首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 343 毫秒
1.
胡斌  黎放  周厚顺 《中国物理快报》2009,26(12):253-256
To study the robustness of complex networks under attack and repair, we introduce a repair model of complex networks. Based on the model, we introduce two new quantities, i.e. attack fraction fa and the maximum degree of the nodes that have never been attacked ~Ka, to study analytically the critical attack fraction and the relative size of the giant component of complex networks under attack and repair, using the method of generating function. We show analytically and numerically that the repair strategy significantly enhances the robustness of the scale-free network and the effect of robustness improvement is better for the scale-free networks with a smaller degree exponent. We discuss the application of our theory in relation to the
understanding of robustness of complex networks with reparability.  相似文献   

2.
In this study, the robustness of small-world networks to three types of attack is investigated. Global efficiency is introduced as the network coefficient to measure the robustness of a small-world network. The simulation results prove that an increase in rewiring probability or average degree can enhance the robustness of the small-world network under all three types of attack. The effectiveness of simultaneously increasing both rewiring probability and average degree is also studied, and the combined increase is found to significantly improve the robustness of the small-world network.Furthermore, the combined effect of rewiring probability and average degree on network robustness is shown to be several times greater than that of rewiring probability or average degree individually. This means that small-world networks with a relatively high rewiring probability and average degree have advantages both in network communications and in good robustness to attacks. Therefore, simultaneously increasing rewiring probability and average degree is an effective method of constructing realistic networks. Consequently, the proposed method is useful to construct efficient and robust networks in a realistic scenario.  相似文献   

3.
We study tolerance and topology of random scale-free networks under attack and defense strategies that depend on the degree k of the nodes. This situation occurs, for example, when the robustness of a node depends on its degree or in an intentional attack with insufficient knowledge of the network. We determine, for all strategies, the critical fraction p(c) of nodes that must be removed for disintegrating the network. We find that, for an intentional attack, little knowledge of the well-connected sites is sufficient to strongly reduce p(c). At criticality, the topology of the network depends on the removal strategy, implying that different strategies may lead to different kinds of percolation transitions.  相似文献   

4.
Two-peak and three-peak optimal complex networks   总被引:1,自引:0,他引:1  
A central issue in complex networks is tolerance of random failures and intentional attacks. Current literature emphasizes the dichotomy between networks with a power-law node connectivity distribution, which are robust to random failures but fragile to targeted attacks, versus networks with an exponentially decaying connectivity distribution, which are less tolerant to failures but more resilient to attacks. We prove analytically that the optimal network configuration under a classic measure of robustness is altogether different from both of the above: in all cases, failure and/or attack, there are no more than three distinct node connectivities in the optimal network.  相似文献   

5.
Yongxiang Xia  Jin Fan 《Physica A》2010,389(6):1281-4570
In this paper, we study the cascading failure in Watts-Strogatz small-world networks. We find that this network model has a heterogeneous betweenness distribution, although its degree distribution is homogeneous. Further study shows that this small-world network is robust to random attack but fragile to intentional attack, in the cascading failure scenario. With comparison to standard random graph and scale-free networks, our result indicates that the robust yet fragile property in the cascading failure scenario is mainly related to heterogeneous betweenness, rather than the network degree distribution. Thus, it suggests that we have to be very careful when we use terms such as homogeneous network and heterogeneous network, unless the distribution we refer to is specified.  相似文献   

6.
一种全局同质化相依网络耦合模式   总被引:2,自引:0,他引:2       下载免费PDF全文
高彦丽  陈世明 《物理学报》2016,65(14):148901-148901
相依网络的相依模式(耦合模式)是影响其鲁棒性的重要因素之一.本文针对具有无标度特性的两个子网络提出一种全局同质化相依网络耦合模式.该模式以子网络的总度分布均匀化为原则建立相依网络的相依边,一方面压缩度分布宽度,提高其对随机失效的抗毁性,另一方面避开对度大节点(关键节点)的相依,提高其对蓄意攻击的抗毁性.论文将其与常见的节点一对一的同配、异配及随机相依模式以及一对多随机相依模式作了对比分析,仿真研究其在随机失效和蓄意攻击下的鲁棒性能.研究结果表明,本文所提全局同质化相依网络耦合模式能大大提高无标度子网络所构成的相依网络抗级联失效能力.本文研究成果能够为相依网络的安全设计等提供指导意义.  相似文献   

7.
We analyze the correlation properties of the Erdos-Rényi random graph (RG) and the Barabási-Albert scale-free network (SF) under the attack and repair strategy with detrended fluctuation analysis (DFA). The maximum degree k representing the local property of the system, shows similar scaling behaviors for random graphs and scale-free networks. The fluctuations are quite random at short time scales but display strong anticorrelation at longer time scales under the same system size N and different repair probability pre. The average degree , revealing the statistical property of the system, exhibits completely different scaling behaviors for random graphs and scale-free networks. Random graphs display long-range power-law correlations. Scale-free networks are uncorrelated at short time scales; while anticorrelated at longer time scales and the anticorrelation becoming stronger with the increase of pre.  相似文献   

8.
There has been a considerable amount of interest in recent years on the robustness of networks to failures. Many previous studies have concentrated on the effects of node and edge removals on the connectivity structure of a static network; the networks are considered to be static in the sense that no compensatory measures are allowed for recovery of the original structure. Real world networks such as the world wide web, however, are not static and experience a considerable amount of turnover, where nodes and edges are both added and deleted. Considering degree-based node removals, we examine the possibility of preserving networks from these types of disruptions. We recover the original degree distribution by allowing the network to react to the attack by introducing new nodes and attaching their edges via specially tailored schemes. We focus particularly on the case of non-uniform failures, a subject that has received little attention in the context of evolving networks. Using a combination of analytical techniques and numerical simulations, we demonstrate how to preserve the exact degree distribution of the studied networks from various forms of attack.  相似文献   

9.
Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erd?s-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.  相似文献   

10.
With the requirements of users enhanced for wireless communication,the cooperative communication will become a development trend in future.In this paper,a model based on complex networks with both preferential attachment is researched to solve an actual network CCN(Cooperative Communication Network).Firstly,the evolution of CCN is given by four steps with different probabilities.At the same time,the rate equations of nodes degree are presented to analyze the evolution of CCN.Secondly,the degree distribution is analyzed by calculating the rate equation and numerical simulation.Finally,the robustness of CCN is studied by numerical simulation with random attack and intentional attack to analyze the effects of degree distribution and average path length.The results of this paper are more significant for building CCN to programme the resource of communication.  相似文献   

11.
手机短信网络的生长过程研究   总被引:5,自引:0,他引:5       下载免费PDF全文
模拟了短信网络的生长过程并研究其拓扑结构.发现短信网络在生长过程中,度分布、节点的度与其加入网络时间的关系、平均度随时间的变化等方面与先前的模型有所不符.根据短信网络的数据分析,提出了短信网络的生长机制——局部优先连接机制.结果表明,模拟以短信网络为代表的实际网络时,局部优先连接模型优于其他网络模型. 关键词: 复杂网络 短信网络 局部优先连接  相似文献   

12.
苑卫国  刘云  程军军  熊菲 《物理学报》2013,62(3):38901-038901
根据新浪微博的实际数据, 建立了两个基于双向“关注”的用户关系网络, 通过分析网络拓扑统计特征, 发现二者均具有小世界、无标度特征. 通过对节点度、紧密度、介数和k-core 四个网络中心性指标进行实证分析, 发现节点度服从分段幂率分布; 介数相比其他中心性指标差异性最为显著; 两个网络均具有明显的层次性, 但不是所有度值大的节点核数也大; 全局范围内各中心性指标之间存在着较强的相关性, 但在度值较大的节点群这种相关性明显减弱. 此外, 借助基于传染病动力学的SIR信息传播模型来分析四种指标在刻画节点传播能力方面的差异性, 仿真结果表明, 选择具有不同中心性指标的初始传播节点, 对信息传播速度和范围均具有不同影响; 紧密度和k-core较其他指标可以更加准确地描述节点在信息传播中所处的网络核心位置, 这有助于识别信息传播拓扑网络中的关键节点.  相似文献   

13.
We introduce a novel model for robustness of complex with a tunable attack information parameter. The random failure and intentional attack known are the two extreme cases of our model. Based on the model, we study the robustness of complex networks under random information and preferential information, respectively. Using the generating function method, we derive the exact value of the critical removal fraction of nodes for the disintegration of networks and the size of the giant component. We show that hiding just a small fraction of nodes randomly can prevent a scale-free network from collapsing and detecting just a small fraction of nodes preferentially can destroy a scale-free network.  相似文献   

14.
A maximum entropy (ME) method to generate typical scale-free networks has been recently introduced. We investigate the controllability of ME networks and Barabási–Albert preferential attachment networks. Our experimental results show that ME networks are significantly more easily controlled than BA networks of the same size and the same degree distribution. Moreover, the control profiles are used to provide insight into control properties of both classes of network. We identify and classify the driver nodes and analyze the connectivity of their neighbors. We find that driver nodes in ME networks have fewer mutual neighbors and that their neighbors have lower average degree. We conclude that the properties of the neighbors of driver node sensitively affect the network controllability. Hence, subtle and important structural differences exist between BA networks and typical scale-free networks of the same degree distribution.  相似文献   

15.
Optimization of robustness and connectivity in complex networks   总被引:2,自引:0,他引:2  
Scale-free networks rely on a relatively small number of highly connected nodes to achieve a high degree of interconnectivity and robustness to random failure, but suffer from a high sensitivity to directed attack. In this paper we describe a parameterized family of networks and analyze their connectivity and sensitivity, identifying a network that has an interconnectedness closer to that of a scale-free network, a robustness to attack closer to that of an exponential network, and a resistance to failure better than that of either of those networks.  相似文献   

16.
武喜萍  杨红雨  韩松臣 《物理学报》2016,65(14):140203-140203
为提高空管技术保障系统应对突发事件的能力,本文以空管技术保障系统导航、通信、监视设备覆盖的航路结构为基础,构建系统对应的空间网络模型.提出从灵活性、鲁棒性、高效性三个方面度量空管技术保障系统网络特性,对北京、上海、广州、昆明、沈阳、兰州飞行情报区的空管技术保障系统网络的平均度、度分布、度-度相关性、聚集系数、平均路径长度、直径等进行分析.分析结果显示,各飞行情报区空管技术保障系统的平均聚集系数在0.25—0.39之间,网络聚集程度偏低;网络平均路径长度为3.4,表现出小世界网络特征;度值3时服从幂律分布,度-度分布不表现出正相关或负相关.对网络进行基于度优先的和随机的抗毁性测度,空管技术保障系统网络抗毁性较差,网络的可靠性由少数核心节点决定,应对核心节点进行目标免疫,提高网络的抗毁性.这些规律为空管技术保障系统能力提升、新建扩建提供理论依据,对降低突发事件对空管系统保障能力的影响,保障空中交通持续安全具有现实意义.  相似文献   

17.
We propose a metric for vulnerability of labeled graphs that has the following two properties: (1) when the labeled graph is considered as an unlabeled one, the metric reduces to the corresponding metric for an unlabeled graph; and (2) the metric has the same value for differently labeled fully connected graphs, reflecting the notion that any arbitrarily labeled fully connected topology is equally vulnerable as any other. A vulnerability analysis of two real-world networks, the power grid of the European Union, and an autonomous system network, has been performed. The networks have been treated as graphs with node labels. The analysis consists of calculating characteristic path lengths between labels of nodes and determining largest connected cluster size under two node and edge attack strategies. Results obtained are more informative of the networks’ vulnerability compared to the case when the networks are modeled with unlabeled graphs.  相似文献   

18.
屈静  王圣军 《物理学报》2015,64(19):198901-198901
在具有网络结构的系统中度关联属性对于动力学行为具有重要的影响, 所以产生适当度关联网络的方法对于大量网络系统的研究具有重要的作用. 尽管产生正匹配网络的方法已经得到很好的验证, 但是产生反匹配网络的方法还没有被系统的讨论过. 重新连接网络中的边是产生度关联网络的一个常用方法. 这里我们研究使用重连方法产生反匹配无标度网络的有效性. 我们的研究表明, 有倾向的重连可以增强网络的反匹配属性. 但是有倾向重连不能使皮尔森度相关系数下降到-1, 而是存在一个依赖于网络参数的最小值. 我们研究了网络的主要参数对于网络度相关系数的影响, 包括网络尺寸, 网络的连接密度和网络节点的度差异程度. 研究表明在网络尺寸大的情况下和节点度差异性强的情况下, 重连的效果较差. 我们研究了真实Internet网络, 发现模型产生的网络经过重连不能达到真实网络的度关联系数.  相似文献   

19.
Small-world and scale-free networks are known to be more easily synchronized than regular lattices, which is usually attributed to the smaller network distance between oscillators. Surprisingly, we find that networks with a homogeneous distribution of connectivity are more synchronizable than heterogeneous ones, even though the average network distance is larger. We present numerical computations and analytical estimates on synchronizability of the network in terms of its heterogeneity parameters. Our results suggest that some degree of homogeneity is expected in naturally evolved structures, such as neural networks, where synchronizability is desirable.  相似文献   

20.
Using very symmetric graphs we generalize several deterministic self-similar models of complex networks and we calculate the main network parameters of our generalization. More specifically, we calculate the order, size and the degree distribution, and we give an upper bound for the diameter and a lower bound for the clustering coefficient. These results yield conditions under which the network is a self-similar and scale-free small world network. We remark that all these conditions are posed on a small base graph which is used in the construction. As a consequence, we can construct complex networks having prescribed properties. We demonstrate this fact on the clustering coefficient. We propose eight new infinite classes of complex networks. One of these new classes is so rich that it is parametrized by three independent parameters.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号