[1] LIU Y, ZOU W, ZHAN M, et al. Enhancing Dynamical Robustness in Aging Networks of Coupled Nonlinear Oscillators[J]. Europhysics Letters, 2016, 114(4): 40004.
[2] de MEO P, MESSINA F, ROSACI D, et al. Estimating Graph Robustness through the Randic Index[J]. IEEE Transactions on Cybernetics, 2017, PP(99): 1-14.
[3] TRAN P N, SAITO H. Enhancing Physical Network Robustness Against Earthquake Disasters with Additional Links[J]. Journal of Lightwave Technology, 2016, 34(22): 5226-5238.
[4] SCHNEIDER C M, MOREIRAB A A, ANDRADE J S, et al. Mitigation of Malicious Attacks on Networks[J]. Proceedings of the National Academy of Sciences of the United States of America, 2011, 108(10): 3838-3841.
[5] BUESSER P, DAOLIO F, TOMASSINI M. Optimizing the Robustness of Scale-free Networks with Simulated Annealing[C]//Lecture Notes in Computer Science: 6594. Heidelberg: Springer Verlag, 2011: 167-176.
[6] ZHOU M, LIU J. A Two-phase Multiobjective Evolutionary Algorithm for Enhancing the Robustness of Scale-free Networks Against Multiple Malicious Attacks[J]. IEEE Transactions on Cybernetics, 2017, 47(2): 539-552.
[7] HOLME P, KIM B J, YOON C N, et al. Attack Vulnerability of Complex Networks[J]. Physical Review E-Statistical, Nonlinear, & Soft Matter Physics, 2004, 65(5): 056109.
[8] van LAARHOVEN P J M, AARTS E H L. Simulated Annealing: Theory and Applications[M]. Dordrecht: D.Reidel Publishing Company, 1987.
[9] 王珏, 王俊, 武勇, 等. 缺失孔径下多基地外辐射源雷达成像算法[J]. 西安电子科技大学学报, 2016, 43(3): 25-30.
WANG Jue, WANG Jun, WU Yong, et al. Multistatic Passive Radar Imaging Algorithm for the Gapped Aperture[J]. Journal of Xidian University, 2016, 43(3): 25-30.
[10] WANG C, ZHAO F, MU D, et al. Simulated Annealing for a Vehicle Routing Problem with Simultaneous Pickup-delivery and Time Windows[C]//Proceedings of the IFIP Advances in Information and Communication Technology: 415. New York: Springer, 2013: 170-177.
[11] MAMANO N, HAYES W B. SANA: Simulated Annealing Far Outperforms Many Other Search Algorithms for Biological Network Alignment[J]. Bioinformatics, 2017, 33(14): 2156-2164.
[12] LATORA V, MARCHIORI M. Efficient Behavior of Small-world Networks[J]. Physical Review Letters, 2001, 87(19): 198701.
[13] LOUZADA V H P, DAOLIO F, HERRMANN H J, et al. Generating Robust and Efficient Networks under Targeted Attacks[C]//Propagation Phenomena in Real World Networks. Intelligent Systems Reference Library: 85. Cham: Springer, 2015: 215-224.
[14] BARABASI A L, ALBERT R. Emergence of Scaling in Random Networks[J]. Science, 1999, 286: 509-512.
[15] HUTCHEON N, BIALEK J W. Updated and Validated Power Flow Model of the Main Continental European Transmission Network[C]//Proceedings of the 2013 IEEE Grenoble Conference Power Technology. Washington: IEEE Computer Society, 2013: 6652178. |