共查询到20条相似文献,搜索用时 46 毫秒
1.
2.
3.
基于级联失效的战域保障网络节点容量优化 总被引:1,自引:0,他引:1
通过分析战域保障网络的构造和特点,提出了基于级联失效的战域保障网络节点容量优化模型,进而研究了3种优化策略对级联失效抗毁性的影响:度升序优化策略、度降序优化策略、随机优化策略.结果表明按度降序策略优化约50%的节点可以有效提高战域保障网络级联失效抗毁性. 相似文献
4.
5.
基于可调负载重分配的复杂网络级联失效模型 总被引:1,自引:1,他引:1
针对现实网络上的负载重分配规则常常是介于全局分配与最近邻分配、均匀分配与极端非均匀分配的特点, 提出了一种可调负载重分配范围与负载重分配异质性的复杂网络级联失效模型, 并分析了该模型在无标度网络上的级联失效条件. 解析与仿真结果表明, 合理调节负载重分配的范围、负载重分配的异质性可以显著提高复杂网络抵御级联失效的抗毁性. 相似文献
6.
针对装备保障网络遭受敌方攻击时所显现出的复杂性现象,对比分析网络级联过程与病毒传播过程的相似性。在已有的负载容量级联故障传递模型基础上,融入了病毒免疫传播的过程,定义保障节点的4种不同状态,构建基于病毒免疫传播理论的装备保障网络级联传递模型,更好地再现了我方保障机构受到敌方实际打击和舆情攻击时的真实状况。通过仿真对比分析表明,在防御资源有限和时间迫切的情况时,优先考虑主动免疫策略,能够取得较好的抵御级联失效的效果,还可以辅助实施目标免疫策略,从而使装备保障网络具有较强的健壮性和较好的恢复能力。 相似文献
7.
8.
深入研究网络级联失效理论建模对分析、预防和控制级联失效有重要的理论和现实意义.借鉴已有网络级联失效理论模型的研究成果,提出了一种更符合实际网络并且更实用的级联失效模型.通过在三种典型复杂网络上分别进行数值仿真,得出该模型在抵制级联失效上比以往的模型具有更强的抗毁性.同时比较了这三类网络在该模型不同参数下抵制级联失效的抗毁性,为日后选取合适的网络拓扑结构和与之匹配的可调参数值提供了借鉴意义. 相似文献
9.
通过引入一种改进的非线性负载容量模型,对加权无标度网络的级联抗毁性进行了深入研究.采用标准化崩塌规模为度量指标,在局部加权负载重分配准则下,对权重系数、容量参数以及网络密度等参量对网络级联抗毁性的影响进行了数值仿真模拟.结果表明,网络的级联抗毁性随着权重系数θ的增大而降低,在θ≤0.3时网络具有较强的抗毁性,这与线性模型中的结论是截然不同的;网络的级联抗毁性随着容量参数的增大而增强,且在权重系数确定的情况下,存在最优参数组合使得网络具有最强的级联抗毁性.最后,对成本和性能约束下加权无标度网络的级联抗毁性进行了定量分析. 相似文献
10.
研究危险品运输网络在遭受恐怖袭击后的级联失效过程和性质有助于指导系统建设和提高其抗毁性能. 在分析危险品运输网络及恐怖袭击特性基础上,建立了双层危险品运输网络模型,通过定义网络的三种节点状态,分析了单次和连环袭击下的危险品运输网络级联失效过程,基于此,建立连环袭击下的危险品运输网络级联失效模型. 从“结果性”和“过程性”两个视角出发,提出网络抗毁性的评价测度“节点存活率”和“相对二次级联失效数”. 通过建立实例仿真场景和仿真流程,就不同袭击次数、不同节点的度及容量系数和不同规划方式对危险品运输网络级联失效特性的影响进行仿真,验证了模型的可行性,仿真结果为危险品运输网络的规划提供决策依据. 相似文献
11.
Cascading failures often occur in congested complex networks. Cascading failures can be expressed as a three-phase process:
generation, diffusion, and dissipation of congestion. Different from the betweenness centrality, a congestion function is
proposed to represent the extent of congestion on a given node. Inspired by the restart process of a node, we introduce the
concept of “delay time,” during which the overloaded node cannot receive or forward any traffic, so an intergradation between
permanent removal and nonremoval is built and the flexibility of the presented model is demonstrated. Considering the connectivity
of a network before and after cascading failures is not cracked because the overloaded node are not removed from network permanently
in our model, a new evaluation function of network efficiency is also proposed to measure the damage caused by cascading failures.
Finally, we investigate the effects of network structure and size, delay time, processing ability, and traffic generation
speed on congestion propagation. Cascading processes composed of three phases and some factors affecting cascade propagation
are uncovered as well. 相似文献
12.
针对复杂网络遭遇蓄意攻击引发的相继故障问题,采用Physical Review E77,026101(2008)所提出的相继故障模型,对比了BA无标度网络和WS小世界网络上遭遇两种边袭击策略导致的全局相继故障现象,并探讨了网络拓扑结构对边袭击策略的影响.理论解析和数值模拟均表明了在模型中可调参数的一定取值内,袭击网络中负荷最小的边比袭击网络中负荷最大的边更易于导致相继故障现象,而且,网络拓扑结构的不同对袭击策略也有着非常重要的影响. 相似文献
13.
This paper applies the concepts and methods of complex networks to the development of models and simulations of master-slave distributed real-time systems by introducing an upper bound in the allowable delivery time of the packets with computation results. Two representative interconnection models are taken into account: Uniformly random and scale free (Barabási-Albert), including the presence of background traffic of packets. The obtained results include the identification of the uniformly random interconnectivity scheme as being largely more efficient than the scale-free counterpart. Also, increased latency tolerance of the application provides no help under congestion. 相似文献
14.
针对已有关于相依网络级联故障研究中未考虑有向依赖边的问题,展开了基于不对称依赖的相依网络级联故障分析,构建了基于负载-容量的级联故障模型,提出基于连通分量的相依网络鲁棒性测度方法,开展了不同网络组合、耦合方式、容忍系数和移除比例在不同攻击模式下的网络鲁棒性研究。结果表明,随机攻击模式下不对称相依网络鲁棒性与以往研究结论类似,蓄意攻击模式下不对称相依网络鲁棒性则取决于攻击范围和容忍系数的大小。通过一则作战网络示例分析证明了所提方法的实际应用价值,对完善相依网络理论研究具有一定的参考意义。 相似文献
15.
Modeling and simulation of the vulnerability of interdependent power-water infrastructure networks to cascading failures 总被引:1,自引:0,他引:1
Critical infrastructures are becoming increasingly interdependent and vulnerable to cascading failures. Existing studies have analyzed the vulnerability of interdependent networks to cascading failures from the static perspective of network topology structure. This paper develops a more realistic cascading failures model that considers the dynamic redistribution of load in power network to explore the vulnerability of interdependent power-water networks. In this model, the critical tolerance threshold is originally proposed to indicate the vulnerability of network to cascading failures. In addition, some key parameters that are important to network vulnerability are identified and quantified through numerical simulation. Results show that cascading failures can be prevented when the values of tolerance parameter are above a critical tolerance threshold. Otherwise interdependent networks collapse after attacking a critical fraction of power nodes. Interdependent networks become more vulnerable with the increase in interdependence strength, which implies the importance of protecting those interconnected nodes to reduce the consequences of cascading failures. Interdependent networks are most vulnerable under high-load attack, which shows the significance of protecting high-load nodes. 相似文献
16.
增强网络的抗毁性对于抵御级联故障具有重要的现实意义。为研究网络参数对级联抗毁性的影响,结合变幂律无标度网络和变聚类系数无标度网络模型,在最大负荷节点遭受蓄意攻击的情况下,研究了无标度网络的幂律指数、聚类系数和平均度与级联抗毁性的关系。结果表明,无标度网络的幂律指数和平均度与网络的级联抗毁性正相关,即网络越均匀、连接越稠密,级联抗毁性越强;但聚类系数对网络的级联抗毁性并没有显著影响。 相似文献
17.
后装保障链是联合作战环境下的重要支撑,针对保障链中的2个重要节点-前进基地和保障基地的资源协调问题,提出了考虑不确定因素影响的优化模型及基于信息共享的协同保障算法;为了解决保障数据样本较小情况下的不确定参数估算问题,利用模糊规划方法把不确定优化模型转化为概率约束模型;并利用增强e-约束法来估算多目标Pareto解,帮助... 相似文献
18.
19.
在分析动态鲁棒性概念的基础上,提出了一种考虑级联失效的C4ISR系统结构动态鲁棒性度量方法,该方法结合不完全信息的攻击模型,设计了C4ISR系统结构级联失效的过程模型和动态鲁棒性值的计算方法,最后通过某一区域联合防空系统结构的案例对本文的动态鲁棒性度量方法进行仿真验证,仿真的结果证明了本文所提方法的有效性。 相似文献
20.
This paper presents two aggregation strategies in convex intersection region for the distributed mobile sensor network (MSN) with heterogeneous dynamics. First, the authors analyze individual local perception model and dynamics model, set the intersection of all the local perceptions as the region of interest (ROI). The MSN consists of sensors with first-order dynamics and second-order dynamics. Then, the authors design a control strategy to ensure that individuals aggregate at a point in the ROI relying on their local perceptions and the locations of neighbors within their communication scope. The authors describe this situation of aggregation as rendezvous. In addition, the authors introduce artificial potential field to make sensors deploy dispersedly in a bounded range near the ROI, which the authors call dispersed deployment. Finally, the authors prove the stability of the proposed strategies and validate the theoretical results by simulations. This research is applied for the cooperative deployment and data collection of mobile platforms with different dynamics under the condition of inaccurate perception. 相似文献