System recovery with memory after intentional attack: a simulation study
Network models are widely used to solve the practical system problems as the result of rapid development of network theory. Modern power system and communication system are both established on the basis of network theory. During the process of many natural network formation, scientists find the pref...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Thesis-Master by Coursework |
Language: | English |
Published: |
Nanyang Technological University
2022
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/159407 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-159407 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1594072023-07-04T17:44:42Z System recovery with memory after intentional attack: a simulation study Huang, Jiajun Xiao Gaoxi School of Electrical and Electronic Engineering EGXXiao@ntu.edu.sg Engineering::Electrical and electronic engineering::Computer hardware, software and systems Network models are widely used to solve the practical system problems as the result of rapid development of network theory. Modern power system and communication system are both established on the basis of network theory. During the process of many natural network formation, scientists find the preferential connection phenomenon. And this phenomenon will lead to that degree distributions of networks follow power-law distribution and these networks are known as scale-free networks. In scale-free networks, there are a small number of vertices with quite high degree and most vertices only have low degree. So the attack to these networks is often intended to destroy the key vertices in the networks. Because the connectivity and stability of this kind of networks mainly depend on these key vertices. In this dissertation, we study the recovery strategy of scale-free networks after massive intentional attack. For scale-free networks generation, we remove the correlation between vertices in the network and the degree distribution can be prescribed. We will evaluate the stability of networks with various degree distributions when facing attack. For recovery of networks, several different kinds of strategies will be studied. These strategies create new edges between the remaining vertices in the network and the connectivity and completeness of the networks can be measured with average distance and largest cluster size respectively. By comparing various repair methods, we hope improvement can be made to these methods and this dissertation can provide references for further research on networks recovery. Master of Science (Communications Engineering) 2022-06-16T06:21:24Z 2022-06-16T06:21:24Z 2022 Thesis-Master by Coursework Huang, J. (2022). System recovery with memory after intentional attack: a simulation study. Master's thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/159407 https://hdl.handle.net/10356/159407 en D-254-21221-03412 application/pdf Nanyang Technological University |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Electrical and electronic engineering::Computer hardware, software and systems |
spellingShingle |
Engineering::Electrical and electronic engineering::Computer hardware, software and systems Huang, Jiajun System recovery with memory after intentional attack: a simulation study |
description |
Network models are widely used to solve the practical system problems as the result of rapid development of network theory. Modern power system and communication system are both established on the basis of network theory. During the process of many natural network formation, scientists find the preferential connection phenomenon. And this phenomenon will lead to that degree distributions of networks follow power-law distribution and these networks are known as scale-free networks. In scale-free networks, there are a small number of vertices with quite high degree and most vertices only have low degree. So the attack to these networks is often intended to destroy the key vertices in the networks. Because the connectivity and stability of this kind of networks mainly depend on these key vertices. In this dissertation, we study the recovery strategy of scale-free networks after massive intentional attack. For scale-free networks generation, we remove the correlation between vertices in the network and the degree distribution can be prescribed. We will evaluate the stability of networks with various degree distributions when facing attack. For recovery of networks, several different kinds of strategies will be studied. These strategies create new edges between the remaining vertices in the network and the connectivity and completeness of the networks can be measured with average distance and largest cluster size respectively. By comparing various repair methods, we hope improvement can be made to these methods and this dissertation can provide references for further research on networks recovery. |
author2 |
Xiao Gaoxi |
author_facet |
Xiao Gaoxi Huang, Jiajun |
format |
Thesis-Master by Coursework |
author |
Huang, Jiajun |
author_sort |
Huang, Jiajun |
title |
System recovery with memory after intentional attack: a simulation study |
title_short |
System recovery with memory after intentional attack: a simulation study |
title_full |
System recovery with memory after intentional attack: a simulation study |
title_fullStr |
System recovery with memory after intentional attack: a simulation study |
title_full_unstemmed |
System recovery with memory after intentional attack: a simulation study |
title_sort |
system recovery with memory after intentional attack: a simulation study |
publisher |
Nanyang Technological University |
publishDate |
2022 |
url |
https://hdl.handle.net/10356/159407 |
_version_ |
1772825569539391488 |