Zhihui kongzhi yu fangzhen (Apr 2024)

Identification of key nodes and research the anti-destruction performance of normal duty command model

  • GUO Zhengxuan, LIANG Wenjun, SU Yang, CHEN Rui

DOI
https://doi.org/10.3969/j.issn.1673-3819.2024.02.012
Journal volume & issue
Vol. 46, no. 2
pp. 84 – 89

Abstract

Read online

The research emphasized the invulnerability of tree command network and Cascade Command network based on the normal duty command model. Random attack and deliberate attack are employed on three kinds of duty command models. The paper found out the best anti-destruction performance model by comparing and analyzing indicators like the indexes of maximum connectivity subgraph size, network efficiency, global aggregation coefficient etc. The collective influence algorithm is used to identify the key nodes of the command network with the best anti-destruction performance, and compared with the traditional key node identification method based on node degree, it is proved that it is more accurate to identify key nodes based on the collective influence algorithm which could provide theoretical guidance for the optimization and protection of the future regular duty command network.

Keywords