Please login to be able to save your searches and receive alerts for new content matching your search criteria.
Scale-free networks in which the degree displays a power-law distribution can be classified into assortative, disassortative, and neutral networks according to their degree–degree correlation. The second-order centrality proposed in a distributed computation manner is quick-calculated and accurate to identify critical nodes. We explore the second-order centrality correlation (SOC) for each type of the scale-free networks. The SOC–SOC correlation in assortative network and neutral network behaves similarly to the degree–degree correlation, while it behaves an apparent difference in disassortative networks. Experiments show that the invulnerability of most of scale-free networks behaves similarly under the node removal ordering by SOC centrality and degree centrality, respectively. The netscience network and the Yeast network behave a little differently because they are native disconnecting networks.
The quantification for the invulnerability of complex network is a fundamental problem in which identifying influential nodes is of theoretical and practical significance. In this paper, we propose a novel definition of centrality named total information (TC) which derives from a local sub-graph being constructed by a node and its neighbors. The centrality is then defined as the sum of the self-information of the node and the mutual information of its neighbor nodes. We use the proposed centrality to identify the importance of nodes through the evaluation of the invulnerability of scale-free networks. It shows both the efficiency and the effectiveness of the proposed centrality are improved, compared with traditional centralities.
Wireless sensor networks (WSNs) have become one of the core technologies of the internet of things (IoT) system. They are information generation and acquisition systems used by the IoT to sense and identify the surrounding environment. They are also sensor technology, embedding computing technology, communication technology and important product in the development of Internet technology, which have made the whole society more intelligent and humanized. WSNs are multi-hop self-organizing networks consisting of a large number of micro-sensor nodes deployed in the monitoring area. They can collaboratively sense, collect and process the monitored objects and transmit them to the observers. In this paper, we use the cascade failure method to find the key nodes in the WSNs. First, a complex network cascade failure model based on load redistribution is proposed. Differences from the existing model are as follows: (1) for each node, an overload function is defined; (2) the evolution of the network topology is replaced by node weight evolution. Based on the cascade failure model, a method for evaluating the importance of complex load network nodes is proposed and a new definition of node importance is given. This method helps to discover some potential “critical nodes” in the network. The final experimental analysis verifies the effectiveness and feasibility of the proposed method.
The research on the invulnerability of software-intensive equipment can improve the continuous combat ability of equipment as a necessary means to deepen the understanding of equipment damage law and improve the equipment anti-destruction ability and recovery ability. The general process and key technologies of software-intensive equipment invulnerability research are summarized from component level, equipment level and equipment network level, and the existing problems are analyzed; the future development direction of equipment invulnerability research is prospected, which provides some reference to the research work of software-intensive equipment invulnerability.
Using system break thought as a breakthrough point, the paper clears the connotation of equipment support resource network invulnerability. It discusses the damage model of equipment support resource network from the two sides of attack target and attack strategy. Based on the thought of complex network, it builds the indexes and evaluation arithmetic of equipment support resource network invulnerability, analyzes with samples and verifies the validity of the method, so it can provide technology approach and method for strengthening battlefield construction and equipment support resource defense.