计算机工程与应用 ›› 2015, Vol. 51 ›› Issue (20): 220-226.

• 工程与应用 • 上一篇    下一篇

山西大水网工程的网络拓扑性能分析

刘忠华1,于  华1,杨方廷2,隋  杰1   

  1. 1.中国科学院大学 工程管理与信息技术学院,北京 100049
    2.系统仿真技术应用国家工程研究中心,北京 100854
  • 出版日期:2015-10-15 发布日期:2015-10-30

Analysis of topological properties of Shanxi water network

LIU Zhonghua1, YU Hua1, YANG Fangting2, SUI Jie1   

  1. 1.College of Engineering and Information Technology, University of Chinese Academy of Sciences, Beijing 100049, China
    2.National Engineering Research Center of System Simulation Technology Application, Beijing 100854, China
  • Online:2015-10-15 Published:2015-10-30

摘要: 山西大水网规划为“两纵十横、六河连通,纵贯南北、横跨东西”的多源互补水网框架。考虑到水网工程的安全、高效运行,需要合理的规划建设和科学的监控防护。提取山西大水网工程的网络拓扑结构,运用复杂网络理论分析其拓扑特征,对其拓扑参数进行计算和分析,并对其拓扑脆弱性进行讨论。结果表明,山西大水网工程连通性不强,网络节点和边的平均负荷较重,网络传输效率也不高。对于选择哪些网络节点和边以及如何对这些网络节点和边进行监控和保护提供了决策参考。

关键词: 山西大水网, 两纵十横, 复杂网络, 网络拓扑, 监控保护, 决策支持

Abstract: Shanxi water network is designed as a multi-source framework of hydraulic engineering, which overall has two longitudinal and ten horizontal trunk streams, makes the six main rivers in Shanxi inter-connected with each other and runs across almost all over the province, from east to west and south to north. For the purpose of ensuring the network to run securely and efficiently, it needs rational planning and construction as well as scientific monitoring and protection. In this paper, it extracts the topology of Shanxi water network, and then analyzes its topological properties based on complex network theory, and specifies its topo-parameters. Furthermore, the vulnerability of its network topology has been reviewed. The results show that Shanxi water network is weakly connected, the average load that the nodes and edges bear is consi-derably over-weighed, and the network transmission efficiency is not sufficient. This paper provides a decision-making strategy to select specific network nodes/edges and discusses how to supervise and guard them in management of water-network project.

Key words: Shanxi water network, two longitudinal and ten horizontal trunk streams, complex network, network topology, monitoring and protection, decision support