<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Using Graph Model to Analyze the Topological Vulnerability of Transport Infrastructure</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Maxim Anop?</string-name>
          <email>manop@iacp.dvo.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Automation and Control Processes FEB RAS</institution>
          ,
          <addr-line>Vladivostok</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <fpage>358</fpage>
      <lpage>366</lpage>
      <abstract>
        <p>Given the ubiquitous nature of infrastructure networks in today's society, there is a global need to understand, quantify, and plan for the resilience of these networks to disruptions. With the development of transport infrastructure, vulnerability analysis is a core process of man-made systems safety management. The main purpose of the paper is to identify the critical road sections and intersections in a road network which have great in uence on the normal functionality of the urban territory. In this paper the structure (topology) of highway network of Vladivostok city in Russia was investigated and analyzed based on the graph theory. The network model of the road system was constructed using Open Street Map data.</p>
      </abstract>
      <kwd-group>
        <kwd>vulnerability</kwd>
        <kwd>complex networks</kwd>
        <kwd>topology</kwd>
        <kwd>transport infrastructure</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>The quality of life of people in the present time is largely determined by the state of
development of the technosphere. Modern society relies upon the collection of systems
and institutions known as the infrastructure to support the welfare and living standard
of people. A downside of this dependency is that sudden failures and disruptions in the
systems may cause severe strains on the society.</p>
      <p>With the development of economies more and more people living in cities, tra c
congestion has become a very serious problem in many large cities of the world. Road
network disruptions can threaten the possibility for people to receive medical care
and other critical services. More generally, they impair people's accessibility to daily
activities such as commuting to work and doing the shopping. Furthermore, there may
be large costs associated with remedies and restoration of the transport system to a
fully operational state.</p>
      <p>Due to a number of catastrophic events, vulnerability analysis has been an area
of increasing interest and research since the mid 1990's. There have been a number
of major events that have disrupted transport networks around the world, but there
are also everyday events that can cause disturbances such as accidents, road works
or vehicle breakdowns. Disruptions can be caused by a wide range of events, some of
? This work was supported in part by the FEB RAS Project No. 15-I-4-007 (0262-2015-0063)
Copyright c by the paper's authors. Copying permitted for private and academic purposes.
In: A. Kononov et al. (eds.): DOOR 2016, Vladivostok, Russia, published at http://ceur-ws.org
which originate within the transport system, including tra c accidents and technical
failures. Other events are external strains imposed on the system, often caused by
nature, as with oods, landslides, heavy snowfall, storms, wild res, earthquakes, etc.
While accidents and technical failures may have limited extents, disruptions caused by
nature may cover large areas in the road network.</p>
      <p>
        Vulnerability is a generalized conception. There are a lot of di erent de nitions of
vulnerability. Vulnerability is usually portrayed in negative terms as the susceptibility
to be harmed. It is degree to which a systemic susceptible to and is unable to cope with
adverse e ects. The concept of transport infrastructure (road network) vulnerability
is not uniform so far [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. According to the study [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], road network vulnerability is a
sensitivity coe cient that is easily a ected by accidents and nally makes the service
level decline sharply. The service level of a road network describes the probability
of the road being connected or used at a certain time. According to Tuyinfei from
Tongji University, the networks inability to withstand abnormal events is one of the
vital causes of signi cant losses, and this is one of the properties of a road network
that can constitute road network vulnerability [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Husdals view is that road network
vulnerability describes the non-functioning of a network under certain conditions.
      </p>
      <p>One important observation giving rise to the broader studies of the topology of
networks is that \the structure a ects function". In other words, there exists a large
extent of interactions between network structure and its dynamics, which makes the
study of the network topology crucial. In particular, this is true in the case of
technological and physical networks where system topology is formed to support certain
activities towards operational and service objectives. Subsequently, any change in the
network topology will have consequences in terms of system operation and its ability
to function.</p>
      <p>
        According to the former researches, the concept of road network vulnerability is to
emphasize the loss or e ect after the network has been attacked by an accident [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        Road network vulnerability analysis can be de ned as the study of potential
degradations of the road transport system and their impacts on society, modelling the road
infrastructure as a network with links (road segments) and nodes (intersections) [
        <xref ref-type="bibr" rid="ref2 ref5">2, 5</xref>
        ].
Using the Swedish road network as a case study, Jenelius found that the importance
of regional road network is largely determined by the road network structure and the
average tra c load in the region, whereas the exposure of regional road network is
largely determined by the network structure and the average user travel time [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The
study shows that the long-term vulnerability disparities stem from the fundamental
properties of the road system and the population densities. Therefore, di erent road
connections have a great impact on the network vulnerability, and research on the
structural vulnerability of road network is very necessary. If we can nd the road
network vulnerability from the road network structure, then network structure can be
optimized to reduce the road network vulnerability.
      </p>
      <p>The main purpose of road network vulnerability assessment is to nd the weak
element, in other words, to nd the key point of the whole network where the loss is
the most signi cant when the same level of attack is su ered. In this paper, we propose
the method to evaluate the vulnerability of the network with respect to the loss of a
road link, e.g. due to a car accident, road work or other jamming occurrences.</p>
      <p>
        The recent advances in the eld of complex networks [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ] reveal its promising
potential to investigate road networks vulnerability at the systems level from a topological
perspective. In graph and complex networks theories, a number of measures have been
proposed to characterize networks. Basic characteristics of the transport infrastructure
can be applied to assess the vulnerability of the network according to complex network
theory. Complex network is an abstraction of real large complicated system, which can
depict internal various interaction and relationship in complicated system. This theory
has been applied to many real infrastructural networks. Complex network theory with
it's random network model, the small-world model and the scale-free network [9{12] is
ideal for researching the actual networked systems, such as power grid networks [
        <xref ref-type="bibr" rid="ref13 ref2">13,
2</xref>
        ], oil/gas pipeline networks [
        <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
        ], urban metro [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], computer and communication
systems [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Topological vulnerability metrics</title>
      <p>Graph theory is utilized to study the structure vulnerability of road network. Structural
(topological) vulnerability refers to the systems own inherent instability and sensitivity.
Road network is taken as undirected graphs which show the general structure of road
network without considering the actual ow.</p>
      <p>Let us consider a network of roads (hereafter also called links or edges) connecting
a number of locations (hereafter also called nodes or vertices). The topology can be
represented as a graph G = (V; E); V is the set of nodes, E is the set of edges.</p>
      <p>There are several statistical measures commonly used to characterize the structure
of complex networks and its vulnerability:</p>
      <p>between vi; vj 2 V , n is the number of vertices in G.
{ degree centrality CD(v) = deg(v) is de ned as the number of edges connecting with
node v.
{ betweenness centrality (v) =</p>
      <p>P iji(jv) , where ij is the total number of shortest
i6=v6=j
paths from node i to node j and ij (v) is the number of those paths that pass
through v.</p>
      <p>1 P d(vi; vj ), where d(vi; vj ) is the shortest distance
{ average path length lG = n(n 1) i6=j</p>
      <p>From the point of view of the topological characterization of the network, centralities
are typically used to measure the vulnerability of the nodes. Degree tends to describe
the importance of node from the local view, while betweenness tend to describe the
importance of node from the overall view.
2.1</p>
      <sec id="sec-2-1">
        <title>Proposed algorithm for edge vulnerability assessment</title>
        <p>According to our concept of the topological vulnerability, de ned in the introduction
together with nding vulnerable nodes we are also interested in failures on the network
links. Under the topological edge vulnerability of the road network in this paper will
understand the edge weight, de ned as the length of the shortest alternative paths
through the nodes left after removal checked edge. Thus, the higher is the edge weight,
the more vulnerable it is. To access edges vulnerability is proposed an algorithm
consisting of several steps.</p>
        <p>{ Step 1. Finding clusters in the network.
{ Step 2. Selecting the links passing through the clusters.
{ Step 3. The quantitative assessment of the found edges vulnerability.</p>
        <p>
          OpenStreetMap (OSM) project is proposed to use as a cartographic base [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]. The
networkX Python module was implemented to work with network topology. Louvain
method and its realisation on a high-level scripting language Python was used for
clusters detection [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]. Results of this step are shown in gure 1.
        </p>
        <p>The result of Louvain clustering is a list of vertices with labels as clusters numbers.
Therefore, the second step is to traversing the G edge list to nd edges which vertices
belong to di erent clusters.</p>
        <p>To determine the quantitative value of the topological edge vulnerability used
another developed algorithm consisted of ve steps.</p>
        <p>{ Step 1. For all edges set the initial edge weight w equal to +1.
{ Step 2. Remove checked link ejc from the network. Save start vjs and end vje node.
{ Step 3. Find the shortest path through vjs and vje nodes and calculate the length
lse of the route.</p>
        <p>j
{ Step 4. If the path exist then wj = ljse. Restore the ejc edge.</p>
        <p>c
{ Step 5. Go to next ej+1 in the list.</p>
        <p>The result of the algorithm is the list of edges with their weights. Edges with no
alternatives routes have in nity weight. The failures of such links lead to serious
consequences. The implementation of this algorithm was also carried out with the python
and NetworkX module. The shortest path was calculated with Dijkstra's algorithm.
3
3.1</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Case Study</title>
      <sec id="sec-3-1">
        <title>Getting Data from the OpenStreetMap Project</title>
        <p>Today OSM map is the only one map that can be downloaded for free on almost any
device, and the primary source of geodata for organizations that want to save on a
cartography.</p>
        <p>
          More than decade of e orts of numerous volunteers developing the Open Street
Map project[
          <xref ref-type="bibr" rid="ref18">18</xref>
          ], led to a Grand open database map information for the whole of planet
Earth [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ]. OSM XML snapshot of the project database is a complete map of the entire
planet (a Planet.osm [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ]) and in uncompressed form occupies a volume of several
hundred gigabytes. Updated every week and grouped by country and region maps in OSM
XML formats can be downloaded, for example, via the GeoFabrik website [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ]. There
are several utilities that can convert osm xml le to shape le or Postgress/PostGIS
[
          <xref ref-type="bibr" rid="ref23">23</xref>
          ] database (osm2shp, osmosis, osm2pgsql, osm2pgrouting, osm2po, osm4routing).
But some of them are suitable only for rendering purpose and during the
convertation lose topological information and some of them di cult to con gure. With the
prospect of development was developed a program converts the osm xml le in to the
SQLite/Spatialite [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ] database with TRANSIMS network format [25{27].
3.2
        </p>
        <p>Topological Vulnerability of Vladivostok city highway network
Developed algorithms and programs were applied for construction the network of
Vladivostok city in Russia. To obtain Vladivostok city transport network we download OSM
XML le with Primorsky region map and prune it with osmosis program and POLY
le that describes the city boundaries. The resulting Vladivostok OSM- le contains 132
552 node (node osm) and 7 818 lines (osm way). After the application of the developed
program the topology of the Vladivostok city highway network as graph G was built.
The network consist of jV j = 10480 nodes and jEj = 12574 edges.</p>
        <p>Figure 2 illustrates a degree distribution of the nodes.</p>
        <p>Figure 3 illustrates a scaled to size numerical values of the betweenness centrality
nodes measure.</p>
        <p>Interestingly, such nodes degree distribution is typical for natural structures like
cracks on the earth surface or blood vessels. This suggests that the Vladivostok city
topology formed in random way.</p>
        <p>Betweenness centrality re ects the extent to which a node lies in between pairs or
groups of other nodes of the graph. This can be also stated as the extent to which a
node is an intermediate in communication over the network. Based on a priori knowing
of the special features of the transport streams and problem zones of the Vladivostok
city can be said that only a part of the results obtained by the evaluation in line with
the real situation. Therefore, the task of developing new assessment remains valid and
important.</p>
        <p>The result of this algorithm is more consistent with expert assessment. It was found
the central streets of the city and major transport interchanges. However, the resulting
score is still far from perfect.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Conclusions</title>
      <p>On the basis of network vulnerability research, the highway road network could be
better planned and constructed, the network topology could be optimized and the
most important nodes and links should be pay more attention to protect and operate.
Complex network theory and graph theory are adopted to analyse and calculate the
topological vulnerability of road network in Vladivostok city. To work with highway
network as graph it was developed an information-computational system that allows to
import data from OSM project in the spatial database and export it to graph edge list.
On the process of vulnerability analysis and calculation, singly based on single metric
is not accurate enough. Therefore, the problem of new structural vulnerability metrics
developing is still important and up-to-date.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Yang</surname>
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Qian</surname>
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Vulnerability Analysis of Road Networks</article-title>
          .
          <source>Journal of Transportation Systems Engineering and Information Technology</source>
          ,
          <volume>12</volume>
          ,
          <fpage>105</fpage>
          -
          <lpage>110</lpage>
          , (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Berdica</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>An introduction to road vulnerability: what has been done, is done and should be done</article-title>
          .
          <source>Transport Policy</source>
          ,
          <volume>9</volume>
          ,
          <fpage>117</fpage>
          -
          <lpage>127</lpage>
          , (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Tu</surname>
            <given-names>Y.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen</surname>
            <given-names>X.H.</given-names>
          </string-name>
          :
          <article-title>Analysis of road network topology vulnerability and critical links</article-title>
          .
          <source>Journal of Tongji University</source>
          ,
          <volume>3</volume>
          ,
          <fpage>264</fpage>
          -
          <lpage>267</lpage>
          , (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Husdal</surname>
            <given-names>J.</given-names>
          </string-name>
          :
          <article-title>Reliability and vulnerability versus cost and bene ts</article-title>
          .
          <source>In 2nd International Symposium on Transportation Network Reliability</source>
          , pp.
          <fpage>180</fpage>
          -
          <lpage>186</lpage>
          . Queenstown and Christchurch, New Zealand, (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Deste</surname>
            <given-names>G.</given-names>
          </string-name>
          , Taylor M.:
          <string-name>
            <given-names>Network</given-names>
            <surname>Vulnerability</surname>
          </string-name>
          .
          <source>The Network Reliability of Transport</source>
          ,
          <fpage>23</fpage>
          -
          <lpage>44</lpage>
          , (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Jenelius</surname>
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petersen</surname>
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mattsson L</surname>
          </string-name>
          .-G.:
          <article-title>Importance and exposure in road network vulnerability analysis</article-title>
          .
          <source>Transportation Research Part A: Policy and Practice</source>
          ,
          <volume>40</volume>
          ,
          <fpage>537</fpage>
          -
          <lpage>560</lpage>
          , (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Barabasi</surname>
            <given-names>A. L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Albert</surname>
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Emergence of scaling in random networks</article-title>
          .
          <source>Science</source>
          ,
          <volume>286</volume>
          ,
          <fpage>509512</fpage>
          , (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Watts</surname>
            <given-names>D. J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Strogatz</surname>
            <given-names>S. H.</given-names>
          </string-name>
          :
          <article-title>Collective dynamics of small-world networks</article-title>
          .
          <source>Nature</source>
          ,
          <volume>393</volume>
          ,
          <fpage>440442</fpage>
          , (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Chen H.-H.</surname>
          </string-name>
          ,
          <string-name>
            <surname>Lin</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <string-name>
            <surname>-M.:</surname>
          </string-name>
          <article-title>Complex Network Characteristics and Invulnerability Simulating Analysis of Supply Chain</article-title>
          .
          <source>Journal of Networks</source>
          ,
          <volume>7</volume>
          ,
          <fpage>591</fpage>
          -
          <lpage>597</lpage>
          , (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Habib M. T.</surname>
          </string-name>
          ,
          <string-name>
            <surname>Rokonuzzaman</surname>
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Distinguishing Feature Selection for Fabric Defect Classi cation</article-title>
          .
          <source>Using Neural Network. Journal of Multimedia</source>
          ,
          <volume>6</volume>
          ,
          <fpage>416</fpage>
          -
          <lpage>424</lpage>
          , (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. Zhang F.,
          <string-name>
            <surname>Liu</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zuo</surname>
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Evolution Modeling of Complex Network Dynamics</article-title>
          .
          <source>Journal of Networks</source>
          ,
          <volume>7</volume>
          ,
          <fpage>554</fpage>
          -
          <lpage>561</lpage>
          , (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Zhang</surname>
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen</surname>
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Huang</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bao</surname>
            <given-names>H.</given-names>
          </string-name>
          :
          <article-title>CRBA: A Capacity Restricted Model Evolved from BA Model for Complex Network</article-title>
          .
          <source>Journal of Networks</source>
          ,
          <volume>6</volume>
          ,
          <fpage>1163</fpage>
          -
          <lpage>1170</lpage>
          , (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Winkler</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dueas-Osorio</surname>
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stein</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Subramanian</surname>
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Performance assessment of topologically diverse power systems subjected to hurricane events</article-title>
          .
          <source>Reliability Engineering &amp; System Safety</source>
          ,
          <volume>95</volume>
          ,
          <fpage>323</fpage>
          -
          <lpage>336</lpage>
          , (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Carvalho</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Buzna</surname>
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bono</surname>
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gutirrez</surname>
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Just</surname>
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Arrowsmith</surname>
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Robustness of trans-European gas networks</article-title>
          .
          <source>Physical Review</source>
          ,
          <volume>80</volume>
          ,
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          , (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Aven</surname>
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Some considerations on reliability theory and its applications</article-title>
          .
          <source>Reliability Engineering &amp; System Safety</source>
          ,
          <volume>21</volume>
          ,
          <fpage>215</fpage>
          -
          <lpage>223</lpage>
          , (
          <year>1988</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Deng</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lu</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yuan</surname>
            <given-names>J</given-names>
          </string-name>
          .:
          <article-title>Topology vulnerability analysis and measure of urban metro network: The case of Nanjing</article-title>
          .
          <source>Journal of Networks</source>
          ,
          <volume>8</volume>
          ,
          <fpage>1350</fpage>
          -
          <lpage>1356</lpage>
          , (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Aggarwal</surname>
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gupta</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Misra</surname>
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>A Simple Method for Reliability Evaluation of a Communication System</article-title>
          .
          <source>IEEE Transactions on Communications, Institute of Electrical &amp; Electronics Engineers (IEEE)</source>
          ,
          <volume>23</volume>
          ,
          <fpage>563</fpage>
          -
          <lpage>566</lpage>
          , (
          <year>1975</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>18. Open street map project, http://www.openstreetmap.org/</mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Blondel</surname>
            <given-names>V. D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guillaume</surname>
            <given-names>J.-L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lambiotte</surname>
            <given-names>R.</given-names>
          </string-name>
          , Lefebvre E.:
          <article-title>Fast unfolding of communities in large networks</article-title>
          .
          <source>J. Stat. Mech.</source>
          ,
          <year>2008</year>
          ,
          <fpage>P10008</fpage>
          , (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>20. Planet osm, http://planet.osm.org/</mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>21. Osm xml, http://wiki.openstreetmap.org/wiki/OSM\_XML</mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <article-title>Openstreetmap data extracts. Geofabriks free download server</article-title>
          , http://download. geofabrik.de/
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <article-title>Postgis is a spatial database extender for postgresql</article-title>
          , http://postgis.net/
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <article-title>SQLite home page</article-title>
          , https://www.sqlite.org/
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <article-title>Transims an open source transportation modeling and simulation toolbox</article-title>
          , https://code. google.com/p/transims/
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Anop</surname>
            <given-names>M.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kravtsov</surname>
            <given-names>E.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nurminski</surname>
            <given-names>E.A.</given-names>
          </string-name>
          :
          <article-title>The Open street map project in TRANSIMS transportation simulation system information science</article-title>
          and
          <source>control systems</source>
          ,
          <volume>47</volume>
          ,
          <fpage>14</fpage>
          -
          <lpage>25</lpage>
          , (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>27. GitHub osm2transims project https://github.com/krondorVL/osm2transims</mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>