling network and the average degree of the connecting edges supported by the network B and the network A in the coupling network are respectively; p (P) A (K A )、P B (K B ) The degree distribution of the connecting edge supported by the network A to the network B in the coupling network is respectively that of the connecting edge supported by the network B to the network A; />The effective node ratios in the network A, B, respectively.
Further, the proportion of the active nodes in the cluster with the local network being s or more in the nth step is expressed as follows:
wherein,the ratio of the functional nodes in the local s cluster is greater than or equal to that of the network A, B in the invalid nth step; />The ratio of nodes belonging to a component of size s relative to surviving nodes in network A, B, respectively +.>Is a ratio of (3);<k A >、<k B >average degree of network A, B, respectively; x represents the probability of the edge connection state; h (x) is a generating function of the overrun distribution; g 0 (x) G is a generating function of the network 0 ' the term (1) is the average degree of the network.
Further, the functional node ratio at the nth step is expressed as follows:
wherein,the network A, B has a proportion of nodes in the cluster s that are functional nodes at the nth step of failure and have at least M external support edges, respectively.
An infrastructure network is built by adopting the method.
The invention has the beneficial effects that:
(1) The invention improves the survivability of the network system by simulating the proportion of the functional nodes in the residual network when the infrastructure network with the multi-coupling dependent association under different conditions suffers random attack.
(2) The invention provides an accurate analysis expression of the proportion of the functional nodes in the cascade fault process and the stable state, and discovers that the system can have sudden phase change behavior after initial fault, and discovers that when the system needs more effective external supporting edges, more internal connection density is needed to avoid breakdown. The invention also analyzes the established infrastructure network model with multiple coupling dependent correlations based on a statistical physical method to find out the influence of different cluster sizes and the number of external supporting edges on the system destruction resistance, thereby optimizing the infrastructure network model and further improving the infrastructure network destruction resistance.
(3) The method for improving the network destruction resistance of the infrastructure is expected to provide a hint for designing a more elastic reality dependent system. The technology has wide application prospect, and can be used for improving the survivability and stability of the network system between smart cities.
Drawings
Fig. 1 is a schematic diagram of a method for evaluating the survivability of an infrastructure network according to an embodiment of the present invention.
Fig. 2 is a graph of the remaining valid node proportions of different M and s under an initial attack.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
A method of improving the survivability of an infrastructure network, comprising the steps of:
s1, constructing an infrastructure network model of multiple coupling dependent correlations, which is specifically as follows:
referring first to fig. 1, an infrastructure network of multiple coupling dependent associations is built based on two networks a and B, the infrastructure network model being represented as:
G=(A,B,V)
wherein, A and B are both undirected and unauthorized networks; network a is denoted as (V A ,E A ),V A Representing a set of all nodes in network A, E A Representing a set of all edges in network a; network B is denoted as (V B ,E B ),V B Representing a set of all nodes in the network, E B Representing a set of all edges in network B; v is a set of nodes of network a and network B; the node number of the network A is N A The node number of the network B is N B Network B has the same number of nodes as network a, i.e., N A =N B 。
In the coupling network composed of the networks A and B, the coupling connection edge between the networks A and B is represented by a set E, one coupling connection edge is formed by connecting a randomly selected node of one network A with a node in the network B, each coupling connection edge can only be connected with one node in the network A or B, and the coupling connection edge obeys Poisson distribution; because the coupling edge has dependence, if one end node of the coupling edge fails, the other end node also fails.
S2, performing attack simulation on the infrastructure network model with the multiple coupling dependent correlations constructed in the S1, analyzing the infrastructure network model after the attack simulation, and searching the optimal cluster size S and the number M of external supporting edges.
The process of attack simulation is as follows:
s2.1, in the infrastructure network model, any node in any network is attacked, and the node which is attacked and has faults is deleted. With reference to fig. 1, it is assumed that a node pointed by an arrow in a network a fails to become a failed node, and in a coupling network formed by the network a and a network B, due to the dependency characteristic, a corresponding node in the network B coupled to the failed node in the network a also fails; and disconnecting the edges of all the fault nodes and the neighbor nodes in the own networks of the network A and the network B respectively, and deleting all the fault nodes from the coupling network and the own network.
S2.2, screening out functional nodes from networks A and B of deleting the fault node from the S2.1. The method comprises the following steps:
for the network A with the fault nodes deleted, counting the degree value k of each remaining node in the network A in the coupling network Ai The degree value is equal to the number of external support edges at the remaining nodes;
for the network B with the fault node deleted, counting the degree value k of each remaining node in the network B in the network itself in the coupling network Bi The degree value is equal to the number of external support edges at the remaining nodes;
carrying out cluster division on the rest nodes, and obtaining the number of nodes in each cluster; setting a cluster size s in a cluster, and deleting the cluster if the number of nodes in the divided cluster is lower than the cluster size s;
and setting the number M of the external supporting edges corresponding to the nodes for the nodes in the rest clusters, and deleting the nodes if the number M of the external supporting edges corresponding to the nodes in the rest clusters is smaller than M.
After the processing, the final remaining nodes are functional nodes.
S2.3, adjusting the cluster size S and the number M of external supporting edges, and comparing failure rates of different networks; and aiming at reducing the failure rate of the network, searching the optimal cluster size s and the number M of external supporting edges.
And S3, optimizing the infrastructure network model based on the optimal cluster size S and the number M of the external supporting edges obtained in the step S2. In particular, the method comprises the steps of,
1. the functional node of the infrastructure network model needs at least M external support edges, and the proportion of the effective node having M external support edges at the nth step is expressed as follows:
wherein,the ratio of the nodes of the network A, B having at least M effective support links in the n phase; p is the ratio of the rest nodes of the initial network under attack, and 1-p is the ratio of the invalid nodes of the initial network under attack; />Respectively representing the probability that a node in the coupled network has at least M valid support links from the B and a networks in the nth phase;respectively representing the probability that a node in the coupled network has at least M-1 valid support links from the B and a networks in the nth phase; k (K) A 、K B The average degree of the connecting edges of the network A (B) and the network B (A) in the coupling network is respectively supported; p (P) A (K A )、P B (K B ) The degree distribution of the connecting edge is supported by the network A (B) to the network B (A) in the coupling network respectively; />The effective node ratios in the network A, B, respectively.
2, the proportion of the functional nodes in the local clusters with the size of s or more in the nth step and the clusters with the size of s or more in the local network is expressed as follows:
wherein,the ratio of the functional nodes in the local s cluster is greater than or equal to that of the network A, B in the invalid nth step; />The ratio of nodes belonging to a component of size s relative to surviving nodes in network A, B, respectively +.>Is a ratio of (3);<k A >、<k B >average degree of network A, B, respectively; x represents the probability of the edge connection state; h (x) is a generating function of the overrun distribution; g 0 (x) G is a generating function of the network 0 ' the term (1) is the average degree of the network.
3. The functional node needs to be a node which is in the local network and is more than or equal to the cluster s and has at least M external supporting edges; as shown in fig. 2, the functional node ratio at the nth step is represented as follows:
wherein,the network A, B has a proportion of nodes in the cluster s that are functional nodes at the nth step of failure and have at least M external support edges, respectively.
As shown in fig. 1 (d). The whole network fault process is analyzed, so that the coupling density inside the network, namely between networks, is increased, and the number of network node faults is reduced; and the critical points of the network can be determined to help design and optimize the network structure, thereby improving the stability and survivability of the network. In addition, the identification of critical points can also help to predict the failure condition of the network, and measures are taken in time to avoid the breakdown of the network, so that the reliability and the safety of the network are protected.
In the present embodiment, in order to improve the survivability of the infrastructure, the selection of the cluster s and the number M of external supporting edges is optimized, and these factors are closely related to the failure rate of the network. In particular, we observe that as the cluster size s and the number of external support edges M increases, the failure rate of the network increases significantly, indicating the importance of these two parameters to destructiveness. Furthermore, we have found that when the cluster size s and the number of external support edges M remain constant, the increase in the inter-network connection density results in a slow failure rate. Successful development and practical application of this technology will provide a new and effective way for the protection and sustainable development of infrastructure networks, thus making an important contribution to the security and sustainability of society. Therefore, the invention has wide application prospect and can bring obvious influence to the technical development and social welfare of the related fields.
The above embodiments are merely for illustrating the design concept and features of the present invention, and are intended to enable those skilled in the art to understand the content of the present invention and implement the same, the scope of the present invention is not limited to the above embodiments. Therefore, all equivalent changes or modifications according to the principles and design ideas of the present invention are within the scope of the present invention.
Claims (10)
1. A method of improving the survivability of an infrastructure network, comprising the steps of:
s1, constructing an infrastructure network model of multiple coupling dependent correlations;
s2, carrying out random attack simulation on the infrastructure network model with multiple coupling dependency correlations constructed in the S1, analyzing the infrastructure network model after attack simulation, and searching the optimal cluster size S and the number M of external supporting edges;
and S3, optimizing the infrastructure network model based on the optimal cluster size S and the number M of the external supporting edges obtained in the step S2.
2. A method of improving the survivability of an infrastructure network as claimed in claim 1, wherein the infrastructure network model is expressed as:
G=(A,B,V)
wherein, A and B are both undirected and unauthorized networks; network a is denoted as (V A ,E A ),V A Representing a set of all nodes in network A, E A Representing a set of all edges in network a; network B is denoted as (V B ,E B ),V B Representing a set of all nodes in the network, E B Representing a set of all edges in network B; v is a set of nodes of network a and network B; the node number of the network A is N A The node number of the network B is N B Network B has the same number of nodes as network a, i.e., N A =N B ;
In the coupling network composed of the networks A and B, a coupling connection edge exists between the network A and the network B, and the coupling connection edge has dependence.
3. A method of improving the survivability of an infrastructure network as claimed in claim 2, wherein the process of S2 is as follows:
s2.1, when the infrastructure network model is attacked, the attacked node and the coupled node also fail; disconnecting the edges of all the fault nodes and the neighbor nodes thereof, and deleting all the fault nodes from the coupling network and the self network;
s2.2, initializing the number M of external support edges and the cluster size S, and screening out functional nodes from the networks A and B deleted fault nodes based on the M and the S respectively;
s2.3, continuously adjusting the cluster size S and the number M of external supporting edges, and comparing the failure rates of the networks under different M and S; and aiming at reducing the failure rate of the network, searching the optimal cluster size s and the number M of external supporting edges.
4. A method of improving the survivability of an infrastructure network according to claim 3, wherein the process of S2.2 is as follows:
for the network A and the network B of the deleted fault node, firstly carrying out cluster division on the rest nodes, and obtaining the number of nodes in each cluster, if the number of the nodes in the divided cluster is lower than the number s of the nodes, deleting the cluster;
for the nodes in the rest clusters, if the number of the external supporting edges corresponding to the nodes in the rest clusters is smaller than M, deleting the nodes;
the final remaining nodes are functional nodes.
5. The method of claim 4, wherein the optimizing the infrastructure network model in S3 comprises:
the functional nodes of the infrastructure network model require at least M external support edges;
the functional nodes need to be in local s clusters or more.
6. A method of improving the survivability of an infrastructure network as defined in claim 5, wherein the proportion of M external support edges owned by the active node at step n is as follows:
wherein,the ratio of the nodes of the network A, B having at least M effective support links in the n phase; p is the ratio of the rest nodes of the initial network under attack, and 1-p is the ratio of the invalid nodes of the initial network under attack; />Respectively representing the probability that a node in the coupled network has at least M valid support links from the B and a networks in the nth phase;respectively representing the probability that a node in the coupled network has at least M-1 valid support links from the B and a networks in the nth phase; k (K) A 、K B The average degree of the connecting edges supported by the network A and the network B in the coupling network and the average degree of the connecting edges supported by the network B and the network A in the coupling network are respectively; p (P) A (K A )、P B (K B ) The degree distribution of the connecting edge supported by the network A to the network B in the coupling network is respectively that of the connecting edge supported by the network B to the network A; />The effective node ratios in the network A, B, respectively.
7. A method of improving the survivability of an infrastructure network as claimed in claim 5, wherein the proportion of active nodes in the local network at s or more in step n is represented as follows:
wherein,the ratio of the functional nodes in the local s cluster is greater than or equal to that of the network A, B in the invalid nth step; />The ratio of nodes belonging to a component of size s relative to surviving nodes in network A, B, respectively +.>Is a ratio of (3);<k A >、<k B >average degree of network A, B, respectively; x represents the probability of the edge connection state; h (x) is a generating function of the overrun distribution; g 0 (x) G is a generating function of the network 0 ' the term (1) is the average degree of the network.
8. A method of improving the survivability of an infrastructure network as claimed in claim 5, wherein the ratio of the functional nodes at step n is represented as follows:
wherein,the network A, B has a proportion of nodes in the cluster s that are functional nodes at the nth step of failure and have at least M external support edges, respectively.
9. An infrastructure network constructed using a method of improving the survivability of an infrastructure network as claimed in claim 1.
10. Use of an infrastructure network according to claim 9, wherein the infrastructure network is applied to a coupling system of a power system and a communication system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311347567.1A CN117294511A (en) | 2023-10-18 | 2023-10-18 | Method for improving damage resistance of infrastructure network and application thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311347567.1A CN117294511A (en) | 2023-10-18 | 2023-10-18 | Method for improving damage resistance of infrastructure network and application thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117294511A true CN117294511A (en) | 2023-12-26 |
Family
ID=89247946
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311347567.1A Pending CN117294511A (en) | 2023-10-18 | 2023-10-18 | Method for improving damage resistance of infrastructure network and application thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117294511A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118096478A (en) * | 2024-04-23 | 2024-05-28 | 深圳市城市交通规划设计研究中心股份有限公司 | Key traffic infrastructure identification method based on multidimensional index dynamic analysis |
-
2023
- 2023-10-18 CN CN202311347567.1A patent/CN117294511A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118096478A (en) * | 2024-04-23 | 2024-05-28 | 深圳市城市交通规划设计研究中心股份有限公司 | Key traffic infrastructure identification method based on multidimensional index dynamic analysis |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fu et al. | Tolerance analysis of cyber-manufacturing systems to cascading failures | |
CN117294511A (en) | Method for improving damage resistance of infrastructure network and application thereof | |
CN113190939B (en) | Large sparse complex network topology analysis and simplification method based on polygon coefficient | |
Bancal et al. | Steady-state dynamics of the forest fire model on complex networks | |
Fu et al. | Analysis on invulnerability of wireless sensor network towards cascading failures based on coupled map lattice | |
CN105183957A (en) | Robustness analysis method for avionics system | |
CN112312444A (en) | Resource backup method under 5G network slice | |
Peng et al. | Reliability analysis of CPS systems under different edge repairing strategies | |
Darwish et al. | An adaptive cellular automata scheme for diagnosis of fault tolerance and connectivity preserving in wireless sensor networks | |
Wang et al. | Analysis on cascading robustness of energy-balanced scale-free wireless sensor networks | |
Wang et al. | A link addition method based on uniformity of node degree in interdependent power grids and communication networks | |
CN105703957A (en) | Robustness calculating method of aviation electrical network system | |
Zhu et al. | Expanding a complex networked system for enhancing its reliability evaluated by a new efficient approach | |
CN108965287B (en) | Virus propagation control method based on limited temporary edge deletion | |
CN102325052B (en) | Optical network multi-fault tolerant method | |
CN113282881B (en) | Electric power information physical system robustness analysis method based on reachable matrix | |
Li-jun et al. | Evolution of wireless sensor network | |
Yang et al. | Enhancing coupled networks robustness via removing Key fragile dependency links | |
Yang et al. | Data center networks recovery for large-scale disasters in optical cloud networks | |
Guo et al. | Topology optimization for blockchain networks | |
Xu et al. | Survivability Analysis and Optimization of Dependent Networks Based on Natural Connectivity | |
CN107426762B (en) | Node message forwarding method for network load balancing | |
Gao et al. | K-extended constrain independent relay node placement with base stations in two-tiered wireless sensor network | |
CN112260873B (en) | Dynamic network fault diagnosis method under 5G network slice | |
Luo et al. | Critical node identification of power wireless private communication network based on complex network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |