A Safety Domain-Based Evaluation Method for Transportation Network Security
A technology of traffic network and safety evaluation, applied in the direction of road vehicle traffic control system, traffic control system, traffic flow detection, etc., can solve the problem of lack of failure probability prediction and preventive control.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0029] A traffic network security evaluation method based on security domain, see figure 1 , The traffic network safety evaluation method includes the following steps:
[0030] 101: Calculate the traffic network security domain under the N-1 constraint, and obtain the boundary equations of the traffic network security domain through the traffic network security domain;
[0031] 102: Calculate the safety boundary distance of the remaining road sections after a certain road section is blocked;
[0032] 103: Carry out safety evaluation of the transportation network through the safety boundary distance, and visualize the safety evaluation results.
[0033] Among them, the traffic network security domain is specifically:
[0034] For a traffic network with a certain topology and capacity in the operation process, all road sections meet the N-1 set of safety operating points. The set has a uniquely definite boundary in a multidimensional space. All operating points within the boundary are sa...
Embodiment 2
[0041] The solution in Embodiment 1 will be described in detail below in combination with specific calculation formulas, as detailed below:
[0042] 201: Calculate the traffic network security domain under the N-1 constraint, and obtain the boundary equations of the traffic network security domain through the traffic network security domain;
[0043] Among them, the security domain of the transportation network can be defined as: for the transportation network with a certain topology and capacity in the operation process, all road sections meet the N-1 safety working point set, which has a uniquely determined boundary in a multidimensional space . All working points inside the boundary are safe, and working points outside the boundary are not safe.
[0044] The embodiment of the present invention adopts the following traffic distribution method that takes account of user balance:
[0045]
[0046] Where t A Is the impedance of section A; v ij Is the speed of each section; l ij Is the...
Embodiment 3
[0062] Combine specific calculation examples below, figure 2 with image 3 Perform feasibility verification of the schemes in Examples 1 and 2, as detailed in the following description;
[0063] In the embodiment of the present invention, 1.25 times the capacity (that is, the value of Q is 1.25) is taken as the upper bound, and if the upper bound is exceeded, the road section is considered to be oversaturated.
[0064] A simple example of commonly used Jiugongge topology is used to verify this method. There are a total of 12 road sections in the calculation example, all road sections are two-way four-lane, and the widths of the lanes are equal. The network topology is shown in figure 2 , The parameters are shown in Table 1.
[0065] Table 1 The parameters of the simple example network
[0066]
[0067]
[0068] From Table 1, we can know the length, capacity and shortest path of any road section after congestion. For example, the length of section (1,2) is 20km, the capacity is 2417...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


