CN109002959A - A kind of harmful influence risk in transit forecasting system based on big data - Google Patents

A kind of harmful influence risk in transit forecasting system based on big data Download PDF

Info

Publication number
CN109002959A
CN109002959A CN201810594834.8A CN201810594834A CN109002959A CN 109002959 A CN109002959 A CN 109002959A CN 201810594834 A CN201810594834 A CN 201810594834A CN 109002959 A CN109002959 A CN 109002959A
Authority
CN
China
Prior art keywords
data
risk
harmful influence
module
factor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810594834.8A
Other languages
Chinese (zh)
Inventor
陈增强
戴波
刘学君
王芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Petrochemical Technology
Original Assignee
Beijing Institute of Petrochemical Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Petrochemical Technology filed Critical Beijing Institute of Petrochemical Technology
Priority to CN201810594834.8A priority Critical patent/CN109002959A/en
Publication of CN109002959A publication Critical patent/CN109002959A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • G06Q10/0832Special goods or special handling procedures, e.g. handling of hazardous or fragile goods

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Educational Administration (AREA)
  • Game Theory and Decision Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The harmful influence risk in transit forecasting system based on big data that the present invention relates to a kind of, it is characterised in that: realize module including data representation module, risk factors statistics and analysis module, prediction module and emulation experiment and system.The present invention gives full play to the advantage of the subject crossings such as technology of Internet of things, data mining technology, statistical management technology, mobile communication technology; data warehouse model, risk Factor Analysis method and the risk profile mechanism transported towards harmful influence are furtherd investigate, makes every effort to analyze the progress with making a breakthrough property in the critical issue research of prediction in region harmful influence risk in transit.

Description

A kind of harmful influence risk in transit forecasting system based on big data
Technical field
The harmful influence risk in transit forecasting system based on big data that the present invention relates to a kind of.
Background technique
With the fast development of China's economic, it is daily that hazardous chemical has become national defense construction, industrial and agricultural production and the people Indispensable valuable cargo in life.However, hazardous chemical during road transport, due to equipment deficiency, shock, squeezes The reasons such as pressure, the container and related auxiliary equipment for containing inflammable, explosive, toxic dangerous material are possible to breakdown or rupture, damage, A large amount of inflammable, the explosive, toxic chemicals transported are leaked out, and then the major accidents such as fire, explosion, poisoning is caused to occur.Especially Its national center city coin as the coin of Beijing, hazardous chemical road transport vehicle inevitably need to pass through population collection Region, thus to potential grave dangers of compositions such as resident, pedestrian, other vehicles and facilities on the way.For this purpose, for harmful influence Risk in transit analysis with prediction and its security monitoring with guarantee it is particularly important.In harmful influence gradually to centralized management trend The fast development of today of development, Internet of Things and the construction of Digital City coinization brings the Informatization Management System of harmful influence into Big data era.And in face of the basis acquisition data of these magnanimity, traditional data analysis tool can no longer meet so huge Greatly, isomery, time-varying unstructured data analysis demand, so as to cause showing for a kind of " data explosion but knowledge being poor " As.Data mining technology exactly solves the best approach of this problem.The arrival and data mining technology of big data era Reach its maturity and move towards informationization path without the safety management suspected of harmful influence transport and provide a strong branch stake tool.
In the world, analysis Transportation of Dangerous Chemicals risk causes the concern for practicing boundary and academia already.China is to danger The research of chemical transport risk analysis was just gradually appeared in middle and later periods the 1990s.By 20 years of researches, state It is inside and outside that many preferable achievements have been achieved in terms of risk analysis of dangerous chemical.Unfortunately, current big portion Divide and a series of problems still had for the research of harmful influence risk analysis, is mainly manifested in:
(1) lack effective multidimensional, multi-source data expression, can not analyze and be provided comprehensively for harmful influence risk in transit Data supporting;
(2) lack the risk analysis method based on modern information technologies, current risk analysis mostly uses greatly law of great number Conventional probability statistical method;
(3) lack the dynamic risk prediction model of real-time, major part existing research at present is still towards deterministic fortune Defeated risk progress risk profile, and the dynamic prediction method for considering the uncertain factor of risk in transit, and passing through feedback mechanism Risk analysis will be made to be more in line with reality;
(4) lack perfect harmful influence risk in transit predictive software systems, spatial information is not introduced into risk analysis Links, lacking the information-based of the risk time-space distribution graph of harmful influence risk accidents indicates.
In summary risk analysis and prediction it is believed that by data mining technology applied to harmful influence transport are analyzed, And on this basis from four data representation, theoretical method, prediction model and software system development angles, for influencing dangerization Every key technology of product safety management of traffic, which analyse in depth, will be a research direction with development potential.
Summary of the invention
The technical issues of present invention devises a kind of harmful influence risk in transit forecasting system based on big data, solves Be: (1) prior art lacks effective multidimensional, multi-source data expression, can not analyze and be provided entirely for harmful influence risk in transit The data supporting in face;(2) prior art lacks the risk analysis method based on modern information technologies, and current risk analysis is most Using the conventional probability statistical method of law of great number;(3) prior art lacks the dynamic risk prediction model of real-time, big at present Part existing research still towards deterministic risk in transit carry out risk profile, and consider risk in transit it is uncertain because Element, and risk analysis will be made to be more in line with reality by the dynamic prediction method of feedback mechanism;(4) prior art lacks perfect Spatial information is not introduced into the links of risk analysis by harmful influence risk in transit predictive software systems, lacks harmful influence wind The information-based of the risk time-space distribution graph of dangerous accident indicates.
In order to solve above-mentioned technical problem, present invention employs following scheme:
A kind of harmful influence risk in transit forecasting system based on big data, it is characterised in that: including data representation module, wind Dangerous factor statistics and analysis module, prediction module and emulation experiment and system realize module.
Further, the data representation module includes data warehouse modeling and data warehouse building;
The data warehouse modeling uses the Modeling Theory based on BWW ontology, and carries out particularization extension to it, in this base One is proposed on plinth has semantic feature, the Data Warehouse Concept model based on ontology.Wherein data warehouse modeling include with Lower two stages: a, Problem Areas modeling: user demand is divided into multiple themes, each theme can be carried out with multiple dimensions It portrays, each dimension can be subdivided into plurality of classes again;B, characteristics of objects models: based on ontology theory, carrying out dimension, class Not Deng Properties of Objects and its between relationship description, solve the Heterogeneity of data;
The local data storehouse that the data warehouse building solves global data warehouse using " mutual exclusion " strategy and it is supported Data redundancy and overlap problem between library, i.e. global data warehouse have a public data structure, include and define the overall situation All publicly-owned data: trans-regional business diagnosis occurs for the harmful influence travel position data in local data's warehouse storage region When processing, global data warehouse is just enabled, related data enters global data warehouse;
The data are related to meteorological data, demographic data, vehicle status data, kinds of goods medium state data and road conditions letter Cease data;
The meteorological data includes wind speed, wind direction, air/surface temperature, humidity, illuminance, lighting delay number, atmospheric pressure Power, rainfall, radiation value;
The demographic data, including driver information, driver's physical condition, driving task time, drive route;
The vehicle status data, including wheel temperature, wheel load, speed, longitudinal acceleration, transverse acceleration, vertical inclination angle, cross To inclination angle, engine temperature, ABS slip rate, energy consumption data;
The kinds of goods medium state data, including harmful influence vehicle carried container type, goods weight/volume, handling flow, valve Door switch, liquid level/time, harmful influence temperature, leakage rate, smokescope, harmful influence external temperature;
The traffic information data, including electronic map, remote sensing image, expressway tol lcollection data, emphasis commerial vehicle GPS data, vehicle flowrate, speed.
Further, the data representation module further includes big data storage model based on cloud computing and based on big data Task Scheduling Model;
The big data storage model based on cloud computing on the basis of virutal machine memory, add one layer of dynamic buffering and Inclusion layer enables the file for being shared caching to be retained for a long time among caching;At the same time, by shared data in physics The mapping address of machine memory cache shared region distributes to virtual machine, and data can directly be visited by making it through this address It asks, achievees the purpose that data sharing
It is described based on the Task Scheduling Model of big data by the cooperating between Data Storage Models, be distributed The task schedule of formula selects the calculating money that network cost is minimum under the premise of guaranteeing that task requests can obtain quick response Source.
Further, the risk factors statistics and analysis module includes following risk factors statistical analysis:
Passed through using the methods of risk assessment of sxemiquantitative with classical risk matrix method (RMA) for semi-quantitative assessment tool It studies various uncertain factors and the probability distribution of different amplitudes of fluctuation and its influence to travel position occurs, to every risk Index carries out quantitative evaluation;The calculation formula of risk probability may be expressed as:
R=P*S'(4-1)
Wherein, R is risk index, and P is the probability that factor occurs, and S is the Intrusion Index that factor generates.R, P, S are equal Simultaneously express the relevant information of Multiple factors simultaneously for matrix variables.
Further, intend on the basis of RMA original advantage, introduce clustering algorithm and it is extended, and by improved Clustering algorithm classifies automatically to risk index, after obtaining the corresponding probability of happening of each factor and Intrusion Index, root The corresponding risk index of various risks factor is calculated according to formula (4-1);Finally, being clustered to risk index, endangered Dangerous source category;
The specific steps of which are as follows:
Step 1: defining the probability P of each risk factors
P=(P (i), i=1,2 ..., m } (4-2)
Wherein p (i) indicates the probability that i-th kind of risk factors F (i) occurs.Assuming that a certain factor F (i) occurs in T time Event number be n (i), the total number of events occurred in T time is n, and F (i) probability is p (i), then makes great efforts law it is found that right by shellfish In any positive number ε > o, have;
That is, frequency n (i)/n that reason F (i) occurs converges on the Probability p of factor generation when n is very big (i);Therefore, frequency n (i)/n approximation that event occurs can be regarded as to the Probability p (i) of event generation;
Step 2: defining the probability index p of each factor.Setting by probability index be divided into C class (C=2,3 ... m), It is different brackets by the probability clustering of each factor firing event by taking C=5 as an example.The value needs of C are surveyed according to sample data It calculates;
Step 3: defining the severity s of each risk factors firing event;The set of s expression seriousness, s=s (i), I=1,2 ..., 36 }, wherein, s (i) indicate i-th of factor F (i) cause event severity;
Step 4: defining the severity index S of each risk factors.Setting by Severity Index be divided into C class (C=2, 3 ... m), by taking C=3 as an example, the seriousness of each factor is divided into 3 grades;The value of C needs to be surveyed according to sample data It calculates.The value range of each grade is clustered using severity s of the K-means algorithm to each factor;
Step 5: calculating the risk index R of each factor according to the following formulaB(P,s);
RB(P, s)=P*S (4-3)
Step 6: risk assessment.According to the size of the risk index numerical value of each factor, evaluate opposite between each factor Risk level, that is, degree of danger, it is therefore an objective to distinguish the relative risk level i.e. degree of danger between them;
Step 7: risk class identification.The risk index being calculated is clustered using k-means algorithm, is endangered Dangerous source structure figure.
Further, the risk factors statistics and analysis module further includes risk factors association analysis:
Step 1: obtaining data, carry out data prediction;
Step 2: Fuzzy Processing is carried out to qualitative attribute using FCM clustering algorithm.FCM by qualitative attribute x (i=1, 2 ..., t) it is transformed to the x indicated by c Fog propertyij(i=1,2 ..., n;J=1,2 ... c) attribute set is found out every The cluster centre of group attribute, so that the cost function of non-similarity index reaches minimum;Attribute value that treated is between (0,1) Degree of membership, indicate the attribute value of each attribute point belong to some grouping degree;
Step 3: classification processing being carried out to quantitative attributes, obtains its Boolean property matrix.Certain quantitative attributes is selected first xi(i=1,2 ..., t), obtain its attribute value number n, and attribute codomain is R, R={ ri, i=1,2 ..., n }, by the category Property is converted to Boolean type data type matrix;
Step 4: setting minimum support calculates the support of each attribute value, obtains frequent item set;Assuming that data acquisition system is D, record number are N, and attribute set A, X are the set of m attribute, andThen X={ vi1,vi2,...,vimSupport Degree is FuzzySupp (X={ vi1,vi2,...,vim}).Wherein, vimIndicate a certain value of j-th of attribute in this m attribute; Since m=1, the support of each attribute value is calculated, while removing the smallest attribute value of support;
Step 5: setting Minimum support4 calculates the fuzzy credence of the property set value comprising risk information,
Confidence level are as follows:
Wherein, it is needed in Y comprising risk information.Simultaneously remove confidence level less than min_confident set to (X → Y);
Step 6: redundancy rule is wiped out, in the strictly all rules obtained according to step 4, if metAnd(or) only need to retainRule.In actual treatment, if covering attribute combines The rule of XYZ has multiple, it is only necessary to which number of packages is minimum before retention discipline, the rear maximum principle of number of packages.
Further, combination forecasting is used in the prediction module: for the low probability of harmful influence risk in transit event The feature of height harm adds weight on the basis of risk class is divided and analyzed with correlate for each risk factors, together When fully consider regional context characteristic, shipping accident rate, population of exposure number, expected loss measure coefficient, pass through integrated approach will Multiple single qualitative and Quantitative Prediction Models are integrated, and a harmful influence risk in transit multi-dimensional factors combined prediction mould is constructed Type, to effectively improve precision of prediction.Its Optimal Combination Forecasting model is defined as follows:
If { yi, (t=1,2 ..., n) indicate n actual observation sequence, { fnIndicate to be calculated with i-th kind of prediction technique Arrive predicted value fitting sequence ((i=1,2 ..., k;T=1,2 ..., n), { wiIndicate various prediction techniques in built-up pattern Weight set (i=1,2,3..., k),It indicates to combine predicted value and sequence that these models are calculated, therefore:
Further, prediction algorithm used in the prediction module:
On the basis of the combination forecasting, data mining algorithm of the project proposed adoption based on Outliers detection is right Risk case carries out forecast assessment, and the basic step of algorithm is as follows:
Step 1: outlier problem definition." normal " data are defined to harmful influence transportation safety state items Testing index, With "abnormal" data and its corresponding deviation metric;
Step 2: data decimation and pretreatment.Data sample is extracted from initial data warehouse, carries out eliminating the number such as noise Data preprocess, while Data Dimensionality Reduction conversion is carried out, the feature to be considered when reducing data mining and variable number;
Step 3: outlier detection.It is obtained according to outlier problem definition using the data mining algorithm of outlier detection It peels off, point data;
Step 4: outcome evaluation.Data mining results are assessed, for be unsatisfactory for require data, return step 3, Again the point data that peels off is detected, until assessment result is met the requirements.
Further, the emulation experiment realizes that module is put down using cloud computing platform as the base layer support of system with system Platform, while the system architecture mutually separated using storage with calculating, improve the data processing and analysis ability of system.
Further, it includes following four functional module that the emulation experiment and system, which realize that module includes:
Module one, basic data management;Its data acquired for each information source and information are managed, and logarithm According to progress preliminary purification and pretreatment;
Data are defined data model according to system and are arranged and stored by module two, data storage and management module;
Module three, data mining algorithm module, the realization to all data mining algorithm, and risk is carried out to data and is commented Estimate;
Module four, subscriber interface module, according to data analysis as a result, being fed back in real time to user, to reach The purpose of security monitoring and guarantee.
The harmful influence risk in transit forecasting system based on big data has the advantages that
(1) present invention gives full play to technology of Internet of things, data mining technology, statistical management technology, mobile communication technology etc. It is pre- to further investigate data warehouse model, risk Factor Analysis method and the risk transported towards harmful influence for the advantage of subject crossing Survey mechanism makes every effort to analyze the progress with making a breakthrough property in the critical issue research of prediction in region harmful influence risk in transit.
(2) present invention proposes a kind of based on ontology, tool for the complexity and uncertainty of Data Warehouse Concept modeling There is the conceptual data model of semantic information, construct a distribution, multidimensional harmful influence risk in transit data warehouse on this basis, And propose big data storage and the task scheduling approach of a kind of memory sharing, to multidimensional, the data of multi-source carry out effective expression and Management is supported and execution performance guarantee to provide effective data for harmful influence risk in transit prediction and management.
(3) present invention is on the basis of data warehouse model, using risk factors and risk case as research object, using statistics It learns and analyzes, build simultaneously with the related art methods such as data mining, the risk factors and its correlate transported to harmful influence Vertical Testing index and assessment indicator system provide to formulate scientific safety precaution and management measure for harmful influence road transport Decision support.
(4) present invention will construct a harmful influence on the basis of risk Factor Analysis
Risk in transit multi-dimensional factors combination forecasting, and data mining algorithm of the proposed adoption based on Outliers detection are right Risk case carries out forecast assessment, to improve level of decision-making, reduces the probability that risk case occurs.
(5) present invention designs and Implements a base to verify the harmful influence risk in transit prediction model that this project proposes In cloud computing platform harmful influence risk in transit analysis decision support system, complete basic data management, event statistics analysis, Data mining analysis while with the basic functions such as system maintenance, considers each ring that spatial information is introduced into risk analysis Section transports wind to realize that the informationization of harmful influence risk accidents time-space distribution graph indicates for area and its trans-regional harmful influence Dangerous forecast analysis provides more intuitive effective technical support.
Detailed description of the invention
Fig. 1: data warehouse schema figure in the present invention;
Fig. 2: the big data storage rack composition based on cloud computing in the present invention;
Fig. 3: software system function structure chart in the present invention.
Specific embodiment
Below with reference to Fig. 1 to Fig. 3, the present invention will be further described:
As shown in Figure 1,
1. the idea and method that the present invention studies
(1) data representation
1. data warehouse modeling: original harmful influence transportation data has very strong complexity, dynamic and isomerism, This makes the data analysis for carrying out systematization to it become a difficult task.On the one hand, involved in harmful influence transportational process To various dimensions information such as weather, personnel, vehicle, kinds of goods medium, road conditions, times, these dimensions, which cooperate with each other, to be together constituted Specific harmful influence road transport scene;On the other hand, the source of data is related to different department and agencies, different physics Equipment, different operating system, and the institutional framework mode of data itself also includes structuring, semi-structured and unstructured number According to.Various dimensions, multi-source data characteristics the identification, analysis and prediction of the expression of data, storage and management and data are mentioned Huge challenge out.
For above data feature, Modeling Theory of the proposed adoption of the present invention based on BWW ontology, and particularization expansion is carried out to it Exhibition, proposing one on this basis has semantic feature, the Data Warehouse Concept model based on ontology.Wherein data warehouse is built Mould includes the following two stage:
A, Problem Areas models: user demand being divided into multiple themes, each theme can be carved with multiple dimensions It draws, each dimension can be subdivided into plurality of classes again.
B, characteristics of objects models: based on ontology theory, carry out dimension, the Properties of Objects such as classification and its between pass The description of system solves the Heterogeneity of data.
2. data warehouse constructs: the key for constructing Distributed Data Warehouse is how to reflect the data in local data warehouse It is mapped in the data structure in global data warehouse.Therefore, proposed adoption " mutual exclusion " strategy of the present invention solves global data warehouse and it The data redundancy and overlap problem between local data warehouse supported, i.e. global data warehouse have a public data knot Structure, include and define global all publicly-owned data: local data warehouse stores the harmful influence travel position data of this city, occurs When trans-regional business diagnosis is handled, global data warehouse is just enabled, related data enters global data warehouse.Wherein, data Warehouse schema figure is as shown in Figure 1.
3. the big data storage model based on cloud computing: in face of the dynamic of ultra-large mass data and data By force, the features such as I/O throughput is high, the storage management of big data face unprecedented challenge.For this purpose, the present invention intends in data bins A kind of big data storage strategy based on cloud computing is proposed on the basis of the model of library, it is empty to solve large-scale data and limited memory Between between contradiction.Different from above traditional file system, the solution that the present invention proposes the file system of meter is, in void On the basis of quasi- machine memory, one layer of dynamic buffering and inclusion layer are added, enables the file for being shared caching among caching Retained for a long time.At the same time, the mapping address by shared data in physical machine memory cache shared region distributes to virtual machine, makes It can directly access data by this address, achieve the purpose that data sharing, data storage architecture such as Fig. 2 institute Show.
4. the Task Scheduling Model based on big data:
Timeliness is the important performance indexes of safety monitoring system.For this purpose, the present invention will combine above-mentioned big data storage side Case proposes a kind of effective Task Scheduling Model, under service response time and the constraint condition of network cost, by with number According to the cooperating between storage model, distributed task schedule is carried out, to guarantee that task requests can obtain quick response Under the premise of, the minimum computing resource of selection network cost.
(2) theory analysis;
A, risk factors statistically analyze:
According to true harmful influence risk in transit casualty data, the present invention uses statistics correlation technique to causing to endanger first Every reason of change product risk in transit accident carries out deep analysis, summary and conclusion.On this basis, for every class risk because Plain successively refinement, while importance sorting is carried out to risk factors according to degree of risk, form perfect point first Factor system knot Structure.
Under above-mentioned risk factors architecture, the methods of risk assessment of proposed adoption sxemiquantitative of the present invention, with classical wind Dangerous matrix method (RMA) is semi-quantitative assessment tool, and the probability of different amplitudes of fluctuation occurs by studying various uncertain factors Distribution and its influence to travel position carry out quantitative evaluation to every risk indicator.The calculation formula of risk probability can indicate Are as follows:
R=P*S'(4-1)
Wherein, R is risk index, and P is the probability that factor occurs, and S is the Intrusion Index that factor generates.R, P, S are equal Simultaneously express the relevant information of Multiple factors simultaneously for matrix variables.
In order to solve data index of the RMA for dynamic change defect heavy in hand, the present invention intends in the original advantage of RMA On the basis of, it introduces clustering algorithm and it is extended, and classified automatically by improved clustering algorithm to risk index, After obtaining the corresponding probability of happening of each factor and Intrusion Index, various risks factor is calculated according to formula (4-1) Corresponding risk index.Finally, clustering to risk index, dangerous source category is obtained.
The specific steps of which are as follows:
Step 1: defining the probability P of each risk factors
P=(P (i), i=1,2 ..., m } (4-2)
Wherein p (i) indicates the probability that i-th kind of risk factors F (i) occurs.Assuming that a certain factor F (i) occurs in T time Event number be n (i), the total number of events occurred in T time is n, and F (i) probability is p (i), then makes great efforts law it is found that right by shellfish In any positive number ε > o, there is limn→∞| n (i)/n-p (i) | < ε }=1.
That is, frequency n (i)/n that reason F (i) occurs converges on the Probability p of factor generation when n is very big (i).Therefore, frequency n (i)/n approximation that event occurs can be regarded as to the Probability p (i) of event generation.
Step 2: defining the probability index p of each factor.Setting by probability index be divided into C class (C=2,3 ... m), It is different brackets by the probability clustering of each factor firing event by taking C=5 as an example.The value needs of C are surveyed according to sample data It calculates.
Step 3: defining the severity s of each risk factors firing event.The set of s expression seriousness, s=s (i), I=1,2 ..., 36 }, wherein, s (i) indicate i-th of factor F (i) cause event severity.
Step 4: defining the severity index S of each risk factors.Setting by Severity Index be divided into C class (C=2, 3 ... m), by taking C=3 as an example, the seriousness of each factor is divided into 3 grades.The value of C needs to be surveyed according to sample data It calculates.The value range of each grade is clustered using severity s of the K-means algorithm to each factor.
Step 5: calculating the risk index R of each factor according to the following formulaB(P,s)。
RB(P, s)=P*S (4-3)
Step 6: risk assessment.According to the size of the risk index numerical value of each factor, evaluate opposite between each factor Risk level, that is, degree of danger, it is therefore an objective to distinguish the relative risk level i.e. degree of danger between them.
Step 7: risk class identification.The risk index being calculated is clustered using k-means algorithm, is endangered Dangerous source structure figure.
B, risk factors association analysis:
Data in the present invention have the characteristics that discretization degree is high, thus with the category of harmful influence road transport risk case Property is research object, and proposed adoption fuzzy association rules algorithm excavates the pass of emphasis from the real data of historical risk event Connection factor, the dependence between analysis incident time, space, reason, seriousness and its treatment measures.Wherein, for quantitative Attribute, project proposed adoption Fuzzy c-mean Algorithm (FCM) are divided into several fuzzy sets to it;For quantitative attributes, will count Its value type, while it being converted into logical type value, to be associated the excavation of rule.The specific steps of which are as follows:
Step 1: obtaining data, carry out data prediction.
Step 2: Fuzzy Processing is carried out to qualitative attribute using FCM clustering algorithm.FCM by qualitative attribute x (i=1, 2 ..., t) it is transformed to the x indicated by c Fog propertyij(i=1,2 ..., n;J=1,2 ... c) attribute set is found out every The cluster centre of group attribute, so that the cost function of non-similarity index reaches minimum.Attribute value that treated is between (0,1) Degree of membership, indicate the attribute value of each attribute point belong to some grouping degree.
Step 3: classification processing being carried out to quantitative attributes, obtains its Boolean property matrix.Certain quantitative attributes is selected first xi(i=1,2 ..., t), obtain its attribute value number n, and attribute codomain is R, R={ ri, i=1,2 ..., n }, by the category Property is converted to Boolean type data type matrix.
Step 4: setting minimum support calculates the support of each attribute value, obtains frequent item set.Assuming that data acquisition system is D, record number are N, and attribute set A, X are the set of m attribute, andThen X={ vi1,vi2,...,vimBranch Degree of holding is FuzzySupp (X={ vi1,vi2,...,vim}).Wherein, vimIndicate that j-th of a certain of attribute takes in this m attribute Value.Since m=1, the support of each attribute value is calculated, while removing the smallest attribute value of support.
Step 5: setting Minimum support4 calculates the fuzzy credence of the property set value comprising risk information,
Confidence level are as follows:
Wherein, it is needed in Y comprising risk information.Remove the set pair that confidence level is less than min_confident simultaneously
Step 6: redundancy rule is wiped out, in the strictly all rules obtained according to step 4, if metAnd(orIt only needs to retainRule.In actual treatment, if covering attribute combines The rule of XYZ has multiple, it is only necessary to which number of packages is minimum before retention discipline, the rear maximum principle of number of packages.
(3) prediction model
1, combination forecasting: for the feature of the low probability height harm of harmful influence risk in transit event, the present invention intends Risk class is divided on the basis of correlate analysis, adds weight for each risk factors, while fully considering space Regional characteristic, shipping accident rate, population of exposure number, the expected loss isometry factor, will be multiple single qualitative by integrated approach It is integrated with Quantitative Prediction Model, a harmful influence risk in transit multi-dimensional factors combination forecasting is constructed, to effectively mention High precision of prediction.Its Optimal Combination Forecasting model is defined as follows:
If { yi, (t=1,2 ..., n) indicate n actual observation sequence, { fnIndicate to be calculated with i-th kind of prediction technique Arrive predicted value fitting sequence ((i=1,2 ..., k;T=1,2 ..., n), { wiIndicate various prediction techniques in built-up pattern Weight set (i=1,2,3..., k),It indicates to combine predicted value and sequence that these models are calculated, therefore:
Prediction algorithm: on the basis of the above prediction model, project proposed adoption is calculated based on the data mining of Outliers detection Method carries out forecast assessment to risk case, and the basic step of algorithm is as follows:
Step 1: outlier problem definition." normal " data are defined to harmful influence transportation safety state items Testing index, With "abnormal" data and its corresponding deviation metric.
Step 2: data decimation and pretreatment.Data sample is extracted from initial data warehouse, carries out eliminating the number such as noise Data preprocess, while Data Dimensionality Reduction conversion is carried out, the feature to be considered when reducing data mining and variable number.
Step 3: outlier detection.It is obtained according to outlier problem definition using the data mining algorithm of outlier detection It peels off, point data.
Step 4: outcome evaluation.Data mining results are assessed, for be unsatisfactory for require data, return step 3, Again the point data that peels off is detected, until assessment result is met the requirements.
(4) emulation experiment and system are realized
A, platform environment: ultra-large data and complicated data type determine that big data can not use traditional calculating Mode and data center architecture are stored, are handled and analyzed, it must rely on the distributed treatment of cloud computing, distributed number According to library, cloud storage and virtualization technology.It is transported for this purpose, the present invention will design and Implement the harmful influence based on cloud computing platform Defeated risk analysis DSS, the system, as the base layer support platform of system, are used simultaneously using using cloud computing platform The system architecture mutually separated with calculating is stored, the data processing and analysis ability of system are improved.
B, functional module: systematic functional structrue figure is as shown in Fig. 2, mainly include following four functional module.
Module one: basic data management.It is managed mainly for the data and information of the acquisition of each information source, and right Data carry out preliminary purification and pretreatment.
Module two: data are defined data model according to system and are arranged and stored by data storage and management module.
Module three: data mining algorithm module, the realization to all data mining algorithm, and risk is carried out to data and is commented Estimate.
Module four: subscriber interface module, according to data analysis as a result, being fed back in real time to user, to reach The purpose of security monitoring and guarantee.
Above in conjunction with attached drawing, an exemplary description of the invention, it is clear that realization of the invention is not by aforesaid way Limitation, as long as use the inventive concept and technical scheme of the present invention carry out various improvement, or it is not improved will be of the invention Conception and technical scheme directly apply to other occasions, be within the scope of the invention.

Claims (10)

1. a kind of harmful influence risk in transit forecasting system based on big data, it is characterised in that: including data representation module, risk Factor statistics and analysis module, prediction module and emulation experiment and system realize module.
2. the harmful influence risk in transit forecasting system based on big data according to claim 1, it is characterised in that: the data Expression module includes data warehouse modeling and data warehouse building;
The data warehouse modeling uses the Modeling Theory based on BWW ontology, and carries out particularization extension to it, on this basis Iing is proposed one has semantic feature, the Data Warehouse Concept model based on ontology;Wherein data warehouse modeling includes following two A stage: a, Problem Areas modeling: user demand is divided into multiple themes, each theme can be carved with multiple dimensions It draws, each dimension can be subdivided into plurality of classes again;B, characteristics of objects models: based on ontology theory, carrying out dimension, classification Equal Properties of Objects and its between relationship description, solve the Heterogeneity of data;
The local data warehouse that data warehouse building solves global data warehouse using " mutual exclusion " strategy and it is supported it Between data redundancy and overlap problem, i.e. there is a public data structure in global data warehouse, includes and defines global all Publicly-owned data: trans-regional business diagnosis processing occurs for the harmful influence travel position data in local data's warehouse storage region When, global data warehouse is just enabled, related data enters global data warehouse;
The data are related to meteorological data, demographic data, vehicle status data, kinds of goods medium state data and traffic information number According to;
The meteorological data includes wind speed, wind direction, air/surface temperature, humidity, illuminance, lighting delay number, atmospheric pressure, rain Amount, radiation value;
The demographic data, including driver information, driver's physical condition, driving task time, drive route;
The vehicle status data, including take turns temperature, wheel load, speed, longitudinal acceleration, transverse acceleration, vertical inclination angle, laterally incline Angle, engine temperature, ABS slip rate, energy consumption data;
The kinds of goods medium state data, including harmful influence vehicle carried container type, goods weight/volume, handling flow, valve are opened Pass, liquid level/time, harmful influence temperature, leakage rate, smokescope, harmful influence external temperature;
The traffic information data, including electronic map, remote sensing image, expressway tol lcollection data, emphasis commerial vehicle GPS number According to, vehicle flowrate, speed.
3. the harmful influence risk in transit forecasting system based on big data according to claim 2, it is characterised in that: the data Expressing module further includes the big data storage model based on cloud computing and the Task Scheduling Model based on big data;
The big data storage model based on cloud computing is added one layer of dynamic buffering and is shared on the basis of virutal machine memory Layer, enables the file for being shared caching to be retained for a long time among caching;At the same time, by shared data in physical machine The mapping address for depositing caching shared region distributes to virtual machine, and data can directly be accessed by making it through this address, be reached To the purpose of data sharing;
It is described based on the Task Scheduling Model of big data by the cooperating between Data Storage Models, carry out distributed Task schedule, under the premise of guaranteeing that task requests can obtain quick response, the minimum computing resource of selection network cost.
4. the harmful influence risk in transit forecasting system based on big data according to claim 3, it is characterised in that: the risk Factor statistics and analysis module includes following risk factors statistical analysis:
Research is passed through with classical risk matrix method (RMA) for semi-quantitative assessment tool using the methods of risk assessment of sxemiquantitative The probability distribution of different amplitudes of fluctuation and its influence to travel position occur for various uncertain factors, to every risk indicator Carry out quantitative evaluation;The calculation formula of risk probability may be expressed as:
R=P*S ' (4-1)
Wherein, R is risk index, and P is the probability that factor occurs, and S is the Intrusion Index that factor generates;R, P, S are square Battle array variable and the relevant information for expressing Multiple factors simultaneously.
5. the harmful influence risk in transit forecasting system based on big data according to claim 4, it is characterised in that: intend in RMA It on the basis of original advantage, introduces clustering algorithm and it is extended, and risk index is carried out by improved clustering algorithm Automatic classification, after obtaining the corresponding probability of happening of each factor and Intrusion Index, is calculated all kinds of according to formula (4-1) The corresponding risk index of risk factors;Finally, clustering to risk index, dangerous source category is obtained;
The specific steps of which are as follows:
Step 1: defining the probability P of each risk factors
P={ P (i), i=1,2 ..., m } (4-2)
Wherein p (i) indicates the probability that i-th kind of risk factors F (i) occurs;Assuming that the thing that a certain factor F (i) occurs in T time Number of packages is n (i), and the total number of events occurred in T time is n, and F (i) probability is p (i), then makes great efforts law by shellfish it is found that for appointing Anticipate positive number ε > o, there is limn→∞| n (i)/n-p (i) | < ε }=1;
That is, frequency n (i)/n that reason F (i) occurs converges on the Probability p (i) of factor generation when n is very big;Cause Frequency n (i)/n approximation that event occurs, can be regarded as the Probability p (i) of event generation by this;
Step 2: defining the probability index p of each factor;Setting by probability index be divided into C class (C=2,3 ... m), with C It is different brackets by the probability clustering of each factor firing event for=5;The value needs of C are calculated according to sample data;
Step 3: defining the severity s of each risk factors firing event;S indicates the set of seriousness, s={ s (i), i= 1,2 ..., 36 }, wherein, s (i) indicate i-th of factor F (i) cause event severity;
Step 4: defining the severity index S of each risk factors;Setting by Severity Index be divided into C class (C=2, 3 ... m), by taking C=3 as an example, the seriousness of each factor is divided into 3 grades;The value of C needs to be surveyed according to sample data It calculates;The value range of each grade is clustered using severity s of the K-means algorithm to each factor;
Step 5: calculating the risk index R of each factor according to the following formulaB(P,s);
RB(P, s)=P*S (4-3)
Step 6: risk assessment: according to the size of the risk index numerical value of each factor, evaluating the relative risk between each factor Level is degree of danger, it is therefore an objective to distinguish the relative risk level i.e. degree of danger between them;
Step 7: risk class identification: the risk index being calculated being clustered using k-means algorithm, obtains danger source Structure chart.
6. the harmful influence risk in transit forecasting system based on big data according to claim 4, it is characterised in that: the risk Factor statistics and analysis module further includes risk factors association analysis:
Step 1: obtaining data, carry out data prediction;
Step 2: Fuzzy Processing is carried out to qualitative attribute using FCM clustering algorithm;FCM is by qualitative attribute x (i=1,2 ..., t) It is transformed to the x indicated by c Fog propertyij(i=1,2 ..., n;J=1,2 ... c) attribute set finds out every group of attribute Cluster centre, so that the cost function of non-similarity index reaches minimum;Treated attribute value being subordinate between (0,1) Degree indicates that the attribute value of each attribute point belongs to the degree of some grouping;
Step 3: classification processing being carried out to quantitative attributes, obtains its Boolean property matrix;Certain quantitative attributes x is selected firsti(i= 1,2 ..., t), its attribute value number n is obtained, attribute codomain is R, R={ ri, i=1,2 ..., n }, which is turned It is changed to Boolean type data type matrix;
Step 4: setting minimum support calculates the support of each attribute value, obtains frequent item set;Assuming that data acquisition system is D, note Record number is N, and attribute set A, X are the set of m attribute, andThen X={ vi1,vi2,...,vimSupport For FuzzySupp (X={ vi1,vi2,...,vim});Wherein, vimIndicate a certain value of j-th of attribute in this m attribute;From m =1 starts, and calculates the support of each attribute value, while removing the smallest attribute value of support;
Step 5: setting Minimum support4 calculates the fuzzy credence of the property set value comprising risk information,
Confidence level are as follows:
Wherein, it is needed in Y comprising risk information;Remove the set pair that confidence level is less than min_confident simultaneously
Step 6: redundancy rule is wiped out, in the strictly all rules obtained according to step 4, if metAnd (or), it is only necessary to retainRule;In actual treatment, if the rule of covering attribute combination XYZ Have multiple, it is only necessary to which number of packages is minimum before retention discipline, the rear maximum principle of number of packages.
7. the harmful influence risk in transit forecasting system based on big data according to claim 4, it is characterised in that: the prediction Combination forecasting is used in module: for the feature of the low probability height harm of harmful influence risk in transit event, in risk class Divide with correlate analysis on the basis of, for each risk factors add weight, while fully consider regional context characteristic, Shipping accident rate, population of exposure number, expected loss measure coefficient, by integrated approach by multiple single qualitative and quantitative forecast moulds Type is integrated, and a harmful influence risk in transit multi-dimensional factors combination forecasting is constructed, to effectively improve precision of prediction;Its Optimal Combination Forecasting model is defined as follows:
If { yi, (t=1,2 ..., n) indicate n actual observation sequence, { fnIndicate to be calculated with i-th kind of prediction technique Predicted value fitting sequence ((i=1,2 ..., k;T=1,2 ..., n), { wiIndicate various prediction techniques in the power of built-up pattern Gather (i=1,2,3..., k) again, indicates that combining these models calculatesPredicted value and sequence, therefore:
8. the harmful influence risk in transit forecasting system based on big data according to claim 7, it is characterised in that: the prediction Prediction algorithm used in module:
On the basis of the combination forecasting, data mining algorithm of the project proposed adoption based on Outliers detection, to risk Event carries out forecast assessment, and the basic step of algorithm is as follows:
Step 1: outlier problem definition: defining " normal " data to harmful influence transportation safety state items Testing index, and " different Often " data and its corresponding deviation metric;
Step 2: data decimation and pretreatment: extracting data sample from initial data warehouse, and it is pre- to carry out the data such as elimination noise Processing, while Data Dimensionality Reduction conversion is carried out, the feature to be considered when reducing data mining and variable number;
Step 3: outlier detection: according to outlier problem definition, using the data mining algorithm of outlier detection, obtain from Group, point data;
Step 4: outcome evaluation: assessing data mining results, for be unsatisfactory for require data, return step 3, again The point data that peels off is detected, until assessment result is met the requirements.
9. the harmful influence risk in transit forecasting system based on big data according to claim 7, it is characterised in that: the emulation Experiment realizes that module will use cloud computing platform as the base layer support platform of system with system, while using storage and calculating phase Isolated system architecture improves the data processing and analysis ability of system.
10. the harmful influence risk in transit forecasting system based on big data according to claim 7, it is characterised in that: described imitative It includes following four functional module that true experiment and system, which realize that module includes:
Module one, basic data management;Its data acquired for each information source and information are managed, and to data into Row preliminary purification and pretreatment;
Data are defined data model according to system and are arranged and stored by module two, data storage and management module;
Module three, data mining algorithm module, the realization to all data mining algorithm, and risk assessment is carried out to data;
Module four, subscriber interface module, according to data analysis as a result, being fed back in real time to user, to reach safety Monitoring and the purpose ensured.
CN201810594834.8A 2018-06-11 2018-06-11 A kind of harmful influence risk in transit forecasting system based on big data Pending CN109002959A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810594834.8A CN109002959A (en) 2018-06-11 2018-06-11 A kind of harmful influence risk in transit forecasting system based on big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810594834.8A CN109002959A (en) 2018-06-11 2018-06-11 A kind of harmful influence risk in transit forecasting system based on big data

Publications (1)

Publication Number Publication Date
CN109002959A true CN109002959A (en) 2018-12-14

Family

ID=64601292

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810594834.8A Pending CN109002959A (en) 2018-06-11 2018-06-11 A kind of harmful influence risk in transit forecasting system based on big data

Country Status (1)

Country Link
CN (1) CN109002959A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110033615A (en) * 2019-03-22 2019-07-19 山西省交通科学研究院有限公司 A kind of road hazard cargo transport dynamic risk appraisal procedure based on Internet of Things
CN110364257A (en) * 2019-07-18 2019-10-22 泰康保险集团股份有限公司 People's vehicle Risk Forecast Method, device, medium and electronic equipment
CN111091292A (en) * 2019-12-18 2020-05-01 中国科学院合肥物质科学研究院 Real-time risk dynamic modeling analysis system for nuclear power station
CN111612395A (en) * 2020-05-19 2020-09-01 衢州学院 Method for evaluating transportation state of hazardous chemical vehicle
CN113516323A (en) * 2021-09-15 2021-10-19 山东蓝湾新材料有限公司 Transportation path recommendation method
CN115358647A (en) * 2022-10-24 2022-11-18 齐鲁云商数字科技股份有限公司 Hydrogen energy industry chain risk monitoring system and monitoring method based on big data
CN116503865A (en) * 2023-05-29 2023-07-28 北京石油化工学院 Hydrogen road transportation risk identification method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103971168A (en) * 2014-04-02 2014-08-06 中国人民解放军防化学院 Hazardous chemical transport hazard predicting and controlling system
US20150020614A1 (en) * 2013-07-16 2015-01-22 Leeo, Inc. Electronic device with environmental monitoring
CN104809244A (en) * 2015-05-15 2015-07-29 成都睿峰科技有限公司 Data mining method and device in big data environment
CN107194586A (en) * 2017-05-23 2017-09-22 广州中国科学院工业技术研究院 Storage tank dynamic risk analysis method, apparatus and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150020614A1 (en) * 2013-07-16 2015-01-22 Leeo, Inc. Electronic device with environmental monitoring
CN103971168A (en) * 2014-04-02 2014-08-06 中国人民解放军防化学院 Hazardous chemical transport hazard predicting and controlling system
CN104809244A (en) * 2015-05-15 2015-07-29 成都睿峰科技有限公司 Data mining method and device in big data environment
CN107194586A (en) * 2017-05-23 2017-09-22 广州中国科学院工业技术研究院 Storage tank dynamic risk analysis method, apparatus and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
贺琳: "基于数据挖掘的道路运行安全风险分析", 《CNKI博士学位论文》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110033615A (en) * 2019-03-22 2019-07-19 山西省交通科学研究院有限公司 A kind of road hazard cargo transport dynamic risk appraisal procedure based on Internet of Things
CN110033615B (en) * 2019-03-22 2020-09-01 山西省交通科学研究院有限公司 Road dangerous cargo transportation dynamic risk assessment method based on Internet of things
CN110364257A (en) * 2019-07-18 2019-10-22 泰康保险集团股份有限公司 People's vehicle Risk Forecast Method, device, medium and electronic equipment
CN111091292A (en) * 2019-12-18 2020-05-01 中国科学院合肥物质科学研究院 Real-time risk dynamic modeling analysis system for nuclear power station
CN111091292B (en) * 2019-12-18 2023-08-18 中国科学院合肥物质科学研究院 Nuclear power station real-time risk dynamic modeling analysis system
CN111612395A (en) * 2020-05-19 2020-09-01 衢州学院 Method for evaluating transportation state of hazardous chemical vehicle
CN113516323A (en) * 2021-09-15 2021-10-19 山东蓝湾新材料有限公司 Transportation path recommendation method
CN115358647A (en) * 2022-10-24 2022-11-18 齐鲁云商数字科技股份有限公司 Hydrogen energy industry chain risk monitoring system and monitoring method based on big data
CN116503865A (en) * 2023-05-29 2023-07-28 北京石油化工学院 Hydrogen road transportation risk identification method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN109002959A (en) A kind of harmful influence risk in transit forecasting system based on big data
CN108694516A (en) A kind of harmful influence risk in transit prediction technique based on big data
CN108694517A (en) A kind of statistical and analytical method of the harmful influence risk in transit factor based on big data
CN103971523B (en) A kind of mountain road traffic safety dynamic early-warning system
Al-Yahyai et al. Wind farm land suitability indexing using multi-criteria analysis
CN110555568B (en) Road traffic running state real-time perception method based on social network information
Shang et al. A hybrid method for traffic incident duration prediction using BOA-optimized random forest combined with neighborhood components analysis
CN105701596A (en) Method for lean distribution network emergency maintenance and management system based on big data technology
Yang et al. Identifying intercity freight trip ends of heavy trucks from GPS data
Zhang et al. Emergency evacuation planning against dike-break flood: a GIS-based DSS for flood detention basin of Jingjiang in central China
CN108304974A (en) A kind of civil aviaton NOSHOW predictions based on optimization C5.0 and Apriori and strong factor-analysis approach
Guo et al. Monitoring and simulation of dynamic spatiotemporal land use/cover changes
Sedehzadeh et al. Optimization of a multi-modal tree hub location network with transportation energy consumption: A fuzzy approach
Grabbe et al. Clustering days with similar airport weather conditions
Kuznichenko et al. Development of a multi-criteria model for making decisions on the location of solid waste landfills
Kim et al. Estimating urban spatial temperatures considering anthropogenic heat release factors focusing on the mobility characteristics
CN107180534A (en) The express highway section average speed method of estimation of support vector regression fusion
Ghasemian et al. Application of a novel hybrid machine learning algorithm in shallow landslide susceptibility mapping in a mountainous area
Soleimani et al. Applying machine learning, text mining, and spatial analysis techniques to develop a highway-railroad grade crossing consolidation model
JABBAR et al. Predictive intelligence: A neural network learning system for traffic condition prediction and monitoring on freeways
Xu et al. Interpretable bus energy consumption model with minimal input variables considering powertrain types
Burlov et al. Algorithmic support for the dynamic functioning of transport systems in the region
Abdullah et al. Exploring the factors influencing traffic accidents: an analysis of black spots and decision tree for injury severity
CN115879848B (en) Transport vehicle safety monitoring method and device
Liu et al. An intelligent urban traffic data fusion analysis method based on improved artificial neural network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181214

RJ01 Rejection of invention patent application after publication