CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    Based on the northeastern margin of Ulan Buh Desert, based on complex network theory, landscape ecology and GIS spatial analysis technology, a comprehensive ecological network (hereinafter referred to as the network) was constructed by considering various factors, and the research area network was analyzed. The network was optimized by four kinds of edgeenhancing strategies, such as random, low priority, low nodefirst and maximum median nodes, and the connection robustness and recovery of the network before and after optimization of different edgeenhancing strategies were analyzed. The results showed that the robustness of network connection before optimization was 0.72, 42 nodes were removed under malicious attack and the network was completely destroyed. Totally 469 nodes were removed under random attack, which can completely destroy the network. Restoring robustness can completely restore the node. The number was 75 random attacks and 56 malicious attacks. Among the four edgeenhancing strategies, the robustness of network connection optimization by degree was more significant than that before optimization: the initial value of connection robustness was risen to 0.99, malicious removing 222 nodes under attack can completely destroy the network. Removing 649 nodes under random attack can completely destroy the network. Among the four edgeincreasing strategies, the degree of robustness of network nodes can be maximized. The number of recovered nodes was increased to 122 (random attack) and 235 (malicious attack). The increase in the number of nodes was the most robust to network edge recovery. The number of recoverable nodes was increased to 87 (random attack) and 27 (malicious attack). 

    Reference
    Related
    Cited by
Get Citation
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:July 05,2019
  • Revised:
  • Adopted:
  • Online: February 10,2020
  • Published:
Article QR Code