Mathematics and Computer Science

| Peer-Reviewed |

Research on the Vulnerability of China-Europe Railway Express Network

Received: 16 May 2022    Accepted:     Published: 19 May 2022
Views:       Downloads:

Share This Article

Abstract

In order to study the vulnerability of the European express train transport network, statistics were made on the countries and cities along the route. The two methods of intentional attack are to study the changes of the network characteristic values, such as the average degree of the network, the proportion of isolated nodes, the average path length, and the network efficiency. Under the deliberate attack, the node average degree, aggregation coefficient, network efficiency, and average path length of the China-Europe train network decrease rapidly with the increase of the attack ratio and decrease to 0. Under random attack, the average node degree, network efficiency, and average path length of the network show a slow decreasing trend with the increase of the attack ratio, and the aggregation coefficient increases slowly and then decreases. The isolated node is no longer connected to other nodes under the deliberate attack and random attack, so the attacked node is the isolated point, which increases the cardinality of the isolated node. The research shows that the China Railway Express network is relatively strong when subjected to random attacks, and relatively vulnerable when subjected to deliberate attacks. At the same time, it is found that some nodes in the China Railway Express play an important role in the connectivity of the network.

DOI 10.11648/j.mcs.20220703.13
Published in Mathematics and Computer Science (Volume 7, Issue 3, May 2022)
Page(s) 48-52
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

China-Europe Railway Express, Complex Networks, Vulnerability, Connectivity, Damage Resistance

References
[1] WU Di, WANG Nuo, YU Anqi, GUAN Lei. Vulnerability and risk management in the maritime silk road container shipping network [J]. Acta Geographica Sinica. 2018, 73 (6): 1133-1148.
[2] Xu Yingming, Xing Lizhi, Dong Xianlei. Research on the trade channel of China-Europe trains under the Belt and Road Initiative [J]. International Trade, 2019, 2: 80-86.
[3] WU Shan, HAN Xiaolong, LIU Chanjuan, et al. Vulnerability analysis of global container shipping network based on complex network. Computer Engineering and Applications, 2018, 54 (15): 249-254.
[4] DUAN Jiarong, ZHENG Hongda. Vulnerability analysis method for complex networks based on node importance [J]. Control Engineering of China, 2020, 27 (4): 692-696.
[5] WANG Nuo, DONG Lingling, WU Nuan, YAN Huakun. The change of global container shipping network vulnerability under intentional attack [J]. Acta Geographica Sinica. 2016, 71 (2): 293-303.
[6] JI Mingjun, LIU Shuangfu, GUO Xinghai. A study on the development planning of logistics parks along new eurasian land bridge [J]. Railway Transport and Andeconomy, 2019, 41 (2): 94-99.
[7] Yang Z L, Adolf N, Wang J. A new risk quantification approach in port facility security assessment [J]. Transportation Research Part A, 2014, 59: 72-90.
[8] Yang Z L, Adolf N, Wang J. Prioritising security vulnerabilities in ports [J]. International Journal of Shipping and Transpor tLogistics, 2013, 5 (6): 622-636.
[9] Talas R, Menachof D. Using portfolio optimisation to calculate the efficient relationship between maritime port security residual risk and security investment [J]. International Journal of Shipping and Transport Logistics, 2014, 6 (3): 314-338.
[10] Germond B. The geopolitical dimension of maritime security [J]. Marine Policy, 2015, 54: 137-142.
[11] A lbertR, Jeong H, BarabásiA-L. Error and attack tolerance of complex networks [J]. Nature, 2000, 406: 378-382.
[12] Zhao S C. Study on Reliability of Urban Public Transit Network Based on Complex Network Theory [J]. China Safety Science Journal, 2013, 23 (4): 108-112.
[13] Huang D R, Shen L B, Zhao L. Vulnerability Analysis of Urban Road Network Based on Complex Network Theory [J]. Journal of Chongqing Jiaotong University (Natural Science), 2015, 34 (1): 110-115.
[14] Liu D C, Ji X P, Wang B, et al. Topological Vulnerability Analysis and Countermeasures of Electrical Communication Network Based on Complex Network Theory [J]. Power System Technology, 2015, 39 (12): 3615-3621.
[15] Jiang X Y, Ji X, Huang J. Vulnerability Analysis of Shipboard Power Network Based on Complex Network Theory [J]. Ship Science and Technology, 2014, (8): 46-52.
Cite This Article
  • APA Style

    Wang Nana, Gao Xinxin, Wang Xueqing. (2022). Research on the Vulnerability of China-Europe Railway Express Network. Mathematics and Computer Science, 7(3), 48-52. https://doi.org/10.11648/j.mcs.20220703.13

    Copy | Download

    ACS Style

    Wang Nana; Gao Xinxin; Wang Xueqing. Research on the Vulnerability of China-Europe Railway Express Network. Math. Comput. Sci. 2022, 7(3), 48-52. doi: 10.11648/j.mcs.20220703.13

    Copy | Download

    AMA Style

    Wang Nana, Gao Xinxin, Wang Xueqing. Research on the Vulnerability of China-Europe Railway Express Network. Math Comput Sci. 2022;7(3):48-52. doi: 10.11648/j.mcs.20220703.13

    Copy | Download

  • @article{10.11648/j.mcs.20220703.13,
      author = {Wang Nana and Gao Xinxin and Wang Xueqing},
      title = {Research on the Vulnerability of China-Europe Railway Express Network},
      journal = {Mathematics and Computer Science},
      volume = {7},
      number = {3},
      pages = {48-52},
      doi = {10.11648/j.mcs.20220703.13},
      url = {https://doi.org/10.11648/j.mcs.20220703.13},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.mcs.20220703.13},
      abstract = {In order to study the vulnerability of the European express train transport network, statistics were made on the countries and cities along the route. The two methods of intentional attack are to study the changes of the network characteristic values, such as the average degree of the network, the proportion of isolated nodes, the average path length, and the network efficiency. Under the deliberate attack, the node average degree, aggregation coefficient, network efficiency, and average path length of the China-Europe train network decrease rapidly with the increase of the attack ratio and decrease to 0. Under random attack, the average node degree, network efficiency, and average path length of the network show a slow decreasing trend with the increase of the attack ratio, and the aggregation coefficient increases slowly and then decreases. The isolated node is no longer connected to other nodes under the deliberate attack and random attack, so the attacked node is the isolated point, which increases the cardinality of the isolated node. The research shows that the China Railway Express network is relatively strong when subjected to random attacks, and relatively vulnerable when subjected to deliberate attacks. At the same time, it is found that some nodes in the China Railway Express play an important role in the connectivity of the network.},
     year = {2022}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Research on the Vulnerability of China-Europe Railway Express Network
    AU  - Wang Nana
    AU  - Gao Xinxin
    AU  - Wang Xueqing
    Y1  - 2022/05/19
    PY  - 2022
    N1  - https://doi.org/10.11648/j.mcs.20220703.13
    DO  - 10.11648/j.mcs.20220703.13
    T2  - Mathematics and Computer Science
    JF  - Mathematics and Computer Science
    JO  - Mathematics and Computer Science
    SP  - 48
    EP  - 52
    PB  - Science Publishing Group
    SN  - 2575-6028
    UR  - https://doi.org/10.11648/j.mcs.20220703.13
    AB  - In order to study the vulnerability of the European express train transport network, statistics were made on the countries and cities along the route. The two methods of intentional attack are to study the changes of the network characteristic values, such as the average degree of the network, the proportion of isolated nodes, the average path length, and the network efficiency. Under the deliberate attack, the node average degree, aggregation coefficient, network efficiency, and average path length of the China-Europe train network decrease rapidly with the increase of the attack ratio and decrease to 0. Under random attack, the average node degree, network efficiency, and average path length of the network show a slow decreasing trend with the increase of the attack ratio, and the aggregation coefficient increases slowly and then decreases. The isolated node is no longer connected to other nodes under the deliberate attack and random attack, so the attacked node is the isolated point, which increases the cardinality of the isolated node. The research shows that the China Railway Express network is relatively strong when subjected to random attacks, and relatively vulnerable when subjected to deliberate attacks. At the same time, it is found that some nodes in the China Railway Express play an important role in the connectivity of the network.
    VL  - 7
    IS  - 3
    ER  - 

    Copy | Download

Author Information
  • School of Liberal Studies, Liaoning University of International Business and Economics, Dalian, China

  • School of Liberal Studies, Liaoning University of International Business and Economics, Dalian, China

  • School of Liberal Studies, Liaoning University of International Business and Economics, Dalian, China

  • Sections