The Invulnerability of Emergency Logistics Network Based on Complex Network

  • Chunxia Chen
  • Yongkang Wang
Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 137)

Abstract

Aim at the performance evaluation of emergency logistics network, the network’s invulnerability is analyzed by the average inverse geodesic length and the size of the largest connected subgraph in this paper. For each case of attacks on vertices and edges, different attacking strategies are used: removals by the descending order of the degree and the betweenness centrality. It is found that the random attack and the maximum edge-betweenness centrality attack are often less damage than select attacks and maximum vertice- betweenness centrality attacks. The invulnerability is weak based on the removals by the recalculated degrees when more vertices are attacked.

Keywords

Emergency logistics network complex network invulnerability 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Tufekci, S., Wallace, W.A.: The emerging area of emergency management and engineering. IEEE Transactions on Engineering Management 45, 103–105 (1998)CrossRefGoogle Scholar
  2. 2.
    Ozdamar, L., Ekinci, E., Kucukyazici, B.: Emergency logistics planning in natural disasters. Annals of Operations Research 129, 217–245 (2004)CrossRefMathSciNetGoogle Scholar
  3. 3.
    Iedrich, F., Gehbauer, F., Rickers, U.: Optimized resource allocation for emergency response after earthquake disaster. Safety Science 35, 45–57 (2000)Google Scholar
  4. 4.
    Yi, W., Ozdamar, L.: A dynamic logistics coordination model for evacuation and support in disaster response activities. European Journal of Operational Research 179, 1177–1193 (2007)CrossRefMATHMathSciNetGoogle Scholar
  5. 5.
    Claudio Garavelli, A.: Flexibility configurations for the supply chain management. Int. J. Production Economics 85, 141–153 (2003)CrossRefGoogle Scholar
  6. 6.
    Thomas, M.U.: Supply chain reliability for contingency operations. In: The Proceeding of Reliability and Maintainability Symposium, pp. 61–67 (2002)Google Scholar
  7. 7.
    Albert, R., Jeong, H., Barabάsi, A.-L.: Error and attack tolerance of complex networks. Nature 406, 378–382 (2000) Google Scholar
  8. 8.
    Holme, P., Kim, B.J., Yoon, C.N., Han, S.K.: Attack vulnerability of complex networks. Phys. Rev. E 65, 1–15 (2002)Google Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  • Chunxia Chen
    • 1
  • Yongkang Wang
    • 2
  1. 1.Mechanical Engineering DepartmentChengdu Electromechanical CollegeChengduChina
  2. 2.Civil Aviation Flight University of ChinaGuanghanChina

Personalised recommendations