Showing 1 - 10 of 13
pattern apparently arises from a bending of the granular layer. For f at vgm less than fss and v<vgm, patterns are tenuous and …
Persistent link: https://www.econbiz.de/10011058483
We investigate how additive weak noise (correlated as well as uncorrelated) modifies the parameters of the Gray–scott reaction diffusion system by performing numerical simulations and applying a renormalization group (RG) analysis in the neighborhood of the spatial scale where biochemical...
Persistent link: https://www.econbiz.de/10011058882
We investigate vulnerability of complex networks including model networks and real-world networks subject to path …. These findings further help us understand the vulnerability of complex systems, better protect complex systems, and design …
Persistent link: https://www.econbiz.de/10011117880
The cascading failure can bring a huge loss for most real-world networks; but, we cannot uncover fully the mechanism and law of the cascading events occurrence. Most networks in which the cascading failure occurred are based on the various ‘flows’, such as power, oils, and information;...
Persistent link: https://www.econbiz.de/10011209713
Many scholars have used different metrics to quantify power grid vulnerability in the literature, but how correlated … these metrics are is an interesting topic. This paper defines vulnerability as the performance drop of a power grid under a … respectively quantify power grid vulnerability V under different node or edge failure probabilities fp and then analyzes the …
Persistent link: https://www.econbiz.de/10010730331
We show how one can completely reconstruct even moderately optimized configurations of the Forest Fire model with relatively few observations. We discuss the relationship between the deep information from limited observations (DILO) to the robust-yet-fragile (RYF) property of the Forest Fire...
Persistent link: https://www.econbiz.de/10010872362
In this paper, a framework is given to model the network of networks and to investigate the vulnerability of the … dependent intensity between two networks is introduced and adopted to discuss the vulnerability of the interdependent … communication network are utilized to investigate the vulnerability of the rail network. The results show that the rail network …
Persistent link: https://www.econbiz.de/10010906966
Many scholars have applied complex network based models to investigate power grid vulnerability, but how effective are … flow model (DCPFM), to simulate the topology-based and flow-based vulnerability of power grid under degree, betweenness …, maximum traffic and importance based intentional attacks. The relationships of vulnerability results from different models are …
Persistent link: https://www.econbiz.de/10011059174
Acyclic networks are a class of complex networks in which links are directed and do not have closed loops. Here we present an algorithm for transforming an ordinary undirected complex network into an acyclic one. Further analysis of an acyclic network allows one to find the structural properties...
Persistent link: https://www.econbiz.de/10011062531
We propose a metric for vulnerability of labeled graphs that has the following two properties: (1) when the labeled … fully connected topology is equally vulnerable as any other. A vulnerability analysis of two real-world networks, the power … networks’ vulnerability compared to the case when the networks are modeled with unlabeled graphs. …
Persistent link: https://www.econbiz.de/10010588760