CN115115283B - Management method of urban key infrastructure, electronic equipment and storage medium - Google Patents
Management method of urban key infrastructure, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN115115283B CN115115283B CN202211028790.5A CN202211028790A CN115115283B CN 115115283 B CN115115283 B CN 115115283B CN 202211028790 A CN202211028790 A CN 202211028790A CN 115115283 B CN115115283 B CN 115115283B
- Authority
- CN
- China
- Prior art keywords
- infrastructure
- parameter
- elastic
- urban
- group
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
- G06Q10/06393—Score-carding, benchmarking or key performance indicator [KPI] analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0631—Resource planning, allocation, distributing or scheduling for enterprises or organisations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
Abstract
A management method, electronic equipment and storage medium for urban key infrastructure belong to the management method of urban infrastructure. The method aims to effectively analyze the running rule of the system at the city level. The method comprises the steps of constructing an elasticity measurement index of an urban infrastructure group; and (3) extracting the key infrastructure of the urban infrastructure group and verifying the validity, and providing a management method of the urban key infrastructure. The method is based on a solid theoretical foundation and a mature physical model, realizes the quantitative calculation of the elasticity index by constructing the cascade failure model of the urban infrastructure group network and formulating the elasticity measurement index, and completes the excavation of the urban key infrastructure. Meanwhile, according to practical conditions, a targeted elastic promotion strategy is provided from three angles, and quantitative evaluation of promotion efficiency is provided, so that important support is provided for a city manager to manage key infrastructure. And the quantitative calculation and comparison provide a practical guidance for implementing a targeted system elasticity improvement strategy.
Description
Technical Field
The invention relates to a city infrastructure management method, in particular to a city key infrastructure management method, electronic equipment and a storage medium.
Background
Due to the rapid development of urban economy and the continuous improvement of urbanization process and level, various urban groups are established in various scales in each country. Among the urban systems, some important infrastructures and complex systems, such as urban traffic networks, urban power supply line networks, urban large airports and the like, which are responsible for urban operation and economic development play a crucial role in normal urban operation. Also, these systems are also referred to as city critical infrastructure because they tend to have a large scale, significant support functions, and complex system interactions. More and more research shows that deliberate attacks on the key infrastructure of the cities can cause huge losses to the cities, including economic losses and even casualties. Because of the large impact of these critical infrastructures on other system facilities, their failure and malfunction often mean the occurrence of large-scale system outages. The various challenges faced by cities are unknown, uncontrollable and unpredictable, and therefore city managers need to start from the key infrastructures of the cities, utilize effective theoretical knowledge and construct protective covers for guaranteeing the normal operation of the cities through rich practical methods.
In addition, global warming, extreme weather, and various human causes are all disturbing factors that affect the normal operation of the infrastructure. The external disturbances affecting the actual operation directly affect the normal operation of the infrastructure and a series of possible domino effects, which are generally called cascade failures, and generally refer to that in a system and a network, failure of one or a few nodes or connecting lines causes failure of other nodes through coupling relations among the nodes, so that a cascade effect is generated, and finally, a part of nodes and even the whole network are crashed. Cascading failures have in fact been the largest cause of impact on the proper functioning of urban infrastructure. Therefore, how to analyze the correlation between infrastructures based on the operating conditions of infrastructures in extreme weather and specific scenes, analyze the operating conditions of infrastructures in a non-isolated manner, and implement effective reliable operation measures is one of the problems to be solved.
The importance of the actual city infrastructure is known by city managers, and a lot of operation monitoring devices and facilities are correspondingly distributed, but because the operation rule of the city-level system cannot be mastered, effective comprehensive utilization among all data acquisition sources cannot be achieved, and meanwhile, how to extract effective data from the data and analyze the actual state of the system operation lacks corresponding knowledge and theory. Meanwhile, the disturbance of the actual outside to the infrastructure occurs locally, the influence of the disturbance on the local part is analyzed, and then the disturbance gradually expands to a part along with the relevance of the system structure and function, and finally the disturbance spreads to the whole system. How to grasp the whole fault propagation process and establish a whole set of effective analysis means aiming at the fault propagation process are the problems to be solved at present.
Disclosure of Invention
The invention aims to solve the problem of discovering weak links in a city infrastructure group network and formulating an implementation promotion strategy aiming at the operation characteristics of the city infrastructure group network, and constructs a city key infrastructure management method based on an elasticity theory from the establishment of city infrastructure group elasticity parameters, the excavation of key infrastructures and the formulation and implementation of a targeted strategy by utilizing a cascading failure model and an elasticity analysis theory, and provides a city key infrastructure management method, electronic equipment and a storage medium.
In order to achieve the purpose, the invention is realized by the following technical scheme:
a management method of a city key infrastructure comprises the following steps:
s1, constructing an elasticity measurement index of an urban infrastructure group;
s2, extracting key infrastructures of the urban infrastructure group and verifying effectiveness;
the specific implementation method of the step S2 comprises the following steps:
s2.1, according to management requirements, defining key infrastructures as bottleneck type key infrastructures and influencing type key infrastructures, wherein the bottleneck type key infrastructures are the pivot positions of the infrastructures in the urban infrastructure group, and the operation of the urban infrastructure group can be influenced to become the bottleneck type key infrastructures; the influence type key infrastructure is an influence type key infrastructure which is formed by that the load change of the influence type key infrastructure affects the adjacent infrastructures and causes serious overload failure;
s2.2, discovering and verifying validity of bottleneck type key infrastructure, wherein the specific implementation method comprises the following steps:
s2.2.1, analyzing the influence of each infrastructure on an overload failure path under the condition that the infrastructure is overloaded, and specifically, setting an infrastructure group G 1 In which contains N 1 An infrastructure, defining an overload level OLL of the infrastructure as:
OLL i (t)is composed oftCore infrastructure of time of dayiOf the level of overload of (a) of (b),FV i (t)is composed oftOf time of dayiThe value of the operating function of (c),MC i is composed ofiThe maximum capacity of (c);
s2.2.2, setting the parameter of the elastic bottleneck asRBPIncluding flexible bottleneck path parametersRBRPFunctional parameters of elastic bottleneckRBFP;
S2.2.3, the elastic bottleneck path parameter is the proportion of the infrastructure on the overload path, and the definition formula is as follows:
wherein, the first and the second end of the pipe are connected with each other,OLL(FI q ) Is shown asqThe operating parameters of the infrastructure are increased tolThe sum of all infrastructure overload levels under double conditions,RBRP(l,i) RepresentiThe operating parameter is increased tolThe elastic bottleneck path parameters under the double condition,OLL i is composed ofiAn overload level of;
normalizing the elastic bottleneck path parameters of the infrastructure to obtain the normalized elastic bottleneck path parameters as follows:
wherein the content of the first and second substances,to representiThe elastic bottleneck path parameters after normalization are used,RBRP(l,q) Representing infrastructureqThe operating parameter is increased tolElastic bottleneck path parameters under double conditions;
s2.2.4, the function parameter of the elastic bottleneck is the influence of the infrastructure on the function, and the definition formula is as follows:
wherein, the first and the second end of the pipe are connected with each other,RBFP(l,i) To representiThe operating parameter is increased tolThe functional parameters of the elastic bottleneck under the double conditions,is shown asqThe infrastructure is the infrastructure under the condition of initial disturbanceiThe elasticity index under the failure condition does not occur,is shown asqThe infrastructure is the infrastructure under the condition of initial disturbanceiElasticity index under failure condition;
normalizing the elastic bottleneck function parameters of the infrastructure to obtain the normalized elastic bottleneck function parameters as follows:
wherein the content of the first and second substances,representing the elastic bottleneck function parameter after i normalization,RBFP(l,q) Representing infrastructureqThe operating parameter is increased tolThe functional parameters of the elastic bottleneck under the double condition;
s2.2.5, verifying the effectiveness of the excavated bottleneck type key infrastructure, including structural verification and functional verification;
s2.2.6, the specific implementation method of structural verification is to calculate the betweenness distribution condition of the original infrastructure group connection structure, the betweenness is a global geometric quantity, the action and the influence of the infrastructure in the whole network are reflected, the influence of the infrastructure on the structure is evaluated by analyzing the betweenness distribution condition of the infrastructure, and the betweenness B is defined as follows:
wherein the content of the first and second substances,n jk representing infrastructurejAndkthe number of shortest paths between the first and second nodes,n jk (i) Representing nodesjAndkin the shortest path betweeniThe number of the (c) is greater than the total number of the (c),B i is composed ofiThe betweenness of (A);
s2.2.7, the specific implementation method of the functional verification comprises the following steps: removing each infrastructure in consideration of the definition of the bottleneck, reconnecting the original structure according to the change condition of the load flow direction, namely bypassing the infrastructure, and realizing direct connection, so that the elasticity before and after removal is calculated and compared, and the discovery function of the bottleneck type key infrastructure is verified;
s2.3, excavating and verifying effectiveness of the influence type key infrastructure;
and S3, providing a management method of the urban key infrastructure.
Further, the method for specifically implementing the elasticity measurement index for constructing the urban infrastructure group in step S1 includes the following steps:
s1.1, counting the operation data of the urban infrastructure, and converting the operation data of the urban infrastructure into an operation function value of the urban infrastructure;
s1.2, extracting the facility corresponding to the attribute of the urban infrastructure as a core infrastructure based on the running function value of the urban infrastructure according to the urban ruleDie set maximum radiusD max CalculatingD max Sequence of infrastructure operational function values and core infrastructure in a city infrastructure group within rangeiPearson correlation coefficient between:
PPMCC i,j is composed ofjSequence of infrastructure operational function values andipearson correlation coefficient therebetween, cov: (i,j) Is composed ofiAndjthe covariance of the running function value sequence of (a),is composed ofiThe standard deviation of (a) is determined,is composed ofjThe standard deviation of (a);
s1.3, dividing city infrastructure groups: through Pearson correlation coefficient, obtainDividing urban infrastructure groups;
representation to core infrastructureiIn the case of a non-woven fabric,jwhether within its central infrastructure group, a value of 1 indicates inside it, and 0 is outside it;
performing the operations of the steps S1.2-S1.3 on the core infrastructure to complete the division of the city infrastructure groups to obtain Z infrastructure groups;
s1.4, establishing a cascading failure model of the infrastructure group;
s1.5, establishing an elasticity measurement index based on the cascade failure model of the infrastructure group.
Further, the specific implementation method of step S1.4 includes the following steps:
s1.4.1, defining initial disturbance as increasing load value of infrastructure based on definition of cascade failure model, and for urban infrastructurejComprises the following steps:
as an infrastructurejThe maximum capacity of the battery pack is set,TP j as an infrastructurejThe tolerance parameter(s) of (a),as an infrastructurejInitial load of (2):
s1.4.2, after cascade failure occurs, deleting overloaded infrastructurejInfrastructure, infrastructurejWill be distributed to first order neighbors according to connection strengthkThe distribution ratio is as follows:
is composed ofjAndkthe normalized strength of the connection therebetween is such that,is composed ofjAndkthe strength of the connection between the two parts,is composed ofjAndmthe strength of the connection between the two parts,mis composed ofQAny one of the above-mentioned (a) and (b),Qto and from the infrastructurejA connected first-order neighbor set;
S1.4.3、kdistributed load andkthe intensity after normalization is proportional, as follows:
is composed ofkThe value of the operational function of the assigned load,FV j as an infrastructurejAn operating function value of;
s1.4.4, comparisonkUpdate load of (2) andkdetermines whether further removal is requiredk:
Is composed ofkIs set to a value of (a) in (b),MC k is composed ofk0 for removal and 1 for retention;
s1.4.5, repeating the steps S1.4.1-S1.4.4, removing the connection and connection strength of the affected infrastructure, and normalizing again until the city infrastructure group returns to the balance state again;
s1.4.6, after the core infrastructure is overloaded, the core infrastructure is reserved, the functional value of the maximum redundancy upper limit of the core infrastructure is maintained to operate, and the overload load of the infrastructure is not distributed.
Further, the specific implementation method of step S1.5 includes the following steps:
s1.5.1, setting the fault propagation time as follows based on a cascade failure model of the urban infrastructure group:
is composed ofjIs propagated tokThe time of (2) is greater than the time of (c),is composed ofjTokThe time taken for the euclidean distance;
s1.5.2, setting the state parameter of the urban infrastructure group as the overload total SCP of the urban infrastructure group, and then setting the elastic parameter of the urban infrastructure groupRComprises the following steps:
wherein the content of the first and second substances,t 0 is the starting moment of the elastic triangle,t 1 the ending time of the elastic triangle, Y is the total number of overload stages,the average time of load transfer objects of all failed infrastructure for cascade failure at level h,Q h is a first-order neighbor set of infrastructure overloaded in cascade failure of the h-th stage,mis Q h In the above-mentioned manner, any one of,N h for the number of infrastructure overloaded in the cascade failure of the h-th stage,is composed ofkIs propagated tomTime of (c).
Further, the specific implementation method of step S2.3 includes the following steps:
s2.3.1, setting the elasticity influence parameter asRIPIncluding elastic operational influencing parametersROIPAnd elastic connection influencing parameterRLIP;
S2.3.2, considering the actual operation process of the infrastructure, firstly, the proportion of the operation load to all the infrastructure loads in the infrastructure group and the relation between the infrastructure operation parameter and the tolerance upper limit are defined, and the elastic operation influence parameter of the infrastructure is definedROIPComprises the following steps:
wherein the content of the first and second substances,ROIP(l,i) To representiThe operating parameter is increased tolThe elastic operation under the double condition influences the parameters,to representqThe value of the operating function of (c),to representiAn operating function value of;
normalizing the elastic operation influence parameters of the infrastructure to obtain the normalized elastic operation influence parameters as follows:
wherein the content of the first and second substances,to representiThe elastic behavior-affecting parameter after normalization,ROIP(l,q) Representing infrastructureqThe operating parameter is increased tolUnder double conditionsAn elastic operational impact parameter;
s2.3.3, consideration ofiThe effect on the operation of the surrounding infrastructure, i.e. wheniThe influence of overload on the operation of peripheral infrastructure occurs, and the flexible connection influences the parametersRLIPComprises the following steps:
wherein the content of the first and second substances,ROIP(i) RepresentiThe elastic connection of (a) influences the parameter, wherein,representing infrastructureiThe operating parameter is increased tolThe elastic parameter under the double condition is that,ufor the number of times the operating parameter is increased,as an infrastructureiThe operating parameter is increased toThe elastic parameter under the double condition of the rubber,is a multiple of the increase in the operating parameter;
normalizing the elastic connection influence parameters of the infrastructure to obtain the normalized elastic connection influence parameters as follows:
wherein the content of the first and second substances,to representiThe elastic connection after normalization affects the parameters,RLIP(q) Representing infrastructureqThe elastic connection influencing parameter of (a);
calculating an average elastic connection impact parameter of the infrastructure group G1 as:
s2.3.4, verifying the effectiveness of the excavated influence type key infrastructure, including structural verification and functional verification;
s2.3.5, structural verification: evaluating the influence of a single infrastructure in an infrastructure group by calculating degree distribution in the infrastructure group structure, wherein the degree of the infrastructure refers to the number of edges associated with the infrastructure, and the number of edges is the number of first-order neighbors connected with the infrastructure;
s2.3.6, functional verification: assuming that the tolerance upper limit of the discovered impact type key infrastructure is set to be infinite, and the condition of overload failure cannot occur, calculating the impact on an overload failure path, and introducing an elastic maximum impact parameter RMIP as follows:
RMIP(l)indicating an increase in an operating parameter oflThe elasticity at times has the greatest influence on the parameters.
Further, the specific implementation method of step S3 includes the following steps:
s3.1, changing the existing connection strength matrix, thereby changing the load distribution policy: for theiIn other words, the neighbor nodes after the overload failure process are countedjThe load change condition of (2) is calculated as:
wherein the content of the first and second substances,represents fromiIs transferred tojOccupies a proportion of the real-time redundancy remaining value;
then, N is calculated respectively 1 Of a secondary processp i2j Then, the sequence is sorted from small to large, and the value of 90% quantile is extracted and recorded asExtractingiIn all neighborsThe set of values less than 1/3 is denotedThe connection strength of the infrastructures in the set is changed, in particular, the infrastructures in the set are changedkThe connection strength of (a) is improved by 1.5 times:
for infrastructures not belonging to a setmThe connection strength of (a) is then:
in thatIn the set, the infrastructure in the set which is ranked to the next 30% of the original connection strength by referring to the original connection strength is deleted from the set;
s3.2, adding a connection relation on the basis of the S3.1: with a probability of overload failure of more than 50% among the infrastructure group, ranked in the first half among all infrastructures, and of neighboring nodesAnd the connection relation of the infrastructure with the value summation less than 1/2 and the core infrastructure or the infrastructure with the average value of the OLL sequence within the range of 5km and less than 0.5 is increased, and for the infrastructure x to be connected of i, the connection strength is as follows:
wherein the content of the first and second substances,is composed ofiThe average value of the OLL sequences within the infrastructure,is composed ofxAn OLL sequence mean within the infrastructure;
s3.3, improving the redundancy upper limit of the infrastructure; combining with the excavation of key infrastructure, performing redundancy upper limit lifting on the key infrastructure, obtaining an OLL sequence in an infrastructure group according to the result of an OLL parameter, removing a part smaller than 1 and a value more than 3 times larger than a residual value in the sequence, calculating the average value of the sequence at the moment minus 1, and then determining the improved redundancy upper limit proportion;
s3.4, implementing a combination strategy: for the infrastructure, the combined application is performed on the infrastructure according to the sequence of the connection strength, the connection relation and the improvement of the redundancy upper limit, after a strategy is implemented each time, the elasticity of the urban infrastructure group system is calculated, and the effects of the front elasticity improvement and the rear elasticity improvement are compared.
Electronic device comprising a memory and a processor, the memory storing a computer program, the processor implementing the steps of the method for managing a city critical infrastructure when executing the computer program.
Computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method for managing a city key infrastructure.
The invention has the beneficial effects that:
the method for managing the urban key infrastructure is constructed based on established infrastructures of cities, a cascading failure model and an elasticity analysis theory from the establishment of elasticity parameters of urban infrastructure groups, the excavation of the key infrastructures and the establishment and implementation of a targeted strategy. The main contents are as follows:
from the establishment of the elasticity index of the urban infrastructure group. Firstly, the city infrastructure group is established as an analysis basic unit, on one hand, because the main problem for the operation of the city system is frequent and small-scale disturbance, the actual influence range of the disturbance is not too large, and the actual influence is caused on the periphery of the occurrence point. Therefore, such disturbances and the actual system performance degradation need to be analyzed within a certain range, so as to grasp the actual influence degree and range. Secondly, for some disasters which have low actual occurrence probability but have huge influence on the system and even cause destructive attack, the association between each part of the whole system needs to be analyzed in detail for such black swan events, and the influence on the whole system caused by initial disturbance at the beginning of analysis and the whole evaluation in the subsequent system recovery process are necessary, so that the influence mode between each unit needs to be analyzed from a small analysis unit. Therefore, the method establishes an analysis system with the urban infrastructure group as a basic unit, and restores the fault propagation process among all basic analysis units by means of a cascading failure model. Firstly, considering the most critical batch of all the infrastructure of the actual city, such as an airport, a railway station, a subway junction and the like, screening out the actual influence range of a central point according to a threshold value, and taking all the infrastructure in the range as an infrastructure group. And then, establishing a cascading failure model of the urban infrastructure group based on the cascading failure model. The actual operation data of each infrastructure is unified into the same index through daily supply quantity of resources for daily life of urban residents, the index is used as the load of the infrastructure, the load distribution strategy after overload is calculated according to the calculated space correlation normalized connection strength, and finally the cascade failure process in the whole fault propagation path is simulated.
Finally, according to the definition of the actual elasticity, the method mainly analyzes the number of the disturbance values which can be actually born by the system, namely the tolerance limit of the system elasticity; and analyzing the propagation process of the actual disturbance in the whole system, including the range size in time and space, and leading to the parameter definition of elasticity. Firstly, the method of elastic triangles is introduced into the method, the whole process of initial disturbance occurrence, fault accelerated propagation stage, system recovery stage and system recovery balance state is simulated, and system state parameter values of infrastructure are defined. And finally, calculating to obtain the elastic parameters of the infrastructure by combining the fault propagation time according to the existing load redundancy upper limit value and the distribution quantity of the infrastructure in the actual load distribution process. From the standpoint of the vulnerable infrastructure. The key infrastructure is divided into two types-bottleneck and impact, according to the needs of practical management. Then, specifically, starting from the process of cascade failure of the infrastructure, important infrastructures are discovered according to the occurrence frequency of each infrastructure and the actual overload degree in all failure paths. The method mainly considers the real scene of actual inspection, starts from the path of cascade failure, finds the infrastructure with overload failure at most and the infrastructure with the maximum influence on connection, and considers the overload degree at the same time, thereby measuring the influence of the fault propagation path of the infrastructure. Then, validity verification is performed on different key infrastructures from the structural and functional aspects respectively. Meanwhile, according to the results of the two verification methods, the effectiveness of the two important infrastructure categories is analyzed, and finally the discovery of the key infrastructure is realized.
From the perspective of the formulation and implementation of a targeted strategy. From the above perspective of effectiveness analysis, it can be found that the vulnerability of the infrastructure group network is mainly reflected in the deficiency of the tolerance upper limit of the individual infrastructure and the difference of the actual connection matrix, that is, the imbalance of the load distribution process, which causes the large-scale overload of the infrastructure group network. In order to prevent the situation, on the basis of the above, the path of the cascading failure needs to be deeply analyzed, and in combination with the tolerance upper limit and the load distribution, a targeted elastic promotion strategy is made from the viewpoint of infrastructure and is implemented on a specific infrastructure. The specific classification is three types: 1. changing an allocation strategy, namely changing a matrix of connection strength, and then calculating the change condition of the elastic value of the infrastructure at two ends of the connection; 2. changing the tolerance upper limit of the infrastructure, considering the magnitude of the elasticity improvement range under a certain condition, and judging whether the method is an effective means or not according to the magnitude; 3. the connection relationship is changed, and the redundancy surplus condition of the core infrastructure within a certain distance range is mainly considered. Therefore, the practical redundancy is fully utilized, and the strategy of improving the elasticity is achieved. According to the three aspects, a strategy for improving the elasticity of the infrastructure group network is established and implemented.
In combination with the three aspects, the invention provides a management method of urban key infrastructure based on the elasticity theory, which has the following advantages:
1. the method simulates the path of the fault propagation of the infrastructure by constructing the cascading failure model of the infrastructure group, provides the elastic index based on the elastic trigonometric theory and excavates the key infrastructure according to the elastic index. The whole analysis process has a strong theoretical basis, and by introducing an index quantification elasticity method, the elasticity capability of actual infrastructure can be effectively represented, and the real situation can be effectively restored; 2. according to the process of discovering the key infrastructure, firstly, the influence of each infrastructure in the network fault propagation path of the infrastructure group is quantified, and meanwhile, the key infrastructure is divided into two types and quantified and a route is dug respectively, so that the actual management requirement is met. And then, completing comprehensive verification of the mining effectiveness of the key infrastructure from two aspects of structure and function. The mutual influence among the infrastructures is considered in the whole analysis process, and the actual fit is realized. The verification of the effectiveness of the key infrastructure is completed by means of a long-time span and parameterization method, and the result analysis is rigorous, real and effective; 3. in the part of the key infrastructure elastic lifting strategy, various lifting strategies are formulated and the number of specific implementation is given quantitatively. Direct and effective guidance is provided for the management of the actual urban infrastructure group network; 4. in summary, the method is based on a solid theoretical foundation and a mature physical model, realizes the quantitative calculation of the elasticity index by constructing the cascade failure model of the urban infrastructure group network and formulating the elasticity measurement index, and completes the excavation of the urban key infrastructure. Meanwhile, the method is practical, a targeted elastic promotion strategy is provided from three angles, and quantitative evaluation of promotion efficiency is provided, so that important support is provided for a city manager to manage key infrastructure. Meanwhile, quantitative calculation and comparison also provide practical guidance for implementing a targeted system elasticity improvement strategy.
Drawings
FIG. 1 is a flow chart of cascade failure of an infrastructure group of a method for managing a city critical infrastructure according to the present invention;
fig. 2 is a process diagram of the elastic triangle model of the method for managing the city key infrastructure according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail below with reference to the accompanying drawings and the detailed description. It is to be understood that the embodiments described herein are illustrative only and are not limiting, i.e., that the embodiments described are only a few embodiments, rather than all, of the present invention. While the components of the embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations, the present invention is capable of other embodiments.
Thus, the following detailed description of specific embodiments of the present invention, presented in the accompanying drawings, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the detailed description of the invention without inventive step, are within the scope of protection of the invention.
In order to further understand the contents, features and effects of the present invention, the following embodiments are illustrated and described in detail with reference to the accompanying drawings 1-2:
the first embodiment is as follows:
a management method of a city key infrastructure comprises the following steps:
s1, constructing an elasticity measurement index of an urban infrastructure group;
further, the method for specifically realizing the elasticity measurement index of the urban infrastructure group constructed in the step S1 comprises the following steps:
s1.1, counting the operation data of the urban infrastructure, and converting the operation data of the urban infrastructure into an operation function value of the urban infrastructure;
according to the definition of the infrastructure: the system is a material engineering facility for providing public services for social production and resident life, is a public service system for ensuring normal progress of national or regional social and economic activities, is a general material condition on which the society depends to survive, and occupies an important position in the construction and development of the whole city. Therefore, the operation data of the urban infrastructure is uniformly converted into the operation function value according to the support effect of each infrastructure on the urban development and the daily activities of urban residents. The actual control was transformed in eight ways as shown in table 1, the comparison was transformed in terms of consumption per person per day:
TABLE 1 Attribute Table for Key infrastructure
Note: the electricity, water supply and power supply are converted according to the average consumption of people, and other services are converted according to the annual service customer number of a market, for example.
S1.2, extracting the facility corresponding to the attribute of the urban infrastructure as a core based on the running function value of the urban infrastructureHeart infrastructure, set maximum radius according to city scaleD max CalculatingD max Sequence of infrastructure operational function values and core infrastructure in a city infrastructure group within rangeiPearson correlation coefficient between:
PPMCC i,j is composed ofjSequence of infrastructure operational function values andipearson correlation coefficient therebetween, cov: (i,j) Is composed ofiAndjthe covariance of the running function value sequence of (a),is composed ofiThe standard deviation of (a) is determined,is composed ofjThe standard deviation of (a);
s1.3, dividing urban infrastructure groups: through Pearson correlation coefficient, obtainDividing urban infrastructure groups;
representation to core infrastructureiIn the case of a non-woven fabric,jwhether within its central infrastructure group, a value of 1 indicates inside, and 0 is outside;
performing the operations of the steps S1.2-S1.3 on the core infrastructure to complete the division of the city infrastructure groups to obtain Z infrastructure groups;
s1.4, establishing a cascading failure model of the infrastructure group;
further, the specific implementation method of step S1.4 includes the following steps:
s1.4.1, defining initial disturbance as increasing load value of infrastructure based on definition of cascade failure model, and for urban infrastructurejComprises the following steps:
as an infrastructurejThe maximum capacity of the battery pack is set,TP j as an infrastructurejThe tolerance parameter(s) of (a) is (are),as an infrastructurejInitial load of (2):
s1.4.2, after cascade failure occurs, deleting overloaded infrastructurejInfrastructure, infrastructurejWill be assigned to first-order neighbors according to connection strengthskThe distribution ratio is as follows:
is composed ofjAndkthe normalized strength of the connection therebetween is such that,is composed ofjAndkthe strength of the connection between the two parts,is composed ofjAndmthe strength of the connection between the two parts,mis composed ofQAny one of the above-mentioned (a) and (b),Qto and from the infrastructurejFirst order of phase connectionA neighbor set;
S1.4.3、kdistributed load andkthe intensity after normalization is proportional, as follows:
is composed ofkThe value of the operational function of the assigned load,FV j as an infrastructurejAn operating function value of (a);
s1.4.4, comparisonkUpdate load of andkdetermines whether further removal is requiredk:
Is composed ofkIs set to a value of (a) in (b),MC k is composed ofk0 for removal and 1 for retention;
s1.4.5, repeating the steps S1.4.1-S1.4.4, removing the connection and connection strength of the affected infrastructure, and normalizing again until the urban infrastructure group returns to a balance state again;
s1.4.6, after the core infrastructure is overloaded, the core infrastructure is reserved, the functional value of the maximum redundancy upper limit of the core infrastructure is maintained to run, and the overload load of the infrastructure is not distributed;
s1.5, establishing an elasticity measurement index based on a cascading failure model of an infrastructure group;
further, the specific implementation method of step S1.5 includes the following steps:
s1.5.1, setting fault propagation time as follows based on a cascade failure model of an urban infrastructure group:
is composed ofjIs propagated tokThe time of the above-mentioned (c) is,is composed ofjTokThe time taken for the euclidean distance;
s1.5.2, setting the state parameter of the urban infrastructure group as the overload total SCP of the urban infrastructure group, and then setting the elastic parameter of the urban infrastructure groupRComprises the following steps:
wherein the content of the first and second substances,t 0 is the starting moment of the elastic triangle,t 1 the ending time of the elastic triangle, Y is the total number of the overloaded stages,the average time of load transfer objects of all failed infrastructure for cascade failure at level h,Q h is a first order neighbor set of the infrastructure overloaded in the cascade failure of the h-th stage,mis Q h In the above-mentioned manner, any one of,N h for the number of infrastructure overloaded in the cascade failure of the h-th stage,is composed ofkIs propagated tomTime of (d);
s2, extracting key infrastructures of the urban infrastructure group and verifying effectiveness;
first, key infrastructure is classified into bottleneck type and impact type according to the needs of practical management. Then, specifically, starting from the process of cascade failure of the infrastructure, two types of key infrastructures are respectively discovered according to the occurrence frequency of each infrastructure and the actual overload degree in all failure paths. Then, validity verification is carried out on different important infrastructures according to different influence forms of single and combination. The main modes are divided into two types: one is to improve the tolerance upper limit and then analyze the change condition of the cascade failure path under the condition; the second is to consider varying adjacency matrices, thereby changing the load distribution in light of the strength of the connection and ultimately affecting the path of the cascading failure. Meanwhile, according to the results of the two situations, the effectiveness of the two important infrastructure categories is analyzed, and finally the discovery of the key infrastructure is realized.
Key infrastructure is divided into two categories-bottleneck and impact, according to management needs. The specific reasons are: considering the effectiveness of the so-called key infrastructure for the implementation of mining and subsequent promotion strategies, the key infrastructure that city managers are eager to mine is characterized by: it is not necessarily a very important node in its operation, but is actually a critical hub due to its location throughout the network structure. Due to the low functions of the network, the network becomes a bottleneck, namely a bottleneck type, for the operation of the whole network. The system bears huge load operation, and slight load change can greatly affect a plurality of adjacent infrastructures connected with the system and finally cause large-scale overload failure-impact type.
The specific implementation method of the step S2 comprises the following steps:
s2.1, according to management requirements, defining key infrastructures as bottleneck type key infrastructures and influencing type key infrastructures, wherein the bottleneck type key infrastructures are hub positions of the infrastructures in the urban infrastructure group, and the operation of the urban infrastructure group can be influenced to become bottleneck type key infrastructures; the influence type key infrastructure is an influence type key infrastructure, wherein the load change of the influence type key infrastructure affects the adjacent infrastructures connected with each other and causes serious overload failure, and the influence type key infrastructure becomes the influence type key infrastructure;
s2.2, discovering bottleneck type key infrastructure and verifying effectiveness, wherein the specific implementation method comprises the following steps:
s2.2.1, analyzing the influence of each infrastructure on an overload failure path under the condition that the infrastructure is overloaded, and specifically, setting an infrastructure group G 1 In which contains N 1 An infrastructure, defining an overload level OLL of the infrastructure as:
OLL i (t)is composed oftCore infrastructure of time of dayiThe level of overload of (a) is,FV i (t)is composed oftOf time of dayiThe value of the operating function of (c),MC i is composed ofiThe maximum capacity of (c);
s2.2.2, setting the parameter of the elastic bottleneck asRBPIncluding flexible bottleneck path parametersRBRPFunctional parameters of elastic bottleneckRBFP;
S2.2.3, the elastic bottleneck path parameter is the proportion of the infrastructure on the overload path, and the definition formula is as follows:
wherein the content of the first and second substances,OLL(FI q ) Is shown asqThe operating parameters of the infrastructure are increased tolThe sum of all infrastructure overload levels under double conditions,RBRP(l,i) To representiIncrease of operating parameterIs composed oflThe elastic bottleneck path parameters under the double condition,OLL i is composed ofiAn overload level of;
normalizing the elastic bottleneck path parameters of the infrastructure to obtain the normalized elastic bottleneck path parameters as follows:
wherein the content of the first and second substances,to representiThe elastic bottleneck path parameters after normalization are used,RBRP(l,q) Representing infrastructureqThe operating parameter is increased tolElastic bottleneck path parameters under double conditions;
s2.2.4, the functional parameters of the elastic bottleneck are the influence of the infrastructure on the function, and the definition formula is as follows:
wherein the content of the first and second substances,RBFP(l,i) RepresentiThe operating parameter is increased tolThe functional parameters of the elasticity bottleneck under the double conditions,denotes the firstqThe infrastructure is the infrastructure under the condition of initial disturbanceiThe elasticity index under the failure condition does not occur,is shown asqThe infrastructure is the infrastructure under the condition of initial disturbanceiElasticity index under failure condition;
normalizing the elastic bottleneck function parameters of the infrastructure to obtain the normalized elastic bottleneck function parameters as follows:
wherein the content of the first and second substances,representing the elastic bottleneck function parameter after i normalization,RBFP(l,q) Representing infrastructureqThe operating parameter is increased tolElastic bottleneck function parameters under double conditions;
s2.2.5, verifying the effectiveness of the excavated bottleneck type key infrastructure, including structural verification and functional verification;
s2.2.6, the specific implementation method of structural verification is to calculate the betweenness distribution condition of the original infrastructure group connection structure, wherein betweenness is global geometric quantity, the action and the influence of the infrastructure in the whole network are reflected, the influence of the infrastructure on the structure is evaluated by analyzing the betweenness distribution condition of the infrastructure, and betweenness B is defined as follows:
wherein, the first and the second end of the pipe are connected with each other,n jk representing infrastructurejAndkthe number of shortest paths between the first and second sets,n jk (i) Representing nodesjAndkin the shortest path betweeniThe number of the (c) is greater than the total number of the (c),B i is composed ofiThe betweenness of (A);
s2.2.7, the specific implementation method of the functional verification comprises the following steps: removing each infrastructure in consideration of the definition of the bottleneck, reconnecting the original structure according to the change condition of the load flow direction, namely bypassing the infrastructure, and realizing direct connection, so that the elasticity before and after removal is calculated and compared, and the discovery function of the bottleneck type key infrastructure is verified;
s2.3, discovering and verifying effectiveness of the influence type key infrastructure;
further, the specific implementation method of step S2.3 includes the following steps:
s2.3.1, setting the elasticity influence parameter asRIPIncluding elastic operational influencing parametersROIPAnd elastic connection influencing parameterRLIP;
S2.3.2, considering the actual operation process of the infrastructure, firstly, the proportion of the operation load to all the infrastructure loads in the infrastructure group and the relation between the infrastructure operation parameter and the tolerance upper limit are defined, and the elastic operation influence parameter of the infrastructure is definedROIPComprises the following steps:
wherein, the first and the second end of the pipe are connected with each other,ROIP(l,i) To representiThe operating parameter is increased tolThe elastic operation under the double condition influences the parameter,to representqThe value of the operating function of (c),representiAn operating function value of (a);
normalizing the elastic operation influence parameters of the infrastructure to obtain the normalized elastic operation influence parameters as follows:
wherein, the first and the second end of the pipe are connected with each other,representiThe elastic behavior-affecting parameter after normalization is performed,ROIP(l,q) Representing infrastructureqThe operating parameter is increased tolElastic operation influence parameters under multiple conditions;
s2.3.3, consideriThe effect on the operation of the surrounding infrastructure, i.e. wheniThe influence of overload on the operation of peripheral infrastructure occurs, and the flexible connection influences the parametersRLIPComprises the following steps:
wherein the content of the first and second substances,ROIP(i) To representiThe elastic connection of (a) influences the parameter, wherein,representing infrastructureiThe operating parameter is increased tolThe elastic parameter under the double condition is that,ufor the number of times the operating parameter is increased,as an infrastructureiThe operating parameter is increased toThe elastic parameter under the double condition is that,is a multiple of the increase in the operating parameter;
normalizing the elastic connection influence parameters of the infrastructure to obtain the normalized elastic connection influence parameters as follows:
wherein the content of the first and second substances,representiThe elastic connection after normalization affects the parameters,RLIP(q) Representing infrastructureqThe elastic connection influencing parameter;
calculating an average elastic connection impact parameter of the infrastructure group G1 as:
s2.3.4, verifying the effectiveness of the excavated influence type key infrastructure, including structural verification and functional verification;
s2.3.5, structural verification: evaluating the influence of a single infrastructure in an infrastructure group by calculating degree distribution in the infrastructure group structure, wherein the degree of the infrastructure refers to the number of edges associated with the infrastructure, and the number of edges is the number of first-order neighbors connected with the infrastructure;
s2.3.6, functional verification: assuming that the tolerance upper limit of the discovered impact type key infrastructure is set to be infinite, and the condition of overload failure cannot occur, calculating the impact on an overload failure path, and introducing an elastic maximum impact parameter RMIP as follows:
RMIP(l)indicating an increase in an operating parameter tolElasticity maximum influence parameter at times;
and S3, providing a management method of the urban key infrastructure.
And (4) making and implementing a targeted elasticity improvement strategy. Starting from the overload failure of the infrastructure group, the most direct idea is to directly increase the redundancy upper limit of the infrastructure, but in practice, the redundancy upper limit is a relatively fixed value, and it is difficult to greatly increase the redundancy upper limit. Therefore, in this section, raising the upper redundancy limit will serve as a third strategy. City managers invest a lot of resources in infrastructure group construction, and due to various reasons, the resources are not fully utilized, and the utilization rate is low. The actual performance is that the load distribution strategy after overload is not reasonable, resulting in short board effect. Therefore, first, considering overcoming the short board effect, a strategy of flexibly promoting the infrastructure group is implemented in terms of the connection matrix and the connection relation. Is divided into three parts.
Further, the specific implementation method of step S3 includes the following steps:
s3.1, changing the existing connection strength matrix, thereby changing the load distribution policy: for theiIn other words, the neighbor nodes after the overload failure process are countedjThe load change condition of (2) is calculated as:
wherein the content of the first and second substances,represents fromiIs transferred tojOccupies a proportion of the real-time redundancy remaining value;
then, N is calculated respectively 1 Of a second processp i2j Then, the sequence is sorted from small to large, and the value of 90% quantile is extracted and recorded asExtracting ofiIn all neighborsThe set of values less than 1/3 is denotedThe connection strength of the infrastructures in the set is changed, in particular, the infrastructures in the set are changedkThe connection strength of (a) is improved by 1.5 times:
for infrastructures not belonging to a setmThe connection strength of (a) is then:
in thatIn the set, the infrastructure in the set which is ranked to the rear 30% of the original connection strength by referring to the original connection strength is deleted from the set;
s3.2, adding a connection relation on the basis of the S3.1: for overload failure probability of more than 50% among infrastructure group, first half of all infrastructures, and neighbor nodesAnd the connection relation of the infrastructure with the value accumulated less than 1/2 and the infrastructure with the average value of the core infrastructure or the OLL sequence within the range of 5km radius less than 0.5 is increased, and for the infrastructure x to be connected of i, the connection strength is as follows:
wherein, the first and the second end of the pipe are connected with each other,is composed ofiThe average value of the OLL sequences within the infrastructure,is composed ofxAn OLL sequence mean within the infrastructure;
s3.3, improving the redundancy upper limit of the infrastructure; combining with the excavation of key infrastructure, performing redundancy upper limit lifting on the key infrastructure, obtaining an OLL sequence in an infrastructure group according to the result of an OLL parameter, removing a part smaller than 1 and a value more than 3 times larger than a residual value in the sequence, calculating the average value of the sequence at the moment minus 1, and then determining the improved redundancy upper limit proportion;
s3.4, implementing a combination strategy: for the infrastructure, the combined application is performed on the infrastructure according to the sequence of the connection strength, the connection relation and the improvement of the redundancy upper limit, after a strategy is implemented each time, the elasticity of the urban infrastructure group system is calculated, and the effects of the front elasticity improvement and the rear elasticity improvement are compared.
In combination with the three aspects, the invention provides a management method of urban key infrastructure based on elastic theory, which has the following advantages:
1. the method simulates the path of infrastructure fault propagation by constructing the cascading failure model of the infrastructure group, and provides the elastic index based on the elastic trigonometric theory, thereby realizing the quantitative calculation of the elastic index and completing the excavation of the urban key infrastructure. The whole analysis process has a strong theoretical basis, and by introducing an index quantification elasticity method, the elasticity capability of actual infrastructure can be effectively represented, and the real situation can be effectively restored; 2. in the process of discovering the key infrastructure, the influence of each infrastructure in the network fault propagation path of the infrastructure group is quantified, and meanwhile, the key infrastructure is divided into two types and quantified and discovered routes are implemented respectively, so that the process accords with the actual management requirement. And then completing verification of the mining effectiveness of the key infrastructure from two aspects of structure and function. The mutual influence among infrastructure is considered in the whole analysis process, and the fit is practical. The verification on the effectiveness of the key infrastructure is completed by means of a long-time span and parameterization method, and the result analysis is rigorous, real and effective; 3. in the part of the key infrastructure elastic lifting strategy, various lifting strategies are made and the number of specific implementation is given quantitatively. Direct and effective guidance is provided for actual urban infrastructure group network management; 4. in summary, the invention is based on a solid theoretical foundation and a mature physical model, and realizes the excavation of the urban key infrastructure by constructing the cascade failure model of the urban infrastructure group network and formulating the elasticity measurement index. Meanwhile, the method is practical, a targeted elastic promotion strategy is provided from three angles, and quantitative evaluation of promotion efficiency is provided, so that important support is provided for a city manager to manage key infrastructure. Meanwhile, quantitative calculation and comparison also provide practical guidance for implementing a targeted system elasticity improvement strategy.
The second embodiment is as follows:
electronic equipment, comprising a memory and a processor, wherein the memory stores a computer program, and the processor implements the steps of a method for managing a city critical infrastructure according to one embodiment when executing the computer program.
Further, the computer device of the present invention may be a device including a processor, a memory, and the like, for example, a single chip microcomputer including a central processing unit, and the like. And the processor is used for implementing the steps of the recommendation method capable of modifying the relationship-driven recommendation data based on the CREO software when executing the computer program stored in the memory.
The Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. In addition, the memory may include high-speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
The third concrete implementation mode:
a computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out a method for managing a city critical infrastructure according to one of the detailed description.
The key points and points to be protected of the technology of the invention are as follows:
firstly, the method is to restore the fault propagation path of the infrastructure by constructing a cascading failure model of the urban infrastructure group network and realize the excavation of the key infrastructure based on the analysis of the influence of each infrastructure on the path.
The excavation of key infrastructure is divided into two types, namely bottleneck type and influence type according to the requirement of actual management, different quantification methods are provided for different types, and the quantification methods are used in the specific excavation process
For the excavated key infrastructure, the comprehensive verification of the excavation effectiveness of the two key infrastructures is realized from the structural and functional aspects
Aiming at improving the strategy of the urban key infrastructure, the implementation of the strategy implementation effectiveness is completed in a quantitative calculation mode from the three angles of a connection strength matrix, a connection relation and a tolerance upper limit.
Abbreviations and key term definitions of the present invention:
resilience Maintain Efficiency: RME, elastic retention efficiency; resilience Zero-Value Parameter: RZP, elastic zero value parameter; fundamental Infrastructure Group: FIG, infrastructure group; maximum Resilience recovery Parameter: MRRP, maximum elastic recovery parameter; pearson Product-motion Correlation Coefficient: PPMCC, pearson correlation coefficient; network resource Dispersal Efficiency: RNDE, network resiliency grooming efficiency; initial Load: IL, initial load; maximum Capacity: MC, maximum capacity; tolerance Parameter: TP, tolerance parameter; resilience Triangle: RT, elastic triangle; parameter: PRM, parameter; system Condition Parameter: SCP, system state parameters; fuction Values: FV, functional value; network resource Index: RNI, network elasticity index; fundamental Infrastructure: FI, infrastructure; overload Level: OLL, overload level; resilience bottleeck Parameter: RBP, elastic bottleneck parameter; resilence Bottleneck Route Parameter: RBRP, elastic bottleneck path parameters; resilence Bottleneck Function Parameter: RBFP, elastic bottleneck function parameter; resilience Linked Impact Parameter: RLIP, flexible connection impact parameter; resilence Operation Impact Parameter: ROIP, elastic operation impact parameter; resilience Impact Parameter: RIP, elastic impact parameters; resilance Maximum Impact Parameter: RMIP, resilience maximum impact parameter.
It is noted that relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms include, or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that includes a list of elements does not include only those elements but also other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the inclusion of a element by a statement of \8230 @ 8230 @, does not exclude the presence of additional like elements in a process, method, article or apparatus that includes the element.
While the application has been described above with reference to specific embodiments, various modifications may be made and equivalents may be substituted for elements thereof without departing from the scope of the application. In particular, the various features of the embodiments disclosed herein may be used in any combination that is not inconsistent with the structure, and the failure to exhaustively describe such combinations in this specification is merely for brevity and resource conservation. Therefore, it is intended that the application not be limited to the particular embodiments disclosed, but that the application will include all embodiments falling within the scope of the appended claims.
Claims (6)
1. A management method of a city key infrastructure is characterized by comprising the following steps: the method comprises the following steps:
s1, constructing an elasticity measurement index of an urban infrastructure group;
s1, the specific implementation method for constructing the elasticity measurement indexes of the urban infrastructure group comprises the following steps:
s1.1, counting the operation data of the urban infrastructure, and converting the operation data of the urban infrastructure into an operation function value of the urban infrastructure;
s1.2, extracting the facility corresponding to the attribute of the urban infrastructure as a core infrastructure based on the running function value of the urban infrastructure, and setting the maximum radius D according to the urban scale max Calculating D max Pearson's correlation coefficient between the sequence of infrastructure operational function values in the city infrastructure group and the core infrastructure i within the range:
PPMCC i,j for the Pearson correlation coefficient between the j infrastructure running function value sequence and i, cov (i, j) is the covariance of the running function value sequences of i and j, σ i Is the standard deviation of i, σ j Is the standard deviation of j;
s1.3, dividing city infrastructure groups: obtaining F through Pearson correlation coefficient i (j) Dividing urban infrastructure groups;
F i (j) Indicates whether j is within its centered infrastructure group for core infrastructure i, with a value of 1 indicating it is inside, and 0 indicating it is outside;
performing the operations of the steps S1.2-S1.3 on the core infrastructure to complete the division of the city infrastructure groups to obtain Z infrastructure groups;
s1.4, establishing a cascading failure model of the infrastructure group;
s1.5, establishing an elasticity measurement index based on a cascading failure model of an infrastructure group;
s2, extracting key infrastructures of the urban infrastructure group and verifying effectiveness;
the specific implementation method of the step S2 comprises the following steps:
s2.1, according to management requirements, defining key infrastructures as bottleneck type key infrastructures and influencing type key infrastructures, wherein the bottleneck type key infrastructures are the pivot positions of the infrastructures in the urban infrastructure group, and the operation of the urban infrastructure group can be influenced to become the bottleneck type key infrastructures; the influence type key infrastructure is an influence type key infrastructure, wherein the load change of the influence type key infrastructure affects the adjacent infrastructures connected with each other and causes serious overload failure, and the influence type key infrastructure becomes the influence type key infrastructure;
s2.2, discovering bottleneck type key infrastructure and verifying effectiveness, wherein the specific implementation method comprises the following steps:
s2.2.1, analyzing the influence of each infrastructure on an overload failure path under the condition that the infrastructure is overloaded, and specifically, setting an infrastructure group G 1 In which contains N 1 Infrastructure, defining the overload level OLL of the infrastructure as:
OLL i (t) overload level of core infrastructure i, FV, at time t i (t) is the operating function value of i at time t, MC i A maximum capacity of i;
s2.2.2, setting the elastic bottleneck parameter as RBP, wherein the elastic bottleneck parameter comprises an elastic bottleneck path parameter RBRP and an elastic bottleneck function parameter RBFP;
s2.2.3, the elastic bottleneck path parameter is the proportion of the infrastructure on the overload path, and the definition formula is as follows:
wherein, OLL (FI) q ) Represents the sum of overload levels of all infrastructures under the condition that the operating parameter of the q-th infrastructure is increased by l times, and RBRP (l, i) represents the elastic bottleneck path parameter under the condition that the operating parameter of i is increased by l times, OLL i An overload level of i;
normalizing the elastic bottleneck path parameters of the infrastructure to obtain the normalized elastic bottleneck path parameters as follows:
wherein, RBRP' (l, i) represents the elastic bottleneck path parameter after i normalization, and RBRP (l, q) represents the elastic bottleneck path parameter under the condition that the operation parameter of the infrastructure q is increased by l times;
s2.2.4, the function parameter of the elastic bottleneck is the influence of the infrastructure on the function, and the definition formula is as follows:
wherein RBFP (l, i) represents an elastic bottleneck function parameter R 'under the condition that i operation parameter is increased by l times' q Represents the elasticity index of the q-th infrastructure under the condition that the i infrastructure does not fail under the initial disturbance condition, R q Representing the elasticity index of the q-th infrastructure under the condition of failure of the infrastructure i under the condition of initial disturbance;
normalizing the elastic bottleneck function parameters of the infrastructure to obtain the normalized elastic bottleneck function parameters as follows:
wherein, RBFP' (l, i) represents the elastic bottleneck function parameter after i normalization, and RBFP (l, q) represents the elastic bottleneck function parameter under the condition that the operation parameter of the infrastructure q is increased by l times;
s2.2.5, verifying the effectiveness of the excavated bottleneck type key infrastructure, including structural verification and functional verification;
s2.2.6, the specific implementation method of structural verification is to calculate the betweenness distribution condition of the original infrastructure group connection structure, the betweenness is a global geometric quantity, the action and the influence of the infrastructure in the whole network are reflected, the influence of the infrastructure on the structure is evaluated by analyzing the betweenness distribution condition of the infrastructure, and the betweenness B is defined as follows:
wherein n is jk Number, n, representing shortest path between infrastructures j and k jk (i) Representing the number of i passes in the shortest path between nodes j and k, B i Is the betweenness of i;
s2.2.7, the specific implementation method of the functional verification comprises the following steps: removing each infrastructure in consideration of the definition of the bottleneck, reconnecting the original structure according to the change condition of the load flow direction, namely bypassing the infrastructure, and realizing direct connection, so that the elasticity before and after removal is calculated and compared, and the discovery function of the bottleneck type key infrastructure is verified;
s2.3, excavating and verifying effectiveness of the influence type key infrastructure;
the specific implementation method of the step S2.3 comprises the following steps:
s2.3.1, setting elastic influence parameters as RIP, including an elastic operation influence parameter ROIP and an elastic connection influence parameter RLIP;
s2.3.2, considering the actual operation process of the infrastructure, firstly, the proportion of the operation load to all the infrastructure loads in the infrastructure group and the relation between the infrastructure operation parameter and the tolerance upper limit, and defining the resilient operation influence parameter ROIP of the infrastructure as follows:
wherein ROIP (l, i) represents an elastic operation influencing parameter under the condition that i operation parameter is increased by l times, FV q Represents the running function value of q, FV i Represents the operating function value of i;
normalizing the elastic operation influence parameters of the infrastructure to obtain the normalized elastic operation influence parameters as follows:
wherein, ROIP' (l, i) represents the elastic operation influence parameter after i normalization, and ROIP (l, q) represents the elastic operation influence parameter under the condition that the infrastructure q operation parameter is increased by l times;
s2.3.3, considering the influence of i on the operation of peripheral infrastructures, namely when the i is overloaded and influences the operation of the peripheral infrastructures, the resilient connection impact parameter RLIP is as follows:
wherein ROIP (i) represents an elastic connection impact parameter of i, wherein R (l, i) represents an elastic parameter under the condition that an operation parameter of infrastructure i is increased by l times, u is the increasing frequency of the operation parameter, R (0.05. U +1, i) represents an elastic parameter under the condition that the operation parameter of infrastructure i is increased by 0.05. U +1 times, and 0.05. U +1 is the increasing multiple of the operation parameter;
normalizing the elastic connection influence parameters of the infrastructure to obtain the normalized elastic connection influence parameters as follows:
wherein RLIP' (i) represents the elastic connection impact parameter after i normalization, RLIP (q) represents the elastic connection impact parameter of the infrastructure q;
calculating an average elastic connection impact parameter of the infrastructure group G1 as:
s2.3.4, verifying the effectiveness of the excavated influence type key infrastructure, including structural verification and functional verification;
s2.3.5, structural verification: evaluating the influence of a single infrastructure in an infrastructure group by calculating degree distribution in the infrastructure group structure, wherein the degree of the infrastructure refers to the number of edges associated with the infrastructure, and the number of edges is the number of first-order neighbors connected with the infrastructure;
s2.3.6, functional verification: assuming that the tolerance upper limit of the discovered impact type key infrastructure is set to be infinite, and the condition of overload failure cannot occur, calculating the impact on an overload failure path, and introducing an elastic maximum impact parameter RMIP as follows:
RMIP (l) represents the elasticity maximum impact parameter when the operating parameter is increased by a factor of l;
and S3, providing a management method of the urban key infrastructure.
2. A method of managing a critical infrastructure in a city according to claim 1, wherein: the specific implementation method of the step S1.4 comprises the following steps:
s1.4.1, defining initial disturbance as a load value of an increased infrastructure based on the definition of a cascade failure model, wherein for an urban infrastructure j:
MC j =(1+TP j )·IL j
MC j is the maximum capacity of infrastructure j, TP j For the tolerance parameter of infrastructure j, IL j For the initial load of infrastructure j:
s1.4.2, when cascade failure occurs, deleting the overloaded infrastructure j, and distributing the load of the infrastructure j to a first-order neighbor k according to the connection strength, wherein the distribution ratio is as follows:
L' j,k is the normalized connection strength between j and k, L j,k Is the strength of the connection between j and k, L j,m Is the connection strength between j and m, m is any one of Q, Q is a first-order neighbor set connected with the infrastructure j;
s1.4.3, the load distributed to k is in proportion to the intensity after k normalization, and the following formula is shown:
FV j2k =FV j ·L' j,k
FV j2k the value of the running function, FV, of the load assigned to k j Is the operating function value of infrastructure j;
then updated load FV 'on k' k Comprises the following steps:
FV′ k =FV k +FV j2k =FV k +FV j ·L' j,k
s1.4.4, comparing the relation between the updating load of k and the maximum capacity of k, and determining whether further k removal is needed:
e (k) is the state value of k, MC k Maximum capacity of k, 0 for removal, 1 for retention;
s1.4.5, repeating the steps S1.4.1-S1.4.4, removing the connection and connection strength of the affected infrastructure, and normalizing again until the urban infrastructure group returns to a balance state again;
s1.4.6, after the core infrastructure is overloaded, the core infrastructure is reserved, the functional value of the maximum redundancy upper limit of the core infrastructure is maintained to operate, and the overload load of the infrastructure is not distributed.
3. A method of managing a critical infrastructure in a city according to claim 2, wherein: the specific implementation method of the step S1.5 comprises the following steps:
s1.5.1, setting fault propagation time as follows based on a cascade failure model of an urban infrastructure group:
T j2k time for the load of j to propagate on k, t j2k The time taken for the distance j to k Euclidean;
s1.5.2, setting the state parameter of the urban infrastructure group as the overload total SCP of the urban infrastructure group, and then setting the elasticity parameter R of the urban infrastructure group as follows:
wherein, t 0 Is the starting time of the elastic triangle, t 1 The ending time of the elastic triangle, Y is the total number of overload stages,the average time of load transfer objects of all failed infrastructure for cascade failure at level h,Q h is a first-order neighbor set of the infrastructure overloaded in the cascade failure of the h-th stage, m is Q h Any one of (1), N h Number of infrastructures overloaded in cascade failure of h-th stage, T k2m The time for a load of k to propagate on m.
4. A method of managing a critical infrastructure in a city according to claim 3, wherein: the specific implementation method of the step S3 comprises the following steps:
s3.1, changing the existing connection strength matrix, thereby changing the load distribution strategy: for i, counting the load change condition of the neighbor node j after the overload failure process, and calculating as follows:
wherein p is i2j Representing the proportion of the load transferred from i to j occupying the real-time redundancy surplus value;
then, N is calculated respectively 1 P of sub-Process i2j Then, the sequence is sorted from small to large, and the value of 90% quantile is extracted and recorded as p i2j (90%) extract i all neighbors p i2j The set of values less than 1/3 is denotedChanging the connection strength of the infrastructure in the set, specifically, increasing the connection strength of the infrastructure k in the set by 1.5 times:
for the connection strengths of infrastructures m that do not belong to the set, then:
in thatIn the set, the infrastructure in the set with the later original connection strength is deleted from the set by referring to the original connection strength ranking;
s3.2, adding a connection relation on the basis of the S3.1: p for over 50% probability of overload failure among infrastructure group, first half ordered among all infrastructures, and neighbor nodes i2j And the connection relation of the infrastructure with the value summation less than 1/2 and the core infrastructure or the infrastructure with the average value of the OLL sequence within the range of 5km and less than 0.5 is increased, and for the infrastructure x to be connected of i, the connection strength is as follows:
wherein the content of the first and second substances,is the OLL sequence average of i within the infrastructure,is the OLL sequence average of x within the infrastructure;
s3.3, improving the redundancy upper limit of the infrastructure; combining with the excavation of key infrastructure, performing redundancy upper limit lifting on the key infrastructure, obtaining an OLL sequence in an infrastructure group according to the result of an OLL parameter, removing a part smaller than 1 and a value more than 3 times larger than a residual value in the sequence, calculating the average value of the sequence at the moment minus 1, and then determining the improved redundancy upper limit proportion;
s3.4, implementing a combination strategy: for the infrastructure, according to the sequence of the connection strength, the connection relation and the improvement of the redundancy upper limit, the combined application is applied to the infrastructure, after a strategy is implemented each time, the elasticity of the urban infrastructure group system is calculated, and the effects of the elasticity capacity improvement before and after the calculation are compared.
5. Electronic device, characterized in that it comprises a memory and a processor, the memory storing a computer program, the processor implementing the steps of a method for the management of a city critical infrastructure according to any one of claims 1 to 4 when executing said computer program.
6. Computer-readable storage medium, on which a computer program is stored, which computer program, when being executed by a processor, is adapted to carry out a method for managing a city critical infrastructure as claimed in any one of the claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211028790.5A CN115115283B (en) | 2022-08-26 | 2022-08-26 | Management method of urban key infrastructure, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211028790.5A CN115115283B (en) | 2022-08-26 | 2022-08-26 | Management method of urban key infrastructure, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115115283A CN115115283A (en) | 2022-09-27 |
CN115115283B true CN115115283B (en) | 2023-01-31 |
Family
ID=83335854
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211028790.5A Active CN115115283B (en) | 2022-08-26 | 2022-08-26 | Management method of urban key infrastructure, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115115283B (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114897454A (en) * | 2022-07-14 | 2022-08-12 | 深圳市城市交通规划设计研究中心股份有限公司 | Urban infrastructure group settlement evaluation method, electronic device and storage medium |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6442602B1 (en) * | 1999-06-14 | 2002-08-27 | Web And Net Computing | System and method for dynamic creation and management of virtual subdomain addresses |
US10574529B2 (en) * | 2016-01-11 | 2020-02-25 | Equinix, Inc. | Defining conditional triggers for issuing data center asset information |
CN109993215B (en) * | 2019-03-08 | 2021-08-24 | 浙江大学 | Route guidance method based on traffic big data |
CN110111576B (en) * | 2019-05-16 | 2020-10-09 | 北京航空航天大学 | Method for realizing urban traffic elasticity index based on space-time congestion sub-cluster |
CN113158456B (en) * | 2021-04-15 | 2024-02-02 | 大连交通大学 | Urban rail transit network cascade failure modeling method |
CN114547827B (en) * | 2022-04-26 | 2022-09-23 | 深圳市城市交通规划设计研究中心股份有限公司 | Infrastructure group running state evaluation method, electronic device and storage medium |
-
2022
- 2022-08-26 CN CN202211028790.5A patent/CN115115283B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114897454A (en) * | 2022-07-14 | 2022-08-12 | 深圳市城市交通规划设计研究中心股份有限公司 | Urban infrastructure group settlement evaluation method, electronic device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN115115283A (en) | 2022-09-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cavallaro et al. | Assessment of urban ecosystem resilience through hybrid social–physical complex networks | |
Hong et al. | Vulnerability assessment and mitigation for the Chinese railway system under floods | |
CN110111576B (en) | Method for realizing urban traffic elasticity index based on space-time congestion sub-cluster | |
Kong et al. | Optimizing the resilience of interdependent infrastructures to regional natural hazards with combined improvement measures | |
CN114547827B (en) | Infrastructure group running state evaluation method, electronic device and storage medium | |
CN103077604B (en) | traffic sensor management method and system | |
CN106789190A (en) | A kind of power telecom network vulnerability assessment and routing optimization method | |
Deng et al. | An assessment method for traffic state vulnerability based on a cloud model for urban road network traffic systems | |
CN110211378A (en) | A kind of urban transportation health indicator system appraisal procedure based on Complex Networks Theory | |
CN110232819B (en) | Complex network-based urban key road excavation method | |
Arosio et al. | The whole is greater than the sum of its parts: a holistic graph-based assessment approach for natural hazard risk of complex systems | |
Zhang et al. | Exploring the structural factors of resilience in urban drainage systems: a large-scale stochastic computational experiment | |
Lei et al. | Mining spatial co-location patterns by the fuzzy technology | |
CN115115283B (en) | Management method of urban key infrastructure, electronic equipment and storage medium | |
CN115034694B (en) | Power grid vulnerability assessment method and device, electronic equipment and storage medium | |
Chang et al. | Tabu search based approach to trouble call analysis | |
Ulak et al. | A prescriptive model to assess the socio-demographics impacts of resilience improvements on power networks | |
CN115114715B (en) | City infrastructure group network elasticity analysis method, electronic device and storage medium | |
CN111310340A (en) | Urban area interaction abnormal relation identification method and equipment based on human movement | |
CN114567562B (en) | Method for identifying key nodes of coupling network of power grid and communication network | |
CN115130193B (en) | City infrastructure group elasticity analysis method, electronic device, and storage medium | |
CN112598305B (en) | Urban road network important node identification method based on local structure flow | |
CN106550387B (en) | A kind of wireless sensor network routing layer QoS evaluating method | |
Son et al. | Random Network Model for Assessing the Topological Performance of Water Distribution Systems | |
Jelenius | Graph models of infrastructures and the robustness of power grids |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |