网络的网络的鲁棒性及一致性研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着科学技术的飞速发展,我们赖以生存的自然环境、社会环境以及各种人造环境之间的联系变得更加紧密和错综复杂,而这些联系可以用复杂网络来描述。因而,复杂网络在很多交叉学科得到了广泛的应用,例如自然界中的生物网,社会中的各类基础设施网,以及生活中的互联网等。复杂网络又是一把双刃剑,现代社会中的很多灾难,从飓风到大规模停电,到恐怖分子的袭击,乃至世界范围的金融危机,都表明了潜在的危险和脆弱性无时无刻不存在于现代基础设施网络及这些网络的相互依赖中;多个体系统的一致性行为,不仅可以让我们更好的理解生物复杂性和群集智能的产生过程,而且可以使我们借鉴生物的智慧来设计控制,让系统呈现出所期望的涌现行为。在过去的十多年里,几乎所有关于复杂网络鲁棒性和一致性研究都是针对单个网络展开的。然而现实中的网络都是相互耦合在一起的,例如相互依赖的基础设施网以及相互作用的生物种群网等,从而形成了一个由复杂网络组成的网络(NON)。因此,NON的鲁棒性和一致性研究已经成为关系国计民生、社会安全稳定、乃至整个生存环境的重要科学技术难题。
     采用渗流理论研究相互依赖网络的鲁棒性
     (1)一般性框架:与基于单个孤立网络的研究不同,本文考虑现实社会中网络是相互依赖和相互作用的,得到了一个分析任意网络的网络(NON)鲁棒性的理论框架,该框架具有结构的任意性和功能的普适性。(ⅰ)结构的任意性:该系统是由任意n个网络组成,每个网络可以是任意结构,如随机网络、随机规则网络、无标度网络、格子网络,甚至小世界网络等,把每个网络视作一个节点,这些节点可以组成一个网络,该网络的拓扑结构依然可以是任意结构。(ⅱ)功能的普适性:从该一般性框架可以很容易得出之前经典的结论,单个网络或两个相互依赖网络的渗流理论只是NON结果中的特例。并且基于该框架理论分析了很多不同结构及不同攻击条件下的NON的鲁棒性,都发现了突然崩溃的一级不连续相变。这与单个网络表现出连续的二级相变显著不同。对于连续相变,一个小比例的节点失效,只能对系统造成较小的损害;而对于不连续相变,一个小比例的节点失效,有可能会造成整个NON发生完全的崩溃。由于网络之间的相互依赖关系,尤其是当网络之间的连接存在环时,NON变得异常脆弱。
     (2)恶意攻击:考虑到现实生活中不仅仅存在随机失效,更存在恶意攻击,即有针对性地攻击某些节点,例如度大的节点。本文将恶意攻击的思想引入相互依赖网络的级联失效动态模型及其鲁棒性分析的研究框架,采用将恶意攻击映射到随机攻击的策略,利用生成函数和平均场的方法,研究了两个网络之间在完全相互依赖和部分相互依赖两种条件下的鲁棒性。研究结果表明:保护度大的节点在单个网络中很有效,而在相互依赖网络中却不能显著提高系统的鲁棒性。
     (3)完全相互依赖NON的鲁棒性:理论分析了n个完全相互依赖网络构成树状NON鲁棒性研究的一般框架,其中形成NON的每一个网络的结构是随机(ER)网络、随机规则(RR)网络和无标度(SF)网络。研究结果表明:(ⅰ)在相同的网络个数及平均度下,RR网络组成的NON的鲁棒性最强,而SF组成的NON的鲁棒性最弱,这点和单个网络正好相反;(ⅱ)对于完全相互依赖的树状结构的NON,其相变临界值和最大聚类中有效的节点只与网络个数n有关,而与这些网络之间的依赖结构无关,并且NON的鲁棒性随着网络个数的增加而递减;(ⅲ)通过比较由ER网络和RR网络组成的NON的相变临界值,理论证明了脆弱性的根源为孤立节点和度为1的节点,该条件导致了当网络的个数足够多,在初始时刻一个节点的失效也会导致整个NON完全崩溃。
     (4)部分相互依赖NON的鲁棒性:理论研究了n个部分相互依赖NON鲁棒性分析的一般框架,其中,NON的拓扑结构可以是星状结构、链状结构、环状结构和随机规则网络结构。主要以n个部分相互依赖的随机(ER)网络为例,研究了不同拓扑结构NON的渗流理论,理论结果有:(ⅰ)获得了介于一级相变与二级相变分界点的临界耦合强度,该临界值将为控制整个NON是否存在突然崩溃的一级相变,也就是整个NON的脆弱性提供理论依据;(ⅱ)对于由随机网络组成的随机规则网络,其渗流理论的结果与树状结构的NON的结果完全不同。令人惊奇的是,NON的相变临界值和最后剩余的最大聚类与网络的个数无关,这是因为网络之间的连接形成环形的缘故,NON的相变临界值和最后剩余的最大聚类与每个网络的平均度以及每个网络连接一起网络的个数相关。众所周知,单个网络中的很多结果的正确性是建立在网络节点个数无穷大的基础上,然而这里,对于NON来说,网络的个数可以是无限的、有限的、甚至是1;(ⅲ)为了进一步将研究成果转化为应用,利用国际航空网络、航海网络以及公司网络为例,研究了三个部分相互依赖网络的鲁棒性,验证了理论结果的正确性和一般性框架的普适性。
     优化相互作用动态网络的一致性及其收敛速度
     (1)加权模型:考虑到动态网络结构的不均匀性,也就是有一些个体节点的度比较大,有些比较小,而度大的个体的方向能够影响到更多的个体,本文利用这一动态网络的拓扑结果提出了以度为权的一致性模型。加权模型大大提高了系统的收敛速度及其一致程度。
     (2)角度限定模型:实际中的个体往往不能在瞬间转动太大的角度,本文构建了角度限定的一致性模型。角度限定模型不仅更加接近现实中的生活或者物体的运动规律,更能大大提高系统的一致程度。并且在含噪音的情况下,对于给定的噪音,存在一个最优的角度限定值。因此,通过控制系统的角度限定值,可以优化系统并使系统达到最优的一致性。
     (3)相互作用模型:加权模型和角度限定模型都可以用来优化单个动态网络或系统的一致性。在现实社会里网络之间相互耦合和相互作用的背景下,作者进而提出了相互作用的动态网络模型和衡量网络的网络一致性的序参量。研究结果发现不同的相互作用关系(共生、捕食和竞争)对整个网络的网络或单个网络的一致性有着不同的影响,例如共生关系下,存在两个动态网络之间的最优耦合强度,使得整个系统和单个网络同时达到最优一致性。相互作用模型结果可以直接被推广到多个网络的一致性问题中去。
     总之,本文的主要贡献是:
     (a)提出了研究任意NON的一般性框架。
     (b)NON表现出,与单个网络连续的二级相变相比,更加脆弱的一级相变。
     (c)对于完全相互依赖的树状结构的NON,其渗流临界值只与网络个数有关,而与NON的拓扑结构无关。
     (d)NON脆弱性的根源是孤立节点和度为1的节点。
     (e)对于环状结构的NON和随机网络组成的随机规则网络,其渗流临界值与网络个数无关。
     (f)保护度大的节点在单个网络中很有效,而在相互依赖网络中却不能显著提高系统的鲁棒性。
     (g)加权模型和角度限制的模型可以提高单个动态网络系统的一致性。
     (h)在共生关系的动态网络中,存在最优的耦合强度,可以控制该参数使得每个网络或系统整体达到最优的一致性。
With the rapid development of science and technology, the natural environment,social systems and infrastructures, which we rely on, are closely interdependent, andbecome very complex. Network science provides useful tools to understand the cou-pled relationship and improve their efficiency and reliability. So we witness the widespreadscientific interest in interdisciplinary field of networks in many disciplines, such as bi-ological networks in the natural world, various infrastructures networks (includingpower grid systems and transportation systems etc.), and in networks serving societylike internet etc. Complex networks can be considered as being a double-edged swordin our modern society. Many disasters ranging from hurricanes to large-scale poweroutage to terrorist attacks, and even the world-wide financial crisis, show the poten-tial risk and vulnerability that exist in modern infrastructure networks and are hiddenunder the interdependence between the networks; Meanwhile, the synchronization ofmulti-agent systems, not only allows us to better understand the biological complexityand swarm intelligence generation process, but also enables us to utilize the wisdomof biologic to design and control the system to produce the desired macro behavior. Inthe past ten years, complex networks research attracted much attention of the scientistsfrom many disciplines. Almost all network research has been focused on the proper-ties of a single isolated network that does not interact with other networks. However,in the real world, the networks are coupled and interdependent. Example include var-ious infrastructures and the interaction of the biological networks. Thereby they forma complex network composed of various interdependent networks (NON). Therefore,research on robustness and synchronization of NON has become an important sci-entific and technical problem and a major challenge which is related to the people’slivelihood, security, and the whole living system. The thesis is composed on two main parts.
     Using percolation theory to study the robustness of interdependent networksThe main work of this part include:
     (1) A general framework: Unlike previous studies, which were based on a singeisolated network, here we consider real networks that are interdependent andinteract with each other, and develop a general theoretical framework to studythe robustness of any network of networks. This general framework featuresthe arbitrary of structure and the general percolation theory.(i) The arbitrary ofstructure. The system is composed of arbitrary n networks, each network can beof any structure, such as Erdo s-Re′nyi (ER) networks, random regular (RR) net-work, scale free (SF) networks, lattices, or even small world networks etc. Eachnetwork can be regarded as a node, these nodes form a network, the network ofnetworks (NON) have an arbitrary topology.(ii) The general percolation the-ory. From the general framework, several previous classical conclusions drawnfrom percolation theory of a single or two interdependent networks, which arejust special cases of our NON results, can be easily obtained. The theoreti-cal analysis of robustness of NON under different structures and various failureconditions were studied. One important result is that we found a discontinuoustransition that leads to abrupt collapse in interdependent networks. This is ofsignificant different from the results in a single network which shows continu-ous transition. The system becomes more vulnerable because of the dependencylinks between networks, and even more vulnerable because of the loops appear-ing in the networks. Why is the discontinuous transition more vulnerable thanthe continuous transition? When the transition is continuous, the removal of asmall fraction of nodes can cause only a small damage to the system and there isno risk of complete failure as long as the largest connected cluster in the networkhas many nodes. On the other hand, when the transition is discontinuous, the re-moval of even a single node near the critical point can cause a complete collapsein the network of networks, even when the largest connected cluster still con-sists of many nodes. Thus it becomes important to find the critical threshold forthe first order case. In this thesis, we show a theoretical solution of the critical threshold for the case of a regular (including random) network of Erdo s-Re′nyinetworks.
     (2) Targeted attack. Considering the fact that in many cases attack can not randombut targeting specific high degree nodes, we introduce a targeted attack approachinto the cascading failure model and the robustness analysis framework of twointerdependent networks. The idea is to map the targeted attack to a randomfailure, and adopt the generating function and mean-field methodology. Usingthis approach we study the robustness under targeted attack of two fully inter-dependent networks and two partially interdependent networks. We find thatwhen the highly connected nodes are protected and have lower probability tofail, coupled SF networks are significantly more vulnerable compared to singlenetworks. The result implies that interdependent networks are difficult to de-fend by strategies such as protecting the high degree nodes that have been founduseful to significantly improve robustness of single networks.
     (3) We first theoretically analyze a tree-like NON formed by n fully interdependentER networks, RR networks and SF networks. The results show that (i) for thesame number of networks and the same average degree, the robustness of NONcomposite of RR networks is the highest, while that of NON composite of SFnetworks is the lowest, which is the opposite of the results obtained for a singlenetwork;(ii) Independent of the topology (as long as it is a tree) but dependentof number of networks: For the tree like fully interdependent network of net-works, the percolation threshold and largest cluster depend only on the numberof networks, but not on the topology of the NON structure. And the robustnessdecreases with the number of networks.(iii) The origin of vulnerability: Ac-cording to the comparison of the critical threshold of ER NON and RR NON,we proved that the origin of vulnerability is the singly connected nodes and theisolated nodes. And this condition cause a whole collapse of a NON when thenumber of networks is large enough.
     (4) Next, we analyze a star-like NON, a loop-like NON and random regular NONcomposed of n partially interdependent networks. We systemically study the robustness of several different topology of the NON and of each individual net-work. The results show that (i) Critical fraction of dependency links: Since thevulnerability of a network of networks can be measured according to type oftransition, we must find an analytical way to control the discontinuous transi-tion and determine the condition under which the discontinuous transition willcease. We examine a regular network of Erdo s-Re′nyi networks and find thatwhen there are fewer dependency links than the critical fraction of dependencylinks, the system is in continuous transition, but when there are more depen-dency links than the critical fraction of dependency links, the system in is dis-continuous transition. We present an analytical solution determining the con-dition necessary for the existence of a discontinuous transition, a solution thatwill be very helpful when designing robust interdependent infrastructures.(ii)Independent of the number of networks: The novel results presented in thismanuscript differ significantly from previous results in the field of interdepen-dent networks. Surprisingly, in contrast to the treelike network of networks inwhich the largest connected cluster depends on the number of networks n, whenthere are loops in the network of networks the largest connected cluster is un-affected by n. We demonstrate that the largest connected cluster of a regularnetwork of Erdo s-Re′nyi networks depends only on the number of networks onwhich each network depends. Although it is widely known that most results fora single network are obtained by assuming that the number of nodes goes to in-finity, our general results are correct for any number of networks, which can beinfinite, finite, or even1.(iii) In order to further translate the theoretical resultsinto application, we utilize real data corresponding to the international networkof airport, the network of seaport and the network of firm to study the robustnessof NON composite of three partially interdependent SF networks. The numeri-cal results further verify the theoretical results and the universality of the generalframework.
     Optimize the synchronization and convergence speed of interacting dynamicnetworks
     (1) A weighted model. In the dynamic network model (Vicsek model), although in- fluencing radius is the same, the neighbor number of each agent is different. Theagent with more neighbors might have larger influences on its neighbors, whichshould play a very important role in the dynamic process. Thus, we introducea weight related to the degree of each agent into Vicsek model when the direc-tions are updated. Moreover, in order to diversify the difference between thelarge degree agents and the small degree agents, a general exponential weightmodel is proposed. The simulation results show that this approach can accelerateconsensus process and improve convergence efficiency. Furthermore, when theexponent is increasing, the contribution of the weight is larger, the self-propelledagent system is much easier to obtain consensus even for the noise disturbance.
     (2) A restricted angle model. Because the directions and positions of all the objectsare initially randomly distributed, most of the objects make sharp changes indirection that bear little similarity to behavior found in nature, and are thus im-practical when developing applications in engineering. From the point of viewof an engineer, any robot or vehicle powered by an engine can not make anacute-angle turn in a very short time period. In order to more closely resemblebehavior found in nature and to be useful in developing real-world applications,we introduce a restricted angle model. The results show that the restricted an-gle model significantly (i) improves the synchronization of Self propelled ob-ject(SPO) systems when the restricted angle decreases because reducing anglerestriction is effectively like reducing the internal noise which leads to improv-ing synchronization,(ii) demonstrates the existence of a critical restricted angleabove which the synchronization order parameter changes sharply form a largevalue to a small value, and (iii) reveals that for each noise amplitude the syn-chronization shows a peak as a function of angle restriction, so there exists anoptimal angle restriction for which one will obtain the best synchronization.
     (3) The weighted model and the restricted angle model can be used to optimizethe dynamic single network or system synchronization. In the biological world,many different dynamic networks are coupled together. Under this context, herewe propose a model to describe the synchronization of interaction network com-posite of dynamic networks, and introduce a parameter to measure the synchro- nization of network of networks. We study the synchronization of two inter-acting networks under three different types of interactions including symbiosis,predation and competition, which can be explored to n dynamic networks. Theresults show that different interaction, like symbiosis, predation and competi-tion, among networks has a different impact on the synchronization of the entiresystem or each single network. For example, as for symbiotic interaction re-lationship, there exists the optimal coupling strength between the two dynamicnetworks, making the whole system and a single network achieve best synchro-nization at the same time.
     In conclusion, the main contributions of this thesis include:
     (a) Developed a general theoretical framework to study the robustness of any net-work formed from any interdependent networks.
     (b) Compared with a single network, NON exhibits first order phase transition,which is more vulnerable.
     (c) For fully interdependent treelike NON, the percolation threshold and giant com-ponent depend only on the number of networks, but not on the topology of theNON structure
     (d) The origin of vulnerability is the singly connected nodes and the isolated nodes,which may cause a complete collapse of a NON when the number of networksis large enough.
     (e) For the looplike NON and the random regular network of random networks, thepercolation threshold is independent with the number of networks.
     (f) It is very effective to protect nodes with high degree in a single network, but itcan not significantly improve the robustness of interdependent networks.
     (g) The weighted model and the restricted angle model can be used to optimize thesynchronization of a single dynamic network.
     (h) Optimal coupling strength exists in the symbiotic relationship interacting dy-namic networks, which indicates that by controlling this parameter we are ableto achieve the optimal synchronization for the whole system and for each net-work.
引文
[1] Watts D.,“A simple model of global cascades on random networks”, Proceed-ings of the National Academy of Sciences,2002,99(9),5766–5771.
    [2] Watts D. and Strogatz S.,“Collective dynamics of small-world networks”, Na-ture,1998,393,440–442.
    [3] Baraba′si A. and Albert R.,“Emergence of scaling in random networks”, sci-ence,1999,286(5439),509–512.
    [4] Faloutsos M., Faloutsos P., and Faloutsos C.,“On power-law relationships ofthe internet topology”, ACM SIGCOMM Computer Communication Review,volume29, ACM,1999,251–262.
    [5] Albert R., Jeong H., and Baraba′si A.,“Error and attack tolerance of complexnetworks”, Nature,2000,406(6794),378–382.
    [6] Cohen R., Erez K., Ben-Avraham D., et al.,“Resilience of the internet to ran-dom breakdowns”, Physical review letters,2000,85(21),4626–4628.
    [7] Callaway D., Newman M., Strogatz S., et al.,“Network robustness and fragility:Percolation on random graphs”, Physical Review Letters,2000,85(25),5468–5471.
    [8] Cohen R., Erez K., Ben-Avraham D., et al.,“Breakdown of the internet underintentional attack”, Physical Review Letters,2001,86(16),3682–3685.
    [9] Milo R., Shen-Orr S., Itzkovitz S., et al.,“Network motifs: simple buildingblocks of complex networks”, Science,2002,298(5594),824–827.
    [10] Albert R. and Baraba′si A.,“Statistical mechanics of complex networks”, Re-views of modern physics,2002,74(1),47–97.
    [11] Newman M.,“The structure and function of complex networks”, SIAM review,2003,45(2),167–256.
    [12] Barrat A., Barthelemy M., Pastor-Satorras R., et al.,“The architecture of com-plex weighted networks”, Proceedings of the National Academy of Sciences ofthe United States of America,2004,101(11),3747–3752.
    [13] Newman M. and Girvan M.,“Finding and evaluating community structure innetworks”, Physical review E,2004,69(2),026113.
    [14] Gallos L., Cohen R., Argyrakis P., et al.,“Stability and topology of scale-freenetworks under attack and defense strategies”, Physical review letters,2005,94(18),188701.
    [15] Song C., Havlin S., and Makse H.,“Self-similarity of complex networks”, Na-ture,2005,433(7024),392–395.
    [16] Boccaletti S., Latora V., Moreno Y., et al.,“Complex networks: Structure anddynamics”, Physics reports,2006,424(4),175–308.
    [17] Newman M., Barabasi A., and Watts D., The Structure and Dynamics of Net-works, Princeton University Press, Princeton,2006.
    [18] West B.J. and Grigolini P., Complex Webs: Anticipating the Improbable, Cam-bridge University Press, Cambridge,2011.
    [19] Bonanno G., Caldarelli G., Lillo F., et al.,“Topology of correlation-based mini-mal spanning trees in real and model markets”, Physical Review E,2003,68(4),046130.
    [20] Daqing L., Kosmidis K., Bunde A., et al.,“Dimension of spatially embeddednetworks”, Nature Physics,2011,7(6),481–484.
    [21] Newman M.E.J., Networks: An Introduction, Oxford University Press, NewYork,2010.
    [22] Dorogovtsev S. and Mendes J., Evolution of Networks: From Biological Nets tothe Internet and WWW (Physics), Oxford University Press, New York,2003.
    [23] Pastor-Satorras R. and Vespignani A., Evolution and Structure of the Internet:A Statistical Physics Approach, Cambridge University Press, Cambridge,2004.
    [24] Caldarelli G. and Vespignani A., Large scale Structure and Dynamics of Com-plex Webs, World Scientific, New York,2007.
    [25] Barra′t A., Barthe′lemy M., and Vespignani A., Dynamical Processes on Com-plex Networks, Cambridge University Press, Cambridge,2008.
    [26] Cohen R. and Havlin S., Complex Networks: Structure, Robustness and Func-tion, Cambridge University Press, Cambridge,2010.
    [27] Kitsak M., Gallos L., Havlin S., et al.,“Identification of influential spreaders incomplex networks”, Nature Physics,2010,6(11),888–893.
    [28] Barthe′lemy M.,“Spatial networks”, Physics Reports,2011,499(1),1–101.
    [29] Strogatz S.,“Exploring complex networks”, Nature,2001,410(6825),268–276.
    [30] Foster Jr J., Gjelde E., Graham W., et al.,“Report of the commission to assessthe threat to the united states from electromagnetic pulse (emp) attack: Criticalnational infrastructures”, Technical report, DTIC Document,2008.
    [31] Rinaldi S., Peerenboom J., and Kelly T.,“Identifying, understanding, and ana-lyzing critical infrastructure interdependencies”, Control Systems, IEEE,2001,21(6),11–25.
    [32] Buldyrev S., Parshani R., Paul G., et al.,“Catastrophic cascade of failures ininterdependent networks”, Nature,2010,464(7291),1025–1028.
    [33] Vespignani A.,“Complex networks: The fragility of interdependency”, Nature,2010,464(7291),984–985.
    [34] Kleinberg J.,“The convergence of social and technological networks”, Com-munications of the ACM,2008,51(11),66–72.
    [35] Liben-Nowell D. and Kleinberg J.,“Tracing information flow on a global scaleusing internet chain-letter data”, Proceedings of the National Academy of Sci-ences,2008,105(12),4633–4638.
    [36] Snijders T., Pattison P., Robins G., et al.,“New specifications for exponentialrandom graph models”, Sociological Methodology,2006,36(1),99–153.
    [37] Handcock M., Raftery A., and Tantrum J.,“Model-based clustering for socialnetworks”, Journal of the Royal Statistical Society: Series A (Statistics in Soci-ety),2007,170(2),301–354.
    [38] Jackson M. and Rogers B.,“Meeting strangers and friends of friends: Howrandom are social networks?”, The American economic review,2007,890–915.
    [39] Borgatti S., Mehra A., Brass D., et al.,“Network analysis in the social sci-ences”, science,2009,323(5916),892–895.
    [40] Borgatti S.,“Identifying sets of key players in a social network”, Computational&Mathematical Organization Theory,2006,12(1),21–34.
    [41] Onnela J., Sarama¨ki J., Hyvo¨nen J., et al.,“Structure and tie strengths in mobilecommunication networks”, Proceedings of the National Academy of Sciences,2007,104(18),7332–7336.
    [42] Faust K.,“Comparing social networks: size, density, and local structure”,Metodolosˇki zvezki,2006,3(2),185–216.
    [43] Santos J.,“Inoperability input-output modeling of disruptions to interdependenteconomic systems”, Systems Engineering,2006,9(1),20–34.
    [44] Jackson M. O., Social and economic networks (economics, physics, sociology),Princeton University Press, Princeton,2008.
    [45] Zimmerman R.,“Decision-making and the vulnerability of interdependent crit-ical infrastructure”,2004,5,4059–4063.
    [46] Mendonc a D. and Wallace W.,“Impacts of the2001world trade center attack onnew york city critical infrastructures”, Journal of Infrastructure Systems,2006,12(4),260–270.
    [47] Robert B. and Morabito L.,“The operational tools for managing physical inter-dependencies among critical infrastructures”, International Journal of CriticalInfrastructures,2008,4(4),353–367.
    [48] Reed D., Kapur K., and Christie R.,“Methodology for assessing the resilienceof networked infrastructure”, Systems Journal, IEEE,2009,3(2),174–180.
    [49] Bagheri E. and Ghorbani A.,“Uml-ci: A reference model for profiling criticalinfrastructure systems”, Information Systems Frontiers,2010,12(2),115–139.
    [50] Mansson D., Thottappillil R., and Backstrom M.,“Methodology for classifyingfacilities with respect to intentional emi”, Electromagnetic Compatibility, IEEETransactions on,2009,51(1),46–52.
    [51] Johansson J. and Hassel H.,“An approach for modelling interdependent infras-tructures in the context of vulnerability analysis”, Reliability Engineering&System Safety,2010,95(12),1335–1344.
    [52] Khanin R. and Wit E.,“How scale-free are biological networks”, Journal ofcomputational biology,2006,13(3),810–818.
    [53] Alon U.,“Biological networks: the tinkerer as an engineer”, Science,2003,301(5641),1866–1867.
    [54] Palla G., Dere′nyi I., Farkas I., et al.,“Uncovering the overlapping communitystructure of complex networks in nature and society”, Nature,2005,435(7043),814–818.
    [55] Kossinets G. and Watts D.,“Empirical analysis of an evolving social network”,Science,2006,311(5757),88–90.
    [56] Newman M.,“The structure of scientific collaboration networks”, Proceedingsof the National Academy of Sciences,2001,98(2),404–409.
    [57] Girvan M. and Newman M.,“Community structure in social and biologicalnetworks”, Proceedings of the National Academy of Sciences,2002,99(12),7821–7826.
    [58] Colizza V., Barrat A., Barthe′lemy M., et al.,“The role of the airline transporta-tion network in the prediction and predictability of global epidemics”, Proceed-ings of the National Academy of Sciences of the United States of America,2006,103(7),2015–2020.
    [59] Wang X. and Chen G.,“Synchronization in scale-free dynamical networks: ro-bustness and fragility”, Circuits and Systems I: Fundamental Theory and Ap-plications, IEEE Transactions on,2002,49(1),54–62.
    [60] Pastor-Satorras R. and Vespignani A.,“Epidemic spreading in scale-free net-works”, Physical review letters,2001,86(14),3200–3203.
    [61] Balcan D., Colizza V., Gonc alves B., et al.,“Multiscale mobility networksand the spatial spreading of infectious diseases”, Proceedings of the NationalAcademy of Sciences,2009,106(51),21484–21489.
    [62] Bunde A. and Havlin S., Fractals and Disordered Systems, Springer, New York,1996.
    [63] Schneider C., Moreira A., Andrade Jr J., et al.,“Mitigation of malicious at-tacks on networks”, Proceedings of the National Academy of Sciences,2011,108(10),3838–3841.
    [64] Chen Y., Paul G., Havlin S., et al.,“Finding a better immunization strategy”,Physical Review Letters,2008,101(5),58701.
    [65] Cohen R., Havlin S., and Ben-Avraham D.,“Efficient immunization strategiesfor computer networks and populations”, Physical review letters,2003,91(24),247901.
    [66] Braunstein L., Buldyrev S., Cohen R., et al.,“Optimal paths in disordered com-plex networks”, Physical review letters,2003,91(16),168701.
    [67] Moreira A., Andrade Jr J., Herrmann H., et al.,“How to make a fragile networkrobust and vice versa”, Physical review letters,2009,102(1),18701.
    [68] Lo′pez E., Buldyrev S., Havlin S., et al.,“Anomalous transport in scale-freenetworks”, Physical review letters,2005,94(24),248701.
    [69] Boguna′M. and Krioukov D.,“Navigating ultrasmall worlds in ultrashort time”,Physical review letters,2009,102(5),58701.
    [70] Leicht E. and D’Souza R.,“Percolation on interacting networks”, arXiv preprintarXiv:0907.0894,2009.
    [71] Rosato V., Issacharoff L., Tiriticco F., et al.,“Modelling interdependent infras-tructures using interacting dynamical models”, International Journal of CriticalInfrastructures,2008,4(1),63–79.
    [72] Force U.C.P.S.O.T.,“Final report on the august14th2003blackout in theunited states and canada: Causes and recommendations”, Technical report,https://reports.energy.gov/,2004.
    [73] Peerenboom J., Fischer R., and Whitfield R.,“Recovering from disruptions ofinterdependent critical infrastructures”, Proc. CRIS/DRM/IIIT/NSF WorkshopMitigat. Vulnerab. Crit. Infrastruct. Catastr. Failures,2001.
    [74] Yagan O., Qian D., Zhang J., et al.,“Optimal allocation of interconnecting linksin cyber-physical systems: Interdependence, cascading failures, and robust-ness”, Parallel and Distributed Systems, IEEE Transactions on,2012,23(9),1708–1720.
    [75] Newman M., Strogatz S., and Watts D.,“Random graphs with arbitrary degreedistributions and their applications”, Physical Review E,2001,64(2),026118.
    [76] Shao J., Buldyrev S., Braunstein L., et al.,“Structure of shells in complex net-works”, Physical Review E,2009,80(3),036105.
    [77] Parshani R., Buldyrev S., and Havlin S.,“Interdependent networks: Reducingthe coupling strength leads to a change from a first to second order percolationtransition”, Physical review letters,2010,105(4),48701.
    [78] Shao J., Buldyrev S., Havlin S., et al.,“Cascade of failures in coupled networksystems with multiple support-dependence relations”, Physical Review E,2011,83(3),036116.
    [79] Huang X., Gao J., Buldyrev S., et al.,“Robustness of interdependent networksunder targeted attack”, Physical Review E,2011,83(6),065101.
    [80] Parshani R., Rozenblat C., Ietri D., et al.,“Inter-similarity between couplednetworks”, Europhysics Letters,2011,92(6),68002.
    [81] Gu C., Zou S., Xu X., et al.,“Onset of cooperation between layered networks”,Physical Review E,2011,84(2),026101.
    [82] Cho W., Goh K., and Kim I.,“Correlated couplings and robustness of couplednetworks”, arXiv preprint arXiv:1010.4971,2010.
    [83] Buldyrev S., Shere N., and Cwilich G.,“Interdependent networks with iden-tical degrees of mutually dependent nodes”, Physical Review E,2011,83(1),016112.
    [84] Sachtjen M., Carreras B., and Lynch V.,“Disturbances in a power transmissionsystem”, Physical Review E,2000,61(5),4877.
    [85] Motter A. and Lai Y.,“Cascade-based attacks on complex networks”, PhysicalReview E,2002,66(6),065102.
    [86] Moreno Y., Pastor-Satorras R., Va′zquez A., et al.,“Critical load and congestioninstabilities in scale-free networks”, Europhysics Letters,2007,62(2),292.
    [87] Motter A.,“Cascade control and defense in complex networks”, Physical Re-view Letters,2004,93(9),98701.
    [88] Parshani R., Buldyrev S., and Havlin S.,“Critical effect of dependency groupson the function of networks”, Proceedings of the National Academy of Sci-ences,2011,108(3),1007–1010.
    [89] Bashan A., Parshani R., and Havlin S.,“Percolation in networks composed ofconnectivity and dependency links”, Physical Review E,2011,83(5),051127.
    [90] Bashan A. and Havlin S.,“The combined effect of connectivity and dependencylinks on percolation of networks”, Journal of Statistical Physics,2011,145(3),686–695.
    [91] Shaw E.,“Fish in schools”, Natural History,1975,84(8),40–45.
    [92] Partridge B.,“The structure and function of fish schools”, Scientific American,1982,246(6),114–123.
    [93] Okubo A.,“Dynamical aspects of animal grouping: swarms, schools, flocks,and herds”, Advances in biophysics,1986,22,1–94.
    [94] Parrish J., Viscido S., and Gru¨nbaum D.,“Self-organized fish schools: an exam-ination of emergent properties”, The biological bulletin,2002,202(3),296–305.
    [95] Vicsek T., Cziro′k A., Ben-Jacob E., et al.,“Novel type of phase transition ina system of self-driven particles”, Physical Review Letters,1995,75(6),1226–1229.
    [96] Cziro′k A., Baraba′si A., and Vicsek T.,“Collective motion of self-propelledparticles: Kinetic phase transition in one dimension”, Physical Review Letters,1999,82(1),209–212.
    [97] Reynolds C.,“Flocks, herds and schools: A distributed behavioral model”,ACM SIGGRAPH Computer Graphics, volume21, ACM,1987,25–34.
    [98] Jadbabaie A., Lin J., and Morse A.,“Coordination of groups of mobile au-tonomous agents using nearest neighbor rules”, Automatic Control, IEEETransactions on,2003,48(6),988–1001.
    [99] Ren W. and Beard R.,“Consensus seeking in multiagent systems under dynam-ically changing interaction topologies”, Automatic Control, IEEE Transactionson,2005,50(5),655–661.
    [100] Jadbabaie A.,“On distributed coordination of mobile agents with changingnearest neighbors”, Univ. Pennsylvania, Philadelphia, PA, Tech. Rep,2003.
    [101] Bonabeau E., Dagorn L., and Fre′on P.,“Scaling in animal group-size distribu-tions”, Proceedings of the National Academy of Sciences,1999,96(8),4472.
    [102] Lorch P.D. and Gwynne D.T.,“Radio-telemetric evidence of migration in thegregarious but not the solitary morph of the mormon cricket (anabrus simplex:Orthoptera: Tettigoniidae)”, Naturwissenschaften,2000,87(8),370–372.
    [103] Flierl G., Gru¨nbaum D., Levins S., et al.,“From individuals to aggregations:the interplay between behavior and physics”, Journal of Theoretical Biology,1999,196(4),397–454.
    [104] Saber R., Richard S., and Murray R.,“Consensus protocols for networks ofdynamic agents”,2003.
    [105] Ren W., Beard R., and Atkins E.,“A survey of consensus problems in multi-agent coordination”, American Control Conference,2005. Proceedings of the2005, IEEE,2005,1859–1864.
    [106] Olfati-Saber R. and Murray R.,“Consensus problems in networks of agentswith switching topology and time-delays”, Automatic Control, IEEE Transac-tions on,2004,49(9),1520–1533.
    [107] Fax J. and Murray R.,“Information flow and cooperative control of vehicleformations”, Automatic Control, IEEE Transactions on,2004,49(9),1465–1476.
    [108] Xiao L. and Boyd S.,“Fast linear iterations for distributed averaging”, Systems&Control Letters,2004,53(1),65–78.
    [109] Yang W., Cao L., Wang X., et al.,“Consensus in a heterogeneous influencenetwork”, Physical Review E,2006,74(3),037101.
    [110] Li W. and Wang X.,“Adaptive velocity strategy for swarm aggregation”, Phys-ical Review E,2007,75(2),021917.
    [111] Zhang J., Zhao Y., Tian B., et al.,“Accelerating consensus of self-driven swarmvia adaptive speed”, Physica A: Statistical Mechanics and its Applications,2009,388(7),1237–1242.
    [112] Moreau L.,“Stability of multiagent systems with time-dependent communica-tion links”, Automatic Control, IEEE Transactions on,2005,50(2),169–182.
    [113] Moreau L.,“Stability of continuous-time distributed consensus algorithms”,Decision and Control,2004. CDC.43rd IEEE Conference on, volume4, IEEE,2004,3998–4003.
    [114] Savkin A.,“Coordinated collective motion of groups of autonomous mobilerobots: Analysis of vicsek’s model”, Automatic Control, IEEE Transactionson,2004,49(6),981–982.
    [115] Li S. and Wang H.,“Multi-agent coordination using nearest neighbor rules:Revisiting the vicsek model”, Arxiv preprint cs/0407021,2004.
    [116] Cucker F. and Smale S.,“Emergent behavior in flocks”, Automatic Control,IEEE Transactions on,2007,52(5),852–862.
    [117] Tang G. and Guo L.,“Convergence of a class of multi-agent systems in proba-bilistic framework”, Journal of Systems Science and Complexity,2007,20(2),173–197.
    [118] Ren W., Beard R., and McLain T.,“Coordination variables and consensus build-ing in multiple vehicle systems”, Cooperative Control,2005,439–442.
    [119] Lin Z., Francis B., and Maggiore M.,“Necessary and sufficient graphical con-ditions for formation control of unicycles”, Automatic Control, IEEE Transac-tions on,2005,50(1),121–127.
    [120] Olfati-Saber R.,“Ultrafast consensus in small-world networks”, American Con-trol Conference,2005. Proceedings of the2005, IEEE,2005,2371–2378.
    [121] Levine H., Rappel W., and Cohen I.,“Self-organization in systems of self-propelled particles”, Physical Review E,2000,63(1),017101.
    [122] Krause J. and Ruxton G., Living in groups, Oxford University Press, USA,2002.
    [123] Couzin I., Krause J., James R., et al.,“Collective memory and spatial sorting inanimal groups”, Journal of theoretical biology,2002,218(1),1–11.
    [124] Stipanovic′D.,I˙nalhan G., Teo R., et al.,“Decentralized overlapping control of aformation of unmanned aerial vehicles”, Automatica,2004,40(8),1285–1296.
    [125] Buzogany L., Pachter M., and d’Azzo J.,“Automated control of aircraft in for-mation flight”, AIAA Guidance, Navigation and Control Conference, Monterey,CA,1993,1349–1370.
    [126] Stilwell D. and Bishop B.,“Platoons of underwater vehicles”, Control SystemsMagazine, IEEE,2000,20(6),45–52.
    [127] Bender J.,“An overview of systems studies of automated highway systems”,Vehicular Technology, IEEE Transactions on,1991,40(1),82–99.
    [128] Gupta V., Hassibi B., and Murray R.,“Stability analysis of stochastically vary-ing formations of dynamic agents”, Decision and Control,2003. Proceedings.42nd IEEE Conference on, volume1, IEEE,2003,504–509.
    [129] Roy S., Saberi A., and Herlugson K.,“Formation and alignment of distributedsensing agents with double-integrator dynamics and actuator saturation”, Sen-sor Network Applications,2004.
    [130] Panzieri S. and Setola R.,“Failures propagation in critical interdependent in-frastructures”, International Journal of Modelling, Identification and Control,2008,3(1),69–78.
    [131] Annibale A., Coolen A., and Bianconi G.,“Network resilience against intelli-gent attacks constrained by the degree-dependent node removal cost”, Journalof Physics A: Mathematical and Theoretical,2010,43,395001.
    [132] Holme P., Kim B., Yoon C., et al.,“Attack vulnerability of complex networks”,Physical Review E,2002,65(5),056109.
    [133] Molloy M. and Reed B.,“The size of the giant component of a random graphwith a given degree sequence”, Combinatorics probability and computing,1998,7(3),295–305.
    [134] Newman M.,“Spread of epidemic disease on networks”, Physical Review E,2002,66(1),016128.
    [135] Erdo s P. and Re′nyi A.,“On random graphs”, I. Publ. Math.,1959,6,290–297.
    [136] Erdo s P. and Re′nyi A.,“On the evolution of random graphs”, Magyar Tud.Akad. Mat. Kutato′Int. Ko¨zl,1960,5,17–61.
    [137] Bolloba′s B., Random Graphs, Academic, London,1985.
    [138] Boguna M., Pastor-Satorras R., and Vespignani A.,“Cut-offs and finite sizeeffects in scale-free networks”, The European Physical Journal B-CondensedMatter and Complex Systems,2004,38(2),205–209.
    [139] Shao J., Buldyrev S., Cohen R., et al.,“Fractal boundaries of complex net-works”, Europhysics Letters,2008,84,48004.
    [140] Dong G., Gao J., Tian L., et al.,“Percolation of partially interdependent net-works under targeted attack”, Physical Review E,2012,85(1),016112.
    [141] Gao J., Buldyrev S., Stanley H., et al.,“Networks formed from interdependentnetworks”, Nature Physics,2011,8(1),40–48.
    [142] Schneider C., Araujo N., Havlin S., et al.,“Towards designing robust couplednetworks”, arXiv preprint arXiv:1106.3234,2011.
    [143] Gao J., Buldyrev S., Havlin S., et al.,“Robustness of a network of networks”,Physical Review Letters,2011,107(19),195701.
    [144] Pocock M., Evans D., and Memmott J.,“The robustness and restoration of anetwork of ecological networks”, Science,2012,335(6071),973–977.
    [145] Mee M. and Wang H.,“Engineering ecosystems and synthetic ecologies”,Molecular BioSystems,2012.
    [146] Cziro′k A., Stanley H., and Vicsek T.,“Spontaneously ordered motion of self-propelled particles”, Journal of Physics A: Mathematical and General,1997,30,1375.
    [147] Reebs S.,“Can a minority of informed leaders determine the foraging move-ments of a fish shoal?”, Animal behaviour,2000,59(2),403–409.
    [148] Swaney W., Kendal J., Capon H., et al.,“Familiarity facilitates social learningof foraging behaviour in the guppy”, Animal Behaviour,2001,62(3),591–598.
    [149] Nagy M., Daruka I., and Vicsek T.,“New aspects of the continuous phase transi-tion in the scalar noise model (snm) of collective motion”, Physica A: StatisticalMechanics and its Applications,2007,373,445–454.
    [150] Gre′goire G. and Chate′H.,“Onset of collective and cohesive motion”, Physicalreview letters,2004,92(2),25702.
    [151] Binder K., Applications of Monte Carlo methods to statistical physics, volume60, IOP Publishing,1997.
    [152] Chate′H., Ginelli F., Gre′goire G., et al.,“Collective motion of self-propelledparticles interacting without cohesion”, Physical Review E,2008,77(4),046113.
    [153] Nagy M.,A′kos Z., Biro D., et al.,“Hierarchical group dynamics in pigeonflocks”, Nature,2010,464(7290),890–893.
    [154] Danforth B. and Ascher J.,“Flowers and insect evolution”, Science,1999,283(5399),143–143.
    [155] DeAngelis D., Gross L., et al., Individual-based models and approaches in ecol-ogy: populations, communities and ecosystems., Chapman&Hall,1992.
    [156] Sahney S., Benton M., and Ferry P.,“Links between global taxonomic diversity,ecological diversity and the expansion of vertebrates on land”, Biology letters,2010,6(4),544–547.
    [157] Burt R., Structural holes: The social structure of competition, Harvard Univ Pr,1995.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700