Security domain-based traffic network security evaluation method

A technology of traffic network and safety evaluation, applied in the direction of road vehicle traffic control system, traffic control system, traffic flow detection, etc., can solve the problem of lack of failure probability prediction and preventive control.

Inactive Publication Date: 2016-04-13
TIANJIN UNIV
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Indicators such as the vulnerability of the traffic network focus on the evaluation of the overall network performance, but lack of research on the prediction of the possibility of failure in some road sections and preventive control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security domain-based traffic network security evaluation method
  • Security domain-based traffic network security evaluation method
  • Security domain-based traffic network security evaluation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] A safety domain-based transportation network security evaluation method, see figure 1 , the transportation network security evaluation method includes the following steps:

[0030] 101: Calculate the transportation network security domain under the N-1 constraint, and obtain the boundary equation group of the transportation network security domain through the transportation network security domain;

[0031] 102: After calculating the blockage of a certain road section, the safety boundary distance of the remaining road sections;

[0032] 103: Carry out safety evaluation on traffic network through safety boundary distance, and visualize safety evaluation results.

[0033] Among them, the transportation network security domain is specifically:

[0034] For a transportation network with a certain topology and capacity during operation, all road sections satisfy the set of N-1 safety operating points, which has a uniquely determined boundary in the multidimensional space,...

Embodiment 2

[0041] The scheme in embodiment 1 is described in detail below in conjunction with specific calculation formula, see below for details:

[0042] 201: Calculate the transportation network security domain under the N-1 constraint, and obtain the boundary equation group of the transportation network security domain through the transportation network security domain;

[0043] Among them, the security domain of the transportation network can be defined as: for the transportation network with a certain topology and capacity in the operation process, all the road sections meet the set of N-1 security working points, and this set has a uniquely determined boundary in the multi-dimensional space . All work points within the boundary are safe, and work points outside the boundary are unsafe.

[0044] The embodiment of the present invention adopts the following flow distribution mode considering user balance:

[0045] t ...

Embodiment 3

[0062] Combined with specific calculation examples, figure 2 and image 3 Carry out feasibility verification to the scheme in embodiment 1 and 2, see the following description for details;

[0063] In the embodiment of the present invention, 1.25 times the capacity (that is, the value of Q is 1.25) is taken as the upper limit, and if the upper limit is exceeded, the road section is regarded as oversaturated.

[0064] A simple example of commonly used Jiugongge topology is used to verify the method. There are 12 road sections in the calculation example, all road sections are two-way four-lane, and the width of the lanes is equal. The network topology is shown in figure 2 , the parameters are shown in Table 1.

[0065] Table 1 The parameters of the simple example network

[0066]

[0067]

[0068] From Table 1, we can know the length, capacity and the shortest path after congestion of any road section. For example, the length of road section (1,2) is 20km, the capac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security domain-based traffic network security evaluation method. The traffic network security evaluation method is based on an N-1 security domain. The security domain-based traffic network security evaluation method includes the following steps that: a traffic network security domain under N-1 constraints is calculated, and a traffic network security domain boundary equation set is obtained through the traffic network security domain; after a certain road section is congested, the security boundary distances of the other road sections are calculated; and security evaluation is performed on a traffic network according to the security boundary distances, and a security evaluation result is visualized. With the security domain-based traffic network security evaluation method of the invention adopted, only a topological structure, flow and vehicle speed are required so as to describe the stability of an urban road network; the plus or minus of the security boundary distances describe whether the road network can operate stably when road sections are congested, so that whether a work point is secure or not can be judged; and the numerical values of the security boundary distances can quantitatively represent the stability of the road network.

Description

technical field [0001] The invention relates to the field of traffic network, and the invention applies the distribution network security domain interdisciplinaryly to the traffic network, and in particular relates to a traffic network security evaluation method based on the security domain. Background technique [0002] The transportation network needs to be able to withstand traffic operation, traffic environment and social public events [1] . The characteristics of whether the transportation network can maintain stable operation when the service capacity is severely reduced is defined as the vulnerability of the transportation network, which emphasizes the loss or impact of random events or intentional attacks on the transportation network [2] . The events here include harsh environment and natural conditions, sudden public events, daily traffic accidents [3] . Vulnerability is a new hot and difficult issue in traffic network research. Reasonable consideration of vul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G08G1/01G06Q10/06
CPCG06Q10/0639G08G1/0133
Inventor 肖峻龙梦皓王成山
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products