Please use this identifier to cite or link to this item:
http://dspace.cityu.edu.hk/handle/2031/5615
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wang, Meilin | en_US |
dc.date.accessioned | 2010-02-10T06:12:45Z | |
dc.date.accessioned | 2017-09-19T09:11:08Z | |
dc.date.accessioned | 2019-02-12T07:28:19Z | - |
dc.date.available | 2010-02-10T06:12:45Z | |
dc.date.available | 2017-09-19T09:11:08Z | |
dc.date.available | 2019-02-12T07:28:19Z | - |
dc.date.issued | 2009 | en_US |
dc.identifier.other | 2009eewm039 | en_US |
dc.identifier.uri | http://144.214.8.231/handle/2031/5615 | - |
dc.description.abstract | A complex network is a network with non-trivial topological features, which means the pattern of connections between pairs of nodes in the network is neither purely regular nor purely random. It describes a wide range of networks in nature and society, including biological networks, social acquaintance networks and the human-made transport and communication networks like the Internet. In recent years, modelling and analysis for different types of complex networks has become an interdisciplinary subject and many characteristics of complex networks have been discovered and proved, such as they are sensitive to targeted attacks which may lead to fracturing the whole network. That means to reduce or even avoid this kind of attacks whenever possible is important for maintaining the networks. One approach to achieve it is to optimize the routing algorithm aimed at reducing the traffic of those backbone-nodes. Doing a literature review is the first step of the project in order to get a deep understanding about complex networks and figure an outline of predecessors’ studies. On the basic of literature review, computer simulations in JAVA language are carried out to generate and analyse a scale-free network in BA model — a typical complex network in one of the most famous complex network models. After that, network transport processes with shortest path first (SPF) routing algorithm and an optimized algorithm are simulated. According to comparisons between these two algorithms in term of transport performance, a new routing algorithm — parallel routing algorithm, which is the combination of previous two algorithms and shows quite satisfying transport performance, is raised and discussed. | en_US |
dc.rights | This work is protected by copyright. Reproduction or distribution of the work in any format is prohibited without written permission of the copyright owner. | en_US |
dc.rights | Access is restricted to CityU users. | en_US |
dc.title | The study of network attacks by using complex network models | en_US |
dc.contributor.department | Department of Electronic Engineering | en_US |
dc.description.supervisor | Supervisor: Dr. Yeung, Alan K H., Assessor: Dr. Chan, Sammy C H | en_US |
Appears in Collections: | Electrical Engineering - Undergraduate Final Year Projects |
Files in This Item:
File | Size | Format | |
---|---|---|---|
fulltext.html | 145 B | HTML | View/Open |
Items in Digital CityU Collections are protected by copyright, with all rights reserved, unless otherwise indicated.