Relationship Between Spatial Vulnerability and Traditional Network Properties
LI Hang, HU Xiaobing, GUO Xiaomei, SHI Peijun
a. Academy of Disaster Reduction and Emergency Management,b. State Key Laboratory of Earth Surface Process and Resource Ecology, Beijing Normal University, Beijing 100875, China
Abstract:To explore a new thinking for network vulnerability research, and improve the practicality of spatial vulnerability model, this paper analyzes the relationship between spatial vulnerability and four traditional network properties, average shortest path, average betweenness, connectivity and amount of impacted shortest paths, and conducts a case study on Beijing′s subway network to verify this relationship. The results show that, when the global impact of spatial hazards is concerned in network vulnerability research, the reasonable combination of the new spatial vulnerability model and traditional network properties can deliver an effective approach.
李航, 胡小兵, 郭晓梅, 史培军. 空间脆弱性与传统网络属性的关系[J]. 复杂系统与复杂性科学, 2017, 14(1): 1-7.
LI Hang, HU Xiaobing, GUO Xiaomei, SHI Peijun. Relationship Between Spatial Vulnerability and Traditional Network Properties[J]. Complex Systems and Complexity Science, 2017, 14(1): 1-7.
[1] Palla G, Derenyi I, Farkas I, et al. Uncovering the overlapping community structure of complex networks in nature and society[J].Nature,2005,435(9): 814-818. [2] Barabasi A L, Albert R. Emergence of scaling in random networks[J].Science,1999,286: 509-512. [3] 罗赟骞,汤锦辉,赵钟磊,等. 中国航空交通网络时变和多层次特性分析[J].复杂系统和复杂性科学,2014,11(4):4-9. Luo Yunqian, Tang Jinhui, Zhao Zhonglei, et. al. Analysis of Chinese airport network’s time-varing and multi-layered features[J].Complex Systems and Complexity Science, 2014,11(4):4-9. [4] 孟仲伟,鲁宗相,宋靖雁. 中美电网的小世界拓扑模型比较分析[J].电力系统自动化,2004,25(15):21-24. Meng Zhongwei, Lu Zongxiang, Song Jingyan. Comparison analysis of the small-world topological model of Chinese and American power grids[J].Automation of Electric Power Systems, 2004,25(15):21-24. [5] 刘业政,周云龙. 无尺度网络平均路径长度的估计[J].系统工程理论与实践,2014,34(6):1566-1571. Liu Yezheng, Zhou Yunlong. Estimation for the average path length of scale-free networks[J].Systems Engineering-Theory & Practice, 2014,34(6):1566-1571. [6] Mazzocchi M, Hansstein F, Ragona M. The 2010 volcanic ash cloud and its financial impact on the European airline industry[J]//CESifo Forum. 2010,11(2): 92-100. [7] 杨露萍,钱大琳. 道路交通网络脆弱性研究[J].交通运输系统工程与信息,2011,12(2):105-110. Yang LuPing, Qian DaLin. Vulnerability analysis of road networks[J].Joural of Transportation Systems Engineering and Information Technology, 2011,12(2):105-110. [8] Liu H, Hu X B, Yang S N, et.al. Application of complex network theory and genetic algorithm in airline route networks[J].Transportation Research Record,2011,2214: 50-58. [9] 许凤,朱金福,苗建军. 基于复杂网络的空铁符合网络的鲁棒性研究[J].复杂系统和复杂性科学,2015,12(1):1-6. Xu Feng, Zhu JinFu, Miao JianJun. The robustness of high-speed railway and civil aviation compound network based on the complex network theory[J].Complex Systems and Complexity Science, 2015,12(1):1-6. [10] 王志强,李欣,李岩,等. 基于复杂网络与风险的电网综合脆弱性评估[J].现代电力,2014,31(3):49-55. Wang ZhiQiang, Li Xin, Li Yan,et al. Comprehensive vulnerability evaluation of power grid based on complex network and risk theory[J].Modern Electric Power, 2014,31(3):49-55. [11] 尹洪英,徐丽群. 道路交通网络脆弱性评估研究现状与展望[J].交通运输系统工程与信息,2010,10(3):7-13. Yin HongYing, Xu LiQun. Vulnerability assessment of transportation road networks[J].Joural of Transportation Systems Engineering and Information Technology, 2010,10(3):7-13. [12] 叶青. 基于复杂网络理论的轨道交通网络脆弱性分析[J].中国安全科学学报,2012,22(2):122-126. Ye Qing. Vulnerability analysis of rail transit based on complex network theory[J].China Safety Science Joural, 2012,22(2):122-126. [13] Wollmer R. Removing arcs from a network[J].Operation research,1964,12(6): 934-940. [14] Corley H W, Sha D Y. Most vital links and nodes in weighted networks[J].Operations Research Letters,1982,1(4):157-160. [15] Grubesic T H, O'Kelly M E, Murray A T. A geographic perspective on commercial Internet survivability[J].Telematics & Informatics, 2003, 20(1):51-69. [16] Murray A T, Matisziw T C, Grubesic T H. Critical network infrastructure analysis: interdiction and system flow[J].Journal of Geographical Systems,2007,9(2): 103-117. [17] Helbing D. Globally networked risks and how to respond[J].Nature,2013,497: 51-59. [18] 李航,郭晓梅,许珍,等. 空间局域性灾害下网络系统的空间脆弱性研究[J].自然灾害学报,2015,24(6):19-32. Li Hang, Guo XiaoMei, Xu Zhen, et al. Research on spatial vulnerability of network systems under spatially local hazards[J].Journal of Natural Disasters,2015,24(6):19-32. [19] 李鹤,张平宇,程叶青. 脆弱性的概念及其评价方法[J].地理科学进展,2008,27(2):18-25. Li He, Zhang PingYu, Chen YeQing. Concepts and assessment methods of vulnerability[J].Progress in Geography, 2008,27(2):18-25. [20] Strihou J P V Y D. Climate change 2001: impacts, adaptation and vulnerability, summary for policymakers[M]//Climate Change 2001: Impacts, Adaptation and Vulnerability. Contribution of Working Group II to the Third Assessment Report of the Intergovernmental Panel on Climate Change. 2001. [21] Cutter S L, Boruff B J, Shirley W L. Social vulnerability to environmental hazards[J].Social Science Quarterly,2003,84(2): 242-261. [22] Shi P, Ning L I, Qian Y E, et al. Research on global environmental change and integrated disaster risk governance[J].Advances in Earth Science, 2009, 24(4):428-435.