In order to study the vulnerability of the European express train transport network, statistics were made on the countries and cities along the route. The two methods of intentional attack are to study the changes of the network characteristic values, such as the average degree of the network, the proportion of isolated nodes, the average path length, and the network efficiency. Under the deliberate attack, the node average degree, aggregation coefficient, network efficiency, and average path length of the China-Europe train network decrease rapidly with the increase of the attack ratio and decrease to 0. Under random attack, the average node degree, network efficiency, and average path length of the network show a slow decreasing trend with the increase of the attack ratio, and the aggregation coefficient increases slowly and then decreases. The isolated node is no longer connected to other nodes under the deliberate attack and random attack, so the attacked node is the isolated point, which increases the cardinality of the isolated node. The research shows that the China Railway Express network is relatively strong when subjected to random attacks, and relatively vulnerable when subjected to deliberate attacks. At the same time, it is found that some nodes in the China Railway Express play an important role in the connectivity of the network.
Published in | Mathematics and Computer Science (Volume 7, Issue 3) |
DOI | 10.11648/j.mcs.20220703.13 |
Page(s) | 48-52 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2022. Published by Science Publishing Group |
China-Europe Railway Express, Complex Networks, Vulnerability, Connectivity, Damage Resistance
[1] | WU Di, WANG Nuo, YU Anqi, GUAN Lei. Vulnerability and risk management in the maritime silk road container shipping network [J]. Acta Geographica Sinica. 2018, 73 (6): 1133-1148. |
[2] | Xu Yingming, Xing Lizhi, Dong Xianlei. Research on the trade channel of China-Europe trains under the Belt and Road Initiative [J]. International Trade, 2019, 2: 80-86. |
[3] | WU Shan, HAN Xiaolong, LIU Chanjuan, et al. Vulnerability analysis of global container shipping network based on complex network. Computer Engineering and Applications, 2018, 54 (15): 249-254. |
[4] | DUAN Jiarong, ZHENG Hongda. Vulnerability analysis method for complex networks based on node importance [J]. Control Engineering of China, 2020, 27 (4): 692-696. |
[5] | WANG Nuo, DONG Lingling, WU Nuan, YAN Huakun. The change of global container shipping network vulnerability under intentional attack [J]. Acta Geographica Sinica. 2016, 71 (2): 293-303. |
[6] | JI Mingjun, LIU Shuangfu, GUO Xinghai. A study on the development planning of logistics parks along new eurasian land bridge [J]. Railway Transport and Andeconomy, 2019, 41 (2): 94-99. |
[7] | Yang Z L, Adolf N, Wang J. A new risk quantification approach in port facility security assessment [J]. Transportation Research Part A, 2014, 59: 72-90. |
[8] | Yang Z L, Adolf N, Wang J. Prioritising security vulnerabilities in ports [J]. International Journal of Shipping and Transpor tLogistics, 2013, 5 (6): 622-636. |
[9] | Talas R, Menachof D. Using portfolio optimisation to calculate the efficient relationship between maritime port security residual risk and security investment [J]. International Journal of Shipping and Transport Logistics, 2014, 6 (3): 314-338. |
[10] | Germond B. The geopolitical dimension of maritime security [J]. Marine Policy, 2015, 54: 137-142. |
[11] | A lbertR, Jeong H, BarabásiA-L. Error and attack tolerance of complex networks [J]. Nature, 2000, 406: 378-382. |
[12] | Zhao S C. Study on Reliability of Urban Public Transit Network Based on Complex Network Theory [J]. China Safety Science Journal, 2013, 23 (4): 108-112. |
[13] | Huang D R, Shen L B, Zhao L. Vulnerability Analysis of Urban Road Network Based on Complex Network Theory [J]. Journal of Chongqing Jiaotong University (Natural Science), 2015, 34 (1): 110-115. |
[14] | Liu D C, Ji X P, Wang B, et al. Topological Vulnerability Analysis and Countermeasures of Electrical Communication Network Based on Complex Network Theory [J]. Power System Technology, 2015, 39 (12): 3615-3621. |
[15] | Jiang X Y, Ji X, Huang J. Vulnerability Analysis of Shipboard Power Network Based on Complex Network Theory [J]. Ship Science and Technology, 2014, (8): 46-52. |
APA Style
Wang Nana, Gao Xinxin, Wang Xueqing. (2022). Research on the Vulnerability of China-Europe Railway Express Network. Mathematics and Computer Science, 7(3), 48-52. https://doi.org/10.11648/j.mcs.20220703.13
ACS Style
Wang Nana; Gao Xinxin; Wang Xueqing. Research on the Vulnerability of China-Europe Railway Express Network. Math. Comput. Sci. 2022, 7(3), 48-52. doi: 10.11648/j.mcs.20220703.13
@article{10.11648/j.mcs.20220703.13, author = {Wang Nana and Gao Xinxin and Wang Xueqing}, title = {Research on the Vulnerability of China-Europe Railway Express Network}, journal = {Mathematics and Computer Science}, volume = {7}, number = {3}, pages = {48-52}, doi = {10.11648/j.mcs.20220703.13}, url = {https://doi.org/10.11648/j.mcs.20220703.13}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.mcs.20220703.13}, abstract = {In order to study the vulnerability of the European express train transport network, statistics were made on the countries and cities along the route. The two methods of intentional attack are to study the changes of the network characteristic values, such as the average degree of the network, the proportion of isolated nodes, the average path length, and the network efficiency. Under the deliberate attack, the node average degree, aggregation coefficient, network efficiency, and average path length of the China-Europe train network decrease rapidly with the increase of the attack ratio and decrease to 0. Under random attack, the average node degree, network efficiency, and average path length of the network show a slow decreasing trend with the increase of the attack ratio, and the aggregation coefficient increases slowly and then decreases. The isolated node is no longer connected to other nodes under the deliberate attack and random attack, so the attacked node is the isolated point, which increases the cardinality of the isolated node. The research shows that the China Railway Express network is relatively strong when subjected to random attacks, and relatively vulnerable when subjected to deliberate attacks. At the same time, it is found that some nodes in the China Railway Express play an important role in the connectivity of the network.}, year = {2022} }
TY - JOUR T1 - Research on the Vulnerability of China-Europe Railway Express Network AU - Wang Nana AU - Gao Xinxin AU - Wang Xueqing Y1 - 2022/05/19 PY - 2022 N1 - https://doi.org/10.11648/j.mcs.20220703.13 DO - 10.11648/j.mcs.20220703.13 T2 - Mathematics and Computer Science JF - Mathematics and Computer Science JO - Mathematics and Computer Science SP - 48 EP - 52 PB - Science Publishing Group SN - 2575-6028 UR - https://doi.org/10.11648/j.mcs.20220703.13 AB - In order to study the vulnerability of the European express train transport network, statistics were made on the countries and cities along the route. The two methods of intentional attack are to study the changes of the network characteristic values, such as the average degree of the network, the proportion of isolated nodes, the average path length, and the network efficiency. Under the deliberate attack, the node average degree, aggregation coefficient, network efficiency, and average path length of the China-Europe train network decrease rapidly with the increase of the attack ratio and decrease to 0. Under random attack, the average node degree, network efficiency, and average path length of the network show a slow decreasing trend with the increase of the attack ratio, and the aggregation coefficient increases slowly and then decreases. The isolated node is no longer connected to other nodes under the deliberate attack and random attack, so the attacked node is the isolated point, which increases the cardinality of the isolated node. The research shows that the China Railway Express network is relatively strong when subjected to random attacks, and relatively vulnerable when subjected to deliberate attacks. At the same time, it is found that some nodes in the China Railway Express play an important role in the connectivity of the network. VL - 7 IS - 3 ER -