Yuanni Liu
ChongQing University of Posts and Telecommunications

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Indonesian Journal of Electrical Engineering and Computer Science

Network Invulnerability Assessment Technology Based on the ENI Yuanni Liu; Hong Tang; Guofeng Zhao; Yunpeng Xiao; Chuan Xu
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 9: September 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In this paper, we have proposed a network invulnerability assessment technique based on the entropy of node importance (ENI) determined by the node betweenness combined with node degree, which can measure the network invulnerability dynamically. Simulation results show that the ENI network entropy can accurately change its values as the network nodes removed deliberately or randomly from the network, and ENI can estimate the network invulnerability accurately, as well as can reflect the damage degree of the network according to network entropy. DOI: http://dx.doi.org/10.11591/telkomnika.v11i9.2966
Efficiency Analysis of Scale-free Network Cascading Failures under Different Types of Attacks Yuanni Liu; Hong Tang; Guofeng Zhao; Yunpeng Xiao; Chuan Xu
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 10: October 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Cascading failures are common in most of the networks, which can result in a congestion regime with degradation in the network performance. In order to investigate how a small shock can trigger avalanches mechanisms affecting a considerable fraction of the network, lots of failure models have been constructed. In this paper, Based on our AHP network cascading model, we have estimated how the efficiency will be affected when coefficients of K, S, T changed, we  find the fact  that the network efficiency of BA network is determined by its attacked types, and  the efficiency  is largely influenced by the attacked types of K and S, and under the same number of failure node, the efficiency under attacks of types T and I are relatively higher than that of the efficiency under attacks of types S and K , and the importance I is largely determined by the proportion of T, when the node failure number is equal, the higher proportion of T, the  higher efficiency it is  under I type attacks. We also tabled some proposals for reducing the damage that the networks suffered from the cascading failures. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.2968