Research article Special Issues

Fixed point theorems for enriched Kannan-type mappings and application

  • The aim of this paper is to establish some fixed point results for enriched Kannan-type mappings in convex metric spaces. We first give an affirmative answer to a recent Berinde and Păcurar's question (Remark 2.3) [J. Comput. Appl. Math., 386 (2021), 113217]. Furthermore, we establish the existence and uniqueness of fixed points for Suzuki-enriched Kannan-type mappings in the setting of convex metric spaces. Finally, we present an application to approximate the solution of the Volterra integral equations to support our results.

    Citation: Yao Yu, Chaobo Li, Dong Ji. Fixed point theorems for enriched Kannan-type mappings and application[J]. AIMS Mathematics, 2024, 9(8): 21580-21595. doi: 10.3934/math.20241048

    Related Papers:

    [1] Jialiang Xiao, Yongtao Zheng, Wei Wang, Xuedong Hua . Robustness analysis of a multimodal comprehensive transportation network from the perspectives of infrastructure and operation: A case study. Electronic Research Archive, 2025, 33(4): 1902-1945. doi: 10.3934/era.2025086
    [2] Jiping Xing, Yunchi Wu, Di Huang, Xin Liu . Transfer learning for robust urban network-wide traffic volume estimation with uncertain detector deployment scheme. Electronic Research Archive, 2023, 31(1): 207-228. doi: 10.3934/era.2023011
    [3] Jiping Xing, Xiaohong Jiang, Yu Yuan, Wei Liu . Incorporating mobile phone data-based travel mobility analysis of metro ridership in aboveground and underground layers. Electronic Research Archive, 2024, 32(7): 4472-4494. doi: 10.3934/era.2024202
    [4] Yuhang Liu, Jun Chen, Yuchen Wang, Wei Wang . Interpretable machine learning models for detecting fine-grained transport modes by multi-source data. Electronic Research Archive, 2023, 31(11): 6844-6865. doi: 10.3934/era.2023346
    [5] Kai Huang, Chang Jiang, Pei Li, Ali Shan, Jian Wan, Wenhu Qin . A systematic framework for urban smart transportation towards traffic management and parking. Electronic Research Archive, 2022, 30(11): 4191-4208. doi: 10.3934/era.2022212
    [6] Hui Yao, Ke Han, Yanhao Liu, Dawei Wang, Zhanping You . Research and comparison of pavement performance prediction based on neural networks and fusion transformer architecture. Electronic Research Archive, 2024, 32(2): 1239-1267. doi: 10.3934/era.2024059
    [7] Hongyu Zhang, Yiwei Wu, Lu Zhen, Yong Jin, Shuaian Wang . Optimization problems in liquefied natural gas transport and storage for multimodal transport companies. Electronic Research Archive, 2024, 32(8): 4828-4844. doi: 10.3934/era.2024221
    [8] Xiangwen Yin . A review of dynamics analysis of neural networks and applications in creation psychology. Electronic Research Archive, 2023, 31(5): 2595-2625. doi: 10.3934/era.2023132
    [9] Yuan Tian, Xinlu Tian, Xinrui Yan, Jie Zheng, Kaibiao Sun . Complex dynamics of non-smooth pest-natural enemy Gomportz models with a variable searching rate based on threshold control. Electronic Research Archive, 2025, 33(1): 26-49. doi: 10.3934/era.2025002
    [10] Qianqian Zhang, Mingye Mu, Heyuan Ji, Qiushi Wang, Xingyu Wang . An adaptive type-2 fuzzy sliding mode tracking controller for a robotic manipulator. Electronic Research Archive, 2023, 31(7): 3791-3813. doi: 10.3934/era.2023193
  • The aim of this paper is to establish some fixed point results for enriched Kannan-type mappings in convex metric spaces. We first give an affirmative answer to a recent Berinde and Păcurar's question (Remark 2.3) [J. Comput. Appl. Math., 386 (2021), 113217]. Furthermore, we establish the existence and uniqueness of fixed points for Suzuki-enriched Kannan-type mappings in the setting of convex metric spaces. Finally, we present an application to approximate the solution of the Volterra integral equations to support our results.



    The multimodal comprehensive transportation network (CNet) is important to the social economy. The transit hub is a key part of CNet for its function of connecting different transportation modes. Although a nationwide transportation infrastructure network has been built, China still lags in the United Nations' logistics index [1]. One important reason is that the transfer capacity of transit hubs is insufficient.

    Robustness is an important property of the system to resist interference. To maintain operation, CNet needs to be robust. Because of its importance, the transit hub is more easily damaged and the negative influence is more serious. Therefore, two questions need to be considered during the stages of planning, construction and management if a robust CNet is needed. One is how to evaluate the robustness of CNet accurately considering the transfer function of the hub. Another is how to enhance the robustness of CNet based on the optimized hub.

    Whether evaluating or enhancing, the research needs to focus on reality. Only in this way can conclusions and suggestions of important practical significance be drawn. First, the network model should accurately reflect reality. Otherwise, the evaluation results of robustness may be biased. Second, the basic statistical characteristics of networks should be researched, such as scale-free and small-world properties. It is beneficial to understand the state of the network. Third, it is necessary to perform a comparative analysis of how the optimized hub affects robustness. It is helpful for engineers to make the improved scheme.

    Based on these objects, Jiangsu Province is selected as the case study. It is one of China's most economically powerful provinces. It also has a complete and powerful network system of multimodal comprehensive transportation. However, the issue of insufficient transfer capacity persists. Therefore, the CNet in Jiangsu can reflect its characteristics when used throughout China.

    Generally, this paper has four contributions. First, the differences in statistical characteristics among CNet and single-mode networks are analyzed. We point out the features and explain the reasons for the degree distribution, scale-free and small-world and spatial scale when the CNet considers mode transfer. Second, the robustness of CNet and single-mode networks is compared. We use some indicators to show the structure failure process under four attack modes and compare the differences between CNet and other networks. Third, the robustness of four kinds of CNets is comparatively analyzed. We note how much the robustness of the CNet can be improved, which is modeled by the method proposed in this paper. We also show the improvement tendency caused by the number of optimized transit hubs. It also demonstrates the validity of our modeling method. Fourth, some suggestions from the planning, construction and management points of view are proposed. The suggestions are about the number of hubs and the design of transfer channels. We propose notification when evaluating the robustness of a real transportation system.

    The research contents are as follows: Section 2 reviews the literature and shows points to be further optimized. Section 3 proposes the optimized modeling method for a CNet. Section 4 introduces the data of the case study and the research method of robustness. Section 5 analyzes the statistical characteristics of five networks in Jiangsu. Section 6 compares the robustness of five networks in Jiangsu. Section 7 explores the robustness of CNets modeled by our method and previous methods. Section 8 summarizes the research conclusions and proposes some suggestions.

    To theoretically analyze the characteristics of a transportation network, the first step is to mathematically depict the real network. In previous research, the network's topology was often represented using a graph. Let us consider an unweighted and undirected network G=(V,E), where G represents the analyzed network, V is the nonempty set of vertices and E is the set of edges. The relationship between V and E can be represented as EV×V indicating that the set of edges is a subset of the connections between any two points. This mathematical representation applies to various types of networks such as power networks, the Internet [2], interpersonal networks and transportation networks [3].

    The process of abstracting objects from a real network into vertices and edges in a graph can be addressed using the concept of modeling space, as proposed by Von Ferber et al [4]. The modeling space encompasses four methods: space L, space C, space P and space B [5,6]. In the analysis conducted by Lin et al., the evolution process of urban public transportation networks at different times was examined, highlighting the distinct topological characteristics between networks constructed using space L and space P [7]. Kurant et al. observed differences in the statistical properties of networks modeled under various methods such as space L, space P and space C using the Swiss railway network [8]. Porta et al. discovered that the highway network modeled under space L lacked the scale-free property, whereas the network modeled under space C exhibited scale-free characteristics [9]. These findings indicate that the properties of a network can differ based on the chosen modeling space.

    Moreover, the selection of vertices and edges varies depending on the spatial scale considered. For instance, Dau S. H. et al. employed intersection conflict points and vehicle trajectory lines [10], while Wang [11] and Li [12] focused on airports and airline routes. Boasa P.R.V. et al., on the other hand, utilized cities and highway sections [13]. Hence, when studying regional transportation, it is crucial to select appropriate objects based on the spatial scale under investigation.

    Transportation networks can be categorized as single-mode or multimodal networks. Single-mode networks encompass various research objects, including urban transit networks [14,15], urban road networks [16,17], railway operation networks [18,19] and aviation operation networks [20,21]. For instance, Zhang examined high-speed railway networks in China, the U.S. and Japan, comparing their statistical characteristics using metrics such as average degree, maximum degree and average medium [22]. Sen investigated the railway network in India and discovered its small-world property [23]. Bagler G reviewed the aviation operation network in India and identified it as a small-world network characterized by a truncated power-law degree distribution [24]. Sienkiewicz J. et al. studied bus networks in 22 cities in Poland, summarized the degree distribution patterns and found that all of them exhibited small-world properties [25].

    In the case of multimodal networks, the research primarily focuses on connecting different networks. Two main approaches are commonly used to construct multimodal networks.

    1) Supernetwork: The supernetwork is a multilayer complex network model that characterizes the composition of multimodal networks. It connects various layers of different modality sub-networks, primarily through virtual arc segments, forming a nested multilayer network model where each layer can interconnect with one another [26,27,28].

    This method finds extensive application in the construction of urban transportation networks. For example, Xu constructed a multimodal supernetwork model among cities and proposed a stochastic equilibrium allocation method for intercity transportation systems [29]. Ding depicted the entire process of residents' public transit travel through a supernetwork, considering components such as line transfers and residents' walking access to bus stops [30]. Lozano established a general bus-subway composite supernetwork, designed a path search algorithm and examined users' path preference selection in urban public transportation [31].

    The supernetwork approach has also been successfully applied to the study of regional comprehensive transportation systems. Shi constructed an airway-railway intermodal network using a supernetwork and conducted an in-depth analysis of road sections and node impedance functions within this composite network [32]. Deng, on the other hand, developed a three-layer supernetwork of highways, railways and waterways for freight planning and forecasting in the Yangtze River Economic Belt [33]. Xu applied the supernetwork approach in the integration of regional comprehensive transportation logistics, encompassing infrastructure, information resources and organizational networks [34].

    2) Merging different networks: This approach involves merging nodes and routes from different networks to achieve the fusion of multiple modes. For instance, Luo combined bus stops and subway stops at the same location into a single node in the study of a composite urban bus-subway transit network [35]. Xu et al. merged nodes that spatially correlated roads and railways when studying the railway-aviation composite network [36]. Feng et al. treated railway stations and airports as homogeneous vertices and established edges representing transfer routes [37]. Ouyang treated railway stations and airports within the same city as a single point [38]. Luo et al. combined a subway station and a bus station with close distances into one vertex when studying conventional buses and subways and represented the bus line and subway line passing through the same two vertices as one edge [39]. Li regarded three adjacent subway stations and four bus stations as a unit and connected each station in the unit to represent the transfer section [40]. Liu utilized a weighted bipartite graph to construct the transfer network inside the station [41].

    Studies on the robustness of transportation networks can be categorized into two main categories: topology-based robustness and operational robustness.

    Topology-based robustness analyzes unweighted topological networks to identify highly influential nodes. Classic indicators used to evaluate node importance include degree centrality [42], betweenness centrality, and closeness centrality [43]. Demšar et al. proposed a mathematical method that utilizes degree centrality and clustering coefficient to identify critical locations in street networks [44]. Chen employed topological indices such as average degree, relative maximum connectivity graph and efficiency to analyze urban transport networks in Beijing and developed a new indicator combining node degree and betweenness to better reflect network resilience [45]. Duan and Lu conducted an empirical study on six city road networks using betweenness centrality to analyze robustness and identify critical points [46].

    Additionally, researchers have developed new indicators such as collective influence (CI), which measures node importance by aggregating degrees over all neighbors within a given radius [47] and CoreHD, a method that removes the highest degree node in 2-core networks first, followed by tree-breaking [48].

    Operational robustness focuses on analyzing weighted networks where weights represent flows, congestion or capacities. Cats et al. integrated capacity degradation results per edge into network robustness assessment using Amsterdam's urban public transport network as a case study [49]. Shang proposed a novel indicator called relative area index (RAI) based on traffic assignment theory to reveal the robustness of multi-scale urban road networks, which outperformed traditional topological metrics like weighted betweenness centrality when facing global disruptions [50]. Ouyang et al. introduced mathematical models and solution algorithms to identify optimal robustness-based and resilience-based protection strategies for critical infrastructure systems [51]. Kermanshah and Derrible developed a geographical and multi-criteria vulnerability assessment method to quantify the impacts of extreme earthquakes on road networks using Los Angeles and San Francisco as case studies [52].

    Some researchers have combined both topology-based and operational perspectives to systematically investigate the resilience characteristics of networks under static and dynamic conditions. They construct frameworks for network robustness analysis that capture the relationship between topological and operational indices. For example, Shang applied topological and operational indices to analyze urban road networks and assess their robustness against local disruptions [53]. Liu proposed a resilience assessment framework considering network function, structure and recovery performance under different attacks to optimize urban road networks [54]. Zhang applied static metrics such as node degree, betweenness and closeness, as well as dynamic metrics like flow degree to analyze the robustness of the directed weighted urban railway network in Hong Kong under cascading failures [55].

    When simulating network failure, researchers commonly employ random and calculated attack methods [56]. Random attacks simulate natural disasters, while calculated attacks simulate intentional human damage. Building on classic methods, researchers have proposed new attack strategies. For example, Li et al. improved spatially localized failure models to simulate failure caused by typhoons, where nodes and edges are affected within a specific circular area [57].

    To summarize, although researchers have made significant progress in studying transportation network robustness, there are several areas that still require further optimization and exploration.

    Lack of unified modeling rules for multimodal CNet: Existing studies predominantly focus on single-mode or composite networks, lacking analysis of CNet that include highways, railways, waterways and aviation. Additionally, there is a lack of standardized mapping rules for vertices and edges, failing to fully represent the mode transfer process facilitated by transit hubs.

    Insufficient statistical characteristics and robustness analysis of multimodal CNet: Previous research primarily concentrates on single-mode or two-mode composite networks. These studies have revealed scale-free and small-world characteristics in bus, subway and aviation networks. However, there is limited research on the topological structure and robustness characteristics of CNet. What is the performance of a comprehensive transportation network in terms of the degree distribution, scale-free characteristics and the small-world? How does the robustness of multi-modal CNet change under various attacks? Are there any differences between the robustness of CNet and the single-mode network? What common trends can be observed in their robustness variations? These questions remain unanswered.

    Insufficient comparative analysis of CNet robustness under different transfer conditions: Different transfer conditions in CNet can be represented by various modeling methods. Previous studies often oversimplify the transfer process and neglect the detailed design of transfer points between different modes. Can this simplification method accurately assess the robustness of CNet? Can the detailed mode transfer design improve the robustness of CNet? How much can this kind of design affect the network's robustness? These questions remain unanswered.

    CNet includes four kinds of single-mode networks and the micronetwork of transit hubs. Single-mode networks refer to the highway, railway, navigation channel and airway transportation networks (HNet, RNet, NNet and ANet, respectively). The micronetwork of transit hubs includes the transfer network inside the hub and the connecting section outside the hub. The transit hub point (THP) is defined as the vertex with a mode transfer function, which includes the vertices of railway stations, harbors and airports. Figure 1 shows the network structure of CNet.

    Figure 1.  The structure of CNet.

    CNet can be described as GC=(VC,EC), where VC and EC refer to the vertices and edges in CNet. Similarly, HNet, RNet, NNet and ANet can be described as GH=(VH,EH), GR=(VR,ER), GN=(VN,EN) and GA=(VA,EA), respectively. The construction method of the above network will be explained in detail in Section 3.3.

    The set of the THP is defined as VTHP and a THP in the set is denoted by vkTHP, where k=1,2,,|VTHP|. The construction method of the connecting section will be explained in detail in Section 3.2. A connecting section is denoted as ekp1p2. The set of all such connecting sections in the CNet is denoted as Econnect. The construction method of the mode transfer network of the THP k will be explained in detail in Section 3.2. The mathematical expression is GkJ=(VkJ,EkJ), where VkJ denotes the set of transfer vertices and EkJ denotes the set of transfer edges.

    Thus, the mathematical expression of CNet is shown in Eq (1).

    (1)

    The transfer connection inside the hub connects all the roads connected by the hub in pairs. It depicts the transfer process from one road to another. Define the transfer network in vkTHP as GkJ=(VkJ,EkJ). The modeling progress can be divided into three steps.

    Step 1: Adding the transfer vertex. Make a circle with a radius of 1 (1 unit after standardization according to the spatial scale). The intersections between the circle and all n edges connecting with vkTHP are the newly added transfer vertices, denoted as vk,1J,vk,2J,vk,nJ. They are represented as blue dots in Figure 2(b). The set of all freshly added transfer vertices in vkTHP is defined as VkJ.

    Figure 2.  The construction process of the mode transfer network.

    Step 2: Adding the transfer edge. Generate C2n edges among n transfer vertices as transfer edges. Each edge is denoted as ek,ijJ, where i,jVkJ and ij. Transfer edges are represented as blue lines in Figure 2(c). The set of all freshly added transfer edges in vkTHP is defined as EkJ.

    Step 3: Deleting THP. Delete vkTHP (represented as the red dashed circle in Figure 2(c)) from all sets, including VTHP, VH, VR, VW and VA. Then, delete the edges between vkTHP and vk,1J,vk,2J,vk,nJ (represented as green and purple solid lines surrounded by the red dashed circle in Figure 2(c)) and define the set of all these kinds of edges as EkTHP, as shown in Figure 2(d).

    The number of vertices Nvertex and edges Ledge in GkJ is shown in Eqs (2)–(4).

    (2)
    (3)
    (4)

    where M is denoted as the number of traffic modes connected by vkTHP (1M4). xi is denoted as the edge number of the mode i (xi2) and the i value ranges from 1 to 4, indicating highway, railway, navigation channel and airway. n is denoted as the total number of edges connected with vkTHP.

    The transfer connection inside the hub refers to the edge connecting the hub and the outside highway, as shown by the red edge in Figure 3. The connection is meant to solve an important problem. In the real world, when the hub is located inside the city there is much slow traffic around it so the links connected to it tend to be low-grade roads. When modeling, if only six types of highways are reserved, the hub will not be connected to the HNet. Therefore, we add an edge between the hub and the external road vertex as an abstract representation of the low-grade road. Figure 3 shows HNet vertex v1hwVH, HNet edge e1cw,e2cwEH, THP vkTHPVTHP and THP vkTHPVR. RNet e1rw,e2rw,e3rw,e4rwER. Define ekp1p2 as the connecting section, where P1=v1hw,P2=vkTHP.

    Figure 3.  The model of the connecting section between the hub and the external highway.

    There is another kind of special hub, which is the expressway entrance and exit (EEE). It connects the expressway and the other roads. Since most expressways in China are tolled, the EEE usually consists of ramps, toll stations, checkpoints, etc., as shown in Figure 4(a). An optimized method is proposed to represent the topology structure of the EEE, as shown in Figure 4(b). Three vertices and two edges are used. vhwring, vtoll and vringcw represent the intersection formed by the ramp and expressway, toll stations or checkpoints and the intersection formed by the ramp and the other road, respectively. eupring and edownring represent two kinds of ramps. In this model, if simulating the EEE failure caused by bad weather, traffic congestion, traffic control, etc., only vtoll needs to be removed. It will not affect the connectivity of the expressway, which is consistent with reality.

    Figure 4.  Modeling method for EEE.

    In addition, two special cases must be discussed. First, for the starting and ending points of the expressway, only vtoll, vringcw and edownring need to be retained, as shown in Figure 4(c). Second, when the road connected with the expressway does not belong to the six kinds of highways in HNet, vhwring, vtoll, vringcw, eupring and edownring is still used but vringcw is only connected to edownring and no other edges are connected, as shown in Figure 4(d).

    The core of the modeling method for a single-mode network is to clarify the mapping rules, which refer to the correspondence between existing traffic elements and the abstract network. There are three steps.

    Step 1: Specify the modeling object. Regional transportation gives more attention to trunk channels. Therefore, it is necessary to clarify the selection criteria of each element in the real network.

    Step 2: Specify the meaning of vertices and edges. Traffic elements represented by the vertices and edges differ in different situations. Whatever they represent must be clarified at the same spatial scale.

    Step 3: Addressing some special situations. Some exceptional cases need to be discussed to more appropriately reflect the topological relationship of the real.

    Table 1.  The Establishment of Mapping Rules.
    Step 1 Step 2 Step 3
    V E
    HNet National expressways, provincial expressways, national trunk highways, provincial trunk highways, urban expressways and urban main roads. Plane intersections, stereo intersections, expressway entrances and exits and toll stations The main highway sections existing between two vertices (ⅰ) VHexcludes intersections formed by roads other than six modeling objects.
    (ⅱ) EH only includes the main road of the highway section
    RNet The national high-speed railway, the national heavy haul railway, and the national railway Grade Ⅰ-Ⅲ The railway stations and the large overpasses intersected by two or more railway lines. The main railway sections. All lines should be reserved when a railway station is connected with multiple lines.
    NNet The navigation channel Grade Ⅰ, Ⅱ, Ⅲ Wharves, locks in the inland waterway, and intersections of inland waterways. Navigation channel sections. The intersection of the marine channel is not considered
    ANet Airway, not airlines. Airports, reporting points, VOR, DME and NDB**. The airway sections. When the positions of different types of vertices coincide, only one needs to be reserved.
    *V and E separately represents the vertex and the edge of the single-mode network.
    **VOR, DME and NDB are the abbreviations of nodes with definite functions on the airway. VOR: very high frequency omnidirectional range. DEM: distance measuring equipment. NDB: nondirectional beacon.

     | Show Table
    DownLoad: CSV

    In Step 1, when constructing HNet, inter-city connectivity and transit traffic requirements are mainly considered. In addition, the administrative grade of a highway can better reflect its function in the network than the technical grade. Therefore, these six paths are chosen as model objects. When constructing ANet, the airway refers to the route that an aircraft needs to follow when flying in the airspace, but the airline is a line operated by the airline company. From the perspective of the infrastructure network, the airway is similar to the highway, railway and navigation channel. Therefore, it is chosen as modeling the object instead of the airline.

    The case object is a comprehensive transportation network in Jiangsu Province, a typical coastal province in China. The highway, railway and navigation data are derived from the electronic navigation map data provided by NavInfo [58]. The aviation data are derived from the enroute chart (Revision 15) published by the Civil Aviation Administration of China (CAAC) in June 2021 [59].

    The electronic navigation map data contain traffic nodes, sections, points of interest (POIs) and sidewalk sections. Therefore, the data are extensive. According to Section 3.3, the original data were filtered and the amount of data decreased significantly. Table 2 shows the number of nodes and sections. Both the node and section numbers of the highway are the largest. The data spatial distribution is shown in Figure 5.

    Table 2.  Comprehensive transportation network data of Jiangsu Province.
    Mode Original data Filtered data
    Number of nodes Highway 136,881 39,007
    Railway 10,650 3046
    Navigation channel 9084 2521
    Airway 164 69
    Other 79,928 0
    Sum 236,707 44,643
    Number of sections Highway 269,151 77,669
    Railway 16,835 4859
    Navigation channel 13,510 3898
    Airway 326 118
    Other 27,286 0
    Sum 327,108 86,544

     | Show Table
    DownLoad: CSV
    Figure 5.  Spatial distribution of data for Jiangsu Province.

    Global efficiency is to explore the connectivity condition of the connected or disconnected network and its formulation is written as follows:

    (5)

    dij represents the distances between any two vertices and N is denoted as the vertex number, where G is the network. If the non-weighted network is completely connected, E(G)=1. When the network is continuously attacked and isolated vertices appear, the distance between vertices will continue to increase, so E(G) decreases. According to Eq (5), the change in global efficiency can be calculated as:

    (6)

    E(G)T represents the global efficiency when T vertices are attacked, where T=1,2,,N. max{E(G)T} represents the maximal value of the global efficiency during the entire progress of the attack and min{E(G)T} represents the minimal one. η(E(G)) is a normalized index, that is 0η(E(G))1.

    The maximal connected subgraph is to measure the completeness of the network. The change of it can be calculated as follows:

    (7)

    N(MCG)T represents the vertex number of the maximal connected subgraph when T vertices are attacked, where T=1,2,,N. N(G) represents the vertex number of G. The meaning of min{} is as same as that above. The index is normalized, that is 0η(R(G))1. A higher η(R(G)) means the network can maintain a good connection, which also means the graph is more robust.

    Structural entropy is to explore the uniformity of the network and formulation is written as follows:

    (8)
    (9)

    H represents the structural entropy of the network. Ii is the importance of vertex i. To eliminate the influence of vertex numbers, H need to be normalized as follows:

    (10)
    (11)
    (12)

    Hmax is the maximal value of the structural entropy when the degree values of all vertices are the same. Hmin is the minimal value, when all vertices connect with a special vertex. According to Eq (12), the change of the standard structural entropy can be calculated as:

    (13)

    H(G)T represents the standard structural entropy when T vertices are attacked, where T=1,2,,N. The meaning of max{} and min{} is as same as those above. η(E(G)) is a normalized index, that is 0η(E(G))1. If η(E(G)) maintains steadily under attack, the network is more robust.

    The robustness composite indicator is to evaluate the robustness of the network from multiple dimensions, including connectivity, completeness and uniformity. The formulation is written as follows:

    (14)

    λ1,λ2 and λ3 is denoted as the weight of η(E(G)), η(R(G)) and η(H(G)), respectively. They indicate the importance of connectivity, completeness and uniformity in the network. λ1,λ2,λ3(0,1) and λ1+λ2+λ3=1. 0V1. The larger the value of V, the more robust the network. In this article, λ1=λ2=λ3=1/3.

    The critical ratio of network failure is to show when the network fails completely and the formulation is written as follows:

    (15)
    (16)

    CP is denoted as the critical point of network failure, which is the number of vertices that have been attacked when V is less than 1% of the initial value V0. CR is normalized, that is 0CR1. The larger the value of CR, the more robust the network.

    This paper proposes four attack strategies. The random attack (RA) is randomly selecting an attacked vertex without considering the difference and all vertices have the same probability of being selected. A calculated attack is a purposeful attack based on the importance of vertices. However, there are a large number of vertices with the same degree value. To clarify the attack sequence of these vertices we formulate three different calculated attack strategies, which are regular calculated attack (CAR), calculated attack considering update degree (CAUD) and calculated attack considering random selection (CARS). The steps of the four attack strategies are shown in Figure 6.

    Figure 6.  Steps of the four attack strategies.

    From Figure 7, it can be seen that the degree of the five networks is mainly concentrated between 1 and 4, and there are few vertices with high degrees. Among them, the curves of HNet and CNet are relatively close. The degree is concentrated between 2 and 4 (94.4 and 88.7%, respectively) and the high degree (k>4) is less (0.2 and 3.7%, respectively). Although the degrees of RNet and ANet are concentrated between 1 and 3 (86.3 and 69.0%, respectively), ANet has more high-degree vertices (15.5%), but RNet has fewer (2.0%). The distribution of the NNet degree is relatively narrow, ranging from 1 to 4, mainly concentrated between 2 and 3 (79.1%).

    Figure 7.  Degree distribution curve.

    Why are there many vertices with a degree value of 3 in HNet? There are three reasons: First, each EEE contributes 1 or 2 vertices with a degree of 3. There are 447 EEEs in HNet, so 671 vertices with a degree value of 3 are contributed. Second, these vertices are primarily intersections of expressways, national or provincial trunk highways and urban roads. This reflects the apparent hierarchical phenomenon of HNet: a small number of expressways and national trunk highways serve a large area and a large number of provincial trunk highways and urban roads serve a small area. This phenomenon is more evident at the city boundary, as shown in Figure 8(a). The intersection vertices are highlighted. Third, Jiangsu is a coastal province and acts as a natural barrier and many east-west highways terminate in north-south coastal highways. Figure 8(b) shows the road in the coastal city of Yancheng. In addition, there are some large natural lakes such as Taihu Lake, Hongze Lake, Gaoyou Lake, Shaobo Lake and Luoma Lake. The highway ends at the road encircling the lake. Figure 8(c) shows the road around Hongze Lake. This kind of vertex is highlighted.

    Figure 8.  The reason for forming the vertices with a degree value of 3.

    To analyze the scale-free property of the networks, their degree distribution curves are fitted in the double logarithmic coordinate system by a power-law distribution function. Barabasi noted that the network is scale-free when the function's slope is 2<γ<3. The network has the characteristics of both a random and scale-free network when γ>3. As shown in Table 3, HNet, RNet, NNet and CNet are not scale-free networks, but ANet is.

    Table 3.  Indicators of the network statistics feature.
    Property Indicator HNet RNet NNet ANet CNet
    Random network Poisson R2 0.0272 0.1513 0.0136 0.0666 0.0872
    Poisson P>|z| 0.720 0.440 0.815 0.583 0.523
    Poisson Log likelihood -2.389 -2.192 -2.027 -2.351 -2.503
    Scale-free Power-law γ -5.87 -4.29 -3.42 -2.07 -3.98
    Small-world lnNlnk 7.649 6.632 3.586 3.586 7.710
    d 26.98 12.478 4.205 4.205 22.58
    Small-world or not? NO NO NO YES NO

     | Show Table
    DownLoad: CSV

    Furthermore, the Poisson distribution is applied to fit the degree distribution curves of the five networks to explore whether they belong to random networks. As shown in Table 3, the fitting indices are not significant. It shows that none of the five networks is a random network.

    Finally, two indicators are calculated to explore the small-world property. Barabasi also noted that when dlnNlnk, the network is small-world. As shown in Table 3, only ANet has the small-world property, while the other four networks do not.

    Why is the judgment of the scale-free property of NNet different from that of predecessors such as Li [60] and Lou [61]? This can be explained by different modeling objects and mapping rules. The modeling object in Li's research is the shipping route network near ports. Ships here are subject to dispatch rather than free navigation. When the network is scale-free, many routes are connected to a few points, which is conducive to dispatching. In Luo's research, the vertex represents the intersection of waterways or an administrative boundary. However, in this paper, waterway intersections, harbors and locks are considered. Especially with the addition of locks, many vertices with a degree value of two are added. Similarly, because of the different modeling objects and mapping rules, the small-world property of NNet is also different from predecessors. However, the conclusions of HNet, RNet and ANet are consistent with the research results of Fu [62], Zhao [63] and Bagler G [24].

    From the number of vertices and edges, it can be seen that HNet occupies the primary position in CNet. In addition, there are other findings: (ⅰ) Compared with HNet, dmax of CNet is smaller. (ⅱ) Compared with HNet, d of CNet is smaller. (ⅲ) Compared with HNet, C of CNet is larger.

    Table 4.  Statistical characteristics.
    Network N L dmax d C
    HNet 3265 4701 76 26.98 0.033
    RNet 255 294 37 15.220 0.089
    NNet 211 236 31 12.478 0.014
    ANet 58 90 10 4.205 0.151
    CNet 4257 6291 55 22.58 0.085

     | Show Table
    DownLoad: CSV

    There are two reasons for the difference in d. On the one hand, the railway, navigation channel and airway connect more vertices. On the other hand, RNet, NNet and ANet result in an average effect due to the smaller number of vertices and shorter average path length.

    Similarly, there are two reasons for the difference in C. On the one hand, considering the transfer network, THP enables the surrounding vertices to communicate with each other more tightly, thus generating more accessible paths and increasing the agglomeration degree. On the other hand, C of RNet, NNet and ANet is higher than that of HNet, so the clustering degree of CNet is increased after integration.

    Under different attack strategies, four networks exhibit varying levels of robustness. They demonstrate greater robustness under RA and CAR, but their robustness is significantly lower under CAUD and CARS. Figure 9 illustrates that regardless of the attack strategy used, the curves of V for CAUD and CARS consistently remain lower than those for RA and CAR throughout the attack. This indicates that the connectivity, completeness and uniformity of the networks are more severely affected under CAUD and CARS compared to RA and CAR even when an equal number of vertices are attacked. Similar patterns are observed for other indices as well.

    Figure 9.  The robustness results of the single-mode network.

    The values of CR under different attack strategies confirm the same robustness trend. In HNet, the CR values under RA, CAR, CAUD and CARS are 94.64, 92.37, 55.90 and 56.36%, respectively. In ANet, CR are 89.66, 79.31, 46.55 and 51.72%, respectively. CR under RA and CAR is consistently higher than that under CAUD and CARS, indicating that the network can withstand more severe attacks before experiencing failure.

    Comparing the four networks, HNet and RNet are deemed more robust than NNet and ANet. First, the speed of network failure varies among the networks. For HNet and RNet, the failure process can be divided into three stages: an initial rapid decrease in V, followed by a relatively high fluctuation stage and finally, another rapid decline. This suggests that the connectivity, completeness and uniformity of the network remain relatively stable during the second stage, even when a significant number of vertices are attacked. In contrast, NNet and ANet experience a rapid and continuous decrease in V throughout the attack, indicating a quick disintegration of the network structure upon damage.

    Second, HNet and RNet exhibit a delayed failure compared to NNet and ANet. The average CR of HNet and RNet is 74.82 and 70.74%, respectively, which is higher than CR of NNet (68.01%) and ANet (66.81%). This suggests that HNet and RNet can withstand more severe attacks before reaching failure.

    An intriguing phenomenon observed is the fluctuation plateau, which we refer to as the "city effect". When modeling the networks, the vertex IDs are sequentially arranged within the same city but adjacently arranged across different cities. Under CAR, the vertices are attacked consecutively based on their IDs when targeting vertices with the same degree. Consequently, the network within each city is destroyed, while the backbone network connecting the cities remains relatively intact, resulting in the occurrence of a fluctuation plateau. However, the city effect does not prevent rapid failure under both CAUD and CARS since the network inside the cities and the backbone network are simultaneously destroyed. This city effect suggests that the network within each city is of lesser importance compared to the backbone network connecting the cities.

    CNet exhibits better robustness under RA and CAR compared to CAUD and CARS. CR is 95.11 and 91.75% under RA and CAR respectively, which is significantly higher than CR under CAUD and CARS, which is 56.85 and 57.25%. Notably, the difference in robustness becomes particularly evident when considering the structural entropy. As mentioned in Section 5.2, CNet exhibits both random network and scale-free network properties. When the entropy decreases, the network structure transitions from disorder to a more ordered state. However, the robustness property can resist this change with stronger robustness offering greater resistance. In Figure 10(a), the green and blue dotted lines consistently fluctuate at a higher position for a longer period compared to the red and golden lines. This indicates that the resistance of entropy under RA and CAR is stronger, reflecting stronger robustness. Additionally, CNet also displays the city effect.

    Figure 10.  The robustness results of CNet.

    Figure 11 illustrates that the curves of CNet and HNet are similar regardless of the attack strategies and indicators. The original E of CNet is lower than that of RNet, NNet and ANet but slightly higher than that of HNet. This discrepancy arises because CNet has a larger number of vertices, resulting in longer average distances and lower global efficiency. However, the original R of CNet is slightly higher than that of HNet, indicating that the addition of other modes effectively increases connectivity.

    Figure 11.  Robustness comparative analysis.

    Observing the changes in η(E(G)), η(R(G)), η(H(G)) and V, it is evident that regardless of the attack strategy, the curves of CNet are consistently higher than those of HNet. Furthermore, HNet reaches the critical point earlier than CNet, indicating that CNet is more robust than HNet. However, there is a brief period in the beginning under CARS when the V curve of HNet surpasses that of CNet. This phenomenon can be explained by two reasons: first, the original value of CNet is lower than that of HNet and second, due to the micronetwork of the transit hub, some high-degree vertices are replaced. At the initial stages of the attack, CNet lacks sufficient high-degree vertices to support the overall network structure.

    Three optimized modeling methods are proposed for the transfer network, the connecting road of the hub and the EEE. In this section, four contrast experiments are designed to explore the effect of these methods on network robustness and prove their validity. In each experiment, we compare the robustness of the two networks. All networks are derived from the Jiangsu Province data and use the same mapping rules. The robustness analysis is carried out according to four attack strategies.

    Based on R(G), two new indicators describe the robustness difference between networks G1 and G2 modeled by different methods.

    The improved rate of the critical ratio ( IRC ). It describes the change in the critical rate of network failure under one attack mode. It can reflect changes in robustness without being affected by network size.

    (17)
    (18)

    CRR1 and CRR2 are separately denoted as critical ratios of G1 and G2 based on R(G). If IRC>0, the robustness of G1 is better than that of G2.

    The improved rate of R(G) (IRR). It describes the average difference in R(G) between two networks before failure. It can reflect the differences in network connectivity when the same number of vertices are attacked.

    (19)
    (20)

    R(G1)j and R(G2)j are denoted as R(G) values of G1 and G2 when vertex j is attacked, respectively. δj is denoted as the improved rate of R(G) when vertex j is attacked. If IRR>0, the robustness of G1 is better than that of G2.

    This experiment compares CNet and NTCNet (no transfer comprehensive transportation network). The core difference between them is the modeling method of hubs. CNet's mode transfer network inside the hub is constructed according to the optimized method. However, NTCNet uses one vertex to represent the hub according to the previous method [26,27], as shown in Figure 12.

    Figure 12.  The modeling difference between CNet and NTCNet.

    Table 5 shows that, compared with NTCNet, CNet can delay the critical point of network failure and this phenomenon is more significant under the calculated attack. Overall, the failure is delayed by an average of 2.79% under the four attack strategies. This shows that the transfer network inside the hub can improve the robustness of the network. Figure 13 shows that η(R(G)) of the two networks change synchronously at the beginning of the attack (0–500). Then, the gap of η(R(G)) experiences a process of first enlarging and then narrowing. Overall, under the four attack strategies, the average IRR is 52.95%. This indicates that under the same attack intensity, CNet can better maintain the network connectivity, which is 52.95% higher than NTCNet. The improvement is most significant in CARS, where IRR reaches 114.46%.

    Table 5.  IRC and IRR between CNet and NTCNet.
    Attack mode RA CAR CAUD CARS
    CRR1(CNet)/% 59.83 75.76 30.91 27.91 Average IRC and IRR of four attack strategies
    CRR2(NTCNet)/% 58.13 74.11 29.74 27.34
    IRC/% 2.92 2.22 3.95 2.07 2.79%
    IRR/% 42.53 19.28 35.51 114.46 52.95%

     | Show Table
    DownLoad: CSV
    Figure 13.  The robustness comparison between CNet and NTCNet.

    The result indicates that CNet can more fully reflect the robustness of real networks than NTCNet. In addition, it also suggests that we should give more attention to the streamline design inside the hub, especially the physical separation design for the transfer between different directions. The separated transfer channel may reduce the probability of network damage. For example, for the security needs of major events such as the Olympic Games or the National People's Congress, travelers need to be checked. If the separation design is not made, all passengers' transfer channels must be blocked during screening so that the whole hub is paralyzed. If a separate design is made, only part of the transfer channel needs to be blocked and others still run. In this way, the harmful impact on the network is reduced, and robustness is improved.

    This experiment compares NTCNet and NCCNet (no connected comprehensive transportation network). The core difference between them is the modeling method of the connecting road outside the hub. In NTCNet, the hub is connected to the high-grade urban road by connecting section, but the hub is connected to the same road directly in NCCNet according to the previous method [26,28], as shown in Figure 14.

    Figure 14.  The modeling difference between NTCNet and NCCNet.

    Table 6 shows that, compared with NCCNet, NTCNet can delay the failure and the average IRC under the four attack strategies is 2.44%. The delay is most significant under CARS, with IRC reaching 4.94%. It is slightly different from the comparative combination of CNet and NTCNet. However, the IRR under RA is the lowest among all attack strategies, which is only 2.70%. It can be seen from Figure 15 that the η(R(G)) curves of NTCNet and NCCNet under RA are close and the maximum δj is only 0.8475, far lower than that of other attack strategies. It indicates that the robustness of NTCNet and NCCNet is close under RA. But under calculated attacks, things are different. The average IRR of the three calculated attacks is 42.49%, much higher than that of RA. Overall, the average IRR of all attack strategies is 32.54%. It indicates that, compared with NCCNet, NTCNet is more capable of maintaining network connectivity under attack, especially under calculated attack. In addition, since CNet is more robust than NTCNet, we can assume that CNet is much more robust than NCCNet.

    Table 6.  IRC and IRR between NTCNet and NCCNet.
    Attack mode RA CAR CAUD CARS
    CRR1(NTCNet) /% 58.13 74.08 29.74 27.34 Average IRC and IRR of four attack strategies
    CRR2(NCCNet) /% 56.31 73.42 29.55 26.05
    IRC/% 3.27 0.90 0.66 4.94 2.44%
    IRR/% 2.70 85.55 13.89 28.02 32.54%

     | Show Table
    DownLoad: CSV
    Figure 15.  The robustness comparison between NTCNet and NCCNet.

    The result shows that CNet can best reflect the robustness of the real network, compared with NCCNet and NTCNet. It also shows that in modeling comprehensive transportation networks, it is necessary to express different networks and consider the connection between them. The connection order of different grades of roads should not be ignored either. The result also reveals that when constructing a hub, it is necessary to avoid the direct connection between the high-grade roads and the hubs, or it will affect traffic organization and diversion management.

    This experiment compares NCCNet and POCNet (partially optimized comprehensive network). POCNet means that only some hubs in NCCNet are optimized. Optimization refers to the construction of a mode transfer network inside the hub and the use of the connecting road outside the hub, as shown in Figure 16. Compared with CNet, NCCNet and NTCNet, POCNet has stronger practical significance. In reality, resources are limited and it is usually difficult to optimize all hubs. When the number of optimized hubs is different, how will the robustness of the network be influenced? This experiment will answer this question.

    Figure 16.  The modeling difference between the optimized and unoptimized hub.

    In this experiment, POCNet is obtained by randomly optimizing different proportions of hubs in NCCNet. For 211 hub nodes in NCCNet, we design 10 groups of experiments. In each group, the proportion of optimized hubs is α, α=10%,20%,,100%. To eliminate the uncertainty caused by random selection, 10 parallel experiments are conducted for each group. In each parallel experiment, a hub with a random proportion of α was selected for optimization. The average value of IRC and IRR of 10 parallel experiments was calculated as the result of this group. It is worth noting that POCNet and CNet are the same when α=100%.

    Table 7 and Figure 17 shows that for different α, the values of IRC and IRR are positive under the four attack modes. With the increase in α, IRR shows a steadily increasing trend from 17.05% to 114.56%. At the same time, IRC fluctuates between 1.78 and 3.87%. However, for different types of attack, IRC and IRR behave differently. Under CAR, CAUD and CARS, IRC and IRR gradually increase with increasing α. However, under RA, IRC shows great fluctuations, even less than zero and IRR fluctuates by approximately 30%. This fluctuation can be more intuitively illustrated in Figure 18. The curves in Figure 18(a) show irregular fluctuations with different α. For example, when α=90%, the curve fluctuates wildly between 0–180%. In Figure 18(b)(d), the curve presents a consistent fluctuation rule and the larger α is, the larger the value represented by the curve.

    Table 7.  IRC and IRR between POCNet and CNet.
    α POCNet RA CAR CAUD CARS Average values of four attacks
    CRR/% IRC/% IRR/% CRR/% IRC/% IRR/% CRR/% IRC/% IRR/% CRR/% IRC/% IRR/% IRC /% IRR /%
    NCCNet 56.31 0 0 73.44 0 0 29.55 0 0 26.06 0 0 0 0
    10% 58.99 4.76 23.54 73.77 0.45 14.87 29.67 0.40 3.08 26.45 1.49 26.71 1.78 17.05
    20% 60.55 7.54 30.86 73.81 0.50 16.75 29.95 1.36 9.44 26.70 2.46 40.89 2.96 24.48
    30% 58.02 3.05 22.67 74.31 1.18 32.19 30.11 1.88 13.18 26.54 1.84 39.56 1.99 26.90
    40% 58.84 4.50 40.67 74.53 1.48 35.98 30.20 2.19 21.57 26.36 1.14 71.27 2.33 42.37
    50% 58.60 4.07 38.17 74.67 1.67 56.70 30.35 2.69 26.03 26.77 2.71 79.49 2.78 50.10
    60% 55.22 -1.93 26.87 74.97 2.08 68.72 30.69 3.85 39.52 27.02 3.68 115.59 1.92 62.68
    70% 57.91 2.84 32.92 75.35 2.61 88.61 30.63 3.64 41.32 27.08 3.91 151.08 3.25 78.48
    80% 55.79 -0.92 31.25 75.31 2.54 96.13 30.78 4.14 47.96 26.77 2.73 162.62 2.12 84.49
    90% 56.15 -0.28 38.40 76.27 3.85 126.77 31.09 5.20 63.61 26.77 2.73 169.57 2.88 99.59
    100% (CNet) 59.83 6.25 42.45 76.26 3.84 146.72 31.12 5.29 73.77 28.09 7.79 195.30 3.87 114.56

     | Show Table
    DownLoad: CSV
    Figure 17.  Changes in IRC and IRR with different α.
    Figure 18.  Change of δj with different α.

    The results show that POCNet is more robust than NCCNet overall. This robustness enhancement is more significant under calculated attacks but less significant under random attacks. Under a calculated attack, the robustness of POCNet increases with increasing α, but under a random attack, the robustness of POCNet fluctuates at a lower level.

    From a practical point of view, optimized hubs can effectively resist the risks brought by calculated attacks and the more optimized hubs there are, the stronger the robustness. However, the improvement effect of such optimization on robustness under random attacks is not significant.

    This experiment compares HNet and NRHNet (no ramp highway network). The core difference between them is the modeling method of EEE. In HNet, the EEE is represented by three vertices and two edges according to the optimized method but by only one vertex in NRHNet according to the previous method [64], as shown in Figure 19.

    Figure 19.  The modeling difference between HNet and NRHNet.

    Table 8 shows under the four attack strategies, the average IRC is 12.34%. It indicates that HNet can withstand more severe attacks than NRHNet. Figure 20 shows the change of η(R(G)) and δj under four attack strategies. Four dash lines in Figure 20(b) represent the average IRR values under each attack strategy. At the beginning of the attack, η(R(G)) of two networks keep changing synchronously. Then, η(R(G)) of HNet is gradually larger than NRHNet and the gap becomes more apparent. Finally, the gap narrows. However, under CAUD the gap of η(R(G)) reaches its peak at the CPR. Overall, the average IRR under the four attack strategies is 265.69%. It indicates that HNet can better maintain network connectivity under the same attack. Therefore, both IRC and IRR indicate that HNet is more robust than NRHNet.

    Table 8.  IRC and IRR between HNet and NRHNet.
    Attack mode RA CAR CAUD CARS
    CPR1(HNet)/% 61.55 78.34 33.40 30.72 Average IRC and IRR of four attack strategies
    CPR2(NRHNet)/% 55.68 71.24 28.85 25.45
    IRC/% 22.10 22.74 16.58 11.84 12.34%
    IRR/% 135.73 739.49 142.93 44.61 265.69%

     | Show Table
    DownLoad: CSV
    Figure 20.  The robustness comparison between HNet and NRHNet.

    The reason is that EEE in NRHNet is represented as a vertex with a degree value of 4 or higher. Compared with HNet, NRHNet has fewer vertices but more high-degree vertices. When the same number of vertices is attacked, the high-degree vertices in NRHNet are more likely to be destroyed, which damages the network structure.

    The result indicates that the modeling optimization method for EEE is more valuable than the previous method. On the one hand, the previous method underestimates the robustness of HNet, but the optimized method can illustrate it well. On the other hand, the stronger robustness of HNet verifies the rationality of ramp construction in reality and demonstrates the vital role of ramps in highway network modeling.

    The comprehensive transportation network improves commuting efficiency and promotes economic development. A comprehensive transportation network design often considers travel behavior and local geological features. Therefore, it is naturally of great importance to explore the structural characteristics of a multimodal comprehensive transportation network. In this paper, five networks are modeled using an optimized modeling method and taking Jiangsu Province as an example case. In particular, CNet focuses on the mode transfer process at the transit hub. Then, some characteristics are explored.

    For statistical characteristics, we find that CNet, HNet, RNet and NNet are not scale-free networks and do not have small-world properties, but ANet is the opposite. Although HNet is the main component of CNet from the numerical view of vertex and edge, the CNet's average distance is shorter and the cluster degree is higher than HNet. It shows that CNet is tighter. In addition, there is another interesting finding that the vertex with a degree of three occupies a high ratio.

    For robustness characteristics, we find that the robustness is different under different attack strategies, but CNet is more robust than the other four single-mode networks regardless of the attack strategy. Under RA, the five networks are all robust. However, their capabilities against failure are different during the attack process. Under CAR, they are all robust. HNet and CNet are more robust due to the city effect. Under CAUD and CARS, they are not sufficiently robust.

    For the influence on robustness and the validity of the optimized modeling method, we find that all three optimized methods for hubs and EEE can enhance network robustness compared with the other modeling methods. The average critical rate of network failure (IRC) is delayed by 12.34, 2.79 and 2.44% and the average connectivity degree (IRR) of the network is increased by 265.69, 52.95 and 32.54%. In addition, the more hubs that are optimized, the stronger the overall robustness of the network. This trend is even more pronounced under calculated attacks. This reveals that the hub and EEE are essential in the comprehensive transportation network. Hubs and EEE with powerful transfer capabilities can improve robustness.

    From the research results, we would like to offer some suggestions to CNet from the planning, construction and management points of view. In the planning stage, more transit hubs should be designed to enhance the scale-free and small-world properties of CNet. More hubs can make the network tighter, which can shorten the travel space distance and provide more paths for the traveler. In the construction stage, a transit hub with powerful transfer facilities is recommended. For example, the transfer channel with a physical separation design between different directions is better than the mixed channel. This design not only makes the transfer faster but also greatly improves the robustness of CNet. Under a special background, the design can maintain the smooth operation of the system and minimize losses. For instance, passengers from certain directions are not allowed to transfer at the hub during events such as the Olympic Games. At this time, only a part of the transfer channels is restricted instead of all channels being closed. In the management stage, a more sophisticated modeling method should be considered when evaluating the robustness of CNet. If EEE and the hub are not modeled factually and elaborately, the robustness of the real transportation system may be underestimated, which is not conducive to accurate evaluation results. Our modeling method provides an effective solution and it is well demonstrated.

    However, there are still shortcomings in this article. This article only analyzes the infrastructure network. In addition, the robustness analysis remains at the static level and does not consider the capacity of vertices and edges. Future research on operation and weighted comprehensive transportation networks can be carried out.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    This research is supported by the key project of National Natural Science Foundation of China (51878166) and "Zhishan" Scholars Programs of Southeast University.

    The authors declare there is no conflict of interest.



    [1] S. Banach, Sur les opérations dans les ensembles abstraits et leur application aux équations intégrales, Fund. Math., 3 (1922), 133–181. http://dx.doi.org/10.4064/fm-3-1-133-181 doi: 10.4064/fm-3-1-133-181
    [2] V. Berinde, M. Păcurar, Approximating fixed points of enriched contractions in Banach spaces, J. Fixed Point Theory Appl., 22 (2020), 38. http://dx.doi.org/10.1007/s11784-020-0769-9 doi: 10.1007/s11784-020-0769-9
    [3] L. Chen, C. Li, R. Kaczmarek, Y. Zhao, Several fixed point theorems in convex b-metric spaces and applications, Mathematics, 8 (2020), 242. http://dx.doi.org/10.3390/math8020242 doi: 10.3390/math8020242
    [4] M. Geraghty, On contractive mappings, Proc. Amer. Math. Soc., 40 (1973), 604–608. http://dx.doi.org/10.1090/S0002-9939-1973-0334176-5
    [5] E. Karapinar, On best proximity point of φGeraghty contractions, Fixed Point Theory Appl., 2013 (2013), 200. http://dx.doi.org/10.1186/1687-1812-2013-200 doi: 10.1186/1687-1812-2013-200
    [6] D. Ji, Y. Yu, C. Li, Fixed point and endpoint theorems of multivalued mappings in convex b-metric spaces with an application, AIMS Mathematics, 9 (2024), 7589–7609. http://dx.doi.org/10.3934/math.2024368 doi: 10.3934/math.2024368
    [7] M. Edelstein, On fixed and periodic points under contractive mappings, J. Lond. Math. Soc., s1-37 (1962), 74–79. http://dx.doi.org/10.1112/jlms/s1-37.1.74 doi: 10.1112/jlms/s1-37.1.74
    [8] T. Suzuki, A new type of fixed point theorem in metric spaces, Nonlinear Anal.-Theor., 71 (2009), 5313–5317. http://dx.doi.org/10.1016/j.na.2009.04.017 doi: 10.1016/j.na.2009.04.017
    [9] R. Kannan, Some results on fixed points, Bull. Cal. Math. Soc., 60 (1968), 71–76.
    [10] R. Kannan, Some results on fixed points-II, American Mathematical Monthly, 76 (1969), 405–408. http://dx.doi.org/10.1080/00029890.1969.12000228 doi: 10.1080/00029890.1969.12000228
    [11] P. Subrahmanyam, Completeness and fixed-points, Monatsh Math., 80 (1975), 325–330. http://dx.doi.org/10.1007/BF01472580 doi: 10.1007/BF01472580
    [12] B. Fisher, A fixed point theorem for compact metric spaces, Publ. Math. Debrecen, 25 (1978), 193–194.
    [13] V. Berinde, M. Păcurar, Kannan's fixed point approximation for solving split feasibility and variational inequality problems, J. Comput. Appl. Math., 386 (2021), 113217. http://dx.doi.org/10.1016/j.cam.2020.113217 doi: 10.1016/j.cam.2020.113217
    [14] W. Takahashi, A convexity in metric space and nonexpansive mappings, Kodai Math. Sem. Rep., 22 (1970), 142–149. http://dx.doi.org/10.2996/kmj/1138846111 doi: 10.2996/kmj/1138846111
    [15] M. Choban, About convex structures on metric spaces, Carpathian J. Math., 38 (2022), 391–404. http://dx.doi.org/10.37193/CJM.2022.02.10 doi: 10.37193/CJM.2022.02.10
    [16] S. Khan, M. Abbas, Common fixed point results with applications in convex metric spaces, Journal of Concrete and Applicable Mathematics, 10 (2012), 65–76.
    [17] V. Berinde, M. Păcurar, Existence and approximation of fixed points of enriched contractions and enriched φ-contractions, Symmetry, 13 (2021), 498. http://dx.doi.org/10.3390/sym13030498 doi: 10.3390/sym13030498
    [18] J. Górnicki, Various extensions of Kannan's fixed point theorem, J. Fixed Point Theory Appl., 20 (2018), 20. http://dx.doi.org/10.1007/s11784-018-0500-2 doi: 10.1007/s11784-018-0500-2
    [19] H. Garai, K. Dey, T. Senapati, On Kannan-type contractive mappings, Numer. Func. Anal. Opt., 39 (2018), 1466–1476. http://dx.doi.org/10.1080/01630563.2018.1485157 doi: 10.1080/01630563.2018.1485157
    [20] K. Roya, S. Panjab, M. Sahab, R. Bishtc, On fixed points of generalized Kannan and Reich type contractive mappings, Filomat, 37 (2023), 9079–9087. http://dx.doi.org/10.2298/FIL2326079R doi: 10.2298/FIL2326079R
  • This article has been cited by:

    1. Yuhang Liu, Jun Chen, Yuchen Wang, Wei Wang, Interpretable machine learning models for detecting fine-grained transport modes by multi-source data, 2023, 31, 2688-1594, 6844, 10.3934/era.2023346
    2. Jialiang Xiao, Yongtao Zheng, Wei Wang, Xuedong Hua, Robustness analysis of a multimodal comprehensive transportation network from the perspectives of infrastructure and operation: A case study, 2025, 33, 2688-1594, 1902, 10.3934/era.2025086
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(970) PDF downloads(79) Cited by(1)

Article outline

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog