Vulnerability analysis for airport networks based on fuzzy soft sets: From the structural and functional perspective

Abstract Recently, much attention has been paid to the reliability and vulnerability of critical infrastructure. In air traffic systems, the vulnerability analysis for airport networks can be used to guide air traffic administrations in their prioritization of the maintenance and repair of airports,...

Full description

Saved in:
Bibliographic Details
Published inChinese journal of aeronautics Vol. 28; no. 3; pp. 780 - 788
Main Authors Li, Shanmei, Xu, Xiaohao
Format Journal Article
LanguageEnglish
Published Elsevier Ltd 01.06.2015
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Abstract Recently, much attention has been paid to the reliability and vulnerability of critical infrastructure. In air traffic systems, the vulnerability analysis for airport networks can be used to guide air traffic administrations in their prioritization of the maintenance and repair of airports, as well as to avoid unnecessary disturbances in the planning of flight schedules. In this paper, the evaluation methods of airport importance and network efficiency arc established. Firstly, the evaluation indices of airport importance are proposed from both the topological and functional perspectives. The topological characteristics come from the structure of airport network and the functional features stem from the traffic flow distribution taking place inside the network. Secondly, an integrated evaluation method based on fuzzy soft set theory is proposed to identify the key airports, which can fuse together importance indices over different time intervals. Thirdly, an airport network efficiency method is established for the purpose of assessing the accuracy of the evaluation method. Finally, empirical studies using real traffic data of US and China's airport networks show that the evaluation method proposed in this papcr is the most accuratc. Thc vulucrability of US and China's airport networks is compared. The similarities and differences between airport geography distribution and airport importance distribution are discussed here and the dynamics of airport importance is studied as well.
AbstractList Abstract Recently, much attention has been paid to the reliability and vulnerability of critical infrastructure. In air traffic systems, the vulnerability analysis for airport networks can be used to guide air traffic administrations in their prioritization of the maintenance and repair of airports, as well as to avoid unnecessary disturbances in the planning of flight schedules. In this paper, the evaluation methods of airport importance and network efficiency arc established. Firstly, the evaluation indices of airport importance are proposed from both the topological and functional perspectives. The topological characteristics come from the structure of airport network and the functional features stem from the traffic flow distribution taking place inside the network. Secondly, an integrated evaluation method based on fuzzy soft set theory is proposed to identify the key airports, which can fuse together importance indices over different time intervals. Thirdly, an airport network efficiency method is established for the purpose of assessing the accuracy of the evaluation method. Finally, empirical studies using real traffic data of US and China's airport networks show that the evaluation method proposed in this papcr is the most accuratc. Thc vulucrability of US and China's airport networks is compared. The similarities and differences between airport geography distribution and airport importance distribution are discussed here and the dynamics of airport importance is studied as well.
Recently, much attention has been paid to the reliability and vulnerability of critical infrastructure. In air traffic systems, the vulnerability analysis for airport networks can be used to guide air traffic administrations in their prioritization of the maintenance and repair of airports, as well as to avoid unnecessary disturbances in the planning of flight schedules. In this paper, the evaluation methods of airport importance and network efficiency are established. Firstly, the evaluation indices of airport importance are proposed from both the topological and functional perspectives. The topological characteristics come from the structure of airport network and the functional features stem from the traffic flow distribution taking place inside the network. Secondly, an integrated evaluation method based on fuzzy soft set theory is proposed to identify the key airports, which can fuse together importance indices over different time intervals. Thirdly, an airport network efficiency method is established for the purpose of assessing the accuracy of the evaluation method. Finally, empirical studies using real traffic data of US and China’s airport networks show that the evaluation method proposed in this paper is the most accurate. The vulnerability of US and China’s airport networks is compared. The similarities and differences between airport geography distribution and airport importance distribution are discussed here and the dynamics of airport importance is studied as well.
Author Li Shanmei Xu Xiaohao
AuthorAffiliation Air Traffic Management Research Base, Civil Aviation Unliversity of China, Tialjin 300300, China
Author_xml – sequence: 1
  givenname: Shanmei
  surname: Li
  fullname: Li, Shanmei
  email: amy820203@163.com
– sequence: 2
  givenname: Xiaohao
  surname: Xu
  fullname: Xu, Xiaohao
BookMark eNp9kEtOwzAQhr0ACVo4ADuLfcM4aRNHrBDiJSGxAbaW7Yxbh2AX2y0qR-Es3Ikr4IqKJavRL83_0Dcie847JOSEQcGA1Wd9oXtZlMBmBUwLgHKPHDIAmLRVzQ7IKMYeoGobBodk_bwaHAap7GDThkonh020kRofqLRh6UOiDtO7Dy-RKhmxo95Rs_r42NDoTaIRU_z--qTXwb_StEAaU1jptApyyGldfnU6WZ9z6RJDXGJWazwi-0YOEY93d0yerq8eL28n9w83d5cX9xM9BUgTzplqeMVl23JtWoU1lh1XyLsaVKkaqRROa6Nns0pjVysNpitRg-ZccWZMNSbsN1cHH2NAI5bBvsqwEQzEFpboRYYltrAETEWGlT3nvx7Mw9YWg4jaossFNuT1ovP2X_fprnHh3fzNuvlfZV3PWMVL3lQ_BdSHaQ
CitedBy_id crossref_primary_10_1016_j_cja_2022_01_009
crossref_primary_10_1155_2022_4032957
crossref_primary_10_1111_risa_13238
crossref_primary_10_1016_j_cja_2017_03_007
crossref_primary_10_3390_su12093749
crossref_primary_10_7498_aps_66_050201
crossref_primary_10_1016_j_cja_2017_01_010
crossref_primary_10_1109_ACCESS_2017_2682231
crossref_primary_10_1109_TITS_2021_3137458
crossref_primary_10_1016_j_cja_2016_01_010
crossref_primary_10_1016_j_chaos_2017_01_007
crossref_primary_10_1007_s12652_019_01558_x
crossref_primary_10_3390_su13116446
crossref_primary_10_1371_journal_pone_0260940
crossref_primary_10_1155_2021_5513093
Cites_doi 10.1016/j.physa.2008.01.077
10.1103/PhysRevE.69.046106
10.7498/aps.62.128901
10.1016/S0898-1221(99)00056-5
10.1016/j.camwa.2008.11.009
10.1016/j.physa.2006.05.032
10.1007/BF02289527
10.1038/35019019
10.1016/j.camwa.2009.10.015
10.1016/0378-8733(91)90017-N
10.1016/j.camwa.2009.04.019
10.1016/0378-8733(78)90021-7
10.1016/S0898-1221(03)00016-6
10.1088/0256-307X/20/8/362
ContentType Journal Article
Copyright 2015
Copyright_xml – notice: 2015
DBID 2RA
92L
CQIGP
W92
~WA
6I.
AAFTH
AAYXX
CITATION
DOI 10.1016/j.cja.2015.04.002
DatabaseName 维普_期刊
中文科技期刊数据库-CALIS站点
维普中文期刊数据库
中文科技期刊数据库-工程技术
中文科技期刊数据库- 镜像站点
ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
DocumentTitleAlternate Vulnerability analysis for airport networks based on fuzzy soft sets: From the structural and functional perspective
EndPage 788
ExternalDocumentID 10_1016_j_cja_2015_04_002
S1000936115000588
665138287
GroupedDBID --K
-SC
-S~
0R~
0SF
1B1
1~5
29B
2B.
2C0
2RA
4.4
457
4G.
5GY
5VR
5VS
5XA
5XD
5XL
6I.
7-5
71M
92H
92I
92L
92R
93N
9D9
9DC
AACTN
AAEDT
AAEDW
AAFTH
AAIKJ
AALRI
AAQFI
AAXUO
ABMAC
ACGFS
ADBBV
ADEZE
ADMUD
AEKER
AENEX
AEXQZ
AFTJW
AFUIB
AGHFR
AI.
AITUG
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
BCNDV
CAJEC
CAJUS
CCEZO
CEKLB
CHBEP
CQIGP
CS3
CW9
DU5
EBS
EJD
EO9
EP2
EP3
FA0
FDB
FNPLU
GBLVA
GROUPED_DOAJ
HZ~
IPNFZ
IXB
J1W
KQ8
M41
N9A
NCXOZ
O-L
O9-
OK1
OZT
Q--
Q-2
RIG
ROL
SDF
SDG
SES
SSZ
TCJ
TGT
U1G
U5M
VH1
W92
~M3
~WA
AAXDM
AAYXX
ADVLN
AKRWK
CITATION
ID FETCH-LOGICAL-c400t-881b7838a998cf9be6e2d8be8d60b2b7abbe46fc553ced6bc0fd2ec0c88b81ff3
IEDL.DBID IXB
ISSN 1000-9361
IngestDate Fri Aug 23 01:17:44 EDT 2024
Fri Feb 23 02:27:54 EST 2024
Wed Feb 14 10:30:16 EST 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 3
Keywords Fuzzy soft sets
Key node
Air traffic
Complex network
Airport network
Language English
License http://creativecommons.org/licenses/by-nc-nd/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c400t-881b7838a998cf9be6e2d8be8d60b2b7abbe46fc553ced6bc0fd2ec0c88b81ff3
Notes Air traffic;Airport network;Complex networkFuzzy soft sets;Key node
11-1732/V
Abstract Recently, much attention has been paid to the reliability and vulnerability of critical infrastructure. In air traffic systems, the vulnerability analysis for airport networks can be used to guide air traffic administrations in their prioritization of the maintenance and repair of airports, as well as to avoid unnecessary disturbances in the planning of flight schedules. In this paper, the evaluation methods of airport importance and network efficiency arc established. Firstly, the evaluation indices of airport importance are proposed from both the topological and functional perspectives. The topological characteristics come from the structure of airport network and the functional features stem from the traffic flow distribution taking place inside the network. Secondly, an integrated evaluation method based on fuzzy soft set theory is proposed to identify the key airports, which can fuse together importance indices over different time intervals. Thirdly, an airport network efficiency method is established for the purpose of assessing the accuracy of the evaluation method. Finally, empirical studies using real traffic data of US and China's airport networks show that the evaluation method proposed in this papcr is the most accuratc. Thc vulucrability of US and China's airport networks is compared. The similarities and differences between airport geography distribution and airport importance distribution are discussed here and the dynamics of airport importance is studied as well.
OpenAccessLink https://www.sciencedirect.com/science/article/pii/S1000936115000588
PageCount 9
ParticipantIDs crossref_primary_10_1016_j_cja_2015_04_002
elsevier_sciencedirect_doi_10_1016_j_cja_2015_04_002
chongqing_primary_665138287
PublicationCentury 2000
PublicationDate 2015-06-01
PublicationDateYYYYMMDD 2015-06-01
PublicationDate_xml – month: 06
  year: 2015
  text: 2015-06-01
  day: 01
PublicationDecade 2010
PublicationTitle Chinese journal of aeronautics
PublicationTitleAlternate Chinese Journal of Aeronautics
PublicationYear 2015
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Han, Li, Liu, Li (b0020) 2006; 42
Albert, Jeong, Barabási (b0040) 2000; 406
Bagler (b0015) 2008; 387
Xu, Ma, Wang (b0070) 2010; 59
Ali, Feng, Liu (b0080) 2009; 57
Maji, Biswas, Roy (b0085) 2003; 45
Ren, Shao, Liu, Guo, Wang (b0045) 2013; 62
Latora, Marchiori (b0090) 2007; 9
Zheng, Gao, Zhao (b0100) 2007; 373
Li, Cai (b0010) 2004; 69
Chen, Hu, Hu, Chen (b0035) 2004; 14
Sabidussi (b0025) 1996; 31
He, Li (b0095) 2007; 34
Chi, Wang, Su, Xu, Zhao, Li (b0005) 2003; 20
Freeman (b0055) 1979; 1
Tan, Wu, Deng (b0050) 2006; 11
Ahmad, Kharal (b0065) 2009; 2009
Molodtsov (b0060) 1999; 37
Freeman, Borgatti, White (b0030) 1991; 13
Yang, Lin, Yang (b0075) 2009; 58
Ahmad (10.1016/j.cja.2015.04.002_b0065) 2009; 2009
Tan (10.1016/j.cja.2015.04.002_b0050) 2006; 11
Xu (10.1016/j.cja.2015.04.002_b0070) 2010; 59
Ren (10.1016/j.cja.2015.04.002_b0045) 2013; 62
Yang (10.1016/j.cja.2015.04.002_b0075) 2009; 58
Han (10.1016/j.cja.2015.04.002_b0020) 2006; 42
Bagler (10.1016/j.cja.2015.04.002_b0015) 2008; 387
Chen (10.1016/j.cja.2015.04.002_b0035) 2004; 14
Maji (10.1016/j.cja.2015.04.002_b0085) 2003; 45
Li (10.1016/j.cja.2015.04.002_b0010) 2004; 69
Freeman (10.1016/j.cja.2015.04.002_b0030) 1991; 13
Chi (10.1016/j.cja.2015.04.002_b0005) 2003; 20
Freeman (10.1016/j.cja.2015.04.002_b0055) 1979; 1
Sabidussi (10.1016/j.cja.2015.04.002_b0025) 1996; 31
Albert (10.1016/j.cja.2015.04.002_b0040) 2000; 406
He (10.1016/j.cja.2015.04.002_b0095) 2007; 34
Molodtsov (10.1016/j.cja.2015.04.002_b0060) 1999; 37
Ali (10.1016/j.cja.2015.04.002_b0080) 2009; 57
Zheng (10.1016/j.cja.2015.04.002_b0100) 2007; 373
Latora (10.1016/j.cja.2015.04.002_b0090) 2007; 9
References_xml – volume: 11
  start-page: 79
  year: 2006
  end-page: 83
  ident: b0050
  article-title: Evaluation method for node importance based on node contraction in complex networks
  publication-title: Syst Eng Technol Pract
  contributor:
    fullname: Deng
– volume: 58
  start-page: 521
  year: 2009
  end-page: 527
  ident: b0075
  article-title: Combination of interval-valued fuzzy set and soft set
  publication-title: Comput Math Appl
  contributor:
    fullname: Yang
– volume: 34
  start-page: 1
  year: 2007
  end-page: 5
  ident: b0095
  article-title: GanWY, Zhu X. Mining vital nodes in complex networks.
  publication-title: Science
  contributor:
    fullname: Li
– volume: 373
  start-page: 837
  year: 2007
  end-page: 844
  ident: b0100
  article-title: Properties of transportation dynamics on scale-free networks
  publication-title: Phys A: Statis Mech Appl
  contributor:
    fullname: Zhao
– volume: 387
  start-page: 2972
  year: 2008
  end-page: 2980
  ident: b0015
  article-title: Analysis of the airport network of India as a complex weighted network
  publication-title: Phys A: Stat Mech Appl
  contributor:
    fullname: Bagler
– volume: 13
  start-page: 141
  year: 1991
  end-page: 154
  ident: b0030
  article-title: Centrality in valued graphs: a measure of betweenness based on network flow
  publication-title: Social Networks
  contributor:
    fullname: White
– volume: 9
  start-page: 1
  year: 2007
  end-page: 16
  ident: b0090
  article-title: A measure of centrality based on network efficiency
  publication-title: New J Phy
  contributor:
    fullname: Marchiori
– volume: 69
  start-page: 046106
  year: 2004
  ident: b0010
  article-title: Statistical analysis of airport network of China
  publication-title: Phys Rev E
  contributor:
    fullname: Cai
– volume: 62
  start-page: 128901
  year: 2013
  end-page: 128905
  ident: b0045
  article-title: Node importance measurement based on the degree and clustering coefficient information
  publication-title: Acta Phys Sin
  contributor:
    fullname: Wang
– volume: 31
  start-page: 581
  year: 1996
  end-page: 603
  ident: b0025
  article-title: The centrality index of a graph
  publication-title: Psychometrika
  contributor:
    fullname: Sabidussi
– volume: 57
  start-page: 1547
  year: 2009
  end-page: 1553
  ident: b0080
  article-title: On some new operations in soft set theory
  publication-title: Comput Math Appl
  contributor:
    fullname: Liu
– volume: 42
  start-page: 29
  year: 2006
  end-page: 31
  ident: b0020
  article-title: Networked characteristics in software and its contribution to software quality
  publication-title: Comput Eng Appl
  contributor:
    fullname: Li
– volume: 37
  start-page: 19
  year: 1999
  end-page: 31
  ident: b0060
  article-title: Soft set theory-first results
  publication-title: Comput Math Appl
  contributor:
    fullname: Molodtsov
– volume: 59
  start-page: 787
  year: 2010
  end-page: 794
  ident: b0070
  article-title: Vague soft sets and their properties
  publication-title: Comput Math Appl
  contributor:
    fullname: Wang
– volume: 45
  start-page: 555
  year: 2003
  end-page: 562
  ident: b0085
  article-title: Soft set theory
  publication-title: Comput Math Appl
  contributor:
    fullname: Roy
– volume: 14
  start-page: 21
  year: 2004
  end-page: 24
  ident: b0035
  article-title: A method for finding the most vital node in communication networks
  publication-title: High Technol Lett
  contributor:
    fullname: Chen
– volume: 20
  start-page: 1393
  year: 2003
  end-page: 1396
  ident: b0005
  article-title: Structural properties of US flight network
  publication-title: Chin Phys Lett
  contributor:
    fullname: Li
– volume: 1
  start-page: 215
  year: 1979
  end-page: 239
  ident: b0055
  article-title: Centrality in social networks conceptual clarification
  publication-title: Social Networks
  contributor:
    fullname: Freeman
– volume: 406
  start-page: 378
  year: 2000
  end-page: 382
  ident: b0040
  article-title: Error and attack tolerance of complex networks
  publication-title: Nature
  contributor:
    fullname: Barabási
– volume: 2009
  start-page: 1
  year: 2009
  end-page: 6
  ident: b0065
  article-title: On fuzzy soft sets
  publication-title: Adv Fuzzy Syst
  contributor:
    fullname: Kharal
– volume: 387
  start-page: 2972
  issue: 12
  year: 2008
  ident: 10.1016/j.cja.2015.04.002_b0015
  article-title: Analysis of the airport network of India as a complex weighted network
  publication-title: Phys A: Stat Mech Appl
  doi: 10.1016/j.physa.2008.01.077
  contributor:
    fullname: Bagler
– volume: 11
  start-page: 79
  issue: 11
  year: 2006
  ident: 10.1016/j.cja.2015.04.002_b0050
  article-title: Evaluation method for node importance based on node contraction in complex networks
  publication-title: Syst Eng Technol Pract
  contributor:
    fullname: Tan
– volume: 2009
  start-page: 1
  year: 2009
  ident: 10.1016/j.cja.2015.04.002_b0065
  article-title: On fuzzy soft sets
  publication-title: Adv Fuzzy Syst
  contributor:
    fullname: Ahmad
– volume: 69
  start-page: 046106
  issue: 4
  year: 2004
  ident: 10.1016/j.cja.2015.04.002_b0010
  article-title: Statistical analysis of airport network of China
  publication-title: Phys Rev E
  doi: 10.1103/PhysRevE.69.046106
  contributor:
    fullname: Li
– volume: 62
  start-page: 128901
  issue: 12
  year: 2013
  ident: 10.1016/j.cja.2015.04.002_b0045
  article-title: Node importance measurement based on the degree and clustering coefficient information
  publication-title: Acta Phys Sin
  doi: 10.7498/aps.62.128901
  contributor:
    fullname: Ren
– volume: 37
  start-page: 19
  issue: 4
  year: 1999
  ident: 10.1016/j.cja.2015.04.002_b0060
  article-title: Soft set theory-first results
  publication-title: Comput Math Appl
  doi: 10.1016/S0898-1221(99)00056-5
  contributor:
    fullname: Molodtsov
– volume: 34
  start-page: 1
  issue: 12
  year: 2007
  ident: 10.1016/j.cja.2015.04.002_b0095
  article-title: GanWY, Zhu X. Mining vital nodes in complex networks. Computer
  publication-title: Science
  contributor:
    fullname: He
– volume: 42
  start-page: 29
  issue: 20
  year: 2006
  ident: 10.1016/j.cja.2015.04.002_b0020
  article-title: Networked characteristics in software and its contribution to software quality
  publication-title: Comput Eng Appl
  contributor:
    fullname: Han
– volume: 57
  start-page: 1547
  issue: 9
  year: 2009
  ident: 10.1016/j.cja.2015.04.002_b0080
  article-title: On some new operations in soft set theory
  publication-title: Comput Math Appl
  doi: 10.1016/j.camwa.2008.11.009
  contributor:
    fullname: Ali
– volume: 373
  start-page: 837
  year: 2007
  ident: 10.1016/j.cja.2015.04.002_b0100
  article-title: Properties of transportation dynamics on scale-free networks
  publication-title: Phys A: Statis Mech Appl
  doi: 10.1016/j.physa.2006.05.032
  contributor:
    fullname: Zheng
– volume: 31
  start-page: 581
  issue: 4
  year: 1996
  ident: 10.1016/j.cja.2015.04.002_b0025
  article-title: The centrality index of a graph
  publication-title: Psychometrika
  doi: 10.1007/BF02289527
  contributor:
    fullname: Sabidussi
– volume: 406
  start-page: 378
  issue: 6794
  year: 2000
  ident: 10.1016/j.cja.2015.04.002_b0040
  article-title: Error and attack tolerance of complex networks
  publication-title: Nature
  doi: 10.1038/35019019
  contributor:
    fullname: Albert
– volume: 59
  start-page: 787
  issue: 2
  year: 2010
  ident: 10.1016/j.cja.2015.04.002_b0070
  article-title: Vague soft sets and their properties
  publication-title: Comput Math Appl
  doi: 10.1016/j.camwa.2009.10.015
  contributor:
    fullname: Xu
– volume: 13
  start-page: 141
  issue: 2
  year: 1991
  ident: 10.1016/j.cja.2015.04.002_b0030
  article-title: Centrality in valued graphs: a measure of betweenness based on network flow
  publication-title: Social Networks
  doi: 10.1016/0378-8733(91)90017-N
  contributor:
    fullname: Freeman
– volume: 9
  start-page: 1
  issue: 6
  year: 2007
  ident: 10.1016/j.cja.2015.04.002_b0090
  article-title: A measure of centrality based on network efficiency
  publication-title: New J Phy
  contributor:
    fullname: Latora
– volume: 58
  start-page: 521
  issue: 3
  year: 2009
  ident: 10.1016/j.cja.2015.04.002_b0075
  article-title: Combination of interval-valued fuzzy set and soft set
  publication-title: Comput Math Appl
  doi: 10.1016/j.camwa.2009.04.019
  contributor:
    fullname: Yang
– volume: 1
  start-page: 215
  issue: 3
  year: 1979
  ident: 10.1016/j.cja.2015.04.002_b0055
  article-title: Centrality in social networks conceptual clarification
  publication-title: Social Networks
  doi: 10.1016/0378-8733(78)90021-7
  contributor:
    fullname: Freeman
– volume: 45
  start-page: 555
  issue: 4
  year: 2003
  ident: 10.1016/j.cja.2015.04.002_b0085
  article-title: Soft set theory
  publication-title: Comput Math Appl
  doi: 10.1016/S0898-1221(03)00016-6
  contributor:
    fullname: Maji
– volume: 20
  start-page: 1393
  issue: 8
  year: 2003
  ident: 10.1016/j.cja.2015.04.002_b0005
  article-title: Structural properties of US flight network
  publication-title: Chin Phys Lett
  doi: 10.1088/0256-307X/20/8/362
  contributor:
    fullname: Chi
– volume: 14
  start-page: 21
  issue: 1
  year: 2004
  ident: 10.1016/j.cja.2015.04.002_b0035
  article-title: A method for finding the most vital node in communication networks
  publication-title: High Technol Lett
  contributor:
    fullname: Chen
SSID ssj0039710
Score 2.1621864
Snippet Abstract Recently, much attention has been paid to the reliability and vulnerability of critical infrastructure. In air traffic systems, the vulnerability...
Recently, much attention has been paid to the reliability and vulnerability of critical infrastructure. In air traffic systems, the vulnerability analysis for...
SourceID crossref
elsevier
chongqing
SourceType Aggregation Database
Publisher
StartPage 780
SubjectTerms Air traffic
Airport network
Complex network
Fuzzy soft sets
Key node
机场
模糊
空中交通系统
结构
综合评价方法
网络效率
脆弱性分析
角度分析
Title Vulnerability analysis for airport networks based on fuzzy soft sets: From the structural and functional perspective
URI http://lib.cqvip.com/qk/83889X/201503/665138287.html
https://dx.doi.org/10.1016/j.cja.2015.04.002
Volume 28
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELaqLsCAeIpSQB6YkKImseM6bFBRVUiwQFE3K34EtYK00HRofz13eZQiwcKSKA9H0Wfnuzvn7jMhlwHjVoTWebCDjR9bL7YYpcSJFYJrExUT-g-PYjDk96No1CC9uhYG0yor7i85vWDr6kynQrMzG487T0ERjgt0aXBxPCz4RW1PLOIb3dZsDOa2UiTwfQ_vrv9sFjleZoLSQ0FUqJ3izMoWcE72-gFW43c7tWF7-ntkt3Ia6U35Xvuk4bIDsrMhJXhI8pfFGwpIF7muS5pUWiMUfFKajFGtOKdZmfI9p2i6LJ1mNF2sVks6Byqmc5fPr2n_c_pOwSekpa4sanLAsyxF81fOGtLZd3nmERn27557A69aUcEz8K3mngQntSuZTCDIMmmsnXChldpJK3wd6m6iteMiNVHEAH-hjZ_a0BnfSKllkKbsmDSzaeZOCIU4yoSMsUQElscMmvMoTlCtXccAumuR9hpLNSuVM5QQEWoeym6LXNXori_W-WYTBd2isFuUzxV0S4vwGn_1Y2wooP2_m53-r1mbbONRmQ52RpoAtzsHxyPXF8XI-gJKHdgC
link.rule.ids 315,786,790,3525,27955,27956,45907
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3JTsMwEB0VOAAHxCrK6gMnpKhZXYcbIKoChQuLerPiJagVpIWmB_r1zGRhkeDCJZHiOIreOG9mnPEzwJEXhIb7xjp4woMbGyc2lKXEieE8VDoqJvRvbnn3IbzqR_0GnNdrYaissuL-ktMLtq6utCo0W-PBoHXnFek4p5CGNscTc7AQRpjr0Sq-_llNx-hvK0kC13Xo9vrXZlHkpYekPeRFhdwpTa0sIulkT6_oNn53VN-cT2cVVqqokZ2WL7YGDZutw_I3LcENyB-nz6QgXRS7vrOkEhthGJSyZEByxTnLyprvCSPfZdgoY-l0NntnE-RiNrH55IR13kYvDINCVgrLkigHPssw8n_ltCEbf63P3ISHzsX9edeptlRwNH6suSMwSm2LQCSYZek0VpZb3whlheGu8lU7UcqGPNVRFKABuNJuanyrXS2EEl6aBlswn40yuw0MEyntB0GQcM-EcYDdEf2E5NpVjKDbJux-YinHpXSG5Dwi0UPRbsJxje5nY11wNpRoFklmkW4o0SxNCGv85Y_BIZH3_-62879uh7DYvb_pyd7l7fUuLFFLWRu2B_MIvd3HKCRXB8Uo-wA-U9sn
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Vulnerability+analysis+for+airport+networks+based+on+fuzzy+soft+sets%EF%BC%9A+From+the+structural+and+functional+perspective&rft.jtitle=%E4%B8%AD%E5%9B%BD%E8%88%AA%E7%A9%BA%E5%AD%A6%E6%8A%A5%EF%BC%9A%E8%8B%B1%E6%96%87%E7%89%88&rft.au=Li+Shanmei+Xu+Xiaohao&rft.date=2015-06-01&rft.issn=1000-9361&rft.issue=3&rft.spage=780&rft.epage=788&rft_id=info:doi/10.1016%2Fj.cja.2015.04.002&rft.externalDocID=665138287
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fimage.cqvip.com%2Fvip1000%2Fqk%2F83889X%2F83889X.jpg