Advertisement

Neural Computing and Applications

, Volume 32, Issue 1, pp 195–204 | Cite as

Research on evolutionary model of urban rail transit vulnerability based on computer simulation

  • Lei Wang
  • Yuntao Chen
  • Chao WangEmail author
Brain- Inspired computing and Machine learning for Brain Health
  • 93 Downloads

Abstract

In order to overcome the vulnerability of the effect of large passenger flow, an improved method based on the vulnerability of large passenger flow was proposed, and 5-year (2013–2017) passenger flow techniques are applied. The urban rail transit safety vulnerability simulation model mainly has three modules. Module 1: Urban rail transit can respond to disturbances in time and make corresponding adjustments and adaptations. Module 2: Urban rail traffic can be restored to a completely normal state for certain disturbances. Module 3: Urban rail transit can be completed within a limited self-recovery and adjustment time, and the fragile state after disturbance can be restored to normal state in time. This section of urban rail transit safety vulnerability evolution model is the core of the algorithm is studied, and according to the model to design the best algorithm procedures, specific algorithm to run the program is shown in Fig. 1. The results of this paper can be used as a basis for solving safety problems. It can in turn help to avoid or reduce the occurrence of disasters and to ensure the safe, fast and efficient operation of subway. This work has significance in theory and practice.

Keywords

Passenger flow Subway Vulnerability Evolutionary Simulation 

Notes

Acknowledgements

This research was supported by Institute of Risk and Insurance. The authors thank Institute of Risk and Insurance for the support in data access. We would also like to acknowledge the editor. The work was supported by Beijing Social Science Foundation (14JDJGC011).

Compliance with ethical standards

Conflict of interest

The authors declare that they have no conflict of interest.

References

  1. 1.
    Hong et al (2016) New light rail transit and active travel: a longitudinal study. Transp Res Part A 92:131–144Google Scholar
  2. 2.
    Adger WN (2006) Vulnerability. Glob Environ Change 16:268–281CrossRefGoogle Scholar
  3. 3.
    Chen Anthony, Yang Chao et al (2007) Network-based accessibility measures for vulnerability analysis of degradable transportation networks. Netw Spat Econ 7(3):241–256CrossRefGoogle Scholar
  4. 4.
    Downing TE (2000) Towards a vulnerability science? [J/OL]. IHDP Newsletter Update, 3Google Scholar
  5. 5.
    Yuan P, Song S et al (2015) Study on the vulnerability evaluation of components of urban rail transit system. China Saf Sci Technol 07:142–149Google Scholar
  6. 6.
    Erath A, Birdsall J, Axhausen KW, Hajdin R (2009) Vulnerability assessment of the Swiss road network. 88th Transportation research board annual meeting, Washington, pp 1–17Google Scholar
  7. 7.
    Erath A, Birdsall J et al (2010) Vulnerability assessment methodology for swiss road network. J Transp Res Board 2137:118–126CrossRefGoogle Scholar
  8. 8.
    Fang LB, Cai JD (2011) Reliability assessment of microgrid using sequential Monte Carlo simulation. J Electron Sci Technol 2011:31–34Google Scholar
  9. 9.
    Li F, Bi Jun et al (2010) Mapping human vulnerability to chemical accidents in the vicinity of chemical industry parks. J Hazard Mater 179:500–506CrossRefGoogle Scholar
  10. 10.
    Gallopín GC (2006) Linkages between vulnerability, resilience, and adaptive capacity. Glob Environ Change 16(3):293–303CrossRefGoogle Scholar
  11. 11.
    Gallopin GC (2006) Linkages between vulnerability, resilience, and adaptive capacity. Glob Environ Change 16:293–303CrossRefGoogle Scholar
  12. 12.
    Kim Hyun (2009) Geographical analysis on network reliability of public transportation systems: a case study of subway network system in Seoul. J Korean Geogr Soc 44(2):187–205MathSciNetGoogle Scholar
  13. 13.
    Jenelius E, Mattsson Lars-Gran. Developing a methodology for road network vulnerability analysis. 12th–13th Nectar cluster 1 seminar, Molde University College, MoldeGoogle Scholar
  14. 14.
    Hinkel Jochen (2011) “Indicators of vulnerability and adaptive capacity”: towards a clarification of the science–policy interface. Glob Environ Change 21(1):198–208CrossRefGoogle Scholar
  15. 15.
    Luers AL, Lobell DB, Sklar LS et al (2003) A method for quantifying vulnerability, applied to the agricultural system of the Yaqui Valley, Mexico. Glob Environ Change 13(4):255–267CrossRefGoogle Scholar
  16. 16.
    Demichela M (2013) Vulnerability assessment for human targets due to ash fallout from Mt. Etna. Chem Eng 32:445–450Google Scholar
  17. 17.
    Yuan P, Song S et al (2014) Fire prediction based on combinational optimization model of gray neural network. China Saf Sci Technol 03:119–124Google Scholar
  18. 18.
    Yuan P, Song S et al (2015) Study on the cusp catastrophe of employees’ unsafe behavior. J Saf Environ 03:165–169Google Scholar
  19. 19.
    Yuan P, Song S et al (2014) Urban vulnerability modeling and simulation under climate change. Urb Dev Res 01:54–60Google Scholar
  20. 20.
    Criado R, Hernández-Bermejo B et al (2007) Efficiency, vulnerability and cost: an overview with applications to subway networks worldwide. Int J Bifurc Chaos 17(7):2289–2301CrossRefGoogle Scholar
  21. 21.
    Criado Regino, Pello Javier et al (2009) A node-based multiscale vulnerability of complex networks. Int J Bifurc Chaos 19(2):703–710MathSciNetCrossRefGoogle Scholar
  22. 22.
    Mitra SK, Saphores J-DM (2016) The value of transportation accessibility in a least developed country city—the case of Rajshahi City, Bangladesh. Transp Res Part A Policy Pract 89:184–200CrossRefGoogle Scholar
  23. 23.
    Smit B, Wandel J (2006) Adaptation, adaptive capacity and vulnerability. Glob Environ Change 16(3):282–292CrossRefGoogle Scholar
  24. 24.
    Song S et al (2016) Study on the influencing factors of electric fire in metro based on vulnerability theory. J Xi’an Univ Sci Technol 05:691–696Google Scholar
  25. 25.
    Thirumalaivasan D, Karmegam M, Venugopal K (2003) AHP-DRASTIC: software for specific aquifer vulnerability assessment using DRASTIC model and GIS. Environ Model Softw 18(7):645–656CrossRefGoogle Scholar

Copyright information

© The Natural Computing Applications Forum 2018

Authors and Affiliations

  1. 1.School of Economics and ManagementBeijing Jiaotong UniversityBeijingChina

Personalised recommendations