scholarly journals Identification of Two Vulnerability Features: A New Framework for Electrical Networks Based on the Load Redistribution Mechanism of Complex Networks

Complexity ◽  
2019 ◽  
Vol 2019 ◽  
pp. 1-14 ◽  
Author(s):  
Xiaoguang Wei ◽  
Shibin Gao ◽  
Tao Huang ◽  
Tao Wang ◽  
Wenli Fan

This paper proposes a new framework to analyze two vulnerability features, impactability and susceptibility, in electrical networks under deliberate attacks based on complex network theory: these two features are overlooked but vital in vulnerability analyses. To analyze these features, metrics are proposed based on correlation graphs constructed via critical paths, which replace the original physical network. Moreover, we analyze the relationship between the proposed metrics according to degree from the perspective of load redistribution mechanisms by adjusting parameters associated with the metrics, which can change the load redistribution rules. Finally, IEEE 118- and 300-bus systems and a realistic large-scale French grid are used to validate the effectiveness of the proposed metrics.

2014 ◽  
Vol 543-547 ◽  
pp. 2953-2956 ◽  
Author(s):  
Sheng Wen Gong

Java is a computer programming language that is class-based, object-oriented, java is, as of 2013, one of the most popular programming languages in use. The Java Development Kit (JDK) is an implementation of java language, which consists of a Java Virtual Machine and all of the java class libraries. There are thousands of classes in the java class libraries, and there are many kinds of relationships between classes. In this paper, we use complex network theory to study the topology of the java class libraries, according to analyzing to the networks feature characters, important classes and interfaces in java class libraries are found, we hope to find the relationship between the characters of complex networks and software reliability.


2014 ◽  
Vol 568-570 ◽  
pp. 1843-1849
Author(s):  
Da Chuan Liu ◽  
Jian Hua Zhang ◽  
Dan Wang ◽  
Hai Nan Li ◽  
Bo Zeng

Owing to more and more people concern about environment issues and reduction of fossil fuels, a growing number of distributed generations (DGs) are being interconnected to the power system. The active distribution network (ADN) provides an effective way to achieve the large scale connection and efficient utilization of them. This paper analyzes the vulnerability performance of active distribution network quantitatively and discusses the impact of DGs on the distribution network transmission efficiency under different grid structure through the application of complex network theory in power system. The example results show that meshed network structure can effectively promoting the consumption of DG and verify the feasibility of applying complex network theory to the distribution network for vulnerability analysis.


2010 ◽  
Vol 37-38 ◽  
pp. 402-406
Author(s):  
Li Sun ◽  
Jun He Yu ◽  
Hong Fei Zhan ◽  
Yi Xu

Starting from the product life cycle, this paper established the modeling of enterprise cluster entity at the base of analyzing the various products of the enterprise cluster. The modeling comprises the process dimension, resource dimension and organization dimension. Every dimension was expressed by the analysis of product view. Then, based on the complex network theory, we obtained the distribution of the products by the product network. Finally, we got the relationship of enterprise cluster entity from the result of the product network.


2016 ◽  
Author(s):  
M. Zanin ◽  
D. Papo ◽  
P. A. Sousa ◽  
E. Menasalvas ◽  
A. Nicchi ◽  
...  

AbstractThe increasing power of computer technology does not dispense with the need to extract meaningful in-formation out of data sets of ever growing size, and indeed typically exacerbates the complexity of this task. To tackle this general problem, two methods have emerged, at chronologically different times, that are now commonly used in the scientific community: data mining and complex network theory. Not only do complex network analysis and data mining share the same general goal, that of extracting information from complex systems to ultimately create a new compact quantifiable representation, but they also often address similar problems too. In the face of that, a surprisingly low number of researchers turn out to resort to both methodologies. One may then be tempted to conclude that these two fields are either largely redundant or totally antithetic. The starting point of this review is that this state of affairs should be put down to contingent rather than conceptual differences, and that these two fields can in fact advantageously be used in a synergistic manner. An overview of both fields is first provided, some fundamental concepts of which are illustrated. A variety of contexts in which complex network theory and data mining have been used in a synergistic manner are then presented. Contexts in which the appropriate integration of complex network metrics can lead to improved classification rates with respect to classical data mining algorithms and, conversely, contexts in which data mining can be used to tackle important issues in complex network theory applications are illustrated. Finally, ways to achieve a tighter integration between complex networks and data mining, and open lines of research are discussed.


2014 ◽  
Vol 2014 ◽  
pp. 1-11 ◽  
Author(s):  
Si-hua Chen ◽  
Wei He

As platform based on users’ relationship to acquire, share, and propagate knowledge, Wechat develops very rapidly and becomes an important channel to spread knowledge. This new way to propagate knowledge is quite different from the traditional media way which enables knowledge to be spread surprisingly in Wechat. Based on complex network theory and the analysis of the factors which influence the knowledge propagation in Wechat, this paper summarizes the behavior preferences of Wechat users in knowledge propagation and establishes a Wechat knowledge propagation model. By the simulation experiment, this paper tests the model established and finds some important thresholds in knowledge propagation in Wechat. The findings are valuable for further studying the knowledge propagation in Wechat and provide theoretical proof for forecasting the scale and influence of knowledge propagation.


2020 ◽  
Vol 12 (15) ◽  
pp. 6267 ◽  
Author(s):  
Jing Liu ◽  
Huapu Lu ◽  
Mingyu Chen ◽  
Jianyu Wang ◽  
Ying Zhang

The layout of the China Comprehensive Transportation Corridors and Hubs (CCTCH), depicted in the 13th Five Year Plan of Transportation, revolves around transport integration and economic globalization. With the aim of improving the sustainability of the entire national transportation system, this paper studies the sustainability of the CCTCH from the perspective of network characteristics and network invulnerability. The topological properties of the CCTCH were quantitatively analyzed, based on graph theory and complex network theory. The relationship between the node degree, betweenness, socioeconomic factors (i.e., GDP, population, GDP per capita) and hub type was explored using correlation analysis. A vulnerability assessment model was developed to investigate the influence of node disruption on the whole network, as well as specific origin–destination paths, and a simulation analysis was conducted to examine the variations in the network performances faced with different attack scenarios. The results show that, among several factors, the hub type has a strong relationship with the node degree and a moderate correlation with GDP. We conclude that the CCTCH is relatively fragile from the viewpoint of network efficiency, and for the purpose of international transportation from the domestic border hubs to the economically developed cities.


2019 ◽  
Vol 10 (3) ◽  
pp. 21-36 ◽  
Author(s):  
Xiaobo Tan ◽  
Ji Tang ◽  
Liting Yu ◽  
Jialu Wang

In this article, the authors present a new novel energy-efficient and fault-tolerant evolution model for large-scale wireless sensor networks based on complex network theory. In the evolution model, not only is the residual energy of each node considered, but also the constraint of links is introduced, which makes the energy consumption of the whole network more balanced. Furthermore, both preferential attachment and random attachment to the evolution model are introduced, which reduces the proportion of the nodes with high degree while keeping scale-free network characteristics to some extent. Theoretical analysis shows that the new model is an extension of the BA model, which is a mixed model between a BA model and a stochastic model. Simulation results show that EFEM has better stochastic network characteristics while keeping scale-free network characteristics if the value of random probability is near 0.2 and it can help to construct a high survivability network for large-scale WSNs.


2014 ◽  
Vol 533 ◽  
pp. 491-494
Author(s):  
Xiao Hong Qin ◽  
Wei Ge

Complex enterprise marketing network is typical scale-free network. Based on the non-uniformity of enterprise marketing network topology, we select pinning control strategy. There are network members for selection a certain percentage to exercise control, to use of virtual control action associated with the coupling between network members, making large-scale enterprise marketing network reaches a steady state. Paper showed that pinning control is effectiveness to control of enterprise marketing for network.


Sign in / Sign up

Export Citation Format

Share Document