Font Size: a A A

Research On Vulnerability Of Airlines And High-speed Railway Double-layer Complex Network Under The Major Public Health Disasters

Posted on:2024-08-13Degree:MasterType:Thesis
Country:ChinaCandidate:Q Q WangFull Text:PDF
GTID:2542307157972849Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
In recent years,air transport and high-speed rail transport have experienced rapid development,constantly shaping a new pattern of transportation network.Therefore,it is of great significance to study their vulnerability for the continuous improvement of transportation network.Based on the background of major public health disasters,this study analyzes the vulnerability of China aviation-high-speed rail double-layer operation network.Firstly,a two-layer complex network of aviation and high-speed rail is established according to Space-P modeling.Secondly,it describes the vulnerability analysis algorithm of two-tier network from the perspective of traditional disasters,and puts forward the vulnerability analysis algorithm of two-tier network from its perspective according to the characteristics of major public disasters.Then,three network structural vulnerability indexes,namely,the average shortest path length,the relative size of the maximum connected subgraph and the overall network efficiency,are selected to measure the vulnerability of the aviation-high-speed rail double-layer operation network,and at the same time,the functional vulnerability of the aviation-high-speed rail double-layer complex network is characterized by the index of transfer connection strength.Taking China Airlines-high-speed rail double-layer operation network as an example,this paper explores the influential communicators in China Airlines-high-speed rail double-layer complex network,simulates the changes of network structure vulnerability of China Airlines-high-speed rail double-layer complex network under two attack modes(random attack and intentional attack based on the maximum MCGM value)by using MATLAB software,and compares the vulnerability differences of China Airlines-high-speed rail double-layer complex network under different attack modes.Finally,three vulnerability optimization strategies are put forward.The results show that:(1)The high-impact nodes of the aviation-high-speed rail double-layer complex network are Beijing,Zhengzhou,Shanghai,Nanjing,Changsha,Hangzhou,Wuxi,Changzhou,Hefei and Wuhan,which are mostly located in the eastern and central regions,and their spatial distribution is more uniform than that of the high-speed rail sub-network.(2)From the perspective of major public health disasters,the intentional attack based on the maximum MCGM value is aimed at the influential nodes in the network,so the vulnerability index of the network will decline faster than the random attack,and the intentional attack based on the maximum MCGM value will do more damage to the system than the random attack.From the point of attack step,the aviation-high-speed rail double-layer complex network > high-speed rail subnet > aviation subnet,which shows that the vulnerability of a single network is high and the double-layer network has high invulnerability.(3)Traditional extreme events that destroy the station facilities will have a greater impact on the high-speed rail-aviation double-layer network than major public health disasters that cause the station to fail.The complementary strength of aviation subnetwork to high-speed rail subnetwork is less than that of high-speed rail subnetwork to aviation subnetwork,and the transfer connection strength of high-speed rail-aviation double-layer network is always higher than that of high-speed rail-aviation double-layer network after station facilities fail and airport is affected.(4)According to the above conclusions,the corresponding vulnerability optimization measures are put forward for China’s aviation-high-speed rail double-tier operation network under the impact of major public health disasters,which are respectively the overall vulnerability optimization of the operation network;Ensure the transfer function of key nodes;Neighboring nodes stop after node failure.
Keywords/Search Tags:Two-layer complex network, vulnerability, transfer connection strength, gravity model
PDF Full Text Request
Related items