Identification of Key Nodes in Urban Subway Disaster Network Based on EDK Algorithm

2021 ◽  
Vol 769 (3) ◽  
pp. 032025
Author(s):  
Yun Jiang ◽  
Lihong Yue
Keyword(s):  
2022 ◽  
Author(s):  
Qiang Lai ◽  
Hong-hao Zhang

Abstract The identification of key nodes plays an important role in improving the robustness of the transportation network. For different types of transportation networks, the effect of the same identification method may be different. It is of practical significance to study the key nodes identification methods corresponding to various types of transportation networks. Based on the knowledge of complex networks, the metro networks and the bus networks are selected as the objects, and the key nodes are identified by the node degree identification method, the neighbor node degree identification method, the weighted k-shell degree neighborhood identification method (KSD), the degree k-shell identification method (DKS), and the degree k-shell neighborhood identification method (DKSN). Take the network efficiency and the largest connected subgraph as the effective indicators. The results show that the KSD identification method that comprehensively considers the elements has the best recognition effect and has certain practical significance.


2012 ◽  
Vol 450-451 ◽  
pp. 582-585
Author(s):  
Qing En Li ◽  
Rui Ren ◽  
Jian Qiu

In recent years, as the load increasing gradually,problems in voltage stability of regional power network which is the terminal of power grid is serious. From the voltage stability machine rational analysis to roll out small interfering voltage stability criterion of new, and the modal method is used to determine the key nodes and areas of the system theory basis.


2011 ◽  
Vol 393-395 ◽  
pp. 851-854
Author(s):  
Lin Hua Zhang ◽  
Xin Zheng ◽  
Ya Jun Lang

In this study, the metabolic network of ectoine by Halomonas venusta DSM 4743 was established. The key nodes to influence the ectoine fermentation in metabolic flux and the basis during optimal control of fermentation process were investigated. The results showed that G6P, α-KG and OAA nodes were the key factors to influence the synthesis of ectoine. The metabolic flux distributions at the key nodes were significantly improved and ectoine concentration was enhanced in ectoine fermentation by adopting monosodium glutamate as the sole carbon and nitrogen sources, feeding monosodium glutamate and supplying oxygen limitedly. The batch fermentation was carried out in 10 L fermentor , the concentration and yield of ectoine was 8.4 g/L and 0.1 g/g, respectively, which were increased by 2.8 and 2 times, by comparison with batch fermentation using glucose as carbon source.


Author(s):  
Kelly O'Neill

This chapter examines the flow of goods across and through Crimea in an attempt to understand the impact of Russian rule on the economic landscape. It focuses on the patterns of exchange and consumption, arguing for the significance of small-scale transactions for understanding the economic geography of the region. While Russian officials were eager to facilitate and control Black Sea trade, farmers and gardeners and craftsmen began participating in the system of overland markets and fairs that connected the southern provinces to merchants and consumers everywhere from Kharkov and Moscow to Nizhnii Novgorod and Kazan. The Crimean economy thus moved southward toward Constantinople and northward toward Moscow, yet the towns of the peninsula remained key nodes of consumption and production, the orchards and vineyards key sites of prosperity.


2016 ◽  
Vol 12 (03) ◽  
pp. 28
Author(s):  
Qin Qin ◽  
Yong-qiang He

In opportunistic networks, temporary nodes choose neighbor nodes to forward messages while communicating. However, traditional forward mechanisms don’t take the importance of nodes into consideration while forwarding. In this paper, we assume that each node has a status indicating its importance, and temporary nodes choose the most important neighbors to forward messages. While discovering important neighbors, we propose a binary tree random walk based algorithm. We analyze the iteration number and communication cost of the proposed algorithm, and they are much less than related works. The simulation experiments validate the efficiency and effectiveness of the proposed algorithm.


Author(s):  
Kirti Chawla ◽  
Gabriel Robins

RFID technology can help competitive organizations optimize their supply chains. However, it may also enable adversaries to exploit covert channels to surreptitiously spy on their competitors. We explain how tracking tags and compromising readers can create covert channels in supply chains and cause detrimental economic effects. To mitigate such attacks, the authors propose a framework that enables an organization to monitor its supply chain. The supply chain is modeled as a network flow graph, where tag flow is verified at selected key nodes, and covert channels are actively sought. While optimal taint checkpoint node selection is algorithmically intractable, the authors propose node selection and flow verification heuristics with various tradeoffs. The chapter discusses economically viable countermeasures against supply chain-based covert channels, and suggests future research directions.


2021 ◽  
Vol 336 ◽  
pp. 09011
Author(s):  
Jun Wang ◽  
Qiang Ye ◽  
Chi Zhang ◽  
Tong Zhang ◽  
Shicheng Li

To explore the relatively weak link of the quality management system, the evaluation of the key nodes in quality system management is the crucial method for the enterprises and organizations. However, due to inadequate understanding of the goals and principles, the evaluation results are difficult to meet the requirements. Therefore, in this paper we normalize the evaluation of the quality management system and discuss the methods of uncertainty quantification as the supplementary for evaluation which brings the more accurate results for improvement suggestions.


Author(s):  
Sławomir Partycki ◽  
Dawid Błaszczak

Abstract Summary Subject and purpose of work: The purpose of the study is to analyse the structure and the relation of the Polish-Belarusian cross-border cooperation network, to identify the key nodes in the network, to analyse the dynamics of connections between the actors, and to identify the most important changes in the structure of the network. Materials and methods: The article quotes the results of analyses of cross-border projects from 2004- 2017. The analysis includes projects completed, applicants, and partners of projects. The network analysis was carried out using Ucinet and NetDraw software. Results: The structure of the Polish-Belarusian cooperation is dominated by several large nodes, on the other hand there are many micronetworks - of three or four nodes, which are connected with each other. Conclusions: The Polish-Belarusian cooperation is of great importance for the international relations of the Polish state. Projects carried out by entities located at the border strengthen the cooperation, bringing a number of measurable benefits (hard and soft), depending on nature of the projects, as well as frequency and scale of the undertaken activities.


Sign in / Sign up

Export Citation Format

Share Document