期刊文献+
共找到26篇文章
< 1 2 >
每页显示 20 50 100
The Effect of Key Nodes on theMalware Dynamics in the Industrial Control Network
1
作者 Qiang Fu JunWang +1 位作者 Changfu Si Jiawei Liu 《Computers, Materials & Continua》 SCIE EI 2024年第4期329-349,共21页
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is be... As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network. 展开更多
关键词 key nodes dynamic model industrial control network SIMULATION
在线阅读 下载PDF
RESEARCH ON KEY NODES OF WIRELESS SENSOR NETWORK BASED ON COMPLEX NETWORK THEORY
2
作者 Ma Chuang Liu Hongwei Zuo Decheng Wu Zhibo Yang Xiaozong 《Journal of Electronics(China)》 2011年第3期396-401,共6页
On the basis of complex network theory, the issues of key nodes in Wireless Sensor Networks (WSN) are discussed. A model expression of sub-network fault in WSN is given at first; subsequently, the concepts of average ... On the basis of complex network theory, the issues of key nodes in Wireless Sensor Networks (WSN) are discussed. A model expression of sub-network fault in WSN is given at first; subsequently, the concepts of average path length and clustering coefficient are introduced. Based on the two concepts, a novel attribute description of key nodes related to sub-networks is proposed. Moreover, in terms of node deployment density and transmission range, the concept of single-point key nodes and generalized key nodes of WSN are defined, and their decision theorems are investigated. 展开更多
关键词 Wireless Sensor network (WSN) key nodes Fault model Complex network theory
在线阅读 下载PDF
K-GCN for Identifying Key Nodes in Complex Networks
3
作者 Lin DONG Yufeng LU 《Journal of Mathematical Research with Applications》 2025年第2期260-274,共15页
Accurately identifying key nodes is essential for evaluating network robustness and controlling information propagation in complex network analysis. However, current research methods face limitations in applicability ... Accurately identifying key nodes is essential for evaluating network robustness and controlling information propagation in complex network analysis. However, current research methods face limitations in applicability and accuracy. To address these challenges, this study introduces the K-GCN model, which integrates neighborhood k-shell distribution analysis with Graph Convolutional Network(GCN) technology to enhance key node identification in complex networks. The K-GCN model first leverages neighborhood k-shell distributions to calculate entropy values for each node, effectively quantifying node importance within the network. These entropy values are then used as key features within the GCN, which subsequently formulates intelligent strategies to maximize network connectivity disruption by removing a minimal set of nodes, thereby impacting the overall network architecture. Through iterative interactions with the environment, the GCN continuously refines its strategies, achieving precise identification of key nodes in the network. Unlike traditional methods, the K-GCN model not only captures local node features but also integrates the network structure and complex interrelations between neighboring nodes, significantly improving the accuracy and efficiency of key node identification.Experimental validation in multiple real-world network scenarios demonstrates that the K-GCN model outperforms existing methods. 展开更多
关键词 key nodes complex networks K-SHELL GCN
原文传递
Analysis of identification methods of key nodes in transportation network 被引量:12
4
作者 Qiang Lai Hong-Hao Zhang 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第6期782-789,共8页
The identification of key nodes plays an important role in improving the robustness of the transportation network.For different types of transportation networks,the effect of the same identification method may be diff... The identification of key nodes plays an important role in improving the robustness of the transportation network.For different types of transportation networks,the effect of the same identification method may be different.It is of practical significance to study the key nodes identification methods corresponding to various types of transportation networks.Based on the knowledge of complex networks,the metro networks and the bus networks are selected as the objects,and the key nodes are identified by the node degree identification method,the neighbor node degree identification method,the weighted k-shell degree neighborhood identification method(KSD),the degree k-shell identification method(DKS),and the degree k-shell neighborhood identification method(DKSN).Take the network efficiency and the largest connected subgraph as the effective indicators.The results show that the KSD identification method that comprehensively considers the elements has the best recognition effect and has certain practical significance. 展开更多
关键词 transportation network key node identification KSD identification method network efficiency
原文传递
Vulnerability analysis for airport networks based on fuzzy soft sets: From the structural and functional perspective 被引量:8
5
作者 Li Shanmei Xu Xiaohao 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2015年第3期780-788,共9页
Abstract Recently, much attention has been paid to the reliability and vulnerability of critical infrastructure. In air traffic systems, the vulnerability analysis for airport networks can be used to guide air traffic... Abstract Recently, much attention has been paid to the reliability and vulnerability of critical infrastructure. In air traffic systems, the vulnerability analysis for airport networks can be used to guide air traffic administrations in their prioritization of the maintenance and repair of airports, as well as to avoid unnecessary disturbances in the planning of flight schedules. In this paper, the evaluation methods of airport importance and network efficiency arc established. Firstly, the evaluation indices of airport importance are proposed from both the topological and functional perspectives. The topological characteristics come from the structure of airport network and the functional features stem from the traffic flow distribution taking place inside the network. Secondly, an integrated evaluation method based on fuzzy soft set theory is proposed to identify the key airports, which can fuse together importance indices over different time intervals. Thirdly, an airport network efficiency method is established for the purpose of assessing the accuracy of the evaluation method. Finally, empirical studies using real traffic data of US and China's airport networks show that the evaluation method proposed in this papcr is the most accuratc. Thc vulucrability of US and China's airport networks is compared. The similarities and differences between airport geography distribution and airport importance distribution are discussed here and the dynamics of airport importance is studied as well. 展开更多
关键词 Air traffic Airport network Complex networkFuzzy soft sets key node
原文传递
Cause Analysis of Consumer‑Grade UAV Accidents Based on Grounded Theory‑Bayesian Network 被引量:5
6
作者 YUE Rentian HAN Meng HOU Bowen 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2022年第5期584-592,共9页
In order to reduce the accident rate of consumer-grade unmanned aerial vehicles(UAVs)in daily use scenarios,the accident causes are analyzed based on the accident cases of consumer-grade UAVs.By extracting accident ca... In order to reduce the accident rate of consumer-grade unmanned aerial vehicles(UAVs)in daily use scenarios,the accident causes are analyzed based on the accident cases of consumer-grade UAVs.By extracting accident causing factors based on the Grounded theory,the relationship between these factors is analyzed.The Bayesian network for consumer-grade UAV accidents is constructed.With the Grounded theory-Bayesian network,the probability of four types of accidents is inferred:fall,air collision,disappearance,and personal injury.With the posterior probability of each factor being reversely reasoned,the causal chain with the maximum probability of each accident is obtained.After the sensitivity of each factor is analyzed,the key nodes in the network accordingly are inferred.Then the causing factors of consumer-grade UAV accidents are analyzed.The results show that the probability of fall accident is the highest,the fall accident is associated with the probabilistic maximum causal chain of personal injury,and the sensitivity analysis results of each type of accident as the result node are inconsistent. 展开更多
关键词 consumer-grade UAV Grounded theory Bayesian network key nodes accident causes
在线阅读 下载PDF
Improved Key Node Recognition Method of Social Network Based on PageRank Algorithm 被引量:1
7
作者 Lei Hong Yiji Qian +2 位作者 Chaofan Gong Yurui Zhang Xin Zhou 《Computers, Materials & Continua》 SCIE EI 2023年第1期1887-1903,共17页
The types and functions of social networking sites are becoming more abundant with the prevalence of self-media culture,and the number of daily active users of social networking sites represented by Weibo and Zhihu co... The types and functions of social networking sites are becoming more abundant with the prevalence of self-media culture,and the number of daily active users of social networking sites represented by Weibo and Zhihu continues to expand.There are key node users in social networks.Compared with ordinary users,their influence is greater,their radiation range is wider,and their information transmission capabilities are better.The key node users playimportant roles in public opinion monitoring and hot event prediction when evaluating the criticality of nodes in social networking sites.In order to solve the problems of incomplete evaluation factors,poor recognition rate and low accuracy of key nodes of social networking sites,this paper establishes a social networking site key node recognition algorithm(SNSKNIS)based on PageRank(PR)algorithm,and evaluates the importance of social networking site nodes in combination with the influence of nodes and the structure of nodes in social networks.This article takes the Sina Weibo platform as an example,uses the key node identification algorithm system of social networking sites to discover the key nodes in the social network,analyzes its importance in the social network,and displays it visually. 展开更多
关键词 Social networking site PageRank algorithm key node
在线阅读 下载PDF
Identification of key recovering node for spatial networks
8
作者 严子健 夏永祥 +3 位作者 郭丽君 祝令哲 梁圆圆 涂海程 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第6期698-704,共7页
Many networks in the real world have spatial attributes, such as location of nodes and length of edges, called spatial networks. When these networks are subject to some random or deliberate attacks, some nodes in the ... Many networks in the real world have spatial attributes, such as location of nodes and length of edges, called spatial networks. When these networks are subject to some random or deliberate attacks, some nodes in the network fail, which causes a decline in the network performance. In order to make the network run normally, some of the failed nodes must be recovered. In the case of limited recovery resources, an effective key node identification method can find the key recovering node in the failed nodes, by which the network performance can be recovered most of the failed nodes. We propose two key recovering node identification methods for spatial networks, which are the Euclidean-distance recovery method and the route-length recovery method. Simulations on homogeneous and heterogeneous spatial networks show that the proposed methods can significantly recover the network performance. 展开更多
关键词 complex networks spatial networks CONGESTION key recovering node
原文传递
Application Independent Dynamic Group-Based Key Establishment for Large-scale Wireless Sensor Networks
9
作者 Kashif Kifayat Madjid Merabti David Llewellyn-Jones 《China Communications》 SCIE CSCD 2007年第1期14-27,共14页
Key establishment and its management in Wireless Sensor Networks(WSN) is a challenging problem due to its limited resources and disordered structure. Many key management schemes have been developed recently for WSN to... Key establishment and its management in Wireless Sensor Networks(WSN) is a challenging problem due to its limited resources and disordered structure. Many key management schemes have been developed recently for WSN to provide secure communication between source and destination sensor nodes.A serious threat highlighted in all of these schemes is that of node capture attacks,where an adversary gains full control over a sensor node through direct physical access.Node capture attacks can also be helpful to an adversary in new attacks like Blackhole and Denial of Service.All of these proposed key management solutions still suffer from node capture attacks with resilience.The current sensor networks are assumed to be designed for specific applications,having key management protocols strongly coupled to applications.The future sensor networks are envisioned as comprising heterogeneous devices assisting to a large range of applications.To achieve this goal,a new application independent approach is needed. In this paper we therefore present a novel,extended version of our previously published Dynamic Group-based Key Establishment(DGKE) protocol. We compare the proposed scheme with existing key management schemes,which shows a significant improvement in resilience against node capture attacks,memory overhead and connectivity. 展开更多
关键词 WIRELESS SENSOR network key management NODE CAPTURE ATTACKS WIRELESS SENSOR network security
在线阅读 下载PDF
Complex Network Formation and Analysis of Online Social Media Systems
10
作者 Hafiz Abid Mahmood Malik 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第3期1737-1750,共14页
To discover and identify the influential nodes in any complex network has been an important issue.It is a significant factor in order to control over the network.Through control on a network,any information can be spr... To discover and identify the influential nodes in any complex network has been an important issue.It is a significant factor in order to control over the network.Through control on a network,any information can be spread and stopped in a short span of time.Both targets can be achieved,since network of information can be extended and as well destroyed.So,information spread and community formation have become one of the most crucial issues in the world of SNA(Social Network Analysis).In this work,the complex network of twitter social network has been formalized and results are analyzed.For this purpose,different network metrics have been utilized.Visualization of the network is provided in its original form and then filter out(different percentages)from the network to eliminate the less impacting nodes and edges for better analysis.This network is analyzed according to different centrality measures,like edge-betweenness,betweenness centrality,closeness centrality and eigenvector centrality.Influential nodes are detected and their impact is observed on the network.The communities are analyzed in terms of network coverage considering theMinimum Spanning Tree,shortest path distribution and network diameter.It is found that these are the very effective ways to find influential and central nodes from such big social networks like Facebook,Instagram,Twitter,LinkedIn,etc. 展开更多
关键词 Complex network data extraction nodes and edges network visualization social media network main hubs centrality measures
在线阅读 下载PDF
A FUNCTION NODE-BASED MULTIPLE PAIRWISE KEYS MANAGEMENT PROTOCOL FOR WIRELESS SENSOR NETWORKS AND ENERGY CONSUMPTION ANALYSIS
11
作者 Bi Jiana Wang Hui Sun Yandong Liu Yanzhao Ji Zhenzhou 《Journal of Electronics(China)》 2009年第5期692-698,共7页
In this letter, a Function node-based Multiple Pairwise Keys Management (MPKMF) protocol for Wireless Sensor Networks (WSNs) is firstly designed, in which ordinary nodes and cluster head nodes are responsible for data... In this letter, a Function node-based Multiple Pairwise Keys Management (MPKMF) protocol for Wireless Sensor Networks (WSNs) is firstly designed, in which ordinary nodes and cluster head nodes are responsible for data collection and transmission, and function nodes are responsible for key management. There are more than one function nodes in the cluster consulting the key generation and other security decision-making. The function nodes are the second-class security center because of the characteristics of the distributed WSNs. Secondly, It is also described that the formation of function nodes and cluster heads under the control of the former, and five kinds of keys, i.e., individual key, pairwise keys, cluster key, management key, and group key. Finally, performance analysis and experiments show that, the protocol is superior in communication and energy consumption. The delay of establishing the cluster key meets the requirements, and a multiple pairwise key which adopts the coordinated security authentication scheme is provided. 展开更多
关键词 Wireless Sensor networks (WSNs) Function nodes key management Energy consumption
在线阅读 下载PDF
Key nodes mining for complex networks based on local gravity model
12
作者 Tao Ren Shixiang Sun +1 位作者 Yanjie Xu Georgi Marko Dimirovski 《Journal of Control and Decision》 2024年第3期409-416,I0009,共9页
Identification of key nodes in complex networks can effectively speed up the spread of favourable information or prevent the spread of rumours and diseases.An algorithm based on local gravity model is proposed to mine... Identification of key nodes in complex networks can effectively speed up the spread of favourable information or prevent the spread of rumours and diseases.An algorithm based on local gravity model is proposed to mine the key spreaders in complex networks.The existing algorithms based on gravity model consider the shortest distance between nodes.However,nodes not only influence each other through the shortest path,which will lead the loss of information between nodes.Different from the existing gravity model,the distance considered in this model is not the shortest distance between nodes,but the reciprocal of the number of feasible paths between nodes.Conveniently,the model is called FPLGM(Local Gravity Model Based on Feasible Paths).Ten different networks are utilised to verify the effectiveness of FPLGM.Results show that the FPLGM performs best in comparison with the well-known state-of-the-art methods. 展开更多
关键词 Complex networks key nodes mining local gravity model
原文传递
改进YOLOv8_obb的大豆主茎节点识别研究
13
作者 杨彦旭 李金阳 +2 位作者 石文强 亓立强 张伟 《中国农机化学报》 北大核心 2026年第1期79-86,共8页
大豆株型对大豆产量有重要影响,大豆主茎节数是大豆株型构成的重要性状。为实现田间条件下大豆主茎节数识别计算,以黑龙江省九三地区大豆为研究对象,提出基于YOLOv8_obb模型改进的大豆主茎节点识别方法YOLOv8_obb—AES,计算大豆主茎节点... 大豆株型对大豆产量有重要影响,大豆主茎节数是大豆株型构成的重要性状。为实现田间条件下大豆主茎节数识别计算,以黑龙江省九三地区大豆为研究对象,提出基于YOLOv8_obb模型改进的大豆主茎节点识别方法YOLOv8_obb—AES,计算大豆主茎节点,得到大豆主茎节数。改进模型引入高效注意力机制模块,缩减模型计算量,采用渐进特征金字塔网络结构替换YOLOv8_obb网络中的路径聚合特征金字塔网络,增强多尺度融合能力,替换IoU损失函数加快模型边界回归,提高模型收敛速度。结果表明,YOLOv8_obb—AES算法对田间大豆主茎节点的平均精度均值与检测速度分别达到89.45%、78.8帧/ms,相比于原始算法分别提升8.45%、7.6帧/ms,对于九研17大豆植株6种不同主茎节数的识别准确率分别为85.4%、84.5%、87.6%、85.2%、81.6%和82.2%。该研究为探究大豆产量与大豆主茎节数之间的关联提供技术支持。 展开更多
关键词 大豆 主茎节点 目标识别 渐进特征金字塔网络 高效注意力机制
在线阅读 下载PDF
Research on Accurate Information Pushing Based on Human Network 被引量:1
14
作者 Meijie Yang Yu Wang Xiaorong Hou 《Social Networking》 2017年第2期181-196,共16页
Based on the social network analysis methods and human network, this paper randomly selected 44 students (31 males and 13 females) as the research objects, and it used the UCINET software to analyze the friendship bet... Based on the social network analysis methods and human network, this paper randomly selected 44 students (31 males and 13 females) as the research objects, and it used the UCINET software to analyze the friendship between them of which 43 used WeChat and 44 used QQ, and it also used the tool Netdraw to visualize the network sociogram. By mining the four aspects of density, accessibility, centrality, block model, the results demonstrated that QQ social network and WeChat social network existed the phenomenon of small world, leaders and subgroups, and the key nodes of QQ human network were more than WeChat network. Through using the key nodes, it can push the precise and efficient information and improve the accuracy of information transmission and impact among network members. 展开更多
关键词 Social network Analysis HUMAN network Small World SUBGROUP key nodes: PRECISE and Efficient INFORMATION INFORMATION Transmission
暂未订购
基于多节点热网络法的航空发动机主轴轴承温度场分析 被引量:14
15
作者 高文君 刘振侠 +1 位作者 朱鹏飞 吕亚国 《推进技术》 EI CAS CSCD 北大核心 2019年第2期382-388,共7页
航空发动机主轴轴承温度场分析是发动机润滑系统热分析的关键。针对传统简单节点热网络法中轴承温度节点设置过于简化、人为设置轴承生热分配比例等问题,提出改进的多节点热网络法。基于Hertz热扩散理论,将轴承三元件分别划分为接触表... 航空发动机主轴轴承温度场分析是发动机润滑系统热分析的关键。针对传统简单节点热网络法中轴承温度节点设置过于简化、人为设置轴承生热分配比例等问题,提出改进的多节点热网络法。基于Hertz热扩散理论,将轴承三元件分别划分为接触表面与主体两个节点,并以Hertz扩散热阻连接;轴承接触区设置油膜节点,加载轴承生热载荷,节点与轴承接触面之间通过油膜热阻连接;构建多节点轴承热网络模型,获得轴承内部更细致的温度场分布。研究表明,轴承表面温度显著高于其内部主体结构温度,而接触区对应的两个接触面之间也存在明显的温度差异,使用本文建立的多节点热网络法对滑油出口温度的计算误差不超过7%。 展开更多
关键词 航空发动机 主轴轴承 热网络法 节点划分 传热扩散热阻
原文传递
基于节点收缩重要性测度的客机主制造商-供应商协同研制网络风险评估研究
16
作者 菅利荣 郑森 欧子恺 《运筹与管理》 CSSCI CSCD 北大核心 2024年第12期172-179,共8页
客机研制项目综合体现了国家科技、制造、经济、管理等领域的尖端水平,被誉为“制造业的皇冠”,具有研制周期较长、成本较高、产品设计过程复杂、风险较高、跨学科交叉及融合等特征。本文分析了客机主制造商-供应商协同研制的工作包分... 客机研制项目综合体现了国家科技、制造、经济、管理等领域的尖端水平,被誉为“制造业的皇冠”,具有研制周期较长、成本较高、产品设计过程复杂、风险较高、跨学科交叉及融合等特征。本文分析了客机主制造商-供应商协同研制的工作包分解结构及其网络型模式,在此基础上,借助复杂网络的相关理论方法,建立了主制造商-供应商协同研制网络,构建了基于节点收缩重要性测度的网络风险评估方法并设计了算法。最后以波音787项目的主制造商、核心供应商数据为例,进行了实证分析,研究结果表明,构建的方法合理地识别出具有高风险、高重要程度的供应商节点。本文还结合凝聚子群聚类结果解析了其中的内在逻辑与造成风险的原因,同时节点重要性测度结果与波音787协同研制故障的历史记录相契合,验证了该方法的有效性。 展开更多
关键词 主制造商-供应商 协同研制 复杂网络 节点重要度 风险评估
在线阅读 下载PDF
基于引文网络主路径的移动图书馆研究脉络演化 被引量:5
17
作者 王晓红 梁玉芳 王福 《现代情报》 CSSCI 2018年第6期32-39,共8页
掌握移动图书馆领域研究的知识演化和扩散指导国内相关研究,对移动图书馆领域引文网络实施断层扫描,了解文献之间的引证关系及引文网络路径已受到业界的关注。为此,运用Hist Cite探测不同节点规模引文网络的引证子群,确定引文网络主路... 掌握移动图书馆领域研究的知识演化和扩散指导国内相关研究,对移动图书馆领域引文网络实施断层扫描,了解文献之间的引证关系及引文网络路径已受到业界的关注。为此,运用Hist Cite探测不同节点规模引文网络的引证子群,确定引文网络主路径。借助Pajek的3种主路径算法分析不同节点规模的主路径成分差异,发现核心文献集和关键知识节点。通过对移动图书馆领域核心文献集及其关系的分析,揭示了移动图书馆领域知识演化的主体脉络。以此为基础,结合国内研究成果对移动图书馆创新研究主路径进行了规划。 展开更多
关键词 移动图书馆 引文网络分析 主路径计算方法 主成分分析 核心知识节点
在线阅读 下载PDF
基于有限单元热网络法的航空发动机主轴轴承热分析 被引量:8
18
作者 潘迎 高文君 +1 位作者 李坤 杜鼎新 《推进技术》 EI CAS CSCD 北大核心 2021年第1期149-155,共7页
航空发动机主轴轴承温度场的精准预测对保证发动机润滑系统及整机稳定运转至关重要。针对传统热网络法精度低的问题,提出一种基于有限单元思想的有限单元热网络法。将轴承结构通过网格划分为有限个单元体,每个单元体设置一个温度节点代... 航空发动机主轴轴承温度场的精准预测对保证发动机润滑系统及整机稳定运转至关重要。针对传统热网络法精度低的问题,提出一种基于有限单元思想的有限单元热网络法。将轴承结构通过网格划分为有限个单元体,每个单元体设置一个温度节点代表该单元体的集总参数,节点间构建热阻关系并形成热网络,通过求解以温度为未知量的大型稀疏矩阵线性方程组来获得滚子轴承横截面的温度分布。该方法可以与轴承局部产热理论相结合,实现轴承局部产热的精准加载,完成温度场的精细化分析。通过与试验结果对比,本文方法对轴承外环表面中心线温度的预测结果与试验结果误差不超过13%。 展开更多
关键词 航空发动机 主轴轴承 有限单元热网络法 节点划分 温度场
原文传递
Finding Key Node Sets in Complex Networks Based on Improved Discrete Fireworks Algorithm 被引量:11
19
作者 LIU Fengzeng XIAO Bing LI Hao 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2021年第3期1014-1027,共14页
Finding out the key node sets that affect network robustness has great practical significance for network protection and network disintegration.In this paper,the problem of finding key node sets in complex networks is... Finding out the key node sets that affect network robustness has great practical significance for network protection and network disintegration.In this paper,the problem of finding key node sets in complex networks is defined firstly.Because it is an NP-hard combinatorial optimization problem,discrete fireworks algorithm is introduced to search the optimal solution,which is a swarm intelligence algorithm and is improved by the prior information of networks.To verify the effect of improved discrete fireworks algorithm(IDFA),experiments are carried out on various model networks and real power grid.Results show that the proposed IDFA is obviously superior to the benchmark algorithms,and networks suffer more damage when the key node sets obtained by IDFA are removed from the networks.The key node sets found by IDFA contain a large number of non-central nodes,which provides the authors a new perspective that the seemingly insignificant nodes may also have an important impact on the robustness of the network. 展开更多
关键词 Complex networks discrete fireworks algorithm key node sets network robustness node centrality
原文传递
基于图形化主接线图的电气连通性分析和研究 被引量:7
20
作者 尹亮 《电力系统保护与控制》 EI CSCD 北大核心 2009年第15期65-68,74,共5页
电气元件的连通性判别是图形化分析的基础,从主接线图中各电气元件之间的连接性及其属性之间的匹配性入手,综合分析了元件连通性的判别方法。通过把母线/开关和接地点/变压器描述的物理模型转化为节点/支路描述的网络模型,提出了分序网... 电气元件的连通性判别是图形化分析的基础,从主接线图中各电气元件之间的连接性及其属性之间的匹配性入手,综合分析了元件连通性的判别方法。通过把母线/开关和接地点/变压器描述的物理模型转化为节点/支路描述的网络模型,提出了分序网图分别进行电气连通性分析的新思路,这种方法对序分量及序网分析有重要指导意义。同时,结合图论方法和网络模型,通过比较已有的分析方法,改进了节点矩阵法的计算流程,使它在运算次数上大大减少,计算速度也明显提高。 展开更多
关键词 主接线图 电气连通性 捕捉点 网络模型 图论 节点矩阵法
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部