Search results

1 – 10 of over 62000
Content available
Article

Huiru Zhang, Limin Jia, Li Wang and Yong Qin

Based on complex network theory, a method for critical elements identification of China Railway High-speed 2 (CRH2) train system is introduced in this paper.

Abstract

Purpose

Based on complex network theory, a method for critical elements identification of China Railway High-speed 2 (CRH2) train system is introduced in this paper.

Design/methodology/approach

First, two methods, reliability theory and complex theory, are introduced, and the advantages and disadvantages for their application in identifying critical elements of high-speed train system are summarized. Second, a multi-layer multi-granularity network model including virtual and actual nodes is proposed, and the corresponding fusion rules for the same nodes in different layers are given.

Findings

Finally, taking CRH2 train system as an example, the critical elements are identified by using complex network theory, which provides a reference for train operation and maintenance.

Originality/value

A method of identifying key elements of CRH2 train system based on integrated importance indices is introduced, which is a meaningful extension of the application of complex network theory to identify key components.

Details

Smart and Resilient Transport, vol. 2 no. 1
Type: Research Article
ISSN: 2632-0487

Keywords

To view the access options for this content please click here
Article

Aimin Wang

The purpose of this paper is to propose a framework for assessing the vulnerability of projects to crises. The study seeks to clarify the cascade effects of disruptions…

Abstract

Purpose

The purpose of this paper is to propose a framework for assessing the vulnerability of projects to crises. The study seeks to clarify the cascade effects of disruptions leading to project crises and to improve project robustness against crises from a systems perspective.

Design/methodology/approach

A framework for assessing project vulnerability to crises is developed using complex network theory. The framework includes network representation of project systems, analyzing project network topology, simulating the cascade of unexpected disruptions and assessing project vulnerability. Use of the framework is then illustrated by applying it to a case study of a construction project.

Findings

Project network topology plays a critical role in resisting crises. By increasing the resilience of the critical tasks and adjusting the structure of a project, the complexity and vulnerability of the project can be reduced, which in turn decreases the occurrence of crises.

Research limitations/implications

The proposed framework is used in a case study. Further studies of its application to projects in diverse industries would be beneficial to enhance the robustness of the results.

Practical implications

Project crises can threaten the survival of a project and endanger the organization’s security. The proposed framework helps prevent and mitigate project crises by protecting critical tasks and blocking the diffusion path from a systems perspective.

Originality/value

This paper presents a novel framework based on complex network theory to assess project vulnerability, which provides a systemic understanding of the cascade of disruptions that lead to project crises.

Details

International Journal of Managing Projects in Business, vol. 12 no. 4
Type: Research Article
ISSN: 1753-8378

Keywords

To view the access options for this content please click here
Article

Li Jin

The purpose of this paper is to analyze the network path and internal mechanism of risks’ cross-contagion between shadow banks and design strategies for preventing risk…

Abstract

Purpose

The purpose of this paper is to analyze the network path and internal mechanism of risks’ cross-contagion between shadow banks and design strategies for preventing risk infection between shadow banks.

Design/methodology/approach

Using the complex network theory, analyze the mechanism of risks’ cross-contagion between shadow banks from the credit network, business relationship network (BRN) and social network (SN); the cross-contagion mechanism using the structural equation model on the basis of China’s shadow banks is tested; based on the three risk infection paths, the prevention and control strategies for risk infection using the mathematical models of epidemic diseases are designed.

Findings

There are three network risk contagion paths between shadow banks. One, the credit network, risks are infected crossly mainly through debt and equity relationships; two, the BRN, risks are infected crossly mainly through business network and macro policy transmission; three, investor SN, risks are infected crossly mainly through individual SN and fractal relationships. The following three strategies for preventing risk’s cross-contagion between shadow banks: one, the in advance preventing strategy is more effective than the ex post control strategy; two, increasing the risk management coefficient; three, reducing the number of risk-infected submarkets.

Originality/value

The research of this study, especially the strategies for preventing the risks’ cross-contagion, could provide theoretical and practical guidance for regulatory authorities in formulating risk supervision measures.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

To view the access options for this content please click here
Article

Desheng Wu, Jingxiu Song, Yuan Bian, Xiaolong Zheng and Zhu Zhang

The increase of turbulence sources and risk points under the complex social information network has brought severe challenges. This paper discusses risk perception and…

Abstract

Purpose

The increase of turbulence sources and risk points under the complex social information network has brought severe challenges. This paper discusses risk perception and intelligent decision-making under the complex social information network to maintain social security and financial security.

Design/methodology/approach

Cross-modal semantic fusion and social risk perception, temporal knowledge graph and analysis, complex social network intelligent decision-making methods have been studied. A big data computing platform of software and hardware integration for security combat is constructed based on the technical support.

Findings

The software and hardware integration platform driven by big data can realize joint identification of significant risks, intelligent analysis and large-scale group decision-making.

Practical implications

The integrated platform can monitor the abnormal operation and potential associated risks of Listed Companies in real-time, reduce information asymmetry and accounting costs and improve the capital market's ability to serve the real economy. It can also provide critical technical support and decision support in necessary public opinion monitoring and control business.

Originality/value

In this paper, the theory of knowledge-enhanced multi-modal multi-granularity dynamic risk analysis and intelligent group decision-making and the idea of an inference think tank (I-aid-S) is proposed. New technologies and methods, such as association analysis, time series evolution and super large-scale group decision-making, have been established. It's also applied in behavior and situation deduction, public opinion and finance and provides real-time, dynamic, fast and high-quality think tank services.

Details

Industrial Management & Data Systems, vol. 121 no. 1
Type: Research Article
ISSN: 0263-5577

Keywords

To view the access options for this content please click here
Article

Till Becker, Mirja Meyer and Katja Windt

The topology of manufacturing systems is specified during the design phase and can afterwards only be adjusted at high expense. The purpose of this paper is to exploit the…

Abstract

Purpose

The topology of manufacturing systems is specified during the design phase and can afterwards only be adjusted at high expense. The purpose of this paper is to exploit the availability of large-scale data sets in manufacturing by applying measures from complex network theory and from classical performance evaluation to investigate the relation between structure and performance.

Design/methodology/approach

The paper develops a manufacturing system network model that is composed of measures from complex network theory. The analysis is based on six company data sets containing up to half a million operation records. The paper uses the network model as a straightforward approach to assess the manufacturing systems and to evaluate the impact of topological measures on fundamental performance figures, e.g., work in process or lateness.

Findings

The paper able to show that the manufacturing systems network model is a low-effort approach to quickly assess a manufacturing system. Additionally, the paper demonstrates that manufacturing networks display distinct, non-random network characteristics on a network-wide scale and that the relations between topological and performance key figures are non-linear.

Research limitations/implications

The sample consists of six data sets from Germany-based manufacturing companies. As the model is universal, it can easily be applied to further data sets from any industry.

Practical implications

The model can be utilized to quickly analyze large data sets without employing classical methods (e.g. simulation studies) which require time-intensive modeling and execution.

Originality/value

This paper explores for the first time the application of network figures in manufacturing systems in relation to performance figures by using real data from manufacturing companies.

Details

International Journal of Productivity and Performance Management, vol. 63 no. 3
Type: Research Article
ISSN: 1741-0401

Keywords

To view the access options for this content please click here
Article

Zhiyun Zou, Yao Xiao and Jianzhi Gao

The purpose of this paper is to attempt to realize the optimization of cascading failure process of urban transit network based on Load‐Capacity model, for better…

Abstract

Purpose

The purpose of this paper is to attempt to realize the optimization of cascading failure process of urban transit network based on Load‐Capacity model, for better evaluating and improving the operation of transit network.

Design/methodology/approach

Robustness is an essential index of stability performance for urban transit systems. In this paper, firstly, the static robustness of transit networks is analyzed based on the complex networks theory. Aiming at random and intentional attack, a concrete algorithm process is proposed on the basis of Dijstra algorithm. Then, the dynamic robustness of the networks, namely cascading failure, is analyzed, and the algorithm process is presented based on the Load‐Capacity model. Finally, the space‐of‐stations is adopted to build the network topology of Foshan transit network, and then the simulation analyses of static and dynamic robustness are realized.

Findings

Results show that transit network is robust to random attack when considering static robustness, but somewhat vulnerable to intentional attack. For dynamic robustness analysis, a large‐scale cascade of transit network may be triggered when the tolerance parameter α is less than a value, so that the robustness of transit network can be improved through some reasonable measures.

Practice implications

The results of this study provide useful information for urban transit network robustness optimization.

Originality/value

An effective method for analyzing the static and dynamic robustness of transit network is provided in this paper.

To view the access options for this content please click here
Article

Daniel O. Rice

The purpose of this paper is to present a P2P network security pricing model that promotes more secure online information sharing in P2P networks through the creation of…

Abstract

Purpose

The purpose of this paper is to present a P2P network security pricing model that promotes more secure online information sharing in P2P networks through the creation of networks with increased resistance to malicious code propagation. Online information sharing is at an all‐time high partly due to the recent growth in, and use of, online peer‐to‐peer (P2P) networks.

Design/methodology/approach

The model integrates current research findings in incentive compatible network pricing with recent developments in complex network theory. File download prices in P2P networks are linked to network security using a graph theory measurement called the Pearson coefficient. The Pearson coefficient indicates a structural dimension of scale‐free networks (scale‐free networks like the internet) called preferential attachment. Preferential attachment refers to the network property where the probability for a node to connect to a new node is greater if the new node already has a high number of connections.

Findings

The P2P network security pricing model concept is illustrated to show how the model functions to create more secure P2P networks.

Research limitations/implications

Future research in P2P network security pricing should focus on testing the model presented in this paper by numerical experiments and simulation including the tracking of malicious code propagation on networks grown under the pricing model.

Originality/value

The P2P network security pricing model demonstrated here is a different approach to network security that has a strong potential to impact on the future security of P2P and other computer based networks.

Details

Online Information Review, vol. 31 no. 5
Type: Research Article
ISSN: 1468-4527

Keywords

To view the access options for this content please click here
Article

Drew Wollin and Chad Perry

This article explores how complexity theory can help marketers to understand a market and to operate within it. Essentially, it argues that complexity theory has the…

Abstract

This article explores how complexity theory can help marketers to understand a market and to operate within it. Essentially, it argues that complexity theory has the potential to provide both global and some local explanations of markets and is complementary to local theories like relationship marketing that may be more familiar to marketing managers. It establishes four types of complex systems that might be used to model social systems. Of these four types, complex adaptive systems seem most appropriate to describe markets. This is illustrated in an investigation of Honda in the global automobile industry. Implications for marketing managers centre on the need to understand feedback loops at many levels of a path‐dependent system that are inherently difficult to predict and control.

Details

European Journal of Marketing, vol. 38 no. 5/6
Type: Research Article
ISSN: 0309-0566

Keywords

To view the access options for this content please click here
Article

Yue-tang Bian, Lu Xu, Jin-Sheng Li and Xia-qun Liu

The purpose of this paper is to explore the evolvement of investors’ behavior in stock market dynamically on the basis of non-cooperative strategy applied by investors in…

Abstract

Purpose

The purpose of this paper is to explore the evolvement of investors’ behavior in stock market dynamically on the basis of non-cooperative strategy applied by investors in complex networks.

Design/methodology/approach

Using modeling and simulation research method, this study designs and conducts a mathematical modeling and its simulation experiment of financial market behavior according to research’s basic norms of complex system theory and methods. Thus the authors acquire needed and credible experimental data.

Findings

The conclusions drawn in this paper are as follows. The dynamical evolution of investors’ trading behavior is not only affected by the stock market network structure, but also by the risk dominance degree of certain behavior. The dynamics equilibrium of trading behavior’s evolvement is directly influenced by the risk dominance degree of certain behavior, connectivity degree and the heterogeneity of the stock market networks.

Research limitations/implications

This paper focuses on the dynamical evolvement of investors’ behavior on the basis of the hypothesis that common investors prefer to mimic their network neighbors’ behavior through different analysis by the strategy of anti-coordination game in complex network. While the investors’ preference and the beliefs among them are not easy to quantify, that is deterministic or stochastic as the environment changes, and is heterogeneous definitely. Thus, these limitations should be broken through in the future research.

Originality/value

This paper aims to address the dynamical evolvement of investors’ behavior in stock market networks on the principle of non-cooperative represented by anti-coordination game in networks for the first time, considering that investors prefer to mimic their network neighbors’ behavior through different analysis by the strategy of differential choosing in every time step. The methodology designed and used in this study is a pioneering and exploratory experiment.

Details

China Finance Review International, vol. 6 no. 4
Type: Research Article
ISSN: 2044-1398

Keywords

To view the access options for this content please click here
Article

Hongbo Cai and Yuanyuan Song

The purpose of this paper is to apply an analysis of complex networks to empirically research international agricultural commodity trade and countries’ trading relations…

Abstract

Purpose

The purpose of this paper is to apply an analysis of complex networks to empirically research international agricultural commodity trade and countries’ trading relations. The structure of global agricultural commodity trade is quantitatively described and analysed.

Design/methodology/approach

Based on statistical physics and graph theory, the research paradigm of a complex network, which has sprung up in the last decade, provides us with new global perspective to discuss the topic of international trade, especially agricultural commodity trade. In this paper, the authors engage in the issue of countries’ positions in international agricultural commodity trade using the latest complex network theories. The authors at first time introduce the improved bootstrap percolation to simulate cascading influences following the breaking down of bilateral agricultural commodity trade relations.

Findings

On a mid-level structure, countries are classified into three communities that reflect the structure of the “core/periphery” using the weighted extremal optimisation algorithm and the coarse graining process. On a micro-level, countries’ rankings are provided with the aid of network’s node centralities, which presents world agricultural commodity trade as a closed, imbalanced, diversified and multi-polar development.

Originality/value

The authors at first time introduce the improved bootstrap percolation to simulate cascading influences following the breaking down of bilateral agricultural commodity trade relations.

Details

China Agricultural Economic Review, vol. 8 no. 3
Type: Research Article
ISSN: 1756-137X

Keywords

1 – 10 of over 62000