Vulnerability analysis for airport networks based on fuzzy soft sets: From the structural and functional perspective
Abstract Recently, much attention has been paid to the reliability and vulnerability of critical infrastructure. In air traffic systems, the vulnerability analysis for airport networks can be used to guide air traffic administrations in their prioritization of the maintenance and repair of airports,...
Saved in:
Published in | Chinese journal of aeronautics Vol. 28; no. 3; pp. 780 - 788 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Elsevier Ltd
01.06.2015
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Abstract Recently, much attention has been paid to the reliability and vulnerability of critical infrastructure. In air traffic systems, the vulnerability analysis for airport networks can be used to guide air traffic administrations in their prioritization of the maintenance and repair of airports, as well as to avoid unnecessary disturbances in the planning of flight schedules. In this paper, the evaluation methods of airport importance and network efficiency arc established. Firstly, the evaluation indices of airport importance are proposed from both the topological and functional perspectives. The topological characteristics come from the structure of airport network and the functional features stem from the traffic flow distribution taking place inside the network. Secondly, an integrated evaluation method based on fuzzy soft set theory is proposed to identify the key airports, which can fuse together importance indices over different time intervals. Thirdly, an airport network efficiency method is established for the purpose of assessing the accuracy of the evaluation method. Finally, empirical studies using real traffic data of US and China's airport networks show that the evaluation method proposed in this papcr is the most accuratc. Thc vulucrability of US and China's airport networks is compared. The similarities and differences between airport geography distribution and airport importance distribution are discussed here and the dynamics of airport importance is studied as well. |
---|---|
AbstractList | Abstract Recently, much attention has been paid to the reliability and vulnerability of critical infrastructure. In air traffic systems, the vulnerability analysis for airport networks can be used to guide air traffic administrations in their prioritization of the maintenance and repair of airports, as well as to avoid unnecessary disturbances in the planning of flight schedules. In this paper, the evaluation methods of airport importance and network efficiency arc established. Firstly, the evaluation indices of airport importance are proposed from both the topological and functional perspectives. The topological characteristics come from the structure of airport network and the functional features stem from the traffic flow distribution taking place inside the network. Secondly, an integrated evaluation method based on fuzzy soft set theory is proposed to identify the key airports, which can fuse together importance indices over different time intervals. Thirdly, an airport network efficiency method is established for the purpose of assessing the accuracy of the evaluation method. Finally, empirical studies using real traffic data of US and China's airport networks show that the evaluation method proposed in this papcr is the most accuratc. Thc vulucrability of US and China's airport networks is compared. The similarities and differences between airport geography distribution and airport importance distribution are discussed here and the dynamics of airport importance is studied as well. Recently, much attention has been paid to the reliability and vulnerability of critical infrastructure. In air traffic systems, the vulnerability analysis for airport networks can be used to guide air traffic administrations in their prioritization of the maintenance and repair of airports, as well as to avoid unnecessary disturbances in the planning of flight schedules. In this paper, the evaluation methods of airport importance and network efficiency are established. Firstly, the evaluation indices of airport importance are proposed from both the topological and functional perspectives. The topological characteristics come from the structure of airport network and the functional features stem from the traffic flow distribution taking place inside the network. Secondly, an integrated evaluation method based on fuzzy soft set theory is proposed to identify the key airports, which can fuse together importance indices over different time intervals. Thirdly, an airport network efficiency method is established for the purpose of assessing the accuracy of the evaluation method. Finally, empirical studies using real traffic data of US and China’s airport networks show that the evaluation method proposed in this paper is the most accurate. The vulnerability of US and China’s airport networks is compared. The similarities and differences between airport geography distribution and airport importance distribution are discussed here and the dynamics of airport importance is studied as well. |
Author | Li Shanmei Xu Xiaohao |
AuthorAffiliation | Air Traffic Management Research Base, Civil Aviation Unliversity of China, Tialjin 300300, China |
Author_xml | – sequence: 1 givenname: Shanmei surname: Li fullname: Li, Shanmei email: amy820203@163.com – sequence: 2 givenname: Xiaohao surname: Xu fullname: Xu, Xiaohao |
BookMark | eNp9kEtOwzAQhr0ACVo4ADuLfcM4aRNHrBDiJSGxAbaW7Yxbh2AX2y0qR-Es3Ikr4IqKJavRL83_0Dcie847JOSEQcGA1Wd9oXtZlMBmBUwLgHKPHDIAmLRVzQ7IKMYeoGobBodk_bwaHAap7GDThkonh020kRofqLRh6UOiDtO7Dy-RKhmxo95Rs_r42NDoTaIRU_z--qTXwb_StEAaU1jptApyyGldfnU6WZ9z6RJDXGJWazwi-0YOEY93d0yerq8eL28n9w83d5cX9xM9BUgTzplqeMVl23JtWoU1lh1XyLsaVKkaqRROa6Nns0pjVysNpitRg-ZccWZMNSbsN1cHH2NAI5bBvsqwEQzEFpboRYYltrAETEWGlT3nvx7Mw9YWg4jaossFNuT1ovP2X_fprnHh3fzNuvlfZV3PWMVL3lQ_BdSHaQ |
CitedBy_id | crossref_primary_10_1016_j_cja_2022_01_009 crossref_primary_10_1155_2022_4032957 crossref_primary_10_1111_risa_13238 crossref_primary_10_1016_j_cja_2017_03_007 crossref_primary_10_3390_su12093749 crossref_primary_10_7498_aps_66_050201 crossref_primary_10_1016_j_cja_2017_01_010 crossref_primary_10_1109_ACCESS_2017_2682231 crossref_primary_10_1109_TITS_2021_3137458 crossref_primary_10_1016_j_cja_2016_01_010 crossref_primary_10_1016_j_chaos_2017_01_007 crossref_primary_10_1007_s12652_019_01558_x crossref_primary_10_3390_su13116446 crossref_primary_10_1371_journal_pone_0260940 crossref_primary_10_1155_2021_5513093 |
Cites_doi | 10.1016/j.physa.2008.01.077 10.1103/PhysRevE.69.046106 10.7498/aps.62.128901 10.1016/S0898-1221(99)00056-5 10.1016/j.camwa.2008.11.009 10.1016/j.physa.2006.05.032 10.1007/BF02289527 10.1038/35019019 10.1016/j.camwa.2009.10.015 10.1016/0378-8733(91)90017-N 10.1016/j.camwa.2009.04.019 10.1016/0378-8733(78)90021-7 10.1016/S0898-1221(03)00016-6 10.1088/0256-307X/20/8/362 |
ContentType | Journal Article |
Copyright | 2015 |
Copyright_xml | – notice: 2015 |
DBID | 2RA 92L CQIGP W92 ~WA 6I. AAFTH AAYXX CITATION |
DOI | 10.1016/j.cja.2015.04.002 |
DatabaseName | 维普_期刊 中文科技期刊数据库-CALIS站点 维普中文期刊数据库 中文科技期刊数据库-工程技术 中文科技期刊数据库- 镜像站点 ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
DocumentTitleAlternate | Vulnerability analysis for airport networks based on fuzzy soft sets: From the structural and functional perspective |
EndPage | 788 |
ExternalDocumentID | 10_1016_j_cja_2015_04_002 S1000936115000588 665138287 |
GroupedDBID | --K -SC -S~ 0R~ 0SF 1B1 1~5 29B 2B. 2C0 2RA 4.4 457 4G. 5GY 5VR 5VS 5XA 5XD 5XL 6I. 7-5 71M 92H 92I 92L 92R 93N 9D9 9DC AACTN AAEDT AAEDW AAFTH AAIKJ AALRI AAQFI AAXUO ABMAC ACGFS ADBBV ADEZE ADMUD AEKER AENEX AEXQZ AFTJW AFUIB AGHFR AI. AITUG ALMA_UNASSIGNED_HOLDINGS AMRAJ BCNDV CAJEC CAJUS CCEZO CEKLB CHBEP CQIGP CS3 CW9 DU5 EBS EJD EO9 EP2 EP3 FA0 FDB FNPLU GBLVA GROUPED_DOAJ HZ~ IPNFZ IXB J1W KQ8 M41 N9A NCXOZ O-L O9- OK1 OZT Q-- Q-2 RIG ROL SDF SDG SES SSZ TCJ TGT U1G U5M VH1 W92 ~M3 ~WA AAXDM AAYXX ADVLN AKRWK CITATION |
ID | FETCH-LOGICAL-c400t-881b7838a998cf9be6e2d8be8d60b2b7abbe46fc553ced6bc0fd2ec0c88b81ff3 |
IEDL.DBID | IXB |
ISSN | 1000-9361 |
IngestDate | Fri Aug 23 01:17:44 EDT 2024 Fri Feb 23 02:27:54 EST 2024 Wed Feb 14 10:30:16 EST 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Keywords | Fuzzy soft sets Key node Air traffic Complex network Airport network |
Language | English |
License | http://creativecommons.org/licenses/by-nc-nd/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c400t-881b7838a998cf9be6e2d8be8d60b2b7abbe46fc553ced6bc0fd2ec0c88b81ff3 |
Notes | Air traffic;Airport network;Complex networkFuzzy soft sets;Key node 11-1732/V Abstract Recently, much attention has been paid to the reliability and vulnerability of critical infrastructure. In air traffic systems, the vulnerability analysis for airport networks can be used to guide air traffic administrations in their prioritization of the maintenance and repair of airports, as well as to avoid unnecessary disturbances in the planning of flight schedules. In this paper, the evaluation methods of airport importance and network efficiency arc established. Firstly, the evaluation indices of airport importance are proposed from both the topological and functional perspectives. The topological characteristics come from the structure of airport network and the functional features stem from the traffic flow distribution taking place inside the network. Secondly, an integrated evaluation method based on fuzzy soft set theory is proposed to identify the key airports, which can fuse together importance indices over different time intervals. Thirdly, an airport network efficiency method is established for the purpose of assessing the accuracy of the evaluation method. Finally, empirical studies using real traffic data of US and China's airport networks show that the evaluation method proposed in this papcr is the most accuratc. Thc vulucrability of US and China's airport networks is compared. The similarities and differences between airport geography distribution and airport importance distribution are discussed here and the dynamics of airport importance is studied as well. |
OpenAccessLink | https://www.sciencedirect.com/science/article/pii/S1000936115000588 |
PageCount | 9 |
ParticipantIDs | crossref_primary_10_1016_j_cja_2015_04_002 elsevier_sciencedirect_doi_10_1016_j_cja_2015_04_002 chongqing_primary_665138287 |
PublicationCentury | 2000 |
PublicationDate | 2015-06-01 |
PublicationDateYYYYMMDD | 2015-06-01 |
PublicationDate_xml | – month: 06 year: 2015 text: 2015-06-01 day: 01 |
PublicationDecade | 2010 |
PublicationTitle | Chinese journal of aeronautics |
PublicationTitleAlternate | Chinese Journal of Aeronautics |
PublicationYear | 2015 |
Publisher | Elsevier Ltd |
Publisher_xml | – name: Elsevier Ltd |
References | Han, Li, Liu, Li (b0020) 2006; 42 Albert, Jeong, Barabási (b0040) 2000; 406 Bagler (b0015) 2008; 387 Xu, Ma, Wang (b0070) 2010; 59 Ali, Feng, Liu (b0080) 2009; 57 Maji, Biswas, Roy (b0085) 2003; 45 Ren, Shao, Liu, Guo, Wang (b0045) 2013; 62 Latora, Marchiori (b0090) 2007; 9 Zheng, Gao, Zhao (b0100) 2007; 373 Li, Cai (b0010) 2004; 69 Chen, Hu, Hu, Chen (b0035) 2004; 14 Sabidussi (b0025) 1996; 31 He, Li (b0095) 2007; 34 Chi, Wang, Su, Xu, Zhao, Li (b0005) 2003; 20 Freeman (b0055) 1979; 1 Tan, Wu, Deng (b0050) 2006; 11 Ahmad, Kharal (b0065) 2009; 2009 Molodtsov (b0060) 1999; 37 Freeman, Borgatti, White (b0030) 1991; 13 Yang, Lin, Yang (b0075) 2009; 58 Ahmad (10.1016/j.cja.2015.04.002_b0065) 2009; 2009 Tan (10.1016/j.cja.2015.04.002_b0050) 2006; 11 Xu (10.1016/j.cja.2015.04.002_b0070) 2010; 59 Ren (10.1016/j.cja.2015.04.002_b0045) 2013; 62 Yang (10.1016/j.cja.2015.04.002_b0075) 2009; 58 Han (10.1016/j.cja.2015.04.002_b0020) 2006; 42 Bagler (10.1016/j.cja.2015.04.002_b0015) 2008; 387 Chen (10.1016/j.cja.2015.04.002_b0035) 2004; 14 Maji (10.1016/j.cja.2015.04.002_b0085) 2003; 45 Li (10.1016/j.cja.2015.04.002_b0010) 2004; 69 Freeman (10.1016/j.cja.2015.04.002_b0030) 1991; 13 Chi (10.1016/j.cja.2015.04.002_b0005) 2003; 20 Freeman (10.1016/j.cja.2015.04.002_b0055) 1979; 1 Sabidussi (10.1016/j.cja.2015.04.002_b0025) 1996; 31 Albert (10.1016/j.cja.2015.04.002_b0040) 2000; 406 He (10.1016/j.cja.2015.04.002_b0095) 2007; 34 Molodtsov (10.1016/j.cja.2015.04.002_b0060) 1999; 37 Ali (10.1016/j.cja.2015.04.002_b0080) 2009; 57 Zheng (10.1016/j.cja.2015.04.002_b0100) 2007; 373 Latora (10.1016/j.cja.2015.04.002_b0090) 2007; 9 |
References_xml | – volume: 11 start-page: 79 year: 2006 end-page: 83 ident: b0050 article-title: Evaluation method for node importance based on node contraction in complex networks publication-title: Syst Eng Technol Pract contributor: fullname: Deng – volume: 58 start-page: 521 year: 2009 end-page: 527 ident: b0075 article-title: Combination of interval-valued fuzzy set and soft set publication-title: Comput Math Appl contributor: fullname: Yang – volume: 34 start-page: 1 year: 2007 end-page: 5 ident: b0095 article-title: GanWY, Zhu X. Mining vital nodes in complex networks. publication-title: Science contributor: fullname: Li – volume: 373 start-page: 837 year: 2007 end-page: 844 ident: b0100 article-title: Properties of transportation dynamics on scale-free networks publication-title: Phys A: Statis Mech Appl contributor: fullname: Zhao – volume: 387 start-page: 2972 year: 2008 end-page: 2980 ident: b0015 article-title: Analysis of the airport network of India as a complex weighted network publication-title: Phys A: Stat Mech Appl contributor: fullname: Bagler – volume: 13 start-page: 141 year: 1991 end-page: 154 ident: b0030 article-title: Centrality in valued graphs: a measure of betweenness based on network flow publication-title: Social Networks contributor: fullname: White – volume: 9 start-page: 1 year: 2007 end-page: 16 ident: b0090 article-title: A measure of centrality based on network efficiency publication-title: New J Phy contributor: fullname: Marchiori – volume: 69 start-page: 046106 year: 2004 ident: b0010 article-title: Statistical analysis of airport network of China publication-title: Phys Rev E contributor: fullname: Cai – volume: 62 start-page: 128901 year: 2013 end-page: 128905 ident: b0045 article-title: Node importance measurement based on the degree and clustering coefficient information publication-title: Acta Phys Sin contributor: fullname: Wang – volume: 31 start-page: 581 year: 1996 end-page: 603 ident: b0025 article-title: The centrality index of a graph publication-title: Psychometrika contributor: fullname: Sabidussi – volume: 57 start-page: 1547 year: 2009 end-page: 1553 ident: b0080 article-title: On some new operations in soft set theory publication-title: Comput Math Appl contributor: fullname: Liu – volume: 42 start-page: 29 year: 2006 end-page: 31 ident: b0020 article-title: Networked characteristics in software and its contribution to software quality publication-title: Comput Eng Appl contributor: fullname: Li – volume: 37 start-page: 19 year: 1999 end-page: 31 ident: b0060 article-title: Soft set theory-first results publication-title: Comput Math Appl contributor: fullname: Molodtsov – volume: 59 start-page: 787 year: 2010 end-page: 794 ident: b0070 article-title: Vague soft sets and their properties publication-title: Comput Math Appl contributor: fullname: Wang – volume: 45 start-page: 555 year: 2003 end-page: 562 ident: b0085 article-title: Soft set theory publication-title: Comput Math Appl contributor: fullname: Roy – volume: 14 start-page: 21 year: 2004 end-page: 24 ident: b0035 article-title: A method for finding the most vital node in communication networks publication-title: High Technol Lett contributor: fullname: Chen – volume: 20 start-page: 1393 year: 2003 end-page: 1396 ident: b0005 article-title: Structural properties of US flight network publication-title: Chin Phys Lett contributor: fullname: Li – volume: 1 start-page: 215 year: 1979 end-page: 239 ident: b0055 article-title: Centrality in social networks conceptual clarification publication-title: Social Networks contributor: fullname: Freeman – volume: 406 start-page: 378 year: 2000 end-page: 382 ident: b0040 article-title: Error and attack tolerance of complex networks publication-title: Nature contributor: fullname: Barabási – volume: 2009 start-page: 1 year: 2009 end-page: 6 ident: b0065 article-title: On fuzzy soft sets publication-title: Adv Fuzzy Syst contributor: fullname: Kharal – volume: 387 start-page: 2972 issue: 12 year: 2008 ident: 10.1016/j.cja.2015.04.002_b0015 article-title: Analysis of the airport network of India as a complex weighted network publication-title: Phys A: Stat Mech Appl doi: 10.1016/j.physa.2008.01.077 contributor: fullname: Bagler – volume: 11 start-page: 79 issue: 11 year: 2006 ident: 10.1016/j.cja.2015.04.002_b0050 article-title: Evaluation method for node importance based on node contraction in complex networks publication-title: Syst Eng Technol Pract contributor: fullname: Tan – volume: 2009 start-page: 1 year: 2009 ident: 10.1016/j.cja.2015.04.002_b0065 article-title: On fuzzy soft sets publication-title: Adv Fuzzy Syst contributor: fullname: Ahmad – volume: 69 start-page: 046106 issue: 4 year: 2004 ident: 10.1016/j.cja.2015.04.002_b0010 article-title: Statistical analysis of airport network of China publication-title: Phys Rev E doi: 10.1103/PhysRevE.69.046106 contributor: fullname: Li – volume: 62 start-page: 128901 issue: 12 year: 2013 ident: 10.1016/j.cja.2015.04.002_b0045 article-title: Node importance measurement based on the degree and clustering coefficient information publication-title: Acta Phys Sin doi: 10.7498/aps.62.128901 contributor: fullname: Ren – volume: 37 start-page: 19 issue: 4 year: 1999 ident: 10.1016/j.cja.2015.04.002_b0060 article-title: Soft set theory-first results publication-title: Comput Math Appl doi: 10.1016/S0898-1221(99)00056-5 contributor: fullname: Molodtsov – volume: 34 start-page: 1 issue: 12 year: 2007 ident: 10.1016/j.cja.2015.04.002_b0095 article-title: GanWY, Zhu X. Mining vital nodes in complex networks. Computer publication-title: Science contributor: fullname: He – volume: 42 start-page: 29 issue: 20 year: 2006 ident: 10.1016/j.cja.2015.04.002_b0020 article-title: Networked characteristics in software and its contribution to software quality publication-title: Comput Eng Appl contributor: fullname: Han – volume: 57 start-page: 1547 issue: 9 year: 2009 ident: 10.1016/j.cja.2015.04.002_b0080 article-title: On some new operations in soft set theory publication-title: Comput Math Appl doi: 10.1016/j.camwa.2008.11.009 contributor: fullname: Ali – volume: 373 start-page: 837 year: 2007 ident: 10.1016/j.cja.2015.04.002_b0100 article-title: Properties of transportation dynamics on scale-free networks publication-title: Phys A: Statis Mech Appl doi: 10.1016/j.physa.2006.05.032 contributor: fullname: Zheng – volume: 31 start-page: 581 issue: 4 year: 1996 ident: 10.1016/j.cja.2015.04.002_b0025 article-title: The centrality index of a graph publication-title: Psychometrika doi: 10.1007/BF02289527 contributor: fullname: Sabidussi – volume: 406 start-page: 378 issue: 6794 year: 2000 ident: 10.1016/j.cja.2015.04.002_b0040 article-title: Error and attack tolerance of complex networks publication-title: Nature doi: 10.1038/35019019 contributor: fullname: Albert – volume: 59 start-page: 787 issue: 2 year: 2010 ident: 10.1016/j.cja.2015.04.002_b0070 article-title: Vague soft sets and their properties publication-title: Comput Math Appl doi: 10.1016/j.camwa.2009.10.015 contributor: fullname: Xu – volume: 13 start-page: 141 issue: 2 year: 1991 ident: 10.1016/j.cja.2015.04.002_b0030 article-title: Centrality in valued graphs: a measure of betweenness based on network flow publication-title: Social Networks doi: 10.1016/0378-8733(91)90017-N contributor: fullname: Freeman – volume: 9 start-page: 1 issue: 6 year: 2007 ident: 10.1016/j.cja.2015.04.002_b0090 article-title: A measure of centrality based on network efficiency publication-title: New J Phy contributor: fullname: Latora – volume: 58 start-page: 521 issue: 3 year: 2009 ident: 10.1016/j.cja.2015.04.002_b0075 article-title: Combination of interval-valued fuzzy set and soft set publication-title: Comput Math Appl doi: 10.1016/j.camwa.2009.04.019 contributor: fullname: Yang – volume: 1 start-page: 215 issue: 3 year: 1979 ident: 10.1016/j.cja.2015.04.002_b0055 article-title: Centrality in social networks conceptual clarification publication-title: Social Networks doi: 10.1016/0378-8733(78)90021-7 contributor: fullname: Freeman – volume: 45 start-page: 555 issue: 4 year: 2003 ident: 10.1016/j.cja.2015.04.002_b0085 article-title: Soft set theory publication-title: Comput Math Appl doi: 10.1016/S0898-1221(03)00016-6 contributor: fullname: Maji – volume: 20 start-page: 1393 issue: 8 year: 2003 ident: 10.1016/j.cja.2015.04.002_b0005 article-title: Structural properties of US flight network publication-title: Chin Phys Lett doi: 10.1088/0256-307X/20/8/362 contributor: fullname: Chi – volume: 14 start-page: 21 issue: 1 year: 2004 ident: 10.1016/j.cja.2015.04.002_b0035 article-title: A method for finding the most vital node in communication networks publication-title: High Technol Lett contributor: fullname: Chen |
SSID | ssj0039710 |
Score | 2.1621864 |
Snippet | Abstract Recently, much attention has been paid to the reliability and vulnerability of critical infrastructure. In air traffic systems, the vulnerability... Recently, much attention has been paid to the reliability and vulnerability of critical infrastructure. In air traffic systems, the vulnerability analysis for... |
SourceID | crossref elsevier chongqing |
SourceType | Aggregation Database Publisher |
StartPage | 780 |
SubjectTerms | Air traffic Airport network Complex network Fuzzy soft sets Key node 机场 模糊 空中交通系统 结构 综合评价方法 网络效率 脆弱性分析 角度分析 |
Title | Vulnerability analysis for airport networks based on fuzzy soft sets: From the structural and functional perspective |
URI | http://lib.cqvip.com/qk/83889X/201503/665138287.html https://dx.doi.org/10.1016/j.cja.2015.04.002 |
Volume | 28 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELaqLsCAeIpSQB6YkKImseM6bFBRVUiwQFE3K34EtYK00HRofz13eZQiwcKSKA9H0Wfnuzvn7jMhlwHjVoTWebCDjR9bL7YYpcSJFYJrExUT-g-PYjDk96No1CC9uhYG0yor7i85vWDr6kynQrMzG487T0ERjgt0aXBxPCz4RW1PLOIb3dZsDOa2UiTwfQ_vrv9sFjleZoLSQ0FUqJ3izMoWcE72-gFW43c7tWF7-ntkt3Ia6U35Xvuk4bIDsrMhJXhI8pfFGwpIF7muS5pUWiMUfFKajFGtOKdZmfI9p2i6LJ1mNF2sVks6Byqmc5fPr2n_c_pOwSekpa4sanLAsyxF81fOGtLZd3nmERn27557A69aUcEz8K3mngQntSuZTCDIMmmsnXChldpJK3wd6m6iteMiNVHEAH-hjZ_a0BnfSKllkKbsmDSzaeZOCIU4yoSMsUQElscMmvMoTlCtXccAumuR9hpLNSuVM5QQEWoeym6LXNXori_W-WYTBd2isFuUzxV0S4vwGn_1Y2wooP2_m53-r1mbbONRmQ52RpoAtzsHxyPXF8XI-gJKHdgC |
link.rule.ids | 315,786,790,3525,27955,27956,45907 |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3JTsMwEB0VOAAHxCrK6gMnpKhZXYcbIKoChQuLerPiJagVpIWmB_r1zGRhkeDCJZHiOIreOG9mnPEzwJEXhIb7xjp4woMbGyc2lKXEieE8VDoqJvRvbnn3IbzqR_0GnNdrYaissuL-ktMLtq6utCo0W-PBoHXnFek4p5CGNscTc7AQRpjr0Sq-_llNx-hvK0kC13Xo9vrXZlHkpYekPeRFhdwpTa0sIulkT6_oNn53VN-cT2cVVqqokZ2WL7YGDZutw_I3LcENyB-nz6QgXRS7vrOkEhthGJSyZEByxTnLyprvCSPfZdgoY-l0NntnE-RiNrH55IR13kYvDINCVgrLkigHPssw8n_ltCEbf63P3ISHzsX9edeptlRwNH6suSMwSm2LQCSYZek0VpZb3whlheGu8lU7UcqGPNVRFKABuNJuanyrXS2EEl6aBlswn40yuw0MEyntB0GQcM-EcYDdEf2E5NpVjKDbJux-YinHpXSG5Dwi0UPRbsJxje5nY11wNpRoFklmkW4o0SxNCGv85Y_BIZH3_-62879uh7DYvb_pyd7l7fUuLFFLWRu2B_MIvd3HKCRXB8Uo-wA-U9sn |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Vulnerability+analysis+for+airport+networks+based+on+fuzzy+soft+sets%EF%BC%9A+From+the+structural+and+functional+perspective&rft.jtitle=%E4%B8%AD%E5%9B%BD%E8%88%AA%E7%A9%BA%E5%AD%A6%E6%8A%A5%EF%BC%9A%E8%8B%B1%E6%96%87%E7%89%88&rft.au=Li+Shanmei+Xu+Xiaohao&rft.date=2015-06-01&rft.issn=1000-9361&rft.issue=3&rft.spage=780&rft.epage=788&rft_id=info:doi/10.1016%2Fj.cja.2015.04.002&rft.externalDocID=665138287 |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fimage.cqvip.com%2Fvip1000%2Fqk%2F83889X%2F83889X.jpg |