Safety evaluation method of shield approaching existing tunnels based on data mining and data fusion

An existing tunnel and safety evaluation technology, applied in data processing applications, instruments, calculations, etc., can solve the problems of less safety evaluation and early warning, unrecognized safety hazards, and separation

Active Publication Date: 2021-09-10
HUAZHONG UNIV OF SCI & TECH
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of these studies mainly focus on analyzing the deformation of existing tunnels through numerical simulation and model tests. They are often modeled and analyzed under simplified assumptions, and they do not take into account the ambiguity and Uncertainty, there is a certain degree of error and deviation from the actual engineering situation
At present, there are very few studies on the systematic safety evaluation and early warning of tunnel construction safety issues from the perspective of risk assessment, and the analysis methods are still stuck in the traditional AHP and fuzzy comprehensive evaluation methods.
Among them, the analytic hierarchy process mainly uses the method of pairwise comparison to determine the relative importance of each element, and solves the eigenvector of the judgment matrix to determine the weight of each element, and does not consider the fuzzy and uncertain information of the system; Although the fuzzy comprehensive evaluation method can quantitatively evaluate fuzzy evaluation objects, its calculation is complicated, and the determination of index weight is more subjective.
Although these studies have taken into account the comprehensive effects of multi-source risk factors to a certain extent, the mining of data information is still not sufficient and objective for shield tunneling under the existing tunnel system that integrates fuzzy, random and uncertain information. , so that the safety hazards in the construction process cannot be identified, and it is difficult to achieve better safety risk decision-making and control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety evaluation method of shield approaching existing tunnels based on data mining and data fusion
  • Safety evaluation method of shield approaching existing tunnels based on data mining and data fusion
  • Safety evaluation method of shield approaching existing tunnels based on data mining and data fusion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0131] like figure 1 As shown, the present invention proposes a method based on fuzzy Bayesian and evidence theory based on data mining and data fusion shield approaching the existing tunnel safety evaluation method, which mainly includes the following steps:

[0132] 1. Bayesian network construction

[0133] (1) Node state division

[0134] Combined with the grade division of the security risk of the existing tunnel passing under the shield, each node in the Bayesian network is divided into five states of 1, 2, 3, 4, and 5, so that it can be compared with the security risk level status ( Ⅰ), Safer (II), General (Ⅲ), More Dangerous (IV), Dangerous (Ⅴ) for one-to-one correspondence to facilitate safety risk assessment and analysis.

[0135] (2) Bayesian network design

[0136] According to the constructed evaluation index system, combined with the ideas and specific practices of Bayesian network design, and integrated prior knowledge such as fault tree and expert experience,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of safety risk evaluation of shield tunneling under existing tunnels, and specifically discloses a safety evaluation method based on data mining and data fusion of shield tunneling approaching existing tunnels. Including: Establishing the safety evaluation index system and risk level classification standard for shield tunneling under the existing tunnel; adopting the fault tree analysis method to design the Bayesian network; obtaining the expert evaluation interval of the root node in the Bayesian network based on group decision-making based on expert judgment Fuzzy sets, and use the improved evidence theory to fuse the expert evaluation interval fuzzy sets to obtain the fuzzy prior probability distribution of the root node of the Bayesian network; based on the Bayesian network model constructed, the risk of shield tunneling under the existing tunnel Probabilistic reasoning and sensitivity analysis are used to determine the safety risk level and key control factors of the existing tunnel under the shield. The invention realizes a more accurate and reasonable comprehensive evaluation of the safety risk of the shield passing through the existing tunnel, and provides a strong basis for the early warning and control decision of the safety risk of the project.

Description

technical field [0001] The present invention belongs to the field of safety risk assessment of existing tunnels under shield tunneling, in particular, it relates to a safety assessment method based on data mining and data fusion for shield approaching existing tunnels, and more specifically, it relates to a method based on fuzzy Bayesian and Evidence theory-based data mining and data fusion are close to existing tunnel safety evaluation methods. Background technique [0002] In recent years, my country's underground rail network lines have become more and more dense, and it has become more and more common for new tunnel shields to pass under existing tunnels. When the shield tunnel passes through the existing tunnel for construction, it will inevitably cause disturbance and deformation of the soil layer, thereby inducing the settlement and deformation of the existing tunnel, and seriously affecting the normal operation of the existing tunnel. Therefore, it is of great engin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q10/06G06Q50/08
CPCG06Q10/0635G06Q10/06393G06Q50/08
Inventor 吴贤国陈虹宇曾铁梅姚春桥郑俊杰章荣军张立茂王帆刘茜
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products