Overview of Key Node Evaluation in Complex Networks DOI

Yunan Jiang,

Linlan Liu, Jian Shu

et al.

Published: Nov. 24, 2023

Complex network is a obtained through highly abstracting real-world complex systems, which can be used to assist in solving problems systems. Homogeneous that only has one type of node and edge. Key nodes are impact the overall stability functionality network, they help us better comprehend manipulate networks. This paper focuses on study key homogeneous networks provides comprehensive review existing methods for evaluating such In this paper, we provide description nodes; We summarize evaluation categorize them into five major classes discussion; emphasize some challenges faced field outline potential directions future research further explore.

Language: Английский

Complex Network Optimization for Fixed-Time Continuous Action Iteration Dilemma by Using Reinforcement Learning DOI
Zhanxiao Jia, Dengxiu Yu, Zhen Wang

et al.

IEEE Transactions on Network Science and Engineering, Journal Year: 2024, Volume and Issue: 11(4), P. 3771 - 3781

Published: April 9, 2024

In this paper, an optimization algorithm based on deep reinforcement learning is proposed to optimize complex networks in fixed-time convergence of continuous action iteration dilemmas. The field iterative dilemmas has long been studied, with prior research primarily emphasizing the effectiveness strategy selection and stability evolution. However, impact topology evolution remained under-explored. present study fills gap by examining how structure influences time required for players reach Nash Equilibrium overall payoff. To identify optimal network that ensures dilemma, achieves shortest time, attains highest payoff state, a designed network. Firstly, paper applies Lyapunov theory analyze dilemma compute upper bound time. Secondly, we establish evaluation criteria taken payoff, subsequently designing functions utilizing these criteria. Thirdly, resolve issue associated function, while analyzing methods. Lastly, method verified simulating dynamic model snowdrift games prisoner

Language: Английский

Citations

5

Identification of important nodes in multi-layer hypergraphs based on fuzzy gravity model and node centrality distribution characteristics DOI

Peng Wang,

Guang Ling, Zhao Pei

et al.

Chaos Solitons & Fractals, Journal Year: 2024, Volume and Issue: 188, P. 115503 - 115503

Published: Sept. 12, 2024

Language: Английский

Citations

5

Dynamically identify important nodes in the hypergraph based on the ripple diffusion and ant colony collaboration model DOI

Peng Wang,

Guang Ling, Zhao Pei

et al.

Journal of Network and Computer Applications, Journal Year: 2025, Volume and Issue: unknown, P. 104107 - 104107

Published: Jan. 1, 2025

Language: Английский

Citations

0

Research on the Pattern and Evolution Characteristics of Global Dry Bulk Shipping Network Driven by Big Data DOI Creative Commons
Haijiang Li, Xin Zhang, Peng Jia

et al.

Journal of Marine Science and Engineering, Journal Year: 2025, Volume and Issue: 13(1), P. 147 - 147

Published: Jan. 16, 2025

The dry bulk shipping network is an important carrier of global commodity flow. To better understand the structural characteristics and future development trends (GDBSN), this study proposes a framework for analysis link prediction based on complex theory. integrates large-scale heterogeneous data, including automatic identification system data port geographic information, to construct GDBSN. findings reveal that exhibits small-world properties, with Port Singapore identified as most influential node. Link results indicate many potential new routes exist within regions or between neighboring countries, exhibiting clear regional clustering characteristics. added links mainly influence local structure, minimal impact overall topology. This provides valuable insights companies in route planning authorities developing strategic plans.

Language: Английский

Citations

0

A unified temporal link prediction framework based on nonnegative matrix factorization and graph regularization DOI
Min Li, Shuming Zhou, Dajin Wang

et al.

The Journal of Supercomputing, Journal Year: 2025, Volume and Issue: 81(6)

Published: April 23, 2025

Language: Английский

Citations

0

Topology Design and Operation of Distribution Network Based on Multi-Objective Framework and Heuristic Strategies DOI Creative Commons
Qing Li, Shengjun Huang, Xueyang Zhang

et al.

Mathematics, Journal Year: 2024, Volume and Issue: 12(13), P. 1998 - 1998

Published: June 28, 2024

This work elucidates a methodological approach employed in the process of planning expansion distribution network (DN) lines, wherein amalgamation system reconfiguration capabilities with operational equilibrium and reliability is paramount. The proposals for DN radial operation schemes post-expansion are encompassed. We formulate bi-objective optimization model that concurrently addresses resource configuration optimization. Subsequently, NSGA-II algorithm to solve model, providing coordinated presentation multiple alternative solutions. However, this problem diverges from conventional problems due its nature as embedded sub-optimization problem, consequently imposing substantial computational burden. To address issue, heuristic algorithms designed optimize configuration, which regarded problem. proposed metric, validated on two case studies using IEEE 33-bus 70-bus test systems. Notably, method achieves solution efficiency by over 200 times compared existing methods.

Language: Английский

Citations

2

Negative collaboration risk analysis and control in manufacturing service collaboration based on complex network evolutionary game DOI
Han-Lin Sun, Yongping Zhang, Bo Liu

et al.

Expert Systems with Applications, Journal Year: 2024, Volume and Issue: 261, P. 125545 - 125545

Published: Oct. 11, 2024

Language: Английский

Citations

2

Spatiotemporal patterns in a 2D lattice of Hindmarsh–Rose neurons induced by high-amplitude pulses DOI

J.S. Ram,

Sishu Shankar Muni, Igor A. Shepelev

et al.

Chaos Solitons & Fractals, Journal Year: 2024, Volume and Issue: 189, P. 115613 - 115613

Published: Oct. 19, 2024

Language: Английский

Citations

2

Resilience evaluation and optimization for an air-ground cooperative network DOI Creative Commons

Xiaoyang Xie,

Shanghua Wen,

Minglong Li

et al.

Electronic Research Archive, Journal Year: 2024, Volume and Issue: 32(5), P. 3316 - 3333

Published: Jan. 1, 2024

<abstract> <p>The combat domain of modern warfare is becoming increasingly multidimensional. It important to evaluate the resilience air-ground cooperative network for defending against attack threats and recovery performance. First, a analysis model was proposed effectively analyze network. Then, considering available resources, three dynamic reconfiguration strategies were given from global perspective help quickly recover performance enhance capabilities. Finally, typical 50-node taken as an example prove effectiveness feasibility model. The method can provide scientific guidance improving capabilities.</p> </abstract>

Language: Английский

Citations

1

METHOD OF RATIONAL SYNTHESIS OF SUBSYSTEMS FOR CRYPTOGRAPHIC PROTECTION OF INFORMATION IN CRITICAL INFRASTRUCTURE NETWORKS DOI Creative Commons
Yevhen Hulak

Cybersecurity Education Science Technique, Journal Year: 2024, Volume and Issue: 4(24), P. 282 - 297

Published: Jan. 1, 2024

The article examines the state of development methodology for building information protection subsystems systems critical infrastructure objects, and separately highlights issue creating complex systems. It is noted that are characterized by presence a significant number disparate elements, which combined into single system to achieve certain goal; existence complex, sometimes contradictory relationships influences; powerful flows between component subsystems. analysis characteristics systems, negatively affect construction subsystems, was carried out, relevance solving tasks such especially within framework network situation centers, determined. implementation well-designed cryptographic subsystem (CIP), can provide reliable confidentiality integrity processed in system, contributes increasing its effectiveness. As part determining conditions application CIP lens ensure with limited access control integrity, method decomposition same type proposed model improved. Based on need as selection process. hardware software technological solutions multiple procedures quick comparison qualitative (semantic) quantitative indicators based properties functional profiles, rational greatest value security function means suitable use proposed.

Language: Английский

Citations

1