Affective Computing and Intelligent Interaction pp 789-797 | Cite as
The Invulnerability of Emergency Logistics Network Based on Complex Network
Abstract
Aim at the performance evaluation of emergency logistics network, the network’s invulnerability is analyzed by the average inverse geodesic length and the size of the largest connected subgraph in this paper. For each case of attacks on vertices and edges, different attacking strategies are used: removals by the descending order of the degree and the betweenness centrality. It is found that the random attack and the maximum edge-betweenness centrality attack are often less damage than select attacks and maximum vertice- betweenness centrality attacks. The invulnerability is weak based on the removals by the recalculated degrees when more vertices are attacked.
Keywords
Emergency logistics network complex network invulnerabilityPreview
Unable to display preview. Download preview PDF.
References
- 1.Tufekci, S., Wallace, W.A.: The emerging area of emergency management and engineering. IEEE Transactions on Engineering Management 45, 103–105 (1998)CrossRefGoogle Scholar
- 2.Ozdamar, L., Ekinci, E., Kucukyazici, B.: Emergency logistics planning in natural disasters. Annals of Operations Research 129, 217–245 (2004)CrossRefMathSciNetGoogle Scholar
- 3.Iedrich, F., Gehbauer, F., Rickers, U.: Optimized resource allocation for emergency response after earthquake disaster. Safety Science 35, 45–57 (2000)Google Scholar
- 4.Yi, W., Ozdamar, L.: A dynamic logistics coordination model for evacuation and support in disaster response activities. European Journal of Operational Research 179, 1177–1193 (2007)CrossRefMATHMathSciNetGoogle Scholar
- 5.Claudio Garavelli, A.: Flexibility configurations for the supply chain management. Int. J. Production Economics 85, 141–153 (2003)CrossRefGoogle Scholar
- 6.Thomas, M.U.: Supply chain reliability for contingency operations. In: The Proceeding of Reliability and Maintainability Symposium, pp. 61–67 (2002)Google Scholar
- 7.Albert, R., Jeong, H., Barabάsi, A.-L.: Error and attack tolerance of complex networks. Nature 406, 378–382 (2000) Google Scholar
- 8.Holme, P., Kim, B.J., Yoon, C.N., Han, S.K.: Attack vulnerability of complex networks. Phys. Rev. E 65, 1–15 (2002)Google Scholar