2015
DOI: 10.1016/j.cja.2015.04.002
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability analysis for airport networks based on fuzzy soft sets: From the structural and functional perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 14 publications
0
11
0
Order By: Relevance
“…Li and Xu [41] employed both functional index and topological metrics in the evaluation of node importance. ese indicators are fused by a method based on fuzzy soft set theory which is able to integrate several indices over different time intervals.…”
Section: Identification Of Topological Important Nodes/edgesmentioning
confidence: 99%
See 2 more Smart Citations
“…Li and Xu [41] employed both functional index and topological metrics in the evaluation of node importance. ese indicators are fused by a method based on fuzzy soft set theory which is able to integrate several indices over different time intervals.…”
Section: Identification Of Topological Important Nodes/edgesmentioning
confidence: 99%
“…Depending on topological indices, these approaches [41][42][43] calculate the importance of a node directly. Instead, Ren et al [44] measured influence of waypoint through change of network after the node is removed.…”
Section: Identification Of Topological Important Nodes/edgesmentioning
confidence: 99%
See 1 more Smart Citation
“…have been investigated by means of a hazard‐dependent approach focused on the airport physical infrastructure (Lopez, ). An integrated hazard‐dependent and hazard‐independent approach is adopted by Li and Xu (), who propose a method to help air traffic administrations schedule airport maintenance to avoid safety concerns and service disruptions. Vulnerability is assessed based on the structural characteristics of the explored airports (nature of the object of vulnerability) and on the specific hazard (maintenance risks).…”
Section: Review Of the Relevant Literaturementioning
confidence: 99%
“…Zeng conducted an empirical analysis on the Chinese aviation network from perspectives of topology, hub level, and invulnerability by using complex network theory [49]. Li et al established the evaluation methods of airport importance and network efficiency, and then compared the vulnerability of the US and China's airport networks [50]. Oriol et al conducted research on airport networks and they split the world airport network (WAN) into seven global region airport networks (GRANs), determining core cities through k-core decomposition and robustness analysis [36].…”
Section: Introductionmentioning
confidence: 99%