Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network key point analysis method based on single-layer information flow transmission

An analysis method and information flow technology, applied in the field of network key point analysis based on single-layer information flow transmission, can solve problems such as changes in advantages and limitations, less important, less correct, etc.

Active Publication Date: 2020-07-31
NAT UNIV OF DEFENSE TECH
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] So far, a large number of methods for evaluating key nodes of the network have been proposed, such as degree centrality, betweenness centrality, proximity centrality, semi-local centrality, etc., but all have their own limitations.
Among them, 1. Degree centrality is a relatively direct indicator, but usually it is not very important or correct. Similar indicators include LocalRank, proximity and H index, etc.; 2. Betweenness centrality and proximity centrality Both are path-based centrality, which is a global metric and can more effectively identify key nodes in the network, but their computational complexity is higher; 3. Semi-local centrality aims to ignore the topological relationship between neighbors and Considering only the number of nearest neighbors and second neighbors of a node is a trade-off between relevance and computational complexity, but the position of a node in the network may play a more important role than global properties such as degree
Also, other ranking methods like Proximity, PageRank, LeaderRank, ClusterRank, etc. have similar limitations
[0005] In short, the existing network node importance ranking methods are all based on the above indicators, and focus on how to improve them. For different structures and types of networks, different indicators have their own advantages and limitations, especially The strengths and limitations of these metrics may vary more for interdependent and interconnected networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network key point analysis method based on single-layer information flow transmission
  • Network key point analysis method based on single-layer information flow transmission
  • Network key point analysis method based on single-layer information flow transmission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] as attached figure 1 The network key point analysis method based on single-layer information flow transmission shown in the figure mainly starts from the perspective of complex network protection and stability improvement, and focuses on blocking the transmission of information flow in the network for modeling and analysis. Discussion under the condition of limited blocking resources; model and analyze the single-layer network, propose the corresponding blocking solution algorithm, and solve and analyze the specifically constructed network, so as to realize the discovery and research of key nodes in the complex network, Considering other constraints such as the internal structure of the network and resource constraints, the following steps are specifically included:

[0071] Step 1. Obtain single-layer network data based on graph structure, and construct a single-layer information flow delivery network based on the network data; the information flow delivery network inc...

Embodiment 2

[0111] On the basis of Embodiment 1, the present invention also provides a computer device, such as Figure 4 As shown, it includes a memory and a processor, the memory stores a computer program, and the processor implements the steps of the method in the first embodiment when executing the computer program.

[0112] In another embodiment, a computer-readable storage medium is provided, on which a computer program is stored, and when the computer program is executed by a processor, the steps of the method in the first embodiment are implemented.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network key point analysis method based on single-layer information flow transmission, and the method comprises the steps: obtaining network data based on a graph structure,and constructing a single-layer information flow transmission network according to the network data; preprocessing the single-layer information flow transmission network, and establishing an optimization objective function based on a network attacker and a network operator; constructing a game model according to the optimization objective functions of the network attacker and the network operator;establishing a single-layer network information flow blocking model from the perspective of the network attacker, and blocking nodes are determined as network key points. According to the invention,two concepts of a network attacker and a network operator are introduced to describe the problem of network security from different perspectives and construct a game model; and meanwhile, the targetsof the network attacker and the network operator are clearly described and are classified into the same model, so that a single-layer network information flow blocking model is established, and key nodes of the network are discovered while a blocking scheme is solved from the perspective of the attacker.

Description

technical field [0001] The invention relates to the technical field of complex networks, in particular to a network key point analysis method based on single-layer information flow transmission. Background technique [0002] Computer network functions mainly include realizing resource sharing, realizing rapid transmission of data information, improving reliability, providing load balancing and distributed processing capabilities, centralized management and comprehensive information services; the above functions can be abstractly summarized as: information flow transmission, key network nodes Or node clusters for information processing and network performance optimization. [0003] The key nodes of the network refer to some special nodes that can affect the structure or performance of the network to a greater extent than other nodes in the network. The failure of some nodes in the network may cause small-scale failure or load redistribution, which has little impact on the ov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/145H04L41/142H04L63/20H04L63/1408
Inventor 朱先强戴周璇朱承汤罗浩吕国栋刘斌丁兆云
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products