Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yongliang Deng is active.

Publication


Featured researches published by Yongliang Deng.


Journal of Networks | 2013

Topology Vulnerability Analysis and Measure of Urban Metro Network: The case of Nanjing

Yongliang Deng; Qiming Li; Ying Lu; Jingfeng Yuan

Urban metro network system is the most effective solution for relieving traffic congestion in large cities. With the development of metro, vulnerability analysis is a core process of metro safety management under the condition of network operation. In this paper, Nanjing planned metro network, in china, which was investigated and analyzed based on the graph theory complex network theory. The metro network topology characteristics and functional properties can be studied by Space L model. Several parameters were used to analyze and measure the topology vulnerability. The fraction of removed nodes is discussed and quantitatively compared in different protocols; meanwhile, the critical threshold of the fraction is 0.05-0.07. The study indicates that Nanjing planned metro network sharing some similar characteristics with those of scale-free network and small world network simultaneously; the metro network is robust against random attacks but vulnerable to malicious attacks; two parameters called global efficiency and average path length were proposed to measure the vulnerability of metro network. In the quantization of vulnerability, both betweens and degree need to be comprehensively considered, because parameter value and its influence are not absolutely positively correlated; In the end, a qualitative calculation method is proposed to calculate the node or vulnerability based on global efficiency and average path length.


Mathematical Problems in Engineering | 2017

Complexity and Vulnerability Analysis of Critical Infrastructures: A Methodological Approach

Yongliang Deng; Liangliang Song; Zhipeng Zhou; Ping Liu

Vulnerability analysis of network models has been widely adopted to explore the potential impacts of random disturbances, deliberate attacks, and natural disasters. However, almost all these models are based on a fixed topological structure, in which the physical properties of infrastructure components and their interrelationships are not well captured. In this paper, a new research framework is put forward to quantitatively explore and assess the complexity and vulnerability of critical infrastructure systems. Then, a case study is presented to prove the feasibility and validity of the proposed framework. After constructing metro physical network (MPN), Pajek is employed to analyze its corresponding topological properties, including degree, betweenness, average path length, network diameter, and clustering coefficient. With a comprehensive understanding of the complexity of MPN, it would be beneficial for metro system to restrain original near-miss or accidents and support decision-making in emergency situations. Moreover, through the analysis of two simulation protocols for system component failure, it is found that the MPN turned to be vulnerable under the condition that the high-degree nodes or high-betweenness edges are attacked. These findings will be conductive to offer recommendations and proposals for robust design, risk-based decision-making, and prioritization of risk reduction investment.


Second International Conference on Vulnerability and Risk Analysis and Management (ICVRAM) and the Sixth International Symposium on Uncertainty, Modeling, and Analysis (ISUMA)Institute for Risk and Uncertainty, University of LiverpoolUniversity of Oxford, Environmental Change InstituteAmerican Society of Civil Engineers | 2014

Using Network Theory to Explore the Vulnerability of the Subway System

Yongliang Deng; Qiming Li; Ying Lu; Liangliang Song; Yusi Cheng

The subway has become the most effective form of transport for relieving traffic congestion in China. The vulnerability of the subway should be studied to improve the safety level in subway operation. In this paper, first of all, the general analytical method of systemic vulnerability was expatiated thoroughly. Then, the centrality theory was introduced to analyze the subway equipment system network (SESN). Next, an undirected SESN was established based on in-depth analysis of the subway system. In the end, based on SESN, vulnerability of the subway was identified by aid of PAJEK and R software platform. The study indicated that the critical vulnerability of the subway system is optical fiber system and automatic train supervision system, and there is a strong positive correlation between the vulnerability and the centrality.


Safety Science | 2015

A research on subway physical vulnerability based on network theory and FMECA

Yongliang Deng; Qiming Li; Ying Lu


Safety Science | 2015

Ontology-based knowledge modeling for automated construction safety checking

Ying Lu; Qiming Li; Zhipeng Zhou; Yongliang Deng


Safety Science | 2016

Modeling and Analysis of Subway Fire Emergency Response: An Empirical Study

Qiming Li; Yongliang Deng; Cong Liu; Qingtian Zeng; Ying Lu


Safety Science | 2016

An incident database for improving metro safety: the case of Shanghai

Xiaoling Zhang; Yongliang Deng; Qiming Li; Martin Skitmore; Zhipeng Zhou


Sustainability | 2017

Using an AHP-ISM Based Method to Study the Vulnerability Factors of Urban Rail Transit System

Liangliang Song; Qiming Li; George F. List; Yongliang Deng; Ping Lu


Safety Science | 2017

A New Approach to Understand Metro Operation Safety by Exploring Metro Operation Hazard Network (MOHN)

Qiming Li; Liangliang Song; George F. List; Yongliang Deng; Zhipeng Zhou; Ping Liu


Safety Science | 2018

Evaluation and reduction of vulnerability of subway equipment: An integrated framework

Yongliang Deng; Liangliang Song; Jianliang Zhou; Jianping Wang

Collaboration


Dive into the Yongliang Deng's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ying Lu

Southeast University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ping Liu

Lanzhou University of Technology

View shared research outputs
Top Co-Authors

Avatar

George F. List

North Carolina State University

View shared research outputs
Top Co-Authors

Avatar

Xiaoling Zhang

City University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar

Martin Skitmore

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Cong Liu

Shandong University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge