System recovery with memory after intentional attack: a simulation study

Network models are widely used to solve the practical system problems as the result of rapid development of network theory. Modern power system and communication system are both established on the basis of network theory. During the process of many natural network formation, scientists find the pref...

Full description

Saved in:
Bibliographic Details
Main Author: Huang, Jiajun
Other Authors: Xiao Gaoxi
Format: Thesis-Master by Coursework
Language:English
Published: Nanyang Technological University 2022
Subjects:
Online Access:https://hdl.handle.net/10356/159407
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-159407
record_format dspace
spelling sg-ntu-dr.10356-1594072023-07-04T17:44:42Z System recovery with memory after intentional attack: a simulation study Huang, Jiajun Xiao Gaoxi School of Electrical and Electronic Engineering EGXXiao@ntu.edu.sg Engineering::Electrical and electronic engineering::Computer hardware, software and systems Network models are widely used to solve the practical system problems as the result of rapid development of network theory. Modern power system and communication system are both established on the basis of network theory. During the process of many natural network formation, scientists find the preferential connection phenomenon. And this phenomenon will lead to that degree distributions of networks follow power-law distribution and these networks are known as scale-free networks. In scale-free networks, there are a small number of vertices with quite high degree and most vertices only have low degree. So the attack to these networks is often intended to destroy the key vertices in the networks. Because the connectivity and stability of this kind of networks mainly depend on these key vertices. In this dissertation, we study the recovery strategy of scale-free networks after massive intentional attack. For scale-free networks generation, we remove the correlation between vertices in the network and the degree distribution can be prescribed. We will evaluate the stability of networks with various degree distributions when facing attack. For recovery of networks, several different kinds of strategies will be studied. These strategies create new edges between the remaining vertices in the network and the connectivity and completeness of the networks can be measured with average distance and largest cluster size respectively. By comparing various repair methods, we hope improvement can be made to these methods and this dissertation can provide references for further research on networks recovery. Master of Science (Communications Engineering) 2022-06-16T06:21:24Z 2022-06-16T06:21:24Z 2022 Thesis-Master by Coursework Huang, J. (2022). System recovery with memory after intentional attack: a simulation study. Master's thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/159407 https://hdl.handle.net/10356/159407 en D-254-21221-03412 application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Electrical and electronic engineering::Computer hardware, software and systems
spellingShingle Engineering::Electrical and electronic engineering::Computer hardware, software and systems
Huang, Jiajun
System recovery with memory after intentional attack: a simulation study
description Network models are widely used to solve the practical system problems as the result of rapid development of network theory. Modern power system and communication system are both established on the basis of network theory. During the process of many natural network formation, scientists find the preferential connection phenomenon. And this phenomenon will lead to that degree distributions of networks follow power-law distribution and these networks are known as scale-free networks. In scale-free networks, there are a small number of vertices with quite high degree and most vertices only have low degree. So the attack to these networks is often intended to destroy the key vertices in the networks. Because the connectivity and stability of this kind of networks mainly depend on these key vertices. In this dissertation, we study the recovery strategy of scale-free networks after massive intentional attack. For scale-free networks generation, we remove the correlation between vertices in the network and the degree distribution can be prescribed. We will evaluate the stability of networks with various degree distributions when facing attack. For recovery of networks, several different kinds of strategies will be studied. These strategies create new edges between the remaining vertices in the network and the connectivity and completeness of the networks can be measured with average distance and largest cluster size respectively. By comparing various repair methods, we hope improvement can be made to these methods and this dissertation can provide references for further research on networks recovery.
author2 Xiao Gaoxi
author_facet Xiao Gaoxi
Huang, Jiajun
format Thesis-Master by Coursework
author Huang, Jiajun
author_sort Huang, Jiajun
title System recovery with memory after intentional attack: a simulation study
title_short System recovery with memory after intentional attack: a simulation study
title_full System recovery with memory after intentional attack: a simulation study
title_fullStr System recovery with memory after intentional attack: a simulation study
title_full_unstemmed System recovery with memory after intentional attack: a simulation study
title_sort system recovery with memory after intentional attack: a simulation study
publisher Nanyang Technological University
publishDate 2022
url https://hdl.handle.net/10356/159407
_version_ 1772825569539391488