Research Article
Applying the Virtual Input-Output Method to the Identification of Key Nodes in Busy Traffic Network
Table 4
The robustness analysis results of experimental traffic network under deliberate attack.
| Node | | | | Rank |
| 2 | 0.1962 | 0.0988 | 0.5036 | 1 | 8 | 0.1962 | 0.1184 | 0.6033 | 2 | 1 | 0.1962 | 0.1594 | 0.8123 | 4 | 7 | 0.1962 | 0.1425 | 0.7265 | 3 | 5 | 0.1962 | 0.1697 | 0.8650 | 5 | 3 | 0.1962 | 0.1753 | 0.8933 | 7 | 4 | 0.1962 | 0.1755 | 0.8944 | 8 | 6 | 0.1962 | 0.1765 | 0.8995 | 9 | 9 | 0.1962 | 0.1706 | 0.8694 | 6 | 10 | 0.1962 | 0.1828 | 0.9316 | 10 |
|
|