CN115115283B - Management method of urban key infrastructure, electronic equipment and storage medium - Google Patents

Management method of urban key infrastructure, electronic equipment and storage medium Download PDF

Info

Publication number
CN115115283B
CN115115283B CN202211028790.5A CN202211028790A CN115115283B CN 115115283 B CN115115283 B CN 115115283B CN 202211028790 A CN202211028790 A CN 202211028790A CN 115115283 B CN115115283 B CN 115115283B
Authority
CN
China
Prior art keywords
infrastructure
parameter
elastic
urban
group
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211028790.5A
Other languages
Chinese (zh)
Other versions
CN115115283A (en
Inventor
周子益
贾磊
童青峰
刘星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Traffic Science Research Institute Co ltd
Shenzhen Urban Transport Planning Center Co Ltd
Original Assignee
Shenzhen Traffic Science Research Institute Co ltd
Shenzhen Urban Transport Planning Center Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Traffic Science Research Institute Co ltd, Shenzhen Urban Transport Planning Center Co Ltd filed Critical Shenzhen Traffic Science Research Institute Co ltd
Priority to CN202211028790.5A priority Critical patent/CN115115283B/en
Publication of CN115115283A publication Critical patent/CN115115283A/en
Application granted granted Critical
Publication of CN115115283B publication Critical patent/CN115115283B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services

Abstract

A management method, electronic equipment and storage medium for urban key infrastructure belong to the management method of urban infrastructure. The method aims to effectively analyze the running rule of the system at the city level. The method comprises the steps of constructing an elasticity measurement index of an urban infrastructure group; and (3) extracting the key infrastructure of the urban infrastructure group and verifying the validity, and providing a management method of the urban key infrastructure. The method is based on a solid theoretical foundation and a mature physical model, realizes the quantitative calculation of the elasticity index by constructing the cascade failure model of the urban infrastructure group network and formulating the elasticity measurement index, and completes the excavation of the urban key infrastructure. Meanwhile, according to practical conditions, a targeted elastic promotion strategy is provided from three angles, and quantitative evaluation of promotion efficiency is provided, so that important support is provided for a city manager to manage key infrastructure. And the quantitative calculation and comparison provide a practical guidance for implementing a targeted system elasticity improvement strategy.

Description

Management method of urban key infrastructure, electronic equipment and storage medium
Technical Field
The invention relates to a city infrastructure management method, in particular to a city key infrastructure management method, electronic equipment and a storage medium.
Background
Due to the rapid development of urban economy and the continuous improvement of urbanization process and level, various urban groups are established in various scales in each country. Among the urban systems, some important infrastructures and complex systems, such as urban traffic networks, urban power supply line networks, urban large airports and the like, which are responsible for urban operation and economic development play a crucial role in normal urban operation. Also, these systems are also referred to as city critical infrastructure because they tend to have a large scale, significant support functions, and complex system interactions. More and more research shows that deliberate attacks on the key infrastructure of the cities can cause huge losses to the cities, including economic losses and even casualties. Because of the large impact of these critical infrastructures on other system facilities, their failure and malfunction often mean the occurrence of large-scale system outages. The various challenges faced by cities are unknown, uncontrollable and unpredictable, and therefore city managers need to start from the key infrastructures of the cities, utilize effective theoretical knowledge and construct protective covers for guaranteeing the normal operation of the cities through rich practical methods.
In addition, global warming, extreme weather, and various human causes are all disturbing factors that affect the normal operation of the infrastructure. The external disturbances affecting the actual operation directly affect the normal operation of the infrastructure and a series of possible domino effects, which are generally called cascade failures, and generally refer to that in a system and a network, failure of one or a few nodes or connecting lines causes failure of other nodes through coupling relations among the nodes, so that a cascade effect is generated, and finally, a part of nodes and even the whole network are crashed. Cascading failures have in fact been the largest cause of impact on the proper functioning of urban infrastructure. Therefore, how to analyze the correlation between infrastructures based on the operating conditions of infrastructures in extreme weather and specific scenes, analyze the operating conditions of infrastructures in a non-isolated manner, and implement effective reliable operation measures is one of the problems to be solved.
The importance of the actual city infrastructure is known by city managers, and a lot of operation monitoring devices and facilities are correspondingly distributed, but because the operation rule of the city-level system cannot be mastered, effective comprehensive utilization among all data acquisition sources cannot be achieved, and meanwhile, how to extract effective data from the data and analyze the actual state of the system operation lacks corresponding knowledge and theory. Meanwhile, the disturbance of the actual outside to the infrastructure occurs locally, the influence of the disturbance on the local part is analyzed, and then the disturbance gradually expands to a part along with the relevance of the system structure and function, and finally the disturbance spreads to the whole system. How to grasp the whole fault propagation process and establish a whole set of effective analysis means aiming at the fault propagation process are the problems to be solved at present.
Disclosure of Invention
The invention aims to solve the problem of discovering weak links in a city infrastructure group network and formulating an implementation promotion strategy aiming at the operation characteristics of the city infrastructure group network, and constructs a city key infrastructure management method based on an elasticity theory from the establishment of city infrastructure group elasticity parameters, the excavation of key infrastructures and the formulation and implementation of a targeted strategy by utilizing a cascading failure model and an elasticity analysis theory, and provides a city key infrastructure management method, electronic equipment and a storage medium.
In order to achieve the purpose, the invention is realized by the following technical scheme:
a management method of a city key infrastructure comprises the following steps:
s1, constructing an elasticity measurement index of an urban infrastructure group;
s2, extracting key infrastructures of the urban infrastructure group and verifying effectiveness;
the specific implementation method of the step S2 comprises the following steps:
s2.1, according to management requirements, defining key infrastructures as bottleneck type key infrastructures and influencing type key infrastructures, wherein the bottleneck type key infrastructures are the pivot positions of the infrastructures in the urban infrastructure group, and the operation of the urban infrastructure group can be influenced to become the bottleneck type key infrastructures; the influence type key infrastructure is an influence type key infrastructure which is formed by that the load change of the influence type key infrastructure affects the adjacent infrastructures and causes serious overload failure;
s2.2, discovering and verifying validity of bottleneck type key infrastructure, wherein the specific implementation method comprises the following steps:
s2.2.1, analyzing the influence of each infrastructure on an overload failure path under the condition that the infrastructure is overloaded, and specifically, setting an infrastructure group G 1 In which contains N 1 An infrastructure, defining an overload level OLL of the infrastructure as:
Figure 858395DEST_PATH_IMAGE001
OLL i (t)is composed oftCore infrastructure of time of dayiOf the level of overload of (a) of (b),FV i (t)is composed oftOf time of dayiThe value of the operating function of (c),MC i is composed ofiThe maximum capacity of (c);
s2.2.2, setting the parameter of the elastic bottleneck asRBPIncluding flexible bottleneck path parametersRBRPFunctional parameters of elastic bottleneckRBFP
S2.2.3, the elastic bottleneck path parameter is the proportion of the infrastructure on the overload path, and the definition formula is as follows:
Figure 447639DEST_PATH_IMAGE002
wherein, the first and the second end of the pipe are connected with each other,OLLFI q ) Is shown asqThe operating parameters of the infrastructure are increased tolThe sum of all infrastructure overload levels under double conditions,RBRP(l,i) RepresentiThe operating parameter is increased tolThe elastic bottleneck path parameters under the double condition,OLL i is composed ofiAn overload level of;
normalizing the elastic bottleneck path parameters of the infrastructure to obtain the normalized elastic bottleneck path parameters as follows:
Figure 165059DEST_PATH_IMAGE003
wherein the content of the first and second substances,
Figure 357006DEST_PATH_IMAGE004
to representiThe elastic bottleneck path parameters after normalization are used,RBRP(l,q) Representing infrastructureqThe operating parameter is increased tolElastic bottleneck path parameters under double conditions;
s2.2.4, the function parameter of the elastic bottleneck is the influence of the infrastructure on the function, and the definition formula is as follows:
Figure 109062DEST_PATH_IMAGE005
wherein, the first and the second end of the pipe are connected with each other,RBFP(l,i) To representiThe operating parameter is increased tolThe functional parameters of the elastic bottleneck under the double conditions,
Figure 338049DEST_PATH_IMAGE006
is shown asqThe infrastructure is the infrastructure under the condition of initial disturbanceiThe elasticity index under the failure condition does not occur,
Figure 277186DEST_PATH_IMAGE007
is shown asqThe infrastructure is the infrastructure under the condition of initial disturbanceiElasticity index under failure condition;
normalizing the elastic bottleneck function parameters of the infrastructure to obtain the normalized elastic bottleneck function parameters as follows:
Figure 679348DEST_PATH_IMAGE008
wherein the content of the first and second substances,
Figure 20331DEST_PATH_IMAGE009
representing the elastic bottleneck function parameter after i normalization,RBFP(l,q) Representing infrastructureqThe operating parameter is increased tolThe functional parameters of the elastic bottleneck under the double condition;
s2.2.5, verifying the effectiveness of the excavated bottleneck type key infrastructure, including structural verification and functional verification;
s2.2.6, the specific implementation method of structural verification is to calculate the betweenness distribution condition of the original infrastructure group connection structure, the betweenness is a global geometric quantity, the action and the influence of the infrastructure in the whole network are reflected, the influence of the infrastructure on the structure is evaluated by analyzing the betweenness distribution condition of the infrastructure, and the betweenness B is defined as follows:
Figure 810433DEST_PATH_IMAGE010
wherein the content of the first and second substances,n jk representing infrastructurejAndkthe number of shortest paths between the first and second nodes,n jk (i) Representing nodesjAndkin the shortest path betweeniThe number of the (c) is greater than the total number of the (c),B i is composed ofiThe betweenness of (A);
s2.2.7, the specific implementation method of the functional verification comprises the following steps: removing each infrastructure in consideration of the definition of the bottleneck, reconnecting the original structure according to the change condition of the load flow direction, namely bypassing the infrastructure, and realizing direct connection, so that the elasticity before and after removal is calculated and compared, and the discovery function of the bottleneck type key infrastructure is verified;
s2.3, excavating and verifying effectiveness of the influence type key infrastructure;
and S3, providing a management method of the urban key infrastructure.
Further, the method for specifically implementing the elasticity measurement index for constructing the urban infrastructure group in step S1 includes the following steps:
s1.1, counting the operation data of the urban infrastructure, and converting the operation data of the urban infrastructure into an operation function value of the urban infrastructure;
s1.2, extracting the facility corresponding to the attribute of the urban infrastructure as a core infrastructure based on the running function value of the urban infrastructure according to the urban ruleDie set maximum radiusD max CalculatingD max Sequence of infrastructure operational function values and core infrastructure in a city infrastructure group within rangeiPearson correlation coefficient between:
Figure 911561DEST_PATH_IMAGE012
PPMCC i,j is composed ofjSequence of infrastructure operational function values andipearson correlation coefficient therebetween, cov: (i,j) Is composed ofiAndjthe covariance of the running function value sequence of (a),
Figure 107050DEST_PATH_IMAGE013
is composed ofiThe standard deviation of (a) is determined,
Figure 474577DEST_PATH_IMAGE014
is composed ofjThe standard deviation of (a);
s1.3, dividing city infrastructure groups: through Pearson correlation coefficient, obtain
Figure 388307DEST_PATH_IMAGE015
Dividing urban infrastructure groups;
Figure 460168DEST_PATH_IMAGE016
Figure 775743DEST_PATH_IMAGE017
representation to core infrastructureiIn the case of a non-woven fabric,jwhether within its central infrastructure group, a value of 1 indicates inside it, and 0 is outside it;
performing the operations of the steps S1.2-S1.3 on the core infrastructure to complete the division of the city infrastructure groups to obtain Z infrastructure groups;
s1.4, establishing a cascading failure model of the infrastructure group;
s1.5, establishing an elasticity measurement index based on the cascade failure model of the infrastructure group.
Further, the specific implementation method of step S1.4 includes the following steps:
s1.4.1, defining initial disturbance as increasing load value of infrastructure based on definition of cascade failure model, and for urban infrastructurejComprises the following steps:
Figure 783013DEST_PATH_IMAGE018
Figure 184038DEST_PATH_IMAGE019
as an infrastructurejThe maximum capacity of the battery pack is set,TP j as an infrastructurejThe tolerance parameter(s) of (a),
Figure 466115DEST_PATH_IMAGE020
as an infrastructurejInitial load of (2):
s1.4.2, after cascade failure occurs, deleting overloaded infrastructurejInfrastructure, infrastructurejWill be distributed to first order neighbors according to connection strengthkThe distribution ratio is as follows:
Figure 636197DEST_PATH_IMAGE021
Figure 204581DEST_PATH_IMAGE022
is composed ofjAndkthe normalized strength of the connection therebetween is such that,
Figure 827323DEST_PATH_IMAGE023
is composed ofjAndkthe strength of the connection between the two parts,
Figure 381933DEST_PATH_IMAGE024
is composed ofjAndmthe strength of the connection between the two parts,mis composed ofQAny one of the above-mentioned (a) and (b),Qto and from the infrastructurejA connected first-order neighbor set;
S1.4.3、kdistributed load andkthe intensity after normalization is proportional, as follows:
Figure 406521DEST_PATH_IMAGE025
Figure 286752DEST_PATH_IMAGE026
is composed ofkThe value of the operational function of the assigned load,FV j as an infrastructurejAn operating function value of;
then thekLoad of update on
Figure 927949DEST_PATH_IMAGE027
Comprises the following steps:
Figure 20670DEST_PATH_IMAGE028
s1.4.4, comparisonkUpdate load of (2) andkdetermines whether further removal is requiredk
Figure 289977DEST_PATH_IMAGE029
Figure 75530DEST_PATH_IMAGE030
Is composed ofkIs set to a value of (a) in (b),MC k is composed ofk0 for removal and 1 for retention;
s1.4.5, repeating the steps S1.4.1-S1.4.4, removing the connection and connection strength of the affected infrastructure, and normalizing again until the city infrastructure group returns to the balance state again;
s1.4.6, after the core infrastructure is overloaded, the core infrastructure is reserved, the functional value of the maximum redundancy upper limit of the core infrastructure is maintained to operate, and the overload load of the infrastructure is not distributed.
Further, the specific implementation method of step S1.5 includes the following steps:
s1.5.1, setting the fault propagation time as follows based on a cascade failure model of the urban infrastructure group:
Figure 938444DEST_PATH_IMAGE031
Figure 834856DEST_PATH_IMAGE032
is composed ofjIs propagated tokThe time of (2) is greater than the time of (c),
Figure 834036DEST_PATH_IMAGE033
is composed ofjTokThe time taken for the euclidean distance;
s1.5.2, setting the state parameter of the urban infrastructure group as the overload total SCP of the urban infrastructure group, and then setting the elastic parameter of the urban infrastructure groupRComprises the following steps:
Figure 790491DEST_PATH_IMAGE034
wherein the content of the first and second substances,t 0 is the starting moment of the elastic triangle,t 1 the ending time of the elastic triangle, Y is the total number of overload stages,
Figure 999755DEST_PATH_IMAGE035
the average time of load transfer objects of all failed infrastructure for cascade failure at level h,Q h is a first-order neighbor set of infrastructure overloaded in cascade failure of the h-th stage,mis Q h In the above-mentioned manner, any one of,N h for the number of infrastructure overloaded in the cascade failure of the h-th stage,
Figure 106383DEST_PATH_IMAGE036
is composed ofkIs propagated tomTime of (c).
Further, the specific implementation method of step S2.3 includes the following steps:
s2.3.1, setting the elasticity influence parameter asRIPIncluding elastic operational influencing parametersROIPAnd elastic connection influencing parameterRLIP
S2.3.2, considering the actual operation process of the infrastructure, firstly, the proportion of the operation load to all the infrastructure loads in the infrastructure group and the relation between the infrastructure operation parameter and the tolerance upper limit are defined, and the elastic operation influence parameter of the infrastructure is definedROIPComprises the following steps:
Figure 84703DEST_PATH_IMAGE037
wherein the content of the first and second substances,ROIP(l,i) To representiThe operating parameter is increased tolThe elastic operation under the double condition influences the parameters,
Figure 946480DEST_PATH_IMAGE038
to representqThe value of the operating function of (c),
Figure 518406DEST_PATH_IMAGE039
to representiAn operating function value of;
normalizing the elastic operation influence parameters of the infrastructure to obtain the normalized elastic operation influence parameters as follows:
Figure 756621DEST_PATH_IMAGE040
wherein the content of the first and second substances,
Figure 855027DEST_PATH_IMAGE041
to representiThe elastic behavior-affecting parameter after normalization,ROIP(l,q) Representing infrastructureqThe operating parameter is increased tolUnder double conditionsAn elastic operational impact parameter;
s2.3.3, consideration ofiThe effect on the operation of the surrounding infrastructure, i.e. wheniThe influence of overload on the operation of peripheral infrastructure occurs, and the flexible connection influences the parametersRLIPComprises the following steps:
Figure 887705DEST_PATH_IMAGE042
wherein the content of the first and second substances,ROIP(i) RepresentiThe elastic connection of (a) influences the parameter, wherein,
Figure 212507DEST_PATH_IMAGE043
representing infrastructureiThe operating parameter is increased tolThe elastic parameter under the double condition is that,ufor the number of times the operating parameter is increased,
Figure 254412DEST_PATH_IMAGE044
as an infrastructureiThe operating parameter is increased to
Figure 817112DEST_PATH_IMAGE045
The elastic parameter under the double condition of the rubber,
Figure 410904DEST_PATH_IMAGE046
is a multiple of the increase in the operating parameter;
normalizing the elastic connection influence parameters of the infrastructure to obtain the normalized elastic connection influence parameters as follows:
Figure 691844DEST_PATH_IMAGE047
wherein the content of the first and second substances,
Figure 803020DEST_PATH_IMAGE048
to representiThe elastic connection after normalization affects the parameters,RLIP(q) Representing infrastructureqThe elastic connection influencing parameter of (a);
calculating an average elastic connection impact parameter of the infrastructure group G1 as:
Figure 485805DEST_PATH_IMAGE049
Figure 391444DEST_PATH_IMAGE050
an average elastic connection impact parameter representing the infrastructure group G1;
s2.3.4, verifying the effectiveness of the excavated influence type key infrastructure, including structural verification and functional verification;
s2.3.5, structural verification: evaluating the influence of a single infrastructure in an infrastructure group by calculating degree distribution in the infrastructure group structure, wherein the degree of the infrastructure refers to the number of edges associated with the infrastructure, and the number of edges is the number of first-order neighbors connected with the infrastructure;
s2.3.6, functional verification: assuming that the tolerance upper limit of the discovered impact type key infrastructure is set to be infinite, and the condition of overload failure cannot occur, calculating the impact on an overload failure path, and introducing an elastic maximum impact parameter RMIP as follows:
Figure 159680DEST_PATH_IMAGE051
RMIP(l)indicating an increase in an operating parameter oflThe elasticity at times has the greatest influence on the parameters.
Further, the specific implementation method of step S3 includes the following steps:
s3.1, changing the existing connection strength matrix, thereby changing the load distribution policy: for theiIn other words, the neighbor nodes after the overload failure process are countedjThe load change condition of (2) is calculated as:
Figure 668021DEST_PATH_IMAGE052
wherein the content of the first and second substances,
Figure 470892DEST_PATH_IMAGE053
represents fromiIs transferred tojOccupies a proportion of the real-time redundancy remaining value;
then, N is calculated respectively 1 Of a secondary processp i2j Then, the sequence is sorted from small to large, and the value of 90% quantile is extracted and recorded as
Figure 281854DEST_PATH_IMAGE054
ExtractingiIn all neighbors
Figure 537386DEST_PATH_IMAGE055
The set of values less than 1/3 is denoted
Figure 724784DEST_PATH_IMAGE056
The connection strength of the infrastructures in the set is changed, in particular, the infrastructures in the set are changedkThe connection strength of (a) is improved by 1.5 times:
Figure 382162DEST_PATH_IMAGE057
for infrastructures not belonging to a setmThe connection strength of (a) is then:
Figure 488658DEST_PATH_IMAGE058
in that
Figure 497065DEST_PATH_IMAGE059
In the set, the infrastructure in the set which is ranked to the next 30% of the original connection strength by referring to the original connection strength is deleted from the set;
s3.2, adding a connection relation on the basis of the S3.1: with a probability of overload failure of more than 50% among the infrastructure group, ranked in the first half among all infrastructures, and of neighboring nodes
Figure 222576DEST_PATH_IMAGE060
And the connection relation of the infrastructure with the value summation less than 1/2 and the core infrastructure or the infrastructure with the average value of the OLL sequence within the range of 5km and less than 0.5 is increased, and for the infrastructure x to be connected of i, the connection strength is as follows:
Figure 39DEST_PATH_IMAGE061
wherein the content of the first and second substances,
Figure 418382DEST_PATH_IMAGE062
is composed ofiThe average value of the OLL sequences within the infrastructure,
Figure 648506DEST_PATH_IMAGE063
is composed ofxAn OLL sequence mean within the infrastructure;
s3.3, improving the redundancy upper limit of the infrastructure; combining with the excavation of key infrastructure, performing redundancy upper limit lifting on the key infrastructure, obtaining an OLL sequence in an infrastructure group according to the result of an OLL parameter, removing a part smaller than 1 and a value more than 3 times larger than a residual value in the sequence, calculating the average value of the sequence at the moment minus 1, and then determining the improved redundancy upper limit proportion;
s3.4, implementing a combination strategy: for the infrastructure, the combined application is performed on the infrastructure according to the sequence of the connection strength, the connection relation and the improvement of the redundancy upper limit, after a strategy is implemented each time, the elasticity of the urban infrastructure group system is calculated, and the effects of the front elasticity improvement and the rear elasticity improvement are compared.
Electronic device comprising a memory and a processor, the memory storing a computer program, the processor implementing the steps of the method for managing a city critical infrastructure when executing the computer program.
Computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method for managing a city key infrastructure.
The invention has the beneficial effects that:
the method for managing the urban key infrastructure is constructed based on established infrastructures of cities, a cascading failure model and an elasticity analysis theory from the establishment of elasticity parameters of urban infrastructure groups, the excavation of the key infrastructures and the establishment and implementation of a targeted strategy. The main contents are as follows:
from the establishment of the elasticity index of the urban infrastructure group. Firstly, the city infrastructure group is established as an analysis basic unit, on one hand, because the main problem for the operation of the city system is frequent and small-scale disturbance, the actual influence range of the disturbance is not too large, and the actual influence is caused on the periphery of the occurrence point. Therefore, such disturbances and the actual system performance degradation need to be analyzed within a certain range, so as to grasp the actual influence degree and range. Secondly, for some disasters which have low actual occurrence probability but have huge influence on the system and even cause destructive attack, the association between each part of the whole system needs to be analyzed in detail for such black swan events, and the influence on the whole system caused by initial disturbance at the beginning of analysis and the whole evaluation in the subsequent system recovery process are necessary, so that the influence mode between each unit needs to be analyzed from a small analysis unit. Therefore, the method establishes an analysis system with the urban infrastructure group as a basic unit, and restores the fault propagation process among all basic analysis units by means of a cascading failure model. Firstly, considering the most critical batch of all the infrastructure of the actual city, such as an airport, a railway station, a subway junction and the like, screening out the actual influence range of a central point according to a threshold value, and taking all the infrastructure in the range as an infrastructure group. And then, establishing a cascading failure model of the urban infrastructure group based on the cascading failure model. The actual operation data of each infrastructure is unified into the same index through daily supply quantity of resources for daily life of urban residents, the index is used as the load of the infrastructure, the load distribution strategy after overload is calculated according to the calculated space correlation normalized connection strength, and finally the cascade failure process in the whole fault propagation path is simulated.
Finally, according to the definition of the actual elasticity, the method mainly analyzes the number of the disturbance values which can be actually born by the system, namely the tolerance limit of the system elasticity; and analyzing the propagation process of the actual disturbance in the whole system, including the range size in time and space, and leading to the parameter definition of elasticity. Firstly, the method of elastic triangles is introduced into the method, the whole process of initial disturbance occurrence, fault accelerated propagation stage, system recovery stage and system recovery balance state is simulated, and system state parameter values of infrastructure are defined. And finally, calculating to obtain the elastic parameters of the infrastructure by combining the fault propagation time according to the existing load redundancy upper limit value and the distribution quantity of the infrastructure in the actual load distribution process. From the standpoint of the vulnerable infrastructure. The key infrastructure is divided into two types-bottleneck and impact, according to the needs of practical management. Then, specifically, starting from the process of cascade failure of the infrastructure, important infrastructures are discovered according to the occurrence frequency of each infrastructure and the actual overload degree in all failure paths. The method mainly considers the real scene of actual inspection, starts from the path of cascade failure, finds the infrastructure with overload failure at most and the infrastructure with the maximum influence on connection, and considers the overload degree at the same time, thereby measuring the influence of the fault propagation path of the infrastructure. Then, validity verification is performed on different key infrastructures from the structural and functional aspects respectively. Meanwhile, according to the results of the two verification methods, the effectiveness of the two important infrastructure categories is analyzed, and finally the discovery of the key infrastructure is realized.
From the perspective of the formulation and implementation of a targeted strategy. From the above perspective of effectiveness analysis, it can be found that the vulnerability of the infrastructure group network is mainly reflected in the deficiency of the tolerance upper limit of the individual infrastructure and the difference of the actual connection matrix, that is, the imbalance of the load distribution process, which causes the large-scale overload of the infrastructure group network. In order to prevent the situation, on the basis of the above, the path of the cascading failure needs to be deeply analyzed, and in combination with the tolerance upper limit and the load distribution, a targeted elastic promotion strategy is made from the viewpoint of infrastructure and is implemented on a specific infrastructure. The specific classification is three types: 1. changing an allocation strategy, namely changing a matrix of connection strength, and then calculating the change condition of the elastic value of the infrastructure at two ends of the connection; 2. changing the tolerance upper limit of the infrastructure, considering the magnitude of the elasticity improvement range under a certain condition, and judging whether the method is an effective means or not according to the magnitude; 3. the connection relationship is changed, and the redundancy surplus condition of the core infrastructure within a certain distance range is mainly considered. Therefore, the practical redundancy is fully utilized, and the strategy of improving the elasticity is achieved. According to the three aspects, a strategy for improving the elasticity of the infrastructure group network is established and implemented.
In combination with the three aspects, the invention provides a management method of urban key infrastructure based on the elasticity theory, which has the following advantages:
1. the method simulates the path of the fault propagation of the infrastructure by constructing the cascading failure model of the infrastructure group, provides the elastic index based on the elastic trigonometric theory and excavates the key infrastructure according to the elastic index. The whole analysis process has a strong theoretical basis, and by introducing an index quantification elasticity method, the elasticity capability of actual infrastructure can be effectively represented, and the real situation can be effectively restored; 2. according to the process of discovering the key infrastructure, firstly, the influence of each infrastructure in the network fault propagation path of the infrastructure group is quantified, and meanwhile, the key infrastructure is divided into two types and quantified and a route is dug respectively, so that the actual management requirement is met. And then, completing comprehensive verification of the mining effectiveness of the key infrastructure from two aspects of structure and function. The mutual influence among the infrastructures is considered in the whole analysis process, and the actual fit is realized. The verification of the effectiveness of the key infrastructure is completed by means of a long-time span and parameterization method, and the result analysis is rigorous, real and effective; 3. in the part of the key infrastructure elastic lifting strategy, various lifting strategies are formulated and the number of specific implementation is given quantitatively. Direct and effective guidance is provided for the management of the actual urban infrastructure group network; 4. in summary, the method is based on a solid theoretical foundation and a mature physical model, realizes the quantitative calculation of the elasticity index by constructing the cascade failure model of the urban infrastructure group network and formulating the elasticity measurement index, and completes the excavation of the urban key infrastructure. Meanwhile, the method is practical, a targeted elastic promotion strategy is provided from three angles, and quantitative evaluation of promotion efficiency is provided, so that important support is provided for a city manager to manage key infrastructure. Meanwhile, quantitative calculation and comparison also provide practical guidance for implementing a targeted system elasticity improvement strategy.
Drawings
FIG. 1 is a flow chart of cascade failure of an infrastructure group of a method for managing a city critical infrastructure according to the present invention;
fig. 2 is a process diagram of the elastic triangle model of the method for managing the city key infrastructure according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail below with reference to the accompanying drawings and the detailed description. It is to be understood that the embodiments described herein are illustrative only and are not limiting, i.e., that the embodiments described are only a few embodiments, rather than all, of the present invention. While the components of the embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations, the present invention is capable of other embodiments.
Thus, the following detailed description of specific embodiments of the present invention, presented in the accompanying drawings, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the detailed description of the invention without inventive step, are within the scope of protection of the invention.
In order to further understand the contents, features and effects of the present invention, the following embodiments are illustrated and described in detail with reference to the accompanying drawings 1-2:
the first embodiment is as follows:
a management method of a city key infrastructure comprises the following steps:
s1, constructing an elasticity measurement index of an urban infrastructure group;
further, the method for specifically realizing the elasticity measurement index of the urban infrastructure group constructed in the step S1 comprises the following steps:
s1.1, counting the operation data of the urban infrastructure, and converting the operation data of the urban infrastructure into an operation function value of the urban infrastructure;
according to the definition of the infrastructure: the system is a material engineering facility for providing public services for social production and resident life, is a public service system for ensuring normal progress of national or regional social and economic activities, is a general material condition on which the society depends to survive, and occupies an important position in the construction and development of the whole city. Therefore, the operation data of the urban infrastructure is uniformly converted into the operation function value according to the support effect of each infrastructure on the urban development and the daily activities of urban residents. The actual control was transformed in eight ways as shown in table 1, the comparison was transformed in terms of consumption per person per day:
TABLE 1 Attribute Table for Key infrastructure
Figure 912128DEST_PATH_IMAGE065
Note: the electricity, water supply and power supply are converted according to the average consumption of people, and other services are converted according to the annual service customer number of a market, for example.
S1.2, extracting the facility corresponding to the attribute of the urban infrastructure as a core based on the running function value of the urban infrastructureHeart infrastructure, set maximum radius according to city scaleD max CalculatingD max Sequence of infrastructure operational function values and core infrastructure in a city infrastructure group within rangeiPearson correlation coefficient between:
Figure 133342DEST_PATH_IMAGE066
PPMCC i,j is composed ofjSequence of infrastructure operational function values andipearson correlation coefficient therebetween, cov: (i,j) Is composed ofiAndjthe covariance of the running function value sequence of (a),
Figure 975396DEST_PATH_IMAGE067
is composed ofiThe standard deviation of (a) is determined,
Figure 42710DEST_PATH_IMAGE068
is composed ofjThe standard deviation of (a);
s1.3, dividing urban infrastructure groups: through Pearson correlation coefficient, obtain
Figure 263606DEST_PATH_IMAGE069
Dividing urban infrastructure groups;
Figure 23752DEST_PATH_IMAGE070
Figure 87523DEST_PATH_IMAGE071
representation to core infrastructureiIn the case of a non-woven fabric,jwhether within its central infrastructure group, a value of 1 indicates inside, and 0 is outside;
performing the operations of the steps S1.2-S1.3 on the core infrastructure to complete the division of the city infrastructure groups to obtain Z infrastructure groups;
s1.4, establishing a cascading failure model of the infrastructure group;
further, the specific implementation method of step S1.4 includes the following steps:
s1.4.1, defining initial disturbance as increasing load value of infrastructure based on definition of cascade failure model, and for urban infrastructurejComprises the following steps:
Figure 958527DEST_PATH_IMAGE072
Figure 33930DEST_PATH_IMAGE073
as an infrastructurejThe maximum capacity of the battery pack is set,TP j as an infrastructurejThe tolerance parameter(s) of (a) is (are),
Figure 230557DEST_PATH_IMAGE074
as an infrastructurejInitial load of (2):
s1.4.2, after cascade failure occurs, deleting overloaded infrastructurejInfrastructure, infrastructurejWill be assigned to first-order neighbors according to connection strengthskThe distribution ratio is as follows:
Figure 946007DEST_PATH_IMAGE075
Figure 355122DEST_PATH_IMAGE076
is composed ofjAndkthe normalized strength of the connection therebetween is such that,
Figure 675245DEST_PATH_IMAGE077
is composed ofjAndkthe strength of the connection between the two parts,
Figure 777193DEST_PATH_IMAGE078
is composed ofjAndmthe strength of the connection between the two parts,mis composed ofQAny one of the above-mentioned (a) and (b),Qto and from the infrastructurejFirst order of phase connectionA neighbor set;
S1.4.3、kdistributed load andkthe intensity after normalization is proportional, as follows:
Figure 425344DEST_PATH_IMAGE079
Figure 638150DEST_PATH_IMAGE080
is composed ofkThe value of the operational function of the assigned load,FV j as an infrastructurejAn operating function value of (a);
thenkLoad of update on
Figure 219304DEST_PATH_IMAGE081
Comprises the following steps:
Figure 351208DEST_PATH_IMAGE082
s1.4.4, comparisonkUpdate load of andkdetermines whether further removal is requiredk
Figure 752234DEST_PATH_IMAGE083
Figure 503152DEST_PATH_IMAGE084
Is composed ofkIs set to a value of (a) in (b),MC k is composed ofk0 for removal and 1 for retention;
s1.4.5, repeating the steps S1.4.1-S1.4.4, removing the connection and connection strength of the affected infrastructure, and normalizing again until the urban infrastructure group returns to a balance state again;
s1.4.6, after the core infrastructure is overloaded, the core infrastructure is reserved, the functional value of the maximum redundancy upper limit of the core infrastructure is maintained to run, and the overload load of the infrastructure is not distributed;
s1.5, establishing an elasticity measurement index based on a cascading failure model of an infrastructure group;
further, the specific implementation method of step S1.5 includes the following steps:
s1.5.1, setting fault propagation time as follows based on a cascade failure model of an urban infrastructure group:
Figure 673233DEST_PATH_IMAGE085
Figure 976039DEST_PATH_IMAGE086
is composed ofjIs propagated tokThe time of the above-mentioned (c) is,
Figure 864360DEST_PATH_IMAGE087
is composed ofjTokThe time taken for the euclidean distance;
s1.5.2, setting the state parameter of the urban infrastructure group as the overload total SCP of the urban infrastructure group, and then setting the elastic parameter of the urban infrastructure groupRComprises the following steps:
Figure 418970DEST_PATH_IMAGE088
wherein the content of the first and second substances,t 0 is the starting moment of the elastic triangle,t 1 the ending time of the elastic triangle, Y is the total number of the overloaded stages,
Figure 709137DEST_PATH_IMAGE089
the average time of load transfer objects of all failed infrastructure for cascade failure at level h,Q h is a first order neighbor set of the infrastructure overloaded in the cascade failure of the h-th stage,mis Q h In the above-mentioned manner, any one of,N h for the number of infrastructure overloaded in the cascade failure of the h-th stage,
Figure 323789DEST_PATH_IMAGE090
is composed ofkIs propagated tomTime of (d);
s2, extracting key infrastructures of the urban infrastructure group and verifying effectiveness;
first, key infrastructure is classified into bottleneck type and impact type according to the needs of practical management. Then, specifically, starting from the process of cascade failure of the infrastructure, two types of key infrastructures are respectively discovered according to the occurrence frequency of each infrastructure and the actual overload degree in all failure paths. Then, validity verification is carried out on different important infrastructures according to different influence forms of single and combination. The main modes are divided into two types: one is to improve the tolerance upper limit and then analyze the change condition of the cascade failure path under the condition; the second is to consider varying adjacency matrices, thereby changing the load distribution in light of the strength of the connection and ultimately affecting the path of the cascading failure. Meanwhile, according to the results of the two situations, the effectiveness of the two important infrastructure categories is analyzed, and finally the discovery of the key infrastructure is realized.
Key infrastructure is divided into two categories-bottleneck and impact, according to management needs. The specific reasons are: considering the effectiveness of the so-called key infrastructure for the implementation of mining and subsequent promotion strategies, the key infrastructure that city managers are eager to mine is characterized by: it is not necessarily a very important node in its operation, but is actually a critical hub due to its location throughout the network structure. Due to the low functions of the network, the network becomes a bottleneck, namely a bottleneck type, for the operation of the whole network. The system bears huge load operation, and slight load change can greatly affect a plurality of adjacent infrastructures connected with the system and finally cause large-scale overload failure-impact type.
The specific implementation method of the step S2 comprises the following steps:
s2.1, according to management requirements, defining key infrastructures as bottleneck type key infrastructures and influencing type key infrastructures, wherein the bottleneck type key infrastructures are hub positions of the infrastructures in the urban infrastructure group, and the operation of the urban infrastructure group can be influenced to become bottleneck type key infrastructures; the influence type key infrastructure is an influence type key infrastructure, wherein the load change of the influence type key infrastructure affects the adjacent infrastructures connected with each other and causes serious overload failure, and the influence type key infrastructure becomes the influence type key infrastructure;
s2.2, discovering bottleneck type key infrastructure and verifying effectiveness, wherein the specific implementation method comprises the following steps:
s2.2.1, analyzing the influence of each infrastructure on an overload failure path under the condition that the infrastructure is overloaded, and specifically, setting an infrastructure group G 1 In which contains N 1 An infrastructure, defining an overload level OLL of the infrastructure as:
Figure 558461DEST_PATH_IMAGE091
OLL i (t)is composed oftCore infrastructure of time of dayiThe level of overload of (a) is,FV i (t)is composed oftOf time of dayiThe value of the operating function of (c),MC i is composed ofiThe maximum capacity of (c);
s2.2.2, setting the parameter of the elastic bottleneck asRBPIncluding flexible bottleneck path parametersRBRPFunctional parameters of elastic bottleneckRBFP
S2.2.3, the elastic bottleneck path parameter is the proportion of the infrastructure on the overload path, and the definition formula is as follows:
Figure 651182DEST_PATH_IMAGE092
wherein the content of the first and second substances,OLLFI q ) Is shown asqThe operating parameters of the infrastructure are increased tolThe sum of all infrastructure overload levels under double conditions,RBRP(l,i) To representiIncrease of operating parameterIs composed oflThe elastic bottleneck path parameters under the double condition,OLL i is composed ofiAn overload level of;
normalizing the elastic bottleneck path parameters of the infrastructure to obtain the normalized elastic bottleneck path parameters as follows:
Figure 795855DEST_PATH_IMAGE093
wherein the content of the first and second substances,
Figure 315830DEST_PATH_IMAGE094
to representiThe elastic bottleneck path parameters after normalization are used,RBRP(l,q) Representing infrastructureqThe operating parameter is increased tolElastic bottleneck path parameters under double conditions;
s2.2.4, the functional parameters of the elastic bottleneck are the influence of the infrastructure on the function, and the definition formula is as follows:
Figure 37798DEST_PATH_IMAGE095
wherein the content of the first and second substances,RBFP(l,i) RepresentiThe operating parameter is increased tolThe functional parameters of the elasticity bottleneck under the double conditions,
Figure 199789DEST_PATH_IMAGE096
denotes the firstqThe infrastructure is the infrastructure under the condition of initial disturbanceiThe elasticity index under the failure condition does not occur,
Figure 605494DEST_PATH_IMAGE097
is shown asqThe infrastructure is the infrastructure under the condition of initial disturbanceiElasticity index under failure condition;
normalizing the elastic bottleneck function parameters of the infrastructure to obtain the normalized elastic bottleneck function parameters as follows:
Figure 686582DEST_PATH_IMAGE098
wherein the content of the first and second substances,
Figure 36792DEST_PATH_IMAGE099
representing the elastic bottleneck function parameter after i normalization,RBFP(l,q) Representing infrastructureqThe operating parameter is increased tolElastic bottleneck function parameters under double conditions;
s2.2.5, verifying the effectiveness of the excavated bottleneck type key infrastructure, including structural verification and functional verification;
s2.2.6, the specific implementation method of structural verification is to calculate the betweenness distribution condition of the original infrastructure group connection structure, wherein betweenness is global geometric quantity, the action and the influence of the infrastructure in the whole network are reflected, the influence of the infrastructure on the structure is evaluated by analyzing the betweenness distribution condition of the infrastructure, and betweenness B is defined as follows:
Figure 471316DEST_PATH_IMAGE100
wherein, the first and the second end of the pipe are connected with each other,n jk representing infrastructurejAndkthe number of shortest paths between the first and second sets,n jk (i) Representing nodesjAndkin the shortest path betweeniThe number of the (c) is greater than the total number of the (c),B i is composed ofiThe betweenness of (A);
s2.2.7, the specific implementation method of the functional verification comprises the following steps: removing each infrastructure in consideration of the definition of the bottleneck, reconnecting the original structure according to the change condition of the load flow direction, namely bypassing the infrastructure, and realizing direct connection, so that the elasticity before and after removal is calculated and compared, and the discovery function of the bottleneck type key infrastructure is verified;
s2.3, discovering and verifying effectiveness of the influence type key infrastructure;
further, the specific implementation method of step S2.3 includes the following steps:
s2.3.1, setting the elasticity influence parameter asRIPIncluding elastic operational influencing parametersROIPAnd elastic connection influencing parameterRLIP
S2.3.2, considering the actual operation process of the infrastructure, firstly, the proportion of the operation load to all the infrastructure loads in the infrastructure group and the relation between the infrastructure operation parameter and the tolerance upper limit are defined, and the elastic operation influence parameter of the infrastructure is definedROIPComprises the following steps:
Figure 325002DEST_PATH_IMAGE101
wherein, the first and the second end of the pipe are connected with each other,ROIP(l,i) To representiThe operating parameter is increased tolThe elastic operation under the double condition influences the parameter,
Figure 983517DEST_PATH_IMAGE102
to representqThe value of the operating function of (c),
Figure 555443DEST_PATH_IMAGE103
representiAn operating function value of (a);
normalizing the elastic operation influence parameters of the infrastructure to obtain the normalized elastic operation influence parameters as follows:
Figure 59237DEST_PATH_IMAGE104
wherein, the first and the second end of the pipe are connected with each other,
Figure 767430DEST_PATH_IMAGE105
representiThe elastic behavior-affecting parameter after normalization is performed,ROIP(l,q) Representing infrastructureqThe operating parameter is increased tolElastic operation influence parameters under multiple conditions;
s2.3.3, consideriThe effect on the operation of the surrounding infrastructure, i.e. wheniThe influence of overload on the operation of peripheral infrastructure occurs, and the flexible connection influences the parametersRLIPComprises the following steps:
Figure 190321DEST_PATH_IMAGE106
wherein the content of the first and second substances,ROIP(i) To representiThe elastic connection of (a) influences the parameter, wherein,
Figure 249544DEST_PATH_IMAGE107
representing infrastructureiThe operating parameter is increased tolThe elastic parameter under the double condition is that,ufor the number of times the operating parameter is increased,
Figure 25870DEST_PATH_IMAGE108
as an infrastructureiThe operating parameter is increased to
Figure 385307DEST_PATH_IMAGE109
The elastic parameter under the double condition is that,
Figure 854466DEST_PATH_IMAGE110
is a multiple of the increase in the operating parameter;
normalizing the elastic connection influence parameters of the infrastructure to obtain the normalized elastic connection influence parameters as follows:
Figure 135406DEST_PATH_IMAGE111
wherein the content of the first and second substances,
Figure 105636DEST_PATH_IMAGE112
representiThe elastic connection after normalization affects the parameters,RLIP(q) Representing infrastructureqThe elastic connection influencing parameter;
calculating an average elastic connection impact parameter of the infrastructure group G1 as:
Figure 788421DEST_PATH_IMAGE113
Figure 428481DEST_PATH_IMAGE114
an average elastic connection impact parameter representing the infrastructure group G1;
s2.3.4, verifying the effectiveness of the excavated influence type key infrastructure, including structural verification and functional verification;
s2.3.5, structural verification: evaluating the influence of a single infrastructure in an infrastructure group by calculating degree distribution in the infrastructure group structure, wherein the degree of the infrastructure refers to the number of edges associated with the infrastructure, and the number of edges is the number of first-order neighbors connected with the infrastructure;
s2.3.6, functional verification: assuming that the tolerance upper limit of the discovered impact type key infrastructure is set to be infinite, and the condition of overload failure cannot occur, calculating the impact on an overload failure path, and introducing an elastic maximum impact parameter RMIP as follows:
Figure 196717DEST_PATH_IMAGE115
RMIP(l)indicating an increase in an operating parameter tolElasticity maximum influence parameter at times;
and S3, providing a management method of the urban key infrastructure.
And (4) making and implementing a targeted elasticity improvement strategy. Starting from the overload failure of the infrastructure group, the most direct idea is to directly increase the redundancy upper limit of the infrastructure, but in practice, the redundancy upper limit is a relatively fixed value, and it is difficult to greatly increase the redundancy upper limit. Therefore, in this section, raising the upper redundancy limit will serve as a third strategy. City managers invest a lot of resources in infrastructure group construction, and due to various reasons, the resources are not fully utilized, and the utilization rate is low. The actual performance is that the load distribution strategy after overload is not reasonable, resulting in short board effect. Therefore, first, considering overcoming the short board effect, a strategy of flexibly promoting the infrastructure group is implemented in terms of the connection matrix and the connection relation. Is divided into three parts.
Further, the specific implementation method of step S3 includes the following steps:
s3.1, changing the existing connection strength matrix, thereby changing the load distribution policy: for theiIn other words, the neighbor nodes after the overload failure process are countedjThe load change condition of (2) is calculated as:
Figure 439479DEST_PATH_IMAGE116
wherein the content of the first and second substances,
Figure 242350DEST_PATH_IMAGE117
represents fromiIs transferred tojOccupies a proportion of the real-time redundancy remaining value;
then, N is calculated respectively 1 Of a second processp i2j Then, the sequence is sorted from small to large, and the value of 90% quantile is extracted and recorded as
Figure 318890DEST_PATH_IMAGE118
Extracting ofiIn all neighbors
Figure 574422DEST_PATH_IMAGE119
The set of values less than 1/3 is denoted
Figure 761821DEST_PATH_IMAGE120
The connection strength of the infrastructures in the set is changed, in particular, the infrastructures in the set are changedkThe connection strength of (a) is improved by 1.5 times:
Figure 419199DEST_PATH_IMAGE121
for infrastructures not belonging to a setmThe connection strength of (a) is then:
Figure 525695DEST_PATH_IMAGE122
in that
Figure 268523DEST_PATH_IMAGE123
In the set, the infrastructure in the set which is ranked to the rear 30% of the original connection strength by referring to the original connection strength is deleted from the set;
s3.2, adding a connection relation on the basis of the S3.1: for overload failure probability of more than 50% among infrastructure group, first half of all infrastructures, and neighbor nodes
Figure 994034DEST_PATH_IMAGE124
And the connection relation of the infrastructure with the value accumulated less than 1/2 and the infrastructure with the average value of the core infrastructure or the OLL sequence within the range of 5km radius less than 0.5 is increased, and for the infrastructure x to be connected of i, the connection strength is as follows:
Figure 505917DEST_PATH_IMAGE125
wherein, the first and the second end of the pipe are connected with each other,
Figure 783315DEST_PATH_IMAGE126
is composed ofiThe average value of the OLL sequences within the infrastructure,
Figure 747860DEST_PATH_IMAGE127
is composed ofxAn OLL sequence mean within the infrastructure;
s3.3, improving the redundancy upper limit of the infrastructure; combining with the excavation of key infrastructure, performing redundancy upper limit lifting on the key infrastructure, obtaining an OLL sequence in an infrastructure group according to the result of an OLL parameter, removing a part smaller than 1 and a value more than 3 times larger than a residual value in the sequence, calculating the average value of the sequence at the moment minus 1, and then determining the improved redundancy upper limit proportion;
s3.4, implementing a combination strategy: for the infrastructure, the combined application is performed on the infrastructure according to the sequence of the connection strength, the connection relation and the improvement of the redundancy upper limit, after a strategy is implemented each time, the elasticity of the urban infrastructure group system is calculated, and the effects of the front elasticity improvement and the rear elasticity improvement are compared.
In combination with the three aspects, the invention provides a management method of urban key infrastructure based on elastic theory, which has the following advantages:
1. the method simulates the path of infrastructure fault propagation by constructing the cascading failure model of the infrastructure group, and provides the elastic index based on the elastic trigonometric theory, thereby realizing the quantitative calculation of the elastic index and completing the excavation of the urban key infrastructure. The whole analysis process has a strong theoretical basis, and by introducing an index quantification elasticity method, the elasticity capability of actual infrastructure can be effectively represented, and the real situation can be effectively restored; 2. in the process of discovering the key infrastructure, the influence of each infrastructure in the network fault propagation path of the infrastructure group is quantified, and meanwhile, the key infrastructure is divided into two types and quantified and discovered routes are implemented respectively, so that the process accords with the actual management requirement. And then completing verification of the mining effectiveness of the key infrastructure from two aspects of structure and function. The mutual influence among infrastructure is considered in the whole analysis process, and the fit is practical. The verification on the effectiveness of the key infrastructure is completed by means of a long-time span and parameterization method, and the result analysis is rigorous, real and effective; 3. in the part of the key infrastructure elastic lifting strategy, various lifting strategies are made and the number of specific implementation is given quantitatively. Direct and effective guidance is provided for actual urban infrastructure group network management; 4. in summary, the invention is based on a solid theoretical foundation and a mature physical model, and realizes the excavation of the urban key infrastructure by constructing the cascade failure model of the urban infrastructure group network and formulating the elasticity measurement index. Meanwhile, the method is practical, a targeted elastic promotion strategy is provided from three angles, and quantitative evaluation of promotion efficiency is provided, so that important support is provided for a city manager to manage key infrastructure. Meanwhile, quantitative calculation and comparison also provide practical guidance for implementing a targeted system elasticity improvement strategy.
The second embodiment is as follows:
electronic equipment, comprising a memory and a processor, wherein the memory stores a computer program, and the processor implements the steps of a method for managing a city critical infrastructure according to one embodiment when executing the computer program.
Further, the computer device of the present invention may be a device including a processor, a memory, and the like, for example, a single chip microcomputer including a central processing unit, and the like. And the processor is used for implementing the steps of the recommendation method capable of modifying the relationship-driven recommendation data based on the CREO software when executing the computer program stored in the memory.
The Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. In addition, the memory may include high-speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
The third concrete implementation mode:
a computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out a method for managing a city critical infrastructure according to one of the detailed description.
The key points and points to be protected of the technology of the invention are as follows:
firstly, the method is to restore the fault propagation path of the infrastructure by constructing a cascading failure model of the urban infrastructure group network and realize the excavation of the key infrastructure based on the analysis of the influence of each infrastructure on the path.
The excavation of key infrastructure is divided into two types, namely bottleneck type and influence type according to the requirement of actual management, different quantification methods are provided for different types, and the quantification methods are used in the specific excavation process
For the excavated key infrastructure, the comprehensive verification of the excavation effectiveness of the two key infrastructures is realized from the structural and functional aspects
Aiming at improving the strategy of the urban key infrastructure, the implementation of the strategy implementation effectiveness is completed in a quantitative calculation mode from the three angles of a connection strength matrix, a connection relation and a tolerance upper limit.
Abbreviations and key term definitions of the present invention:
resilience Maintain Efficiency: RME, elastic retention efficiency; resilience Zero-Value Parameter: RZP, elastic zero value parameter; fundamental Infrastructure Group: FIG, infrastructure group; maximum Resilience recovery Parameter: MRRP, maximum elastic recovery parameter; pearson Product-motion Correlation Coefficient: PPMCC, pearson correlation coefficient; network resource Dispersal Efficiency: RNDE, network resiliency grooming efficiency; initial Load: IL, initial load; maximum Capacity: MC, maximum capacity; tolerance Parameter: TP, tolerance parameter; resilience Triangle: RT, elastic triangle; parameter: PRM, parameter; system Condition Parameter: SCP, system state parameters; fuction Values: FV, functional value; network resource Index: RNI, network elasticity index; fundamental Infrastructure: FI, infrastructure; overload Level: OLL, overload level; resilience bottleeck Parameter: RBP, elastic bottleneck parameter; resilence Bottleneck Route Parameter: RBRP, elastic bottleneck path parameters; resilence Bottleneck Function Parameter: RBFP, elastic bottleneck function parameter; resilience Linked Impact Parameter: RLIP, flexible connection impact parameter; resilence Operation Impact Parameter: ROIP, elastic operation impact parameter; resilience Impact Parameter: RIP, elastic impact parameters; resilance Maximum Impact Parameter: RMIP, resilience maximum impact parameter.
It is noted that relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms include, or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that includes a list of elements does not include only those elements but also other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the inclusion of a element by a statement of \8230 @ 8230 @, does not exclude the presence of additional like elements in a process, method, article or apparatus that includes the element.
While the application has been described above with reference to specific embodiments, various modifications may be made and equivalents may be substituted for elements thereof without departing from the scope of the application. In particular, the various features of the embodiments disclosed herein may be used in any combination that is not inconsistent with the structure, and the failure to exhaustively describe such combinations in this specification is merely for brevity and resource conservation. Therefore, it is intended that the application not be limited to the particular embodiments disclosed, but that the application will include all embodiments falling within the scope of the appended claims.

Claims (6)

1. A management method of a city key infrastructure is characterized by comprising the following steps: the method comprises the following steps:
s1, constructing an elasticity measurement index of an urban infrastructure group;
s1, the specific implementation method for constructing the elasticity measurement indexes of the urban infrastructure group comprises the following steps:
s1.1, counting the operation data of the urban infrastructure, and converting the operation data of the urban infrastructure into an operation function value of the urban infrastructure;
s1.2, extracting the facility corresponding to the attribute of the urban infrastructure as a core infrastructure based on the running function value of the urban infrastructure, and setting the maximum radius D according to the urban scale max Calculating D max Pearson's correlation coefficient between the sequence of infrastructure operational function values in the city infrastructure group and the core infrastructure i within the range:
Figure FDA0003886004970000011
PPMCC i,j for the Pearson correlation coefficient between the j infrastructure running function value sequence and i, cov (i, j) is the covariance of the running function value sequences of i and j, σ i Is the standard deviation of i, σ j Is the standard deviation of j;
s1.3, dividing city infrastructure groups: obtaining F through Pearson correlation coefficient i (j) Dividing urban infrastructure groups;
Figure FDA0003886004970000012
F i (j) Indicates whether j is within its centered infrastructure group for core infrastructure i, with a value of 1 indicating it is inside, and 0 indicating it is outside;
performing the operations of the steps S1.2-S1.3 on the core infrastructure to complete the division of the city infrastructure groups to obtain Z infrastructure groups;
s1.4, establishing a cascading failure model of the infrastructure group;
s1.5, establishing an elasticity measurement index based on a cascading failure model of an infrastructure group;
s2, extracting key infrastructures of the urban infrastructure group and verifying effectiveness;
the specific implementation method of the step S2 comprises the following steps:
s2.1, according to management requirements, defining key infrastructures as bottleneck type key infrastructures and influencing type key infrastructures, wherein the bottleneck type key infrastructures are the pivot positions of the infrastructures in the urban infrastructure group, and the operation of the urban infrastructure group can be influenced to become the bottleneck type key infrastructures; the influence type key infrastructure is an influence type key infrastructure, wherein the load change of the influence type key infrastructure affects the adjacent infrastructures connected with each other and causes serious overload failure, and the influence type key infrastructure becomes the influence type key infrastructure;
s2.2, discovering bottleneck type key infrastructure and verifying effectiveness, wherein the specific implementation method comprises the following steps:
s2.2.1, analyzing the influence of each infrastructure on an overload failure path under the condition that the infrastructure is overloaded, and specifically, setting an infrastructure group G 1 In which contains N 1 Infrastructure, defining the overload level OLL of the infrastructure as:
Figure FDA0003886004970000021
OLL i (t) overload level of core infrastructure i, FV, at time t i (t) is the operating function value of i at time t, MC i A maximum capacity of i;
s2.2.2, setting the elastic bottleneck parameter as RBP, wherein the elastic bottleneck parameter comprises an elastic bottleneck path parameter RBRP and an elastic bottleneck function parameter RBFP;
s2.2.3, the elastic bottleneck path parameter is the proportion of the infrastructure on the overload path, and the definition formula is as follows:
Figure FDA0003886004970000022
wherein, OLL (FI) q ) Represents the sum of overload levels of all infrastructures under the condition that the operating parameter of the q-th infrastructure is increased by l times, and RBRP (l, i) represents the elastic bottleneck path parameter under the condition that the operating parameter of i is increased by l times, OLL i An overload level of i;
normalizing the elastic bottleneck path parameters of the infrastructure to obtain the normalized elastic bottleneck path parameters as follows:
Figure FDA0003886004970000023
wherein, RBRP' (l, i) represents the elastic bottleneck path parameter after i normalization, and RBRP (l, q) represents the elastic bottleneck path parameter under the condition that the operation parameter of the infrastructure q is increased by l times;
s2.2.4, the function parameter of the elastic bottleneck is the influence of the infrastructure on the function, and the definition formula is as follows:
Figure FDA0003886004970000024
wherein RBFP (l, i) represents an elastic bottleneck function parameter R 'under the condition that i operation parameter is increased by l times' q Represents the elasticity index of the q-th infrastructure under the condition that the i infrastructure does not fail under the initial disturbance condition, R q Representing the elasticity index of the q-th infrastructure under the condition of failure of the infrastructure i under the condition of initial disturbance;
normalizing the elastic bottleneck function parameters of the infrastructure to obtain the normalized elastic bottleneck function parameters as follows:
Figure FDA0003886004970000025
wherein, RBFP' (l, i) represents the elastic bottleneck function parameter after i normalization, and RBFP (l, q) represents the elastic bottleneck function parameter under the condition that the operation parameter of the infrastructure q is increased by l times;
s2.2.5, verifying the effectiveness of the excavated bottleneck type key infrastructure, including structural verification and functional verification;
s2.2.6, the specific implementation method of structural verification is to calculate the betweenness distribution condition of the original infrastructure group connection structure, the betweenness is a global geometric quantity, the action and the influence of the infrastructure in the whole network are reflected, the influence of the infrastructure on the structure is evaluated by analyzing the betweenness distribution condition of the infrastructure, and the betweenness B is defined as follows:
Figure FDA0003886004970000031
wherein n is jk Number, n, representing shortest path between infrastructures j and k jk (i) Representing the number of i passes in the shortest path between nodes j and k, B i Is the betweenness of i;
s2.2.7, the specific implementation method of the functional verification comprises the following steps: removing each infrastructure in consideration of the definition of the bottleneck, reconnecting the original structure according to the change condition of the load flow direction, namely bypassing the infrastructure, and realizing direct connection, so that the elasticity before and after removal is calculated and compared, and the discovery function of the bottleneck type key infrastructure is verified;
s2.3, excavating and verifying effectiveness of the influence type key infrastructure;
the specific implementation method of the step S2.3 comprises the following steps:
s2.3.1, setting elastic influence parameters as RIP, including an elastic operation influence parameter ROIP and an elastic connection influence parameter RLIP;
s2.3.2, considering the actual operation process of the infrastructure, firstly, the proportion of the operation load to all the infrastructure loads in the infrastructure group and the relation between the infrastructure operation parameter and the tolerance upper limit, and defining the resilient operation influence parameter ROIP of the infrastructure as follows:
Figure FDA0003886004970000032
wherein ROIP (l, i) represents an elastic operation influencing parameter under the condition that i operation parameter is increased by l times, FV q Represents the running function value of q, FV i Represents the operating function value of i;
normalizing the elastic operation influence parameters of the infrastructure to obtain the normalized elastic operation influence parameters as follows:
Figure FDA0003886004970000041
wherein, ROIP' (l, i) represents the elastic operation influence parameter after i normalization, and ROIP (l, q) represents the elastic operation influence parameter under the condition that the infrastructure q operation parameter is increased by l times;
s2.3.3, considering the influence of i on the operation of peripheral infrastructures, namely when the i is overloaded and influences the operation of the peripheral infrastructures, the resilient connection impact parameter RLIP is as follows:
Figure FDA0003886004970000042
wherein ROIP (i) represents an elastic connection impact parameter of i, wherein R (l, i) represents an elastic parameter under the condition that an operation parameter of infrastructure i is increased by l times, u is the increasing frequency of the operation parameter, R (0.05. U +1, i) represents an elastic parameter under the condition that the operation parameter of infrastructure i is increased by 0.05. U +1 times, and 0.05. U +1 is the increasing multiple of the operation parameter;
normalizing the elastic connection influence parameters of the infrastructure to obtain the normalized elastic connection influence parameters as follows:
Figure FDA0003886004970000043
wherein RLIP' (i) represents the elastic connection impact parameter after i normalization, RLIP (q) represents the elastic connection impact parameter of the infrastructure q;
calculating an average elastic connection impact parameter of the infrastructure group G1 as:
Figure FDA0003886004970000044
Figure FDA0003886004970000045
an average elastic connection impact parameter representing the infrastructure group G1;
s2.3.4, verifying the effectiveness of the excavated influence type key infrastructure, including structural verification and functional verification;
s2.3.5, structural verification: evaluating the influence of a single infrastructure in an infrastructure group by calculating degree distribution in the infrastructure group structure, wherein the degree of the infrastructure refers to the number of edges associated with the infrastructure, and the number of edges is the number of first-order neighbors connected with the infrastructure;
s2.3.6, functional verification: assuming that the tolerance upper limit of the discovered impact type key infrastructure is set to be infinite, and the condition of overload failure cannot occur, calculating the impact on an overload failure path, and introducing an elastic maximum impact parameter RMIP as follows:
Figure FDA0003886004970000051
RMIP (l) represents the elasticity maximum impact parameter when the operating parameter is increased by a factor of l;
and S3, providing a management method of the urban key infrastructure.
2. A method of managing a critical infrastructure in a city according to claim 1, wherein: the specific implementation method of the step S1.4 comprises the following steps:
s1.4.1, defining initial disturbance as a load value of an increased infrastructure based on the definition of a cascade failure model, wherein for an urban infrastructure j:
MC j =(1+TP j )·IL j
MC j is the maximum capacity of infrastructure j, TP j For the tolerance parameter of infrastructure j, IL j For the initial load of infrastructure j:
s1.4.2, when cascade failure occurs, deleting the overloaded infrastructure j, and distributing the load of the infrastructure j to a first-order neighbor k according to the connection strength, wherein the distribution ratio is as follows:
Figure FDA0003886004970000052
L' j,k is the normalized connection strength between j and k, L j,k Is the strength of the connection between j and k, L j,m Is the connection strength between j and m, m is any one of Q, Q is a first-order neighbor set connected with the infrastructure j;
s1.4.3, the load distributed to k is in proportion to the intensity after k normalization, and the following formula is shown:
FV j2k =FV j ·L' j,k
FV j2k the value of the running function, FV, of the load assigned to k j Is the operating function value of infrastructure j;
then updated load FV 'on k' k Comprises the following steps:
FV′ k =FV k +FV j2k =FV k +FV j ·L' j,k
s1.4.4, comparing the relation between the updating load of k and the maximum capacity of k, and determining whether further k removal is needed:
Figure FDA0003886004970000053
e (k) is the state value of k, MC k Maximum capacity of k, 0 for removal, 1 for retention;
s1.4.5, repeating the steps S1.4.1-S1.4.4, removing the connection and connection strength of the affected infrastructure, and normalizing again until the urban infrastructure group returns to a balance state again;
s1.4.6, after the core infrastructure is overloaded, the core infrastructure is reserved, the functional value of the maximum redundancy upper limit of the core infrastructure is maintained to operate, and the overload load of the infrastructure is not distributed.
3. A method of managing a critical infrastructure in a city according to claim 2, wherein: the specific implementation method of the step S1.5 comprises the following steps:
s1.5.1, setting fault propagation time as follows based on a cascade failure model of an urban infrastructure group:
Figure FDA0003886004970000061
T j2k time for the load of j to propagate on k, t j2k The time taken for the distance j to k Euclidean;
s1.5.2, setting the state parameter of the urban infrastructure group as the overload total SCP of the urban infrastructure group, and then setting the elasticity parameter R of the urban infrastructure group as follows:
Figure FDA0003886004970000062
wherein, t 0 Is the starting time of the elastic triangle, t 1 The ending time of the elastic triangle, Y is the total number of overload stages,
Figure FDA0003886004970000063
the average time of load transfer objects of all failed infrastructure for cascade failure at level h,Q h is a first-order neighbor set of the infrastructure overloaded in the cascade failure of the h-th stage, m is Q h Any one of (1), N h Number of infrastructures overloaded in cascade failure of h-th stage, T k2m The time for a load of k to propagate on m.
4. A method of managing a critical infrastructure in a city according to claim 3, wherein: the specific implementation method of the step S3 comprises the following steps:
s3.1, changing the existing connection strength matrix, thereby changing the load distribution strategy: for i, counting the load change condition of the neighbor node j after the overload failure process, and calculating as follows:
Figure FDA0003886004970000064
wherein p is i2j Representing the proportion of the load transferred from i to j occupying the real-time redundancy surplus value;
then, N is calculated respectively 1 P of sub-Process i2j Then, the sequence is sorted from small to large, and the value of 90% quantile is extracted and recorded as p i2j (90%) extract i all neighbors p i2j The set of values less than 1/3 is denoted
Figure FDA0003886004970000071
Changing the connection strength of the infrastructure in the set, specifically, increasing the connection strength of the infrastructure k in the set by 1.5 times:
Figure FDA0003886004970000072
for the connection strengths of infrastructures m that do not belong to the set, then:
Figure FDA0003886004970000073
in that
Figure FDA0003886004970000074
In the set, the infrastructure in the set with the later original connection strength is deleted from the set by referring to the original connection strength ranking;
s3.2, adding a connection relation on the basis of the S3.1: p for over 50% probability of overload failure among infrastructure group, first half ordered among all infrastructures, and neighbor nodes i2j And the connection relation of the infrastructure with the value summation less than 1/2 and the core infrastructure or the infrastructure with the average value of the OLL sequence within the range of 5km and less than 0.5 is increased, and for the infrastructure x to be connected of i, the connection strength is as follows:
Figure FDA0003886004970000075
wherein the content of the first and second substances,
Figure FDA0003886004970000076
is the OLL sequence average of i within the infrastructure,
Figure FDA0003886004970000077
is the OLL sequence average of x within the infrastructure;
s3.3, improving the redundancy upper limit of the infrastructure; combining with the excavation of key infrastructure, performing redundancy upper limit lifting on the key infrastructure, obtaining an OLL sequence in an infrastructure group according to the result of an OLL parameter, removing a part smaller than 1 and a value more than 3 times larger than a residual value in the sequence, calculating the average value of the sequence at the moment minus 1, and then determining the improved redundancy upper limit proportion;
s3.4, implementing a combination strategy: for the infrastructure, according to the sequence of the connection strength, the connection relation and the improvement of the redundancy upper limit, the combined application is applied to the infrastructure, after a strategy is implemented each time, the elasticity of the urban infrastructure group system is calculated, and the effects of the elasticity capacity improvement before and after the calculation are compared.
5. Electronic device, characterized in that it comprises a memory and a processor, the memory storing a computer program, the processor implementing the steps of a method for the management of a city critical infrastructure according to any one of claims 1 to 4 when executing said computer program.
6. Computer-readable storage medium, on which a computer program is stored, which computer program, when being executed by a processor, is adapted to carry out a method for managing a city critical infrastructure as claimed in any one of the claims 1 to 4.
CN202211028790.5A 2022-08-26 2022-08-26 Management method of urban key infrastructure, electronic equipment and storage medium Active CN115115283B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211028790.5A CN115115283B (en) 2022-08-26 2022-08-26 Management method of urban key infrastructure, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211028790.5A CN115115283B (en) 2022-08-26 2022-08-26 Management method of urban key infrastructure, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115115283A CN115115283A (en) 2022-09-27
CN115115283B true CN115115283B (en) 2023-01-31

Family

ID=83335854

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211028790.5A Active CN115115283B (en) 2022-08-26 2022-08-26 Management method of urban key infrastructure, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115115283B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114897454A (en) * 2022-07-14 2022-08-12 深圳市城市交通规划设计研究中心股份有限公司 Urban infrastructure group settlement evaluation method, electronic device and storage medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6442602B1 (en) * 1999-06-14 2002-08-27 Web And Net Computing System and method for dynamic creation and management of virtual subdomain addresses
US10574529B2 (en) * 2016-01-11 2020-02-25 Equinix, Inc. Defining conditional triggers for issuing data center asset information
CN109993215B (en) * 2019-03-08 2021-08-24 浙江大学 Route guidance method based on traffic big data
CN110111576B (en) * 2019-05-16 2020-10-09 北京航空航天大学 Method for realizing urban traffic elasticity index based on space-time congestion sub-cluster
CN113158456B (en) * 2021-04-15 2024-02-02 大连交通大学 Urban rail transit network cascade failure modeling method
CN114547827B (en) * 2022-04-26 2022-09-23 深圳市城市交通规划设计研究中心股份有限公司 Infrastructure group running state evaluation method, electronic device and storage medium

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114897454A (en) * 2022-07-14 2022-08-12 深圳市城市交通规划设计研究中心股份有限公司 Urban infrastructure group settlement evaluation method, electronic device and storage medium

Also Published As

Publication number Publication date
CN115115283A (en) 2022-09-27

Similar Documents

Publication Publication Date Title
Cavallaro et al. Assessment of urban ecosystem resilience through hybrid social–physical complex networks
Hong et al. Vulnerability assessment and mitigation for the Chinese railway system under floods
CN110111576B (en) Method for realizing urban traffic elasticity index based on space-time congestion sub-cluster
Kong et al. Optimizing the resilience of interdependent infrastructures to regional natural hazards with combined improvement measures
CN114547827B (en) Infrastructure group running state evaluation method, electronic device and storage medium
CN103077604B (en) traffic sensor management method and system
CN106789190A (en) A kind of power telecom network vulnerability assessment and routing optimization method
Deng et al. An assessment method for traffic state vulnerability based on a cloud model for urban road network traffic systems
CN110211378A (en) A kind of urban transportation health indicator system appraisal procedure based on Complex Networks Theory
CN110232819B (en) Complex network-based urban key road excavation method
Arosio et al. The whole is greater than the sum of its parts: a holistic graph-based assessment approach for natural hazard risk of complex systems
Zhang et al. Exploring the structural factors of resilience in urban drainage systems: a large-scale stochastic computational experiment
Lei et al. Mining spatial co-location patterns by the fuzzy technology
CN115115283B (en) Management method of urban key infrastructure, electronic equipment and storage medium
CN115034694B (en) Power grid vulnerability assessment method and device, electronic equipment and storage medium
Chang et al. Tabu search based approach to trouble call analysis
Ulak et al. A prescriptive model to assess the socio-demographics impacts of resilience improvements on power networks
CN115114715B (en) City infrastructure group network elasticity analysis method, electronic device and storage medium
CN111310340A (en) Urban area interaction abnormal relation identification method and equipment based on human movement
CN114567562B (en) Method for identifying key nodes of coupling network of power grid and communication network
CN115130193B (en) City infrastructure group elasticity analysis method, electronic device, and storage medium
CN112598305B (en) Urban road network important node identification method based on local structure flow
CN106550387B (en) A kind of wireless sensor network routing layer QoS evaluating method
Son et al. Random Network Model for Assessing the Topological Performance of Water Distribution Systems
Jelenius Graph models of infrastructures and the robustness of power grids

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant