Computer Science ›› 2020, Vol. 47 ›› Issue (10): 275-281.doi: 10.11896/jsjkx.190800087
• Computer Network • Previous Articles Next Articles
LI Hui, ZHOU Liang-ping, YANG Jun, ZHAO Shu-ping
CLC Number:
[1]ZHANG H,HU C Z,WANG X.Brittleness analysis and important nodes discovery in large time-evolving complex networks[J].Journal of Shanghai jiaotong university (English Version),2017,22(1):50-54. [2]AKSHA S K,LUKE J,RESLER L L M,et al.An analysis of social vulnerability to natural hazards in nepal using a modified social vulnerability index [J].International Scientific Journal of Disaster Risk (English edition),2019(5):51-59. [3]PENG Q Y,FENG L P,W C,et al.Structural brittleness analysis of information transfer process of high-speed railway train control[J].Journal of Southwest Jiaotong University,2017,52(5):1-6. [4]ZHU T T,DING J Y,TIAN S M,et al.Cascading failure forcest based on compound vulnerability relevance and imporved Floyed algorithm[J].Journal of Electric Power Science and Technology,2018,33(4):58-65. [5]SHAO R R,FANG Z G,XU X W,et al.Research on improving closed-loop supply chain system based on brittleness theory[J].Journal of China University of Science and Technology,2018,48(11):68-77. [6]MA J,JU Z.Cascading failure model of scale-free networks for avoiding edge failure [J].Peer to Peer Networking & Applications,2019(13):1-12. [7]MAVHURA E.Systems analysis of vulnerability to hydrometeorological threats:an exploratory study of vulnerability drivers in Northern Zimbabwe [J].International Journal of Disaster Risk Science,2019,10(2):204-219. [8]XING B,CAO J H,SONG T L,et al.Research on cooperation support model of equipment support system of systems based on complex network[J].Acta Armamentarii,2017,38(2):374-382. [9]ZHANG H,HU C,WANG X.Application of complexity and brittleness on software architecture[C]//IEEE International Conference on Communication Software & Networks.2016:570-573. [10]WANG X L,LIU M X,PAN W H.Analysis of the vulnerability of air traffic information physical systems[J].China science paper,2019,14(2):47-51. [11]ELLINAS C.The domino effect:an empirical exposition of systemic risk across project networks [J].Production and Operations Management,2019,28(1):63-81. [12]EKOMWENRENREN E,ALHARBI H,ELGORASHI T,et al.A stabilising control strategy for cyber-physical power systems [J].Iet control Theory & Applications,2019(5):1-8. [13]LI M C,MEI W M,LIU Y Q,et al.Accurate identification method of brittle branches in power grid based on improved load flow entropy indexes[J].Power System Technology,2019,43(3):1026-1033. [14]LIU W Q,XU L Y,CHEN Y P.Brittleness measurement and evalution analysis of manufacturing equipment based on brittle risk entropy[J].Computer Integrated Manufacturing Systems,2019,25(11):2820-2830. [15]MOHAPATRA A G,LENKA S K,KESWANI B.Neural network and fuzzy logic based smart DSS model for irrigation notification and control in precision agriculture[J].Proceeding of the National Academy of Sciences India,2018,89(5):1-10. [16]OKAMOTO K,LTTI L,TSIOTRAS P.Vision-based autonomous path following using a human driver control model with reliable input-feature value estimation[J].IEEE Transactions on Intelligent Vehicles,2019,4(3):497-506. [17]AADALEESAN P,SAHA P.A nash game approach to mixed H2/H∞ model predictive control:part 3-output feedback case[J].International Journal of Automation and Computing,2018,15(5):12-18. [18]An extended linear quadratic model predictive control approach for multi-destination urban traffic networks[J].IEEE Transactions on Intelligent Transportation Systems,2018,PP(99):1-14. |
[1] | NAN Ming-li, LI Jian-hua, CUI Qiong, RAN Hao-dan. Flexibility Measurement Model of Command and Control Information Chain for Networked Operations [J]. Computer Science, 2018, 45(10): 306-312. |
[2] | YANG Ying-hui, LI Jian-hua, NAN Ming-li, CUI Qiong and WANG Hong. Networked Operational Information Flowing Dynamic Hypergraph Model Based on Motif [J]. Computer Science, 2016, 43(8): 30-35. |
|