Vulnerability of nodes under controlled network topology and flow autocorrelation conditions

被引:42
作者
Lopez, Fernando A. [2 ]
Paez, Antonio [1 ]
Carrasco, Juan A. [3 ]
Ruminot, Natalia A. [3 ]
机构
[1] McMaster Univ, Sch Geog & Earth Sci, 1280 Main St West, Hamilton, ON L8S 4K1, Canada
[2] Univ Politecn Cartagena, Fac Ciencias Empresa, Dept Metodos Cuantitat & Informat, Calle Real 3, Cartagena 30201, Spain
[3] Univ Concepcion, Dept Civil Engn, POB 160-C, Concepcion, Chile
基金
加拿大自然科学与工程研究理事会;
关键词
Networks; Vulnerability; Topology; Autocorrelation; Simulation; TRANSPORT NETWORK; SOCIAL-INFLUENCE; INFRASTRUCTURE; MODEL; CENTRALITY; FRAMEWORK; POWER;
D O I
10.1016/j.jtrangeo.2017.02.002
中图分类号
F [经济];
学科分类号
02 ;
摘要
Infrastructure networks, including transportation, telecommunications, and energy grids, are essential for the correct functioning of many economic and social processes. Considering the import of networked critical infrastructure, it is clear that understanding the characteristics of networks that make them vulnerable to disruption is a valuable endeavor. As recent research demonstrates, network vulnerability is a very relevant issue on the design and operation of any networked process in general, and transportation in particular, where the main interest is on identifying network elements that are singularly sensible to disruptions to their integrity. While there have been some suggestions from the literature that the configuration of the network may influence the vulnerability of individual elements, a systematic investigation of network topology and vulnerability has not been conducted. Furthermore, neither has there been an account of the relevance of coherence in the contents of the network, or in other words, the autocorrelation of flows. Accordingly, the objective of this paper is to investigate, from the perspective of the integrity of nodes, the vulnerability to disruption of individual network elements, while controlling for network topology and autocorrelation. Analysis is based on extensive numerical simulations for different network configurations and spatial autocorrelation levels, and the results obtained demonstrate that the proper evaluation of network vulnerability requires not only an understanding of its topology, but also of the distribution of flows. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:77 / 87
页数:11
相关论文
共 61 条
[1]   Vulnerability of systems [J].
Agarwal, J ;
Blockley, DI ;
Woodman, NJ .
CIVIL ENGINEERING AND ENVIRONMENTAL SYSTEMS, 2001, 18 (02) :141-165
[2]   Error and attack tolerance of complex networks [J].
Albert, R ;
Jeong, H ;
Barabási, AL .
NATURE, 2000, 406 (6794) :378-382
[3]  
Allen R. G., 1998, FAO Irrigation and Drainage Paper
[4]  
[Anonymous], 1995, Interactive spatial data analysis
[5]   Computing topological parameters of biological networks [J].
Assenov, Yassen ;
Ramirez, Fidel ;
Schelhorn, Sven-Eric ;
Lengauer, Thomas ;
Albrecht, Mario .
BIOINFORMATICS, 2008, 24 (02) :282-284
[6]   Network biology:: Understanding the cell's functional organization [J].
Barabási, AL ;
Oltvai, ZN .
NATURE REVIEWS GENETICS, 2004, 5 (02) :101-U15
[7]   Emergence of scaling in random networks [J].
Barabási, AL ;
Albert, R .
SCIENCE, 1999, 286 (5439) :509-512
[8]  
Berdica K., 2002, Transp. Policy, V9, P117, DOI [DOI 10.1016/S0967-070X(02)00011-2, 10.1016/S0967-070X(02)00011-2]
[9]  
BLACK WR, 1992, GEOGR ANAL, V24, P207
[10]  
BONACICH P, 1987, AM J SOCIOL, V92, P1170, DOI 10.1086/228631