灾害情况下FIM模型在高速公路网络上的应用
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
高速公路是道路交通的重要组成部分,由于其全封闭、全立交、机动车分向分道行驶等特点,使得高速公路大大提高了行车速度、缩短了运输时间,而且能够最大限度的排除机动车之间的干扰和冲突,减少了交通事故的发生。高速公路成为创造国家和社会经济效益的重要基础设施。因此,如何维护和保养高速公路基础设施、如何科学合理的规划高速公路基础设施建设、如何在灾害等自然条件下高速公路遭到破坏时得以迅速的恢复高速公路网络的能效等方面成为迫切需要解决的问题。
     本课题是以辽宁省高速公路为例,通过在地学领域运用比较广泛的网络脆弱性研究方法——FIM模型(Flow Interdiction Model网络流量阻断模型),运用于研究高速公路网络领域,并尝试给出灾害情况下的应急措施方案,其主要进行的研究有以下几个方面:
     1.对FIM模型进行转化,使其转化后的模型更适合研究多影响因素的高速公路网络问题;
     2.利用实地调查的部分车流量数据和人口、工业产值数据,应用无约束重力模型方法,推导出网络中所有OD路径上的车流量及城市之间工业吸引值;
     3.在FIM模型的实现上,应用ArcGIS软件对研究网络中各个节点、边定义属性,并且具有对研究结果可视化的作用;应用Java编程语言以最短路径算法——Dijkstra方法为核心,枚举研究网络中所有OD路径;应用Lingo最优化求解软件对枚举出的OD路径集合进行求最优运算,得到一条边或多条边的组合,该边及边的组合即为对整体网络功效影响最大的线路或线路组合;
     4.通过FIM模型求得的结果,结合辽宁省实际情况,提出灾害情况下应急和抢修的措施,以实现恢复整体网络的最大功效。
Highway is an important component of transport facility, which could increase running speed of automobile, shorten travel time, eliminate interference between motor vehicle, it could reduce the number of accidents due to its characteristics of full enclose, interchange, and separation of travel directions. Furthermore, freeway has become one of important infrastructures which could help to benefit economy and social developments. Therefore, how to maintain freeway facilities, construct freeway with scientific and reasonable methods, and rapidly restore highway network under natural disaster, are deemed to be critical.
     The paper chooses the care study of freeway in Liaoning, P.R.C, and provides emergency response countermeasures under natural disaster by adopting Flow Interdiction Model (which is a network method widely utilized in the field of geosciences). The research as followed.
     1. Transform FIM in order to fit the study on the freeway network problems with multiple influential factors.
     2. Deduce vehicle flow on OD path in the research network by utilizing traffic volume data obtained from field investigation and unconstrained gravity model.
     3. ArcGIS software defines nodes and edges'attributes in the network. In the meantime, the visualization of the study results are realized by ArcGIS software. Java enumerates all the feasible OD path by using the Shortest Path Algorithm. Lingo obtains the optimal solution, according to the feasible OD path. Its generation results are one edge or combination of edges.
     Provide emergency response plan and propose remedial approaches to achieve effects of full restoration of the freeway network by means of FIM model.
引文
[1]先立志.论修建高速公路的重要性和必要性.公路.1989,11
    [2]张绍军.高速公路的作用及启示.公路运输文摘.2004,10:12-16
    [3]俞莉佳.高速公路建设对拉动经济的作用研究[J].现在商业贸易.2007,19(11):36-37
    [4]Timmerman P. Vulnerability Resilience and the Collapse of Society [A]. Environmental Monograph. Toronto:Institute for Environmental Studies.1981.
    [5]胡兴华,刘咏.设置公交专用道道路的交通脆弱性分析.交通运输工程与信息学报.2006,4(3):128-133
    [6]Murray AT, Matisziw TC and Grubesic TH. Critical network infrastructure analysis:interdiction and system flow [J]. Journal of Geographical Systems, 2007,9(2):103-107
    [7]Grubesic TH, O'Kelly ME, Murray AT. A geographic perspective on commercial Internet survivability [J]. Telemat Inform.2003,20:51-69
    [8]Latora V, Marchiori M. Vulnerability and protection of infrastructure networks [J]. Phys RevE,2005,71:015103
    [9]Crucitti P, Latora V, Marchiori M. Model for cascading failures in complex networks [J]. Physical Review E,2004,69:045104
    [10]Doyle JC, Alderson DL, Li L, Low S, Roughan M, Shalunov S, Tanaka R, WillingerW. The'robust yet fragile'nature of the Internet [J]. Proceedings of the National Academy Sciences,2005,102:14497-14502
    [11]Corley HW, Chang H. Finding the n most vital nodes in a flow network [J]. Management Science,1974,21:362-364
    [12]Nardellia E, Proiettia G, Widmayer P. Finding the most vital node of a shortest path [J]. Theor Comput Sci,2003,296:167-177
    [13]Wollmer R. Removing arcs from a network [J]. Oper Res,1964,12:934-940. [14] Wood KR. Deterministic network interdiction [J]. Math Comput Modell,1993, 17:1-18
    [15]Grubesic TH, Murray AT. Vital nodes, interconnected infrastructures of network reliability [J]. Ann Assoc Am Geograph,2006,96:64-83
    [16]Grubesic TH, Murray AT, Mefford J. Continuity in critical network infrastructures:accounting for nodal disruptions[A]. In:Murray AT, Grubesic TH (eds) Reliability and vulnerability in critical infrastructure:a quantitative geographic perspective[C]. Springer, Heidelberg,2006,197-220
    [17]Myung Y-S, Kim H-J. A cutting plane algorithm for computing k-edge survivability of a Network [J]. European Journal of Operational Research,2004, 156:579-589
    [18]Murray AT, Matisziw TC and Grubesic TH. Critical network infrastructure analysis:interdiction and system flow [J]. Journal of Geographical Systems, 2007,9(2):103-107
    [19]Matisziw TC, Murray AT. Modeling s-t path availability to support disaster vulnerability assessment of network infrastructure [J]. Computers& Operations Research,2009,36:16-26
    [20]商彦蕊.自然灾害综合研究的新进展——脆弱性研究.地域研究与开发.2000,19(2):73-77
    [21]沈珍瑶,杨志峰,曹瑜.环境脆弱性研究评述.地质科技情报.2003,22(3):91-93
    [22]Sime JD. Accidents and disasters:vulnerability in the built environment [J]. Safety Science,1991,14(2):109-124
    [23]Mohamed Hamza, Roger Zetter. Structural adjustment, urban systems, and disaster vulnerability in developing countries [J]. Cities,1998,15(4):291-299.
    [24]Irasema A-A. Geomorphology, natural hazards, vulnerability and prevention of natural disasters in developing countries [J]. Geomorphology,2002, 47(2-4):107-124
    [25]Dibben C, Chester DK. Human vulnerability in volcanic environments:the case of Furnas, Sao Miguel, Azores [J]. Journal of Volcanology and Geothermal Research,1999,92(1-2):133-150
    [26]Bogardi JJ. Hazards, risks and vulnerabilities in a changing environment:the unexpected onslaught on human security [J]. Global Environmental Change Part A, 2004,14(4):361-365
    [27]Paul McLaughlin, Thomas Dietz. Structure, agency and environment:Toward an integrated perspective on vulnerability [J]. Global Environmental Change,2008, 18(1):99-111
    [28]E.O.13010. Critical Infrastructure Protection. URL:Executive Order 13010-Critical Infrastructure Protection [R].1996,61(138):37347-37350
    [29]李克让,陈育峰.全球气候变化影响下中国森林的脆弱性分析[J].地理学 报,1996,51(S1):40-49
    [30]於琍,曹明奎,陶波,李克让,董文杰,刘洪滨,刘长友.基于潜在植被的中国陆地生态系统对气候变化的脆弱性定量评价[J].植物生态学报,2008,32(3):521-530
    [31]冉圣宏,金建君,薛纪.脆弱生态区评价的理论与方法[J].自然资源学报,2002,17(1):117-122
    [32]Alex Erath, James Birdsall, Kay W.Axhausen, Rade Hajdin. Vulnerability Assessment Methodology for Swiss Road Network. Transportation Reasearch Record:Journal of the Transportation Research Board.2010,2137(13):118-126
    [33]Erik Jeneluus, Tom Petersen, Lars-Goran Mattsson. Importance and exposure in road network vulnerability analysis. Transportation Research Part A:Policy and Practice.2006,40(7):537-560
    [34]Bell.M.G.H, Kanturska.U, Schmocker,J-D, Fonzone.A. Attacker-defender models and road network vulnerability. Philosophical Transactions of the Royal Society A.2008,366:1893-1906
    [35]邹中正.抗御自然灾害能力的脆弱性分析——对金川县的灾情考察.四川气象.2001,21(2):45-49
    [36]高廷,徐笑歌,王静爱,李睿.2008年中国南方低温雨雪冰冻灾害承灾体分类与脆弱性评价——以湖南省郴州市交通承灾体为例.贵州师范大学学报:自然科学版.2008,26(4):14-21
    [37]马颖.城市交通生命线系统及其脆弱性的内涵和后果表现分析.价值工程.2006,25(12):12-21
    [38]李引珍,郭耀煌.交通运输网络最短路径关键边问题研究.中国管理科学.2004,12(4):69-73
    [39]张晶.辽宁统计调查年鉴:2006.辽宁人民出版社.2006,10-36
    [40]辽宁省统计局.辽宁统计年鉴:2006.中国统计出版社.2006,34-35
    [41]武汉大学设计研究总院.中国城乡公路网地图集.武汉大学出版社.2009,29-32
    [42]辽宁经纬测绘规划建设有限公司.辽宁省地图.西安地图出版社.2009
    [43]朱顺应,管菊香,王红等.交通分布预测模糊重力模型.东南大学学报(自然科学版).2008,38(4):727-731
    [44]程琦.高速公路交通灾害的预警管理研究.武汉理工大学硕士学位论文.2002.11-12
    [45]高秀静.辽宁省地图册(2006)新版——中国分省系列地图册.中国地图 出版社.2006,1-5
    [46]徐晓琴.基于图论的网络脆弱性评估系统的研究与实现.东南大学硕士学位论文.2006,9-12
    [47]张思伟,马寿峰,王亮.路网可靠性及其在交通系统中的应用.交通管理.2005,7:56-58
    [48]张炜熙.区域发展脆弱性研究与评估.天津大学硕士学位论文.2006,6-12
    [49]巫继雨.网络脆弱性分析.北京邮电大学硕士学位论文.2006,3-15
    [50]陈光亭.无向网络中最短路的最关键边问题.杭州电子工业学院学报.2002,22(1):48-50
    [51]肖文刚,陈金泉.重力模型改进在交通分布预测中的应用.科技情报开发与经济.2007,17(12):200
    [52]周扬军,赵晓华,李涛.重力模型应用方法与问题探讨.山西建筑.2007,33(25):65-66
    [53]傅莉萍.重力模型在交通量分布中的应用.交通运输.2008,14:328-330
    [54]王玉龙,杨放春,孙其博.基于模型的网络脆弱性定量分析方法.北京邮电大学学报.2008,31(4):58-61
    [55]王玥,蔡皖东,段琪.基于遗传算法的网络脆弱性计算方法.系统仿真学报.2009,21(6):1628-1632
    [56]邓亚平,吴慧莲,陈琳,王彬.网络脆弱性评估系统的设计与实现.计算机应用研究.2005,1:219-221
    [57]王预震,路畅,吕锡香.一种新的网络脆弱性量化分析模型,西安工业学院学报.2005,25(6):568-571
    [58]刘海旭,卜雷,蒲云.道路交通网络可靠性研究综述.世界科技研究与发展.2004,26(2):68-72
    [59]金孟合.城市公共交通网络布局规划及GIS在交通仿真分析软件中应用的研究.浙江大学硕士学位论文.2006:3-32
    [60]凤晓梅.基于GIS的城市公共交通系统评价研究.北京交通大学硕士学位论文.2007:3-21
    [61]范琦,王贵玲等.地下水脆弱性评价方法的探讨及实例.水利学报.2007,38(5):601-605
    [62]张启龙.几类特殊图的脆弱性参数.西北工业大学硕士学位论文.2006:2-9
    [63]刘志强,蔡策,童小田.我国道路交通安全现状分析.公路交通科技.2001,18(2):70-73
    [64]张清,黄朝迎.我国交通运输气候灾害的初步研究.灾害学.1998,13(3):43-46
    [65]蒋军,代舒.冰雪灾害对道路运输的影响及对策探讨.道路交通与安全.2008,8(4):18-21