期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
基于回溯机制的互联网AS拓扑的Betweenness算法 被引量:7
1
作者 张国强 张国清 《计算机研究与发展》 EI CSCD 北大核心 2006年第10期1790-1796,共7页
Betweenness能够刻画节点或边在网络中的重要程度.在Internet中,Betweenness直接反应了特定网络拓扑结构下节点或链路可能承载的网络流量,能够对网络的动态行为进行预测.但传统的Be-tweenness计算复杂度较高,为O(n3),但这些算法是为加... Betweenness能够刻画节点或边在网络中的重要程度.在Internet中,Betweenness直接反应了特定网络拓扑结构下节点或链路可能承载的网络流量,能够对网络的动态行为进行预测.但传统的Be-tweenness计算复杂度较高,为O(n3),但这些算法是为加权网络设计的,而很多实际的网络模型并没有考虑权重.另一方面,目前的算法都没有考虑边的语义,而互联网AS(autonomoussystem)拓扑中的边具有语义.针对简单无权网络提出一种基于回溯的时间复杂度为O(nm)的Betweenness计算方法.在进一步考虑InternetAS拓扑的特殊性,即任意两个相连的AS都具有某种商业关系的基础上提出了互联网AS层拓扑的Betweenness计算方法. 展开更多
关键词 betweenness 自治系统 网络拓扑 路由策略
下载PDF
基于流量加权Betweenness提高网络容量的方法 被引量:3
2
作者 范晶 张国强 张国清 《系统仿真学报》 EI CAS CSCD 北大核心 2008年第17期4708-4711,4715,共5页
在节点的发包速率和转发包速率都和节点度相关的流量模型中,研究了在基于跳数的最短路径路由策略下网络的容量问题。将Betweenness的概念进行了扩展,提出流量加权Betweenness的概念,使之更准确地描述在每个节点的发包速率各不相同的情... 在节点的发包速率和转发包速率都和节点度相关的流量模型中,研究了在基于跳数的最短路径路由策略下网络的容量问题。将Betweenness的概念进行了扩展,提出流量加权Betweenness的概念,使之更准确地描述在每个节点的发包速率各不相同的情况下节点可能承载的流量。并据此推导出适合于该流量模型的网络容量计算公式,同时指出在基于BA算法构造的scale-free网络中,在流量加权Betweenness值处在前5%至10%和前10%至15%的节点间加边的方法能显著提高容量。最后,通过仿真实验验证了该公式的正确性和该方法的有效性。 展开更多
关键词 流量加权betweenness 网络拓扑 网络容量 无标度网络 拥塞
原文传递
Dynamical robustness of networks based on betweenness against multi-node attack 被引量:1
3
作者 袁紫薇 吕长春 +1 位作者 司书宾 段东立 《Chinese Physics B》 SCIE EI CAS CSCD 2021年第5期229-235,共7页
We explore the robustness of a network against failures of vertices or edges where a fraction of vertices is removed and an overload model based on betweenness is constructed.It is assumed that the load and capacity o... We explore the robustness of a network against failures of vertices or edges where a fraction of vertices is removed and an overload model based on betweenness is constructed.It is assumed that the load and capacity of vertex are correlated with its betweenness centrality B_(i)as B_(i)^(θ)and(1+α)B_(i)^(θ)(θis the strength parameter,αis the tolerance parameter).We model the cascading failures following a local load preferential sharing rule.It is found that there exists a minimal whenθis between 0 and 1,and its theoretical analysis is given.The minimalα_(c)characterizes the strongest robustness of a network against cascading failures triggered by removing a random fraction f of vertices.It is realized that the minimalα_(c)increases with the increase of the removal fraction f or the decrease of average degree.In addition,we compare the robustness of networks whose overload models are characterized by degree and betweenness,and find that the networks based on betweenness have stronger robustness against the random removal of a fraction f of vertices. 展开更多
关键词 complex network ROBUSTNESS betweenness critical threshold
原文传递
Analysis of cascading failures of power cyber-physical systems considering false data injection attacks 被引量:4
4
作者 Jian Li Chaowei Sun Qingyu Su 《Global Energy Interconnection》 CAS CSCD 2021年第2期204-213,共10页
This study considers the performance impacts of false data injection attacks on the cascading failures of a power cyber-physical system,and identifies vulnerable nodes.First,considering the monitoring and control func... This study considers the performance impacts of false data injection attacks on the cascading failures of a power cyber-physical system,and identifies vulnerable nodes.First,considering the monitoring and control functions of a cyber network and power flow characteristics of a power network,a power cyber-physical system model is established.Then,the influences of a false data attack on the decision-making and control processes of the cyber network communication processes are studied,and a cascading failure analysis process is proposed for the cyber-attack environment.In addition,a vulnerability evaluation index is defined from two perspectives,i.e.,the topology integrity and power network operation characteristics.Moreover,the effectiveness of a power flow betweenness assessment for vulnerable nodes in the cyberphysical environment is verified based on comparing the node power flow betweenness and vulnerability assessment index.Finally,an IEEE14-bus power network is selected for constructing a power cyber-physical system.Simulations show that both the uplink communication channel and downlink communication channel suffer from false data attacks,which affect the ability of the cyber network to suppress the propagation of cascading failures,and expand the scale of the cascading failures.The vulnerability evaluation index is calculated for each node,so as to verify the effectiveness of identifying vulnerable nodes based on the power flow betweenness. 展开更多
关键词 Power cyber-physical systems False date injection attack Cascading failure VULNERABILITY Power flow betweenness.
下载PDF
Complex Networks: Traffic Dynamics, Network Performance, and Network Structure 被引量:1
5
作者 Ziping Hu Krishnaiyan Thulasiraman Pramode K. Verma 《American Journal of Operations Research》 2013年第1期187-195,共9页
This paper explores traffic dynamics and performance of complex networks. Complex networks of various structures are studied. We use node betweenness centrality, network polarization, and average path length to captur... This paper explores traffic dynamics and performance of complex networks. Complex networks of various structures are studied. We use node betweenness centrality, network polarization, and average path length to capture the structural characteristics of a network. Network throughput, delay, and packet loss are used as network performance measures. We investigate how internal traffic, through put, delay, and packet loss change as a function of packet generation rate, network structure, queue type, and queuing discipline through simulation. Three network states are classified. Further, our work reveals that the parameters chosen to reflect network structure, including node betweenness centrality, network polarization, and average path length, play important roles in different states of the underlying networks. 展开更多
关键词 Complex Networks betweenness CENTRALITY Network Polarization Average Path Length THROUGHPUT De-lay PACKET Loss
下载PDF
An Energy-Based Centrality for Electrical Networks
6
作者 Ruiyuan Kong Congying Han +1 位作者 Tiande Guo Wei Pei 《Energy and Power Engineering》 2013年第4期597-602,共6页
We present an energy-based method to estimate centrality in electrical networks. Here the energy between a pair of vertices denotes by the effective resistance between them. If there is only one generation and one loa... We present an energy-based method to estimate centrality in electrical networks. Here the energy between a pair of vertices denotes by the effective resistance between them. If there is only one generation and one load, then the centrality of an edge in our method is the difference between the energy of network after deleting the edge and that of the original network. Compared with the local current-flow betweenness on the IEEE 14-bus system, we have an interesting discovery that our proposed centrality is closely related to it in the sense of that the significance of edges under the two measures are very similar. 展开更多
关键词 CENTRALITY ENERGY EFFECTIVE Resistance Current-flow betweenness
下载PDF
Confidence Intervals for Assessing Sizes of Social Network Centralities
7
作者 Dawn Iacobucci Rebecca McBride +1 位作者 Deidre L. Popovich Maria Rouziou 《Social Networking》 2018年第4期220-242,共23页
This research uses random networks as benchmarks for inferential tests of network structures. Specifically, we develop formulas for expected values and confidence intervals for four frequently employed social network ... This research uses random networks as benchmarks for inferential tests of network structures. Specifically, we develop formulas for expected values and confidence intervals for four frequently employed social network centrality indices. The first study begins with analyses of stylized networks, which are then perturbed with increasing levels of random noise. When the indices achieve their values for fully random networks, the indices reveal systematic relationships that generalize across network forms. The second study then delves into the relationships between numbers of actors in a network and the density of a network for each of the centrality indices. In doing so, expected values are easily calculated, which in turn enable chi-square tests of network structure. Furthermore, confidence intervals are developed to facilitate a network analyst’s understanding as to which patterns in the data are merely random, versus which are structurally significantly distinct. 展开更多
关键词 CENTRALITY Degree CLOSENESS betweenness EIGENVECTOR CENTRALITY SOCIAL Networks
下载PDF
Research on LFS Algorithm in Software Network
8
作者 Wei Wang Hai Zhao +9 位作者 Hui Li Jun Zhang Peng Li Zheng Liu Naiming Guo Jian Zhu Bo Li Shuang Yu Hong Liu Kunzhan Yang 《Journal of Software Engineering and Applications》 2010年第2期185-189,共5页
Betweenness centrality helps researcher to master the changes of the system from the overall perspective in software network. The existing betweenness centrality algorithm has high time complexity but low accuracy. Th... Betweenness centrality helps researcher to master the changes of the system from the overall perspective in software network. The existing betweenness centrality algorithm has high time complexity but low accuracy. Therefore, Layer First Searching (LFS) algorithm is proposed that is low in time complexity and high in accuracy. LFS algorithm searches the nodes with the shortest to the designated node, then travels all paths and calculates the nodes on the paths, at last get the times of each node being traveled which is betweenness centrality. The time complexity of LFS algorithm is O(V2). 展开更多
关键词 LFS SOFTWARE NETWORK the Shortest PATH betweenness CENTRALITY
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部