Unlock instant, AI-driven research and patent intelligence for your innovation.

A Safety Domain-Based Evaluation Method for Transportation Network Security

A technology of traffic network and safety evaluation, applied in the direction of road vehicle traffic control system, traffic control system, traffic flow detection, etc., can solve the problem of lack of failure probability prediction and preventive control.

Inactive Publication Date: 2017-10-10
TIANJIN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Indicators such as the vulnerability of the traffic network focus on the evaluation of the overall network performance, but lack of research on the prediction of the possibility of failure in some road sections and preventive control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Safety Domain-Based Evaluation Method for Transportation Network Security
  • A Safety Domain-Based Evaluation Method for Transportation Network Security
  • A Safety Domain-Based Evaluation Method for Transportation Network Security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] A traffic network security evaluation method based on security domain, see figure 1 , The traffic network safety evaluation method includes the following steps:

[0030] 101: Calculate the traffic network security domain under the N-1 constraint, and obtain the boundary equations of the traffic network security domain through the traffic network security domain;

[0031] 102: Calculate the safety boundary distance of the remaining road sections after a certain road section is blocked;

[0032] 103: Carry out safety evaluation of the transportation network through the safety boundary distance, and visualize the safety evaluation results.

[0033] Among them, the traffic network security domain is specifically:

[0034] For a traffic network with a certain topology and capacity in the operation process, all road sections meet the N-1 set of safety operating points. The set has a uniquely definite boundary in a multidimensional space. All operating points within the boundary are sa...

Embodiment 2

[0041] The solution in Embodiment 1 will be described in detail below in combination with specific calculation formulas, as detailed below:

[0042] 201: Calculate the traffic network security domain under the N-1 constraint, and obtain the boundary equations of the traffic network security domain through the traffic network security domain;

[0043] Among them, the security domain of the transportation network can be defined as: for the transportation network with a certain topology and capacity in the operation process, all road sections meet the N-1 safety working point set, which has a uniquely determined boundary in a multidimensional space . All working points inside the boundary are safe, and working points outside the boundary are not safe.

[0044] The embodiment of the present invention adopts the following traffic distribution method that takes account of user balance:

[0045]

[0046] Where t A Is the impedance of section A; v ij Is the speed of each section; l ij Is the...

Embodiment 3

[0062] Combine specific calculation examples below, figure 2 with image 3 Perform feasibility verification of the schemes in Examples 1 and 2, as detailed in the following description;

[0063] In the embodiment of the present invention, 1.25 times the capacity (that is, the value of Q is 1.25) is taken as the upper bound, and if the upper bound is exceeded, the road section is considered to be oversaturated.

[0064] A simple example of commonly used Jiugongge topology is used to verify this method. There are a total of 12 road sections in the calculation example, all road sections are two-way four-lane, and the widths of the lanes are equal. The network topology is shown in figure 2 , The parameters are shown in Table 1.

[0065] Table 1 The parameters of the simple example network

[0066]

[0067]

[0068] From Table 1, we can know the length, capacity and shortest path of any road section after congestion. For example, the length of section (1,2) is 20km, the capacity is 2417...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security domain-based traffic network security evaluation method. The traffic network security evaluation method is based on an N-1 security domain. The security domain-based traffic network security evaluation method includes the following steps that: a traffic network security domain under N-1 constraints is calculated, and a traffic network security domain boundary equation set is obtained through the traffic network security domain; after a certain road section is congested, the security boundary distances of the other road sections are calculated; and security evaluation is performed on a traffic network according to the security boundary distances, and a security evaluation result is visualized. With the security domain-based traffic network security evaluation method of the invention adopted, only a topological structure, flow and vehicle speed are required so as to describe the stability of an urban road network; the plus or minus of the security boundary distances describe whether the road network can operate stably when road sections are congested, so that whether a work point is secure or not can be judged; and the numerical values of the security boundary distances can quantitatively represent the stability of the road network.

Description

Technical field [0001] The invention relates to the field of transportation networks. The invention applies the safety domain of the distribution network to the transportation network across disciplines, and in particular relates to a safety domain-based transportation network safety evaluation method. Background technique [0002] The transportation network needs to be able to withstand traffic operation, traffic environment and social public events [1] . The ability of the transportation network to maintain stable operation when the service capacity is severely reduced is defined as the vulnerability of the transportation network, which emphasizes the loss or impact caused by random events or intentional attacks on the transportation network [2] . Incidents here include harsh environments and natural conditions, sudden public incidents, and daily traffic accidents [3] . Vulnerability is a new hot and difficult issue in transportation network research. Reasonable consideration...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G08G1/01G06Q10/06
CPCG06Q10/0639G08G1/0133
Inventor 肖峻龙梦皓王成山
Owner TIANJIN UNIV