1887
banner image
No data available.
Please log in to see this content.
You have no subscription access to this content.
No metrics data to plot.
The attempt to load metrics for this article has failed.
The attempt to plot a graph for these metrics has failed.
Reducing the vulnerability of network by inserting modular topologies
Rent:
Rent this article for
USD
10.1063/1.4792267
/content/aip/journal/chaos/23/1/10.1063/1.4792267
http://aip.metastore.ingenta.com/content/aip/journal/chaos/23/1/10.1063/1.4792267
View: Figures

Figures

Image of FIG. 1.
FIG. 1.

The process of our strategy: (a) the network G 0; (b) the first modular WS small-world network (with yellow nodes and black solid connections) be inserted; (c) more modular WS small-world network be inserted.

Image of FIG. 2.
FIG. 2.

The betweenness reduction results using our strategy, with α = 0, 0.3, 0.6 and 0.9, respectively, when generating the modular WS small-world networks. All these modular networks are set S = 16, K = 4, and fm  = 0.5.

Image of FIG. 3.
FIG. 3.

The betweenness reduction results using our strategy, with K = 2, 4, and 6, respectively, when generating the modular WS small-world networks. All these modular networks are set S = 16, α = 0.3, and fm  = 0.5.

Image of FIG. 4.
FIG. 4.

The betweenness reduction results using our strategy, with fm  = 2, 4, and 6, respectively, when generating the modular WS the small-world networks. All these modular are set S = 16, α = 0.3, and K = 4.

Image of FIG. 5.
FIG. 5.

The betweenness reduction results using our strategy, with S = 12, 16, 20, and 30, respectively, when generating the modular WS small-world networks. (a) All these modular networks are set K = 4, α = 0.3, and fm 0.5; (b) All these modular networks are set K = 0.25 S, α = 0.3, and fm  = 0.5.

Image of FIG. 6.
FIG. 6.

The betweenness reduction results using our strategy and other four node-pair-connecting methods. The modular networks are set S = 16, K = 2, α = 0.3, and fm = 0.5.

Image of FIG. 7.
FIG. 7.

The betweenness reduction results with methods of our strategy (black solid lines), connecting node pairs randomly with one node added (red solid lines) and our strategy making random connections instead (blue dash lines), in basis networks with node number N0  = (a) 100; (b) 500; (c) 1000. The modular networks are set S = 16, K = 2, α = 0.3, and fm  = 0.5.

Image of FIG. 8.
FIG. 8.

The repeated tests resulted in Fig. 7(a) using the max betweenness as a function against fa .

Loading

Article metrics loading...

/content/aip/journal/chaos/23/1/10.1063/1.4792267
2013-02-15
2014-04-16
Loading

Full text loading...

This is a required field
Please enter a valid email address
752b84549af89a08dbdd7fdb8b9568b5 journal.articlezxybnytfddd
Scitation: Reducing the vulnerability of network by inserting modular topologies
http://aip.metastore.ingenta.com/content/aip/journal/chaos/23/1/10.1063/1.4792267
10.1063/1.4792267
SEARCH_EXPAND_ITEM