Showing 1 - 10 of 13
pattern apparently arises from a bending of the granular layer. For f at vgm less than fss and v<vgm, patterns are tenuous and …
Persistent link: https://www.econbiz.de/10011058483
We investigate how additive weak noise (correlated as well as uncorrelated) modifies the parameters of the Gray–scott reaction diffusion system by performing numerical simulations and applying a renormalization group (RG) analysis in the neighborhood of the spatial scale where biochemical...
Persistent link: https://www.econbiz.de/10011058882
In this paper, a framework is given to model the network of networks and to investigate the vulnerability of the … dependent intensity between two networks is introduced and adopted to discuss the vulnerability of the interdependent … communication network are utilized to investigate the vulnerability of the rail network. The results show that the rail network …
Persistent link: https://www.econbiz.de/10010906966
The cascading failure can bring a huge loss for most real-world networks; but, we cannot uncover fully the mechanism and law of the cascading events occurrence. Most networks in which the cascading failure occurred are based on the various ‘flows’, such as power, oils, and information;...
Persistent link: https://www.econbiz.de/10011209713
Many scholars have used different metrics to quantify power grid vulnerability in the literature, but how correlated … these metrics are is an interesting topic. This paper defines vulnerability as the performance drop of a power grid under a … respectively quantify power grid vulnerability V under different node or edge failure probabilities fp and then analyzes the …
Persistent link: https://www.econbiz.de/10010730331
We show how one can completely reconstruct even moderately optimized configurations of the Forest Fire model with relatively few observations. We discuss the relationship between the deep information from limited observations (DILO) to the robust-yet-fragile (RYF) property of the Forest Fire...
Persistent link: https://www.econbiz.de/10010872362
We propose a metric for vulnerability of labeled graphs that has the following two properties: (1) when the labeled … fully connected topology is equally vulnerable as any other. A vulnerability analysis of two real-world networks, the power … networks’ vulnerability compared to the case when the networks are modeled with unlabeled graphs. …
Persistent link: https://www.econbiz.de/10010588760
, this paper proposes a hybrid approach for structural vulnerability analysis of power transmission networks, in which a DC … scheme for power grids vulnerability assessment and modeling. The new approach embodies some important characteristics of …
Persistent link: https://www.econbiz.de/10010590251
Most existing research on the vulnerability of power grids based on complex networks ignores the electrical … grids to provide sufficient power to customers, is introduced to measure the vulnerability together with the size of the … paper is effective for analyzing the vulnerability of power grids. …
Persistent link: https://www.econbiz.de/10010591411
A new family of networks, called entangled, has recently been proposed in the literature. These networks have optimal properties in terms of synchronization, robustness against errors and attacks, and efficient communication. They are built with an algorithm which uses modified simulated...
Persistent link: https://www.econbiz.de/10010591682