Modeling cascading failures in the North American power grid

合集下载

A study on casing deformation failure during multi-stage hydraulic fracturing

A study on casing deformation failure during multi-stage hydraulic fracturing

A study on casing deformation failure during multi-stage hydraulic fracturing for the stimulated reservoir volume of horizontal shale wellsZhanghua Lian a,*,Hao Yu a,Tiejun Lin a,Jianhua Guo ba State Key Lab of Oil and Gas Reservoir Geology and Exploitation,Southwest Petroleum University,Chengdu610500,Chinab Research Institute of Gas Recovery Engineering,PetroChina Southwest Oil and Gas Field Company,Guanhan618300,Chinaa r t i c l e i n f oArticle history:Received24November2014 Received in revised form26January2015Accepted26February2015 Available online10March2015Keywords:Stimulated reservoir volume Shale gasCasing deformation failure Numerical simulationRock damage mechanics Stress deficit a b s t r a c tVolume fracturing technique has effectively helped develop unconventional oil and gas reservoirs in recent years.At the same time,new problems of casing deformation failure occurred.Based on the drilling and well completion data,microseismic surveillance data,theories of fracture mechanics,rock damage mechanics and rock failure criterion,this paper established afinite element model of the for-mation of effective stimulated reservoir volume,including clustering perforation casing for X-1h shale gas horizontal well,to address the problems.The research results indicate:1)the stress deficit of zero stress areas and tension stress areas occurred within the range of stimulated reservoir volume during the process of volume fracturing.And,the state of this stress deficit,which would make clustering perfo-ration casings of horizontal wells“hanging”in the formation to some extent,resulted in certain degree of deflection deformation radically and S-shape deformation axially.2)the problem of casing deformation failure remains fundamentally unsolvable through simply improving casing grade and wall thickness to increaseflexural strength.3)the key to solve casing deformation failure is the reasonable spacing design of multi-stage fracturing.The methods and achievements in the paper provide theoretical supports for the popularization and application of shale stimulated reservoir volume and controlling the S-shape deformation failures of the horizontal multi-cluster perforation casing.©2015Elsevier B.V.All rights reserved.1.IntroductionIn recent years,volume fracturing has become an effective technique for the development of unconventional oil and gas res-ervoirs(Wang et al.,2012,2014a).Using volume fracturing mea-sures,the stimulated reservoir volume(SRV)can be realized to achieve industrial production volume(Wang et al.,2015).In2006, Mayerhofer et al.(2006)first mentioned the concept of the Stim-ulated Reservoir Volume(SRV).Later on,other experts in thisfield (Cipolla et al.,2009;Mayerhofer et al.,2010;Wu et al.,2011;Chen et al.,2012)developed the concept and revealed its basic contents, optimization design and the implementation methods.Meanwhile, Wu et al.(2011)clearly presented a new concept of volume frac-turing technique,i.e.the technique can break up reservoirs to form complicated fracture networks,and“create”artificial permeability. This technique successfully breaks the traditional fracturing seepage theory model and greatly shortens the effective seepage distance and is especially applicable to the stimulation of highly brittle rock layer.Meanwhile,multi-stage and multi-cluster perfo-ration modes are also applied(Wu et al.,2012).The SRV theory completely subverts the traditional fracturing theory(Wu et al., 2011).The volume fracturing technique no longer forms symme-try bi-wing fractures,but generates complex fracture networks. Also,this theory illustrates that fracture initiation and extensions are not a simple tension-fracture,but have completed mechanics behaviors with shear failure,leap and slip(Chipperfield et al., 2007).This volume fracturing was put into use for thefirst time in the multi-stage and multi-cluster SRV process of W201well and W201-H1well in Weiyuan,Sichuan Province,China,and good stimulation effect was obtained(Wu et al.,2012).After that,this technique was applied and developed in the SRV process of ultra-low permeability and tight oil reservoirs in Changqing oilfield, Jilin oilfield,Tarim oilfield,Southwest oil-gasfields and Sulige gas*Corresponding author.State Key Lab of Oil and Gas Reservoir Geology and Exploitation,Southwest Petroleum University,Chengdu610500,China.E-mail address:milsu1964@(Z.Lian).Contents lists available at ScienceDirectJournal of Natural Gas Science and Engineering journal ho mep age:www.elsevier.co m/lo cate/jngse/10.1016/j.jngse.2015.02.0281875-5100/©2015Elsevier B.V.All rights reserved.Journal of Natural Gas Science and Engineering23(2015)538e546field in China(Chen et al.,2007;Ye et al.,2013;Tang et al.,2013).2.A new problem in volume fracturing-casing deformation failureA new problem of casing deformation failure has occurred during multi-stage hydraulic fracturing of SRV.Due to the charac-teristics of big fracturing volume,excessive stimulated segments and big pumping delivery rate in the volume fracturing process, there will exist complicated mechanical behaviors such as shear failure,leap and slip around the horizontal casing and the change of in-situ stressfield(Chipperfield et al.,2007;Hossain et al.,2007). All these problems will frequently lead to casing deformation fail-ure and make it difficult to run subsequent completion tools. Consequently,normal well completion operations and stimulation treatments can't be performed,which would seriously influence stimulation effect(Chen et al.,2007;Hossain et al.,2007;Yang et al.,2013;Tang et al.,2013;Yu et al.,2014;Brantley et al.,2014).Daneshy(2005)showed that during the fracturing operations, casing could fail under tension across the fractured interval either by de-threading of the collars of the casing or by tensile failure at perforations.He presented the main factors contributing to this failure are off-balance fracture growth,and pseudo-openhole environment;other contributing factors are borehole inclination with respect to the fracture plane,and the quality of the cement bond.Furui et al.(2010)developed a comprehensive liner-deformation model to analyze casing failure in fracturing and acidizing.Their computed results indicated that Their computed results indicated that fracturing and acidizing can lead to the compaction effect,borehole instability and casing deformation.Yu et al.(2014)constructed a three-dimensionalfinite element model of casing failure during the multi-layer fracturing of vertical wells. According to the comparison of MIT multi-arms logs after frac-turing,casing failure is coefficient results of rock properties decrease,asymmetry treatment zones,high fracturing pressure and terrestrial stressfield redistribution.Wang et al.(2014b)indicated that local buckling,crushing,connection failure and shear failure are the main modes of casing failure.The researches above have demonstrated the effect of traditional hydraulic fracturing on cas-ing damage from different perspectives.However,studies on casing failure in multi-stage hydraulic fracturing of SRV are still relatively few.In this work,we analyzed the information of a shale gas hori-zontal well in Sichuan,well X-h1,when serious casing failure occurred during its volume fracturing process.Based on micro-seismic monitoring data,areas affected by rock-cracking,tectonic map around casing,in-situ stress data,casing size and so on,using finite element analysis software,mechanical models for the research on the mechanism of casing damage of horizontal well volume fracturing could be established.Throughfinite element numerical modeling research and analysis under different condi-tions,wefigured out the forms,reasons and mechanisms of the casing failure,and presented the related protection and control measures for the casing damage.3.Finite element modeling(FEM)of horizontal section volume fracturing3.1.Basic data of X-1h wellX-1h is a horizontal shale gas well in West China,with measured depth(MD)of2649m and horizontal section length of 1250m,as shown in Fig.1.In the horizontal section,casing dimension is139.7mmÂ9.17mm with a steel grade of P110.The material parameters of casing and cement sheath are shown in Table1.Twelve-stage volume fracturing was adopted in this well.Each stage of multi-cluster perforation had an effective length of20m and the spacing of adjacent fracturing sections was80m,as shown in Fig.1.Each section was injected about2000m3fluids into the layer at theflow back rate of9.8%and maximum pump pressure of 64MPa.On the basis of microseismic information,some layers appeared repetitive volume fracturing,as shown in Fig.2.After volume fracturing,during the process of drilling bridge plug,the block of F117mm milling shoe at the depth of2331.5m evidenced the possibility of casing failure.The casing failure section was located in thefifth fracturing section,which was the biggest stimulated volume.Therefore,finite element(FE)model must contain all the information of this section.3.2.Basic theory of rock damage and division of volume fracturing spread rangeDuring each staged fracturing process,pump pressure would rise with the increase of delivery capacity,andfluid seepage pres-sure that forced on areas of volume fracturing would also go up, which changed the formation stressfield.Whereas,the changing stressfield could result in formation damage of stimulated areas and decrease of rock mechanical properties(Zhao et al.,2012). Based on microseismic principles,it can be considered that any signal of microseismogram is the initiation fracture of a microcrack that continues to expand(Dong and Gao,2004).However,it is impossible to accurately depict the changes of rock mechanical properties that appeared after the generation of each microcrack. Therefore,it is assumed that the rock mass in themicroseismic Z.Lian et al./Journal of Natural Gas Science and Engineering23(2015)538e546539areas during each staged fracturing process is a homogeneous fracture cube (Tian,2007).According to the related theories of fracture mechanics and several fracture criteria,we use cohesive element type to simulate the decrease of rock mechanical proper-ties (Turon et al.,2006).The critical stress criterion is Eq.1s n s max n2þs ss max s2þs ts max t2¼1(1)The linear degradation criterion of cohesive element elasticitymodulus is Eq.2E ¼ð1Àd ÞÂE 0(2)The formula to calculating the damage factor d is Eq.3d ¼d f m Âd max m Àd 0md max m  d f m Àd 0m(3)The location of casing failure is at 2331.5m,which lies between the fourth perforation and fifth perforation.Based on themicroseismic monitoring images,the third to sixth staged frac-turing section can be found closely related to the casing failure.As the research object is casing,we use some basic geometric shapes to represent the volume fracturing spread range on microseismic image of each stage near the casing.While those signals that are far from casing or isolated from each other are neglected in the model for their little in fluence on casing deformation.The use of basic geometric shapes can provide convenience for subsequent mesh-ing.As shown in Fig.3,there are ellipses and rectangles in the planar projection of microseismic monitoring images of X-1h well and the division range is displayed in Fig.3a e d.These areas are viewed as homogeneous cracks,which are directly under fracturing fluid pressure and have decreased rock mechanical properties.3.3.Finite element modeling and meshingOn the basis of the above-mentioned theory and microseismic monitoring data,the fracture areas with crevices in third to sixth microseismic results as displayed in Fig.3are drawn in a coordinate paper,showing in bined with geological data,borehole trajectory data,completion technology and the working condition of multi-stage fracturing,a FEM of multi-cluster perforation casing is established to simulate the third to sixth staged fracturing pro-cess of horizontal section formation with the length of 643m,the width of 476m and the thickness of 200m.This model contains horizontal section with MD of 2035m e 2678m,as shown in Fig.5.In Fig.5,the elliptic cylinders and rectangular columns are frac-turing areas,and the superimposed zones indicate repeated frac-turing areas.Theoretical research and practice show that rock mechanical parameters of re-fracturing areas willdecreaseFig.1.Schematic diagram of X-1h basic data.Table 1Material parameters of casing and cement sheath.MaterialElastic modulus/GPa Poisson's ratio Cohesion/MPaFriction angle/Yield strength/MPa Casing 210.00.30758.0Cement15.00.2312.026Table 2Fracturing operation parameters of X-1h.StageWell section (m)Hydrostatic pressure (MPa)Working pressure (MPa)Pressure gradient (MPa/m)Max.Min.32556e 246515.056.551.60.02442465e 237015.062530.02452370e 227015.064590.02462270e 217015.065580.024Z.Lian et al./Journal of Natural Gas Science and Engineering 23(2015)538e 546540obviously,especially stress field variation,after two or more than two fracturing treatments.We can see from Fig.4that the casing failure locates in the re-fracturing areas.Besides,we can know from Fig.5a that fracturing stimulation areas is extremely unsymmetri-cal.Non-uniform load appears around the multi-cluster perforation casing and put casing into complicated stress conditions after fracturing.In FEM of Fig.5,the range of the formation model is 643Â476Â200m.However,the size of casing diameter is only 0.1397m and the ratio of casing diameter to its length is 2.1710À4,which means it is dif ficult and arduous for meshing.To address this issue,first partition and subdivide the complex three-dimensional regions,such as microseismic areas,casing,cement sheath and overlaps,into simpler regions that the automatic mesh generator can mesh.Then control the global mesh size,and a local re finement is applied for casing.Finally,using Arbitrary Lagrange-Euler (ALE)adaptive mesh for casing to provide control of mesh distortion,and structured or sweep technique to generate global mesh.According to the function “Verify mesh ”,an estimate of mesh quality is good.After the intelligent meshing technical process,the partial enlarged meshing of cement sheath and casing is shown in Fig.5b.For the formation,casing and cement sheath in the areas that is not frac-tured,we use C3D8P element type.For the crack in fractured areas,cohesive element can be used to simulate the rock damage after each stage fracturing,and the meshed model has 354,827nodes and 336,390elements in Fig.5b.Through the comparison of computed results after mesh re finement,the calculation accuracy can be improved with the increasing mesh density but the in flu-ence is very little.Therefore,the node number is suf ficient for this particular problem.3.4.Boundary and initial conditionsThe six facets of the model in Fig.5are the far field boundary conditions.According to the logging information,the Prede finedField function is applied to calculate the in-situ stress distribution before multi-stage fracturing which is shown in Fig.6.In the finite element numerical simulation,the in-situ stress will be automati-cally redistributed toward the volume fracturing areas around the wellbore.In Fig.6,the direction of minimum horizontal in-situ stress is parallel to the axial direction of borehole and the value of three-dimensional stresses varies with MD.The average minimum hori-zontal in-situ stress is 30Mpa,combining with the average vertical in-situ stress of 35Mpa and the average maximum horizontal in-situ stress of 60Mpa,indicates the heterogeneity of in-situ stress field is not strong.As shown in Fig.6,the in-situ stress distribution is relatively uniform.On this condition,casing is under good me-chanical environment and the in-situ stress field has little in fluence over casing failure.3.5.Basic data of numerical simulation in SRV fracturingThis paper has set up multi-analysis steps to simulate each stage of the volume fracturing with FE software.In the process of volume fracturing,the basic parameters of fracturing fluid pressure in casing and corresponding crack areas (pore pressure)are shown in Table 2.For re-fracturing areas which would be subjected to two or more repeated fracturing treatments under fracturing fluid pres-sure of different stages,the decreased elasticity modulus around the casing will be calculated with Eqs.(1)e (3)after each stage volume fracturing.By use of the keyword *Field,mechanical property values of formation that decrease after rock damage are reset to materials of repeated fracturing areas.4.Analysis of the FE numerical simulationBased on the finite element model,including clustering perfo-ration casing (as shown in Fig.5)in this paper,the in-situ stress field in the areas with more microseisms has redistributed for many times under the effect of fracturing fluid pressure (pore pressure)by the numerical simulation of third to sixth stage volume frac-turing.The casing is affected by variable terrestrial stress field,whose magnitude and direction in the whole model changes dramatically,even the “tension stress ”areas and “zero stress ”areas occur in the range of the volume fracturing (the circle surrounded by red (in the web version)curve,as shown in Fig.7).In this paper,these areas are called “stress de fict areas ”and the one where simulated reservoir volume fracturing “broken up ”reservoirs.Fig.7shows the vector distribution contours of 3D in-situ stress field after sixth staged fracturing.By contrast of the analysis of the stress field in Figs.7and 6,the maximum value of three-dimension stress near the microseismic areas varies from 36.3MPa,47.2MPa,72.7MPa e 73MPa,52.4MPa,116.0MPa,which means the nu-merical value and heterogeneity degree of the in-situ stress field increase signi ficantly.The collapsing strength of the casing de-creases with the increasing three-directional non-uniform compression forces,which makes the casing in a worse mechanical environment.In some microseismic areas,due to strong fracturing pressure and breakage of initial formation volume,in-situ stress disappears temporarily,then,tension stress areas and zero stress areas occur in the formation with broken volume under complex mechanical environment (the positive values of three-dimensional stress,as shown in Fig.7).The appearance of tension stress areas is favorable to the increase of crack width and conductivity of oil and gas,while “stress de ficit ”areas leads the horizontal casing to “overhang ”in volume fracturing formation in different degrees.Then the asymmetry of SRV areas made in-situ stress transverse shear force acting on casing and the formation,which leads to casing deformation along the radial direction to some extent.TheFig.2.Collective diagram of microseismic surveillance data of Total 12stages in X-1h.Z.Lian et al./Journal of Natural Gas Science and Engineering 23(2015)538e 546541FE results in this paper show in some multiple refracturing areas,rock mechanical properties,including modulus of elasticity,pois-son's ratio and compressive strength sequentially decrease,accompanying with the successive increase of heterogeneity and de ficiency of in-situ stress field and the enhancement of shear ef-fect,meanwhile,radial elliptical deformation and axial S-shape deformation of casing gradually strengthen.All these changes will result in casing deformation failure,which makes it dif ficult to lower completion tools,causing the failure of stimulation treat-ment according to its deformed section.Fig.8is showing the axial deformation and Von Mises stress distribution contours of casing in the horizontal section after the third-to-sixth staged fracturing.FE analysis reveals that in the process of multi-staged volume fracturing operation,terrestrial stress field constantly redistributes,which also leads to the mixed “tensile stress ”and “compressive stress ”.Under the shear effect ofstress field and the gravity effect of suspending casing in “stress de ficit ”section,deformation failure often occurs.In the sections of unbroken formation,the casing has little deformation,while in other sections,casing is in fluenced by variable stress field.There-fore,there will appear several “S ”shape deformation failures in the whole horizontal segment of the casing.From Fig.8,we can see the axial deformation of the casing.In Fig.8,the maximum stress of 760.3MPa,which is beyond the casing yield strength of 758.0MPa,occurs near the location of casing deformation failure at 2331.5m,indicating that the casing not only occurs large deformation,but also plastic failure.In order to study the deformation failure mechanism of the casing cross-section direction during multi-stage hydraulic frac-turing,the ellipticity (Yu et al.,2014)of casing calculated by Eq.(4)after sixth stage volume fracturing is shown in Fig.9.The maximum ellipticity was only 1.2%,found at 2320e 2340m.Because oftheFig.3.Planar diagram of each stage's microseismic surveillance data of X-1h well.Z.Lian et al./Journal of Natural Gas Science and Engineering 23(2015)538e 546542comparatively small ellipticity of the casing's section,in this case,the casing oval deformation is not a main factor that prevents the access of running tools.z ¼2ðD max ÀD min ÞðD max þD min ÞÂ100%(4)Therefore,we obtained the curvature and displacement of cas-ing deformation by A e A (vertical in-situ stress direction)and B e B (maximum horizontal in-situ stress direction)of the casing cross section with MD from FE numerical results,as shown in Fig.10.The bending deformations are clearly found on the segments of the horizontal casing.The maximum displacement of 44mm appears somewhere near 2335m in A e A direction,with a large curvature and small casing segment length;in B e B direction,there emerges distortion of displacement,the maximum displacement is 40mm,and the casing becomes an obvious S-shape,as shown in Fig.10b.This results in the dif ficult access to the S-shape casing for long rigid tubular string.Based on the field investigation of X-1h well,using F 117mm milling shoe to mill bridge plug was blocked when tool ran into 2331.5m.The bottom outside milling shoe was worn seriously after taken out,as shown in Fig.11a;there were also tiny iron filings in the mud ditch,as shown in Fig.11b.The casing was thought as deformation failure.Then,a lead impression block (LIB)was run to help determine its nature.The LIB has a malleable lead baseinFig.4.Collective diagram of microseismic surveillance data of 3rd to 6th stages in X-1hwell.Fig.5.The FE model of the SRV formation including clustering perforation casing of 3rd to 6th stages in X-1h.Fig.6.The in-situ stress field vector distribution contours.Z.Lian et al./Journal of Natural Gas Science and Engineering 23(2015)538e 546543which the deformed casing can leave an impression when they meet.The deformation failure was con firmed through the squashed side of LIB,as shown in Fig.11c.By contrast,the FE results showing in this paper are the same to the actual working condition.There-fore,the current method and FEM are correct.The study above shows that the casing deformation failure is mainly resulted from the increasing non-uniform degree of the three-directional compression load,caused by the changing terrestrial stress field during multi-stage fracturing process.Therefore,increasing the flexural strength by simply increasing steel grade and wall thickness cannot radically solve the failure of axial S-shaped deformation of casing.In order to achieve industrial production of SRV,delivery ca-pacity and pump pressure can't be changed,so the reasonable spacing design of multi-stage fracturing is the key to solve casing deformation failure.The optimal spacing design based on geolog-ical data,rock properties and in-situ stress filed,should be applied instead of the simple uniform one,and adjusted timely on the basis of micro-seismic monitoring results,which makes the terrestrial stress load on the casing as uniform as possible.5.Conclusions(1)The constructed FEM is based on rock damage mechanics and fracturing areas data from microseismic monitoring.The FEM can be applied to effectively and quantitatively study casing deformation failure during multi-stage hydraulic fracturing for SRV of horizontal shale wells.(2)After FE numerical study of the third-to-sixth staged frac-turing,it can be known that there will be the “tensile stress ”areas and “zero stress ”areas in the fracture areas after sixth staged volume fracturing.Although the existence of tensile stress areas is favorable for increasing fracture width and flow conductivity,the “stress de ficit ”areas will make casing remain in suspending state and lead to radial deformation.(3)Some areas receive refracturing treatment,leading the for-mation rock mechanical properties to decrease,the in-situ stress field non-uniform degree and stress de ficit areas to increase,the shear effect to increase,and the radial ellipse deformation and axial S-shaped deformation of casing to increase at the same time.All these changes will result in casing deformation failure.(4)Increasing the flexural strength by simply increasing steel grade and wall thickness cannot radically solve the failure of axial S-shaped deformation of casing.The key to solve casing deformation failure is the reasonable spacing design ofmulti-Fig.7.The vector distributions of formation three dimensional in-situ stress field after 6th stagedfracturing.Fig.8.Von Mises stress ofcasing.Fig.9.Changed curves of casing's ellipticity with well depth.Z.Lian et al./Journal of Natural Gas Science and Engineering 23(2015)538e 546544stage fracturing,which makes the terrestrial stress load on the casing as uniform as possible.AcknowledgmentsThe authors thank the National Natural Science Foundation of China (No.50774063)and the Research Fund for the Doctoral Program of Higher Education of China (No.20135121110005),for their contributions to this paper.ReferencesBrantley,S.L.,Yoxtheimer, D.,Arjmand,S.,Grieve,P.,Vidic,R.,Pollak,J.,Llewellyn,G.T.,Abad,J.,Simon,C.,2014.Water resource impacts during un-conventional shale gas development:the Pennsylvania experience.Int.J.Coal Geol.126,140e 156.Chen,M.,Qian,B.,Ou,Z.,Zhang,J.,Jiang,H.,Chen,R.,2012.Exploration and Practiceof Volume Fracturing in Shale Gas Reservoir of Sichuan Basin,China.IADC/SPE 155598.Chen,Z.,Wang,Z.,Zeng,H.,2007.Status quo and prospect of staged fracturingtechnique in horizontal wells.Nat.Gas Ind.27(9),78e 80.Chipper field,S.T.,Wong,J.R.,Warner,D.S.,Cipolla,C.L.,Mayerhofer,M.J.,Lolon,E.P.,Warpinski,N.R.,2007.Shear Dilation Diagnostics:a New Approach for Evalu-ating Tight Gas Stimulation Treatments.SPE 106289.Cipolla,C.L.,Lolon,E.P.,Mayerhofer,M.J.,Warpinski,N.R.,2009.Fracture DesignConsiderations in Horizontal Wells Drilled in Unconventional Gas Reservoirs.SPE 119366.Daneshy,A.A.,2005.Impact of Off-balance Fracturing on Borehole Stability &CasingFailure.SPE 93620.Dong,S.,Gao,H.,2004.Microseismicmonitoring technology and its application to oil field development.Pet.Instrum.18(5),5e 8.Furui,K.,Fuh,G.F.,Abdelmalek,N.,Morita,N.,2010.A Comprehensive ModelingAnalysis of Borehole Stability and Production-liner Deformation for Inclined/Horizontal Wells Completed in a Highly Compacting Chalk Formation.SPE 123651-PA .Hossain,M.M.,Rahmank,S.S.,2007.Volumetric Growth and Hydraulic Conductivityof Naturally Fractured Reservoirs during Hydraulic Fracturing:a Case Study Using Australian Conditions.SPE 63173.Mayerhofer,M.J.,Lolon, E.P.,Youngblood,J.E.,Heinze,J.R.,2006.Integration ofMicroseismic Fracture Mapping Results with Numerical Fracture Network Production Modeling in the Barnett Shale.SPE 102103.Mayerhofer,M.J.,Lolon, E.P.,Warpinski,N.R.,Cipolla, C.L.,Walser, D.,Rightmire,C.M.,2010.What is Stimulated Reservoir Volume.SPE 119890-PA .Tang,Y.,Wang,G.,Li,Z.,Chen,S.,Du,L.,2013.Practice and understanding onmultiple crack volume fracturing in open hole horizontal well section of Zone Su53.Oil Drill.Prod.Technol.35(1),63e 67.Tian,F.,2007.Elasticity modulus and fracture density in the rocks with crevices.Acta Geol.Sin.81(10),1338e 1344.Turon,A.,Camanho,P.P.,Costa,J.,D a vila, C.G.,2006.A damage model for thesimulation of delamination in advanced composites under variable-model loading.Mech.Mater.38(2006),1072e 1089.Wang,H.,Liao,X.,Zhao,X.,Zhao,D.,Liao,C.,2014a.Advances of technology study ofstimulated reservoir volume in unconventional reservoir.Spec.Oil Gas Reserv.21(2),8e 15.Wang,H.,Liao,X.,Ding,H.,2015.Monitoring and evaluating the volume fracturingeffect of horizontal well.J.Nat.Gas Sci.Eng.22(2015),498e 502.Wang,Y.,Lu,Y.,Li,Y.,Wang,X.,Yan,X.,Zhang,Z.,2012.Progress and application ofhydraulic fracturing technology in unconventional reservoir.Acta Pet.Sin.Sin.33(Suppl.1),149e 158.Wang,Y.,Watson,R.,Rostami,J.,Wang,Y.,Limbruner,M.,He,Z.,2014b.Study ofborehole stability of Marcellus shale wells in longwall mining areas.J.Pet.Explor.Prod.Technol.4(2014),59e 71.Wu,Q.,Xu,Y.,Wang,T.,Wang,X.,2011.The revolution of reservoir stimulation:anintroduction of volume fracturing.Nat.Gas Ind.31(4),7e 12.Fig.10.Curves of bending deformation of casing after 6th staged fracturing varied with welldepth.Fig.11.Field images of casing deformation after 6th staged fracturing.Z.Lian et al./Journal of Natural Gas Science and Engineering 23(2015)538e 546545。

专业英语 词组翻译

专业英语 词组翻译

1. artificial intelligence 人工智能2. paper-tape reader 纸带阅读器3. optical computer 光计算机4. neural network 神经网络5. instruction set 指令集6. parallel processing 并行处理7. difference engine 差分机8. versatile logical element 通用逻辑元件9. silicon substrate 硅衬底10. vacuum tube 真空管11. 数据的存储与处理the storage and handling of data12. 超大规模集成电路very large-scale integrated circuit13. 中央处理器central processing unit14. 个人计算机personal computer15. 模拟计算机analogue computer16. 数字计算机digital computer17. 通用计算机general-purpose computer18. 处理器芯片processor chip19. 操作指令operating instructions20. 输入设备input device1. artificial neural network 人工神经网络2. computer architecture 计算机体系结构3. robust computer program 健壮的计算机程序4. human-computer interface 人机接口5. knowledge representation 知识表示6. 数值分析numerical analysis7. 程序设计环境programming environment8. 数据结构data structure9. 存储和检索信息store and retrieve information10. 虚拟现实virtual reality1. data field 数据字段,数据域2. learning curve 学习曲线3. third-party solution 第三方解决方案4. Windows Media Player Windows媒体播放器5. 开始按钮Start button6. 指定输入区designated input area7. 手写体识别系统handwriting-recognition system8. 字符集character set1. function key 功能键,操作键2. voice recognition module 语音识别模块3. touch-sensitive region 触敏区4. address bus 地址总线5. flatbed scanner 平板扫描仪6. dot-matrix printer 点阵打印机(针式打印机)7. parallel connection 并行连接8. cathode ray tube 阴极射线管9. video game 电子游戏10. audio signal 音频信号11. 操作系统operating system12. 液晶显示(器)LCD (liquid crystal display)13. 喷墨打印机inkjet printer14. 数据总线data bus15. 串行连接serial connection16. 易失性存储器volatile memory17. 激光打印机laser printer18. 磁盘驱动器disk drive19. 基本输入/输出系统BIOS (Basic Input/Output System)20. 视频显示器video display1. interrupt handler 中断处理程序2. virtual memory 虚拟存储(器),虚存,虚拟内存3. context switch 上下文转换,语境转换4. main memory 主存(储器)5. bit pattern 位模式6. 外围设备peripheral device7. 进程表process table8. 时间片time slice9. 图形用户界面graphical user interface10. 海量存储器mass storage1. code generator 代码生成程序,代码发生器2. abstract machine 抽象机3. program editor 程序编辑程序,程序编辑器4. configuration item 配置项5. 计算机辅助设计CAD (computer-aided design)6. 数据冗余data redundancy7. 指挥与控制系统command and control system8. 视频压缩与解压缩video compression and decompression1. storage register 存储寄存器2. function statement 函数语句3. program statement 程序语句4. object-oriented language 面向对象语言5. assembly language 汇编语言6. intermediate language 中间语言,中级语言7. relational language 关系(型)语言8. artificial language 人工语言9. data declaration 数据声明10. SQL 结构化查询语言11. 可执行程序executable program12. 程序模块program module13. 条件语句conditional statement14. 赋值语句assignment statement15. 逻辑语言logic language16. 机器语言machine language17. 函数式语言functional language18. 程序设计语言programming language19. 运行计算机程序run a computer program20. 计算机程序员computer programmer1. native code 本机(代)码2. header file 头标文件;页眉文件3. multithreaded program 多线程程序4. Java-enabled browser 支持Java的浏览器5. malicious code 恶意代码6. 机器码machine code7. 汇编码assembly code8. 特洛伊木马程序Trojan horse9. 软件包software package10. 类层次class hierarchy1. bar chart 条形图2. frequency array 频率数组3. graphical representation 图形表示4. multidimensional array 多维数组5. 用户视图user(’s) view6. 下标形式subscript form7. 一维数组one-dimensional array8. 编程结构programming construct1. inference engine 推理机2. system call 系统调用3. compiled language 编译执行的语言4. parallel computing 并行计算5. pattern matching 模式匹配6. memory location 存储单元7. interpreter program 解释程序8. library routine 库程序,程序库例行程序9. intermediate program 中间程序,过渡程序10. source file 源文件11. 解释执行的语言interpreted language12. 设备驱动程序device driver13. 源程序source program14. 调试程序debugging program15. 目标代码object code16. 应用程序application program17. 实用程序utility program18. 逻辑程序logic program19. 墨盒ink cartridge20. 程序的存储与执行program storage and execution1. messaging model 消息接发模型2. common language runtime 通用语言运行时刻(环境)3. hierarchical namespace 分层名称空间4. development community 开发界5. CORBA公用对象请求代理(程序)体系结构6. 基本组件base component7. 元数据标记metadata tag8. 虚拟机virtual machine9. 集成开发环境IDE(integrated development environment)10. 简单对象访问协议SOAP(Simple Object Access Protocol)1. procedure call 过程调用2. fault tolerance 容错3. homogeneous system 同构系统4. autonomous agent 自主主体5. 路由算法routing algorithm6. 异构型环境heterogeneous environment7. 多址通信协议multicast protocol8. 通信链路communication(s) link1. system specification 系统规格说明2. unit testing 单位(或单元、部件)测试3. software life cycle 软件生命周期(或生存周期)4. system validation testing 系统验证测试5. evolutionary development process 演化开发过程6. simple linear model 简单线性模型7. program unit 程序单元8. throwaway prototype 抛弃式原型9. text formatting 正文格式编排,文本格式化10. system evolution 系统演变11. 系统设计范例system design paradigm12. 需求分析与定义requirements analysis and definition13. 探索式编程方法exploratory programming approach14. 系统文件编制system documentation15. 瀑布模型waterfall model16. 系统集成system integration17. 商用现成软件commercial off-the-shelf (或COTS) software18. 基于组件的软件工程component-based software engineering (CBSE)19. 软件维护工具software maintenance tool20. 软件复用software reuse1. check box 复选框,选择框,校验框2. structured design 结构化设计3. building block 积木块,构建模块,构件4. database schema 数据库模式5. radio button 单选(按)钮6. 系统建模技术system modeling technique7. 模型驱动开发model-driven development8. 数据流程图data flow diagram9. 下拉式菜单drop-down (或pull-down) menu10. 滚动条scroll bar1. procedural language 过程语言2. common design structure 通用设计结构3. class and object interaction 类与对象交互4. design constraint 设计约束5. 设计模式design pattern6. 可复用软件reusable software7. 面向对象的系统object-oriented system8. 继承层次inheritance hierarchy1. end user 最终用户,终端用户2. atomic operation 原子操作3. database administrator 数据库管理员4. relational database model 关系数据库模型5. local data 本地数据6. object-oriented database 面向对象数据库7. database management system (DBMS) 数据库管理系统8. entity-relationship model (ERM) 实体关系模型9. distributed database 分布式数据库10. flat file 平面文件11. 二维表two-dimensional table12. 数据属性data attribute13. 数据库对象database object14. 存储设备storage device15. 数据类型data type16. 数据插入与删除data insertion and deletion17. 层次数据库模型hierarchical database model18. 数据库体系结构database architecture19. 关系数据库管理系统relational database management system (RDBMS)20. 全局控制总线global control bus1. nonvolatile storage system 非易失性存储系统2. equipment malfunction 设备故障3. wound-wait protocol 受伤―等待协议4. exclusive lock 排它锁,互斥(型)锁5. database integrity 数据库完整性6. 共享锁shared lock7. 数据库实现database implementation8. 级联回滚cascading rollback9. 数据项data item10. 分时操作系统time-sharing operating system1. base class 基(本)类2. data library 数据(文件)库3. data access stack 数据存取栈4. database-specific functionality 数据库特有的功能5. 默认设置default setting6. 异常处理程序exception handler7. β测试beta testing8. 桥接提供程序bridge provider1. microwave radio 微波无线电2. digital television 数字电视3. DSL 数字用户线路4. analog transmission 模拟传输5. on-screen pointer 屏幕上的指针6. computer terminal 计算机终端7. radio telephone 无线电话8. cellular telephone 蜂窝电话,移动电话,手机9. decentralized network 分散型网络10. wire-based internal network 基于导线的内部网络,有线内部网11. 光缆fiber-optic cable12. 传真机fax machine13. 无线通信wireless communications14. 点对点通信point-to-point communications15. 调制电脉冲modulated electrical impulse16. 通信卫星communication(s) satellite17. 电报电键telegraph key18. 传输媒体transmission medium (或media)19. 无绳电话cordless telephone20. 金属导体metal conductor1. bit map 位图,位映象2. parallel port 并行端口3. direct memory access (DMA) 直接存储器存取4. universal serial bus 通用串行总线5. general-purpose register 通用寄存器6. 电路板circuit board7. 串行通信serial communication8. 数码照相机digital camera9. 存储映射输入/输出memory-mapped I/O10. 有线电视cable televisionUnit Seven/Section CI. Fill in the blanks with the information given in the text:1. Transfer2. cells3. label4. integratedII. Translate the following terms or phrases from English into Chinese and vice versa:1. high-definition TV 高清晰度电视2. frame relay 帧中继3. data rate 数据(速)率4. metropolitan area network 城域网5. 机顶盒set-top box6. 多模光纤multi-mode fiber7. 协议堆栈protocol stack8. 虚拟路径标识符VPI (virtual path identifier)1. file server 文件服务器2. carrier sense 载波检测,载波监听3. protocol suite 协议组,协议集4. peer-to-peer model 对等模型5. bus topology network 总线拓扑网络6. inter-machine cooperation 机器间合作,计算机间合作7. Ethernet protocol collection 以太网协议集8. proprietary network 专有网络9. utility package 实用软件包,公用程序包10. star network 星形网络11. 局域网local area network (LAN)12. 令牌环token ring13. 无线网络wireless network14. 封闭式网络closed network15. 环形拓扑结构ring topology16. 客户机/服务器模型client/server model17. 网络应用程序network application18. 进程间通信interprocess communication19. 打印服务器print server20. 广域网wide area network (W AN)1. routing path 路由选择通路2. dual-ring topology 双环形拓扑结构3. extended star topology 扩展星形拓扑结构4. backbone network 基干网,骨干网5. mesh topology 网格拓扑结构6. 同轴电缆coaxial cable7. 逻辑拓扑结构logical topology8. 无冲突连网环境collision-free networking environment9. 树形拓扑结构tree topology10. 目的地节点destination node1. destination address 目的地址2. performance degradation 性能退化(或降级)3. four-interface bridge 4接口网桥4. common bus 公共总线,公用总线5. 数据链路层data-link layer6. 协议转换器protocol converter7. 开放式系统互连OSI (Open Systems Interconnection)8. 物理地址physical address1. cell phone 蜂窝电话,移动电话,手机2. IP address 网际协议地址,IP地址3. autonomous system 自主系统4. dial-up connection 拨号连接5. network identifier 网络标识符6. binary notation 二进制记数法7. mnemonic name 助记名,缩写名8. Internet-wide directory system 因特网范围的目录系统9. name server 名称服务器10. Internet infrastructure 因特网基础结构11. 助记地址mnemonic address12. 网吧cyber cafe13. 宽带因特网访问broadband Internet access14. 顶级域名top-level domain (TLD)15. 因特网编址Internet addressing16. 点分十进制记数法dotted decimal notation17. 因特网服务提供商Internet service provider (ISP)18. 专用因特网连接dedicated Internet connection19. 主机地址host address20. 硬件与软件支持hardware and software support1. incoming message 来报,到来的报文2. application layer 应用层3. utility software 实用软件4. sequence number (顺)序号,序列号5. remote login capabilities 远程登录能力6. 端口号port number7. 软件例程software routine8. 传输层transport layer9. 文件传送协议FTP(File Transfer Protocol)10. 万维网浏览器Web browser1. wildcard character 通配符2. Copy command 复制命令3. search operator 搜索算符4. home page 主页5. 回车键Enter key6. 搜索引擎search engine7. 嵌入代码embedded code8. 超文本标记语言Hypertext Markup Language1. mailing list 邮件发送清单,邮件列表2. proprietary software 专有软件3. cc line 抄送行4. bcc line 密送行5. forwarded e-mail messages 转发的电子邮件6. e-mail convention 电子邮件常规7. click on an icon 点击图标8. confidential document 密件,秘密文件9. classified information 密级信息10. recovered e-mail message 恢复的电子邮件11. 常用情感符commonly used emoticon12. 已删除电子邮件deleted e-mail13. 电子系统electronic system14. 附件行Attachments line15. 版权法copyright law16. 电子邮件网规e-mail netiquette17. 信息高速公路information superhighway18. 签名文件signature file19. 电子数据表程序spreadsheet program20. 文字处理软件word processor1. web-authoring software 网络写作软件2. template generator 模版生成程序3. navigation page 导航页面4. corporate logo 公司标识5. splash page 醒目页面,过渡页6. 导航条navigation bar7. 节点页面node page8. 网站地图site map9. 可用性测试usability testing10. 图形交换格式gif(Graphics Interchange Format)Unit Ten/Section CI. Fill in the blanks with the information given in the text:1. technical2. participation3. openness; sharing4. prosumers; wikiII. Translate the following terms or phrases from English into Chinese and vice versa:1. instant messaging 即时通信,即时消息2. content syndication 内容聚合3. user-friendly interface 用户友好界面,方便用户的接口4. Weblog-publishing tool 博客(或网志)发布工具5. 应用程序编程接口application programming interface (API)6. 基于因特网的外包Internet-based outsourcing7. 软件升级software upgrade8. 版本号version number1. customized marketing strategy 定制的营销策略2. B2G transaction 企业对政府交易3. mobile telephone 移动电话4. dot-com bust 网络不景气5. smart card 智能卡,灵巧卡6. digital piracy 数字盗版7. dot-com boom 网络繁荣8. C2C transaction 消费者对消费者交易9. Web auction site 拍卖网站10. fingerprint reader 指纹读取器11. 射频识别装置radio-frequency identification (RFID) device12. 电子数据交换electronic data interchange (EDI)13. 库存管理技术inventory management technology14. 知识产权intellectual property15. 条形码bar code16. 货币兑换currency conversion17. 电子图书electronic book18. 视网膜扫描仪retina scanner19. 个人数字助理personal digital assistant (PDA)20. 企业对企业电子商务B2B electronic commerce1. software suite 软件套件2. text box 文本框3. virtual checkout counter 虚拟付款台4. static catalog 静态目录5. browser session 浏览器会话期6. 动态目录dynamic catalog7. 购物车软件shopping cart software8. 供应链supply chain9. 企业资源计划软件enterprise resource planning (ERP) software10. 税率tax rateUnit Eleven/Section CI. Fill in the blanks with the information given in the text:1. credit2. downloading; in-store3. malls4. hackersII. Translate the following terms or phrases from English into Chinese and vice versa:1. privacy policy 隐私政策2. identity theft 身份(信息)盗取3. affiliate marketing 联属网络营销4. postal money order 邮政汇票5. 零售网站retail website6. 信用卡credit card7. 货到付款cash on delivery8. 安全套接层Secure Sockets Layer1. encryption program 加密程序2. deletion command 删除命令3. authorized user 授权的用户4. backup copy 备份5. voltage surge 电压浪涌6. circuit breaker 断路器7. electronic component 电子元件(或部件)8. data-entry error 数据输入错误9. electronic break-in 电子入侵10. power line 电力线,输电线11. 检测程序detection program12. 电源power source13. 破坏性计算机程序destructive computer program14. 计算机病毒computer virus15. 软件侵权software piracy16. 硬盘驱动器hard-disk drive17. 病毒检查程序virus checker18. 主存储器primary storage19. 电子公告板electronic bulletin board20. 浪涌电压保护器surge protector1. phishing attack 网络钓鱼攻击2. graphics card 显(示)卡3. heuristic analysis 试探性分析4. infected file 被感染文件5. virus dictionary 病毒字典6. 数据捕获data capture7. 恶意软件malic ious software8. 病毒特征代码virus signature9. 防病毒软件antivirus software10. 内存驻留程序memory-resident program1. system platform 系统平台2. install back doors 安装后门3. email attachment 电子邮件的附件4. vulnerability assessment tool 脆弱性评估工具5. 网络安全措施network security measure6. 系统维护人员system maintenance personnel7. 邮件交换记录MX record8. 非法闯入系统hack a system。

表因果的英语作文

表因果的英语作文

表因果的英语作文Title: Exploring Cause and Effect Relationships。

In the realm of human understanding, cause and effect relationships form the very fabric of our comprehension of the world. From the simplest occurrences to the most complex phenomena, we constantly seek to unravel the connections between events and their consequences. In this essay, we delve into the significance of cause and effect relationships, their role in various domains, and the methods used to analyze and comprehend them.First and foremost, understanding cause and effect relationships is pivotal in grasping the fundamental principles governing natural phenomena. In the scientific domain, cause and effect serve as the cornerstone of experimentation and hypothesis testing. Scientists meticulously design experiments to isolate variables and elucidate the causal relationships between them. Through rigorous observation, data collection, and analysis, theyuncover the intricate mechanisms underlying natural processes.Moreover, cause and effect relationships permeate numerous aspects of human existence, extending beyond the confines of scientific inquiry. In social sciences such as psychology, sociology, and economics, researchers probe the interplay between various factors to discern patterns of behavior, societal trends, and economic dynamics. By identifying causal links, scholars gain insights into human cognition, social interactions, and the mechanisms driving economic growth or decline.In everyday life, individuals intuitively navigate through a web of cause and effect relationships, albeit often unconsciously. From mundane decisions like choosing what to eat for breakfast to significant life choices such as career paths or relationships, individuals weigh the potential consequences of their actions. While some causal connections may seem straightforward, others unfold in complex and unpredictable ways, posing challenges to our understanding and decision-making processes.Analyzing cause and effect relationships requires a multifaceted approach, drawing upon various methodologies and analytical tools. Statistical techniques such as regression analysis, correlation studies, and structural equation modeling provide quantitative insights into the relationships between variables. Qualitative methods such as case studies, interviews, and content analysis offer in-depth understanding and context to complex causal dynamics.Furthermore, advances in technology and data analytics have revolutionized the study of cause and effect relationships, enabling researchers to analyze vast amounts of data with unprecedented precision. Machine learning algorithms, for instance, can identify hidden patterns and causal connections within large datasets, shedding light on intricate relationships that might elude human perception.However, despite our best efforts, discerning causality remains a daunting challenge in many instances. The inherent complexity of natural systems, coupled with the presence of confounding variables and nonlinear dynamics,often complicates causal inference. In such cases, researchers resort to probabilistic reasoning, causal modeling, and counterfactual analysis to approximate causal relationships and mitigate uncertainty.Moreover, cause and effect relationships are not always unidirectional or linear; they can exhibit feedback loops, cascading effects, and emergent properties, giving rise to nonlinear dynamics and system-wide changes. Understanding such complex causal structures requires interdisciplinary collaboration, drawing insights from diverse fields ranging from systems theory and complexity science to philosophy and epistemology.In conclusion, cause and effect relationshipsconstitute the cornerstone of human understanding, permeating scientific inquiry, social analysis, and everyday decision-making. By unraveling the intricate connections between events and their consequences, we gain deeper insights into the mechanisms governing the natural world and human behavior. While analyzing cause and effect relationships poses challenges and uncertainties, itremains a fundamental endeavor in our quest to comprehend the complexities of existence.。

Qualitative simulation

Qualitative simulation

Qualitative SimulationBenjamin KuipersIn Encyclopedia of Physical Science and Technology,Third Edition.Robert A.Meyers,Editor-in-Chief.Academic Press,2001,pages287–300.Qualitative simulation predicts the set of possible behaviors consistent with a qualitative differential equation model of the world.Its value comes from the ability to express natural types of incomplete knowl-edge of the world,and the ability to derive a provably complete set of possible behaviors in spite of the incompleteness of the model.A qualitative differential equation model(QDE)is an abstraction of an ordinary differential equation, consisting of a set of real-valued variables and functional,algebraic and differential constraints among them.A QDE model is qualitative in two senses.First,the values of variables are described in terms of their ordinal relations with afinite set of symbolic landmark values,rather than in terms of real numbers. Second,functional relations may be described as monotonic functions(increasing or decreasing over par-ticular ranges)rather than by specifying a functional form.These purely qualitative descriptions can be augmented with semi-quantitative knowledge in the form of real bounding intervals around unknown real values and real-valued bounding envelope functions around unknown real-valued functions.Qualitative and semi-quantitative models can be derived by composing model fragments and collecting the associated modeling assumptions.Qualitative simulation starts with a QDE and a qualitative description of an initial state.Given a qual-itative description of a state(called a qstate),it predicts the qualitative state descriptions that can possibly be direct successors of the current state description.Repeating this process produces a graph of qualitative state descriptions,in which the paths starting from the root are the possible qualitative behaviors.The graph of qualitative states is pruned according to criteria derived from the theory of ordinary differential equations, in order to preserve the guarantee that all possible behaviors are predicted.Abstraction methods have also been developed to simplify the resulting qualitative behaviors.The resulting graph of qualitative states(the behavior graph)can still be quite large,requiring automated methods based on temporal logic model-checking to determine whether the qualitative prediction implies a desired conclusion.Conclusions derived in this way can be used in the design and validation of dynamical systems such as controllers.A set of qualitative models and their associated predictions can also be unified with a stream of observations to monitor an ongoing dynamical system or to do system identification on a partial model.Ongoing research topics include qualitative simulation and abstraction methods,the use of various types of quantitative knowledge,automated ways to determine the conclusions to draw from a predicted behavior graph,design and verification methods,online monitoring frameworks,and modeling methods suited forQualitative Simulation2 particular application domains.The specific notations in this article are those used in the QSIM representa-tion[20,21],but the concepts covered include the related ideas from[8,12,30,31].1The Qualitative Model RepresentationLike an ordinary differential equation,a qualitative differential equation model consists of a set of variablesrelated by constraints.(Figure1shows an example of the QSIM code for a QDE describing a simple U-tubesystem consisting of two tanks,A and B,connected by a thin channel.)A variable represents a continuouslydifferentiable function over the extended real number line,,including.However,in a QDE model,the range of each variable,including the independent variable time,is described qualitatively by aquantity space.A quantity space is afinite,totally ordered set of symbolic landmark values representingqualitatively important values in the real number line(seefigure1).Every quantity space includes landmarksfor zero and positive and negative infinity.A purely qualitative model specifies only the ordinal relationsamong landmarks,though as we shall see below,semi-quantitative extensions may provide bounds on thepossible real values corresponding to a landmark.The algebraic and differential constraints in a QDE are simple and familiar equations,universally quan-tified over.(add x y z)(mult x y z)(minus x y)(d/dt x y)Since they are asserted as individual constraints,rather than composed as hierarchical expressions intraditional algebra,a QDE must include explicit variables for subexpressions.However,a QDE may alsoinclude constraints representing unknown functions in the set of monotonically increasing continuously differentiable functions(satisfying additional technical conditions discussed in[21]).(M+x y)(M-x y)The and constraints make it possible to express a QDE model including functions whose ex-plicit form is not known,and which are only described in terms of monotonicity.An algebraic or functionalconstraint may specify corresponding values,which are tuples of landmark values known to satisfy the con-straint.A QDE may also explicitly describe the boundaries of its domain of applicability by specifyingtransition conditions that carry the behavior into a different model.The U-tube model in Figure1illustrateseach of these features.The qualitative magnitude of a variable is described either as a landmark value or as an open intervalbetween two adjacent landmarks in the quantity space of that variable.The qualitative value of a variable isdescribed as its qualitative magnitude and the sign of its derivative(its direction of change:inc,std,or dec).(Note that the antecedents of the transition conditions in Figure1are specified by the qualitative values ofparticular variables.)A qualitative state of a model is a tuple of associations of qualitative values to eachvariable in the model.Time is described in the same way as every other variable.Since its direction of change is always inc,time progresses through an alternating sequence of landmark values(called time-points)and open intervalsQualitative Simulation3Qualitative Simulation4 between adjacent time-points.The time-points are defined as those points in time when the qualitative stateof the model(i.e.,the qualitative value of any variable)changes.A qualitative behavior is a sequence of qualitative states,where each state is the immediate successor ofthe one before it.Because of the qualitative representation,it is possible for afinite sequence of qualitativestates to represent the behavior of a system from its initial state at to afinal state at.For example,one possible behavior of the U-tube model in Figure1,initialized with Tank A full and Tank Bempty,is the following three-state behavior concluding with a state where both Tank A and Tank B are partlyfull.We see new landmark values being created and inserted into quantity spaces when new critical valuesare defined;i.e.,when a qualitative magnitude lies in an open interval,but direction of change is.Figure2(a)shows a plot of this qualitative behavior(each qualitative value is plotted at a landmark,or midway between two landmarks).Because the tanks have unknown sizes(the landmarks AMAX andBMAX)and geometries(the monotonic functions linking amount and pressure),the behavior graph for thismodel is a tree of three behaviors.There are extensions to the representation not discussed here,including the region transition and discon-tinuous changes shown in Figure2(b).See[21]for details.2Qualitative SimulationThe QSIM algorithm[20,21]performs qualitative simulation by deriving the immediate successors of eachqualitative state,repeating this step to grow the behavior graph from the initial state at its root.In orderto guarantee that all possible behaviors are predicted,we requirefirst that all possible qualitative valuetransitions are predicted,and second,that combinations of qualitative values are only deleted when they areinconsistent.Table1enumerates all transitions from each qualitative value description to its possible successors.The validity of this table follows directly from the Intermediate Value and Mean Value Theorems fromelementary calculus.The successor generation phase of QSIM consists of the following steps,given a QDE and a currentstate.Qualitative Simulation5Qualitative Simulation6 I-Successors:interval to point.Qualitative Simulation71.(Value generation.)For each variable in,generate all possible successor values using Table1.2.(Constraintfiltering.)For each constraint in the QDE,which applies to a tuple of variables,generateall corresponding tuples of successor values.Delete each tuple that violates its constraint.3.(Local consistencyfiltering.)For each pair of constraints that are adjacent,in the sense that they sharea variable,and for each tuple of one constraint that assigns a value,say,to,delete that tuple ifthere is no tuple associated with the other constraint that also assigns the value to.4.(State generation.)From the remaining tuples of values associated with constraints,exhaustivelyenumerate all consistent complete assignments of values to variables.Create a successor state for from each of these assignments.Once successor states have been added to the behavior graph,they can be analyzed and the description augmented in several ways.In some cases inconsistencies can be identified that were not visible at the successor-generation level,allowing states to be pruned from the graph.Statefilters consider information local to the current state and perhaps its immediate predecessor.In-consistency can be propagated from a state to its predecessors.A quiescent state(fixed point)can be recognized because all directions of change are.In somecases,its stability can also be determined.Transitions to infinite values and infinite times must satisfy additional constraints.Higher-order derivative constraints can sometimes be derived algebraically from the QDE and applied to eliminate certain successor states.New landmarks and new corresponding value tuples can be created explicitly to describe critical values and other uniquely determined values in quantity spaces.A region transition is identified when the current state matches the antecedent to a transition rule.Thecurrent state is linked to a new state,created with respect to the QDE for the new operating region, with values mapped from the current state.The transition may represent a discontinuous change,or it may represent a re-description of the current state within a new model.Behaviorfilters derive properties of the entire behavior terminating in the current state,to augment the behavior description and sometimes determine its inconsistency.A periodic behavior can be identified by matching the new state to one of its predecessors in thebehavior graph.The phase space trajectory of a dynamical system can only intersect itself if the behavior is periodic.Qualitative behaviors that self-intersect without creating a cycle are inconsistent.Terms equivalent to potential and kinetic energy,and conservative and non-conservative work,can be derived from some QDE models,and tested for consistency.When semi-quantitative information is associated with the QDE,it can be propagated to refine or refute the behavior description.(Section3.)Qualitative Simulation8 The QSIM Guaranteed Coverage Theorem states that the QSIM behavior graph describes all real solu-tions to ODE models consistent with the given QDE and initial qualitative state.This follows directly from the fact that all possible successor values are generated,and that states and behaviors are deleted only when proved to be inconsistent.There is no converse guarantee that every predicted qualitative behavior corresponds to a real solution to some ODE described by the QDE.While the constraint satisfaction algorithm in QSIM is sound and com-plete,there may well be a G¨o del-like incompleteness theorem stating that the properties of real dynamical systems are too rich to be captured by anyfinite set of symbolic constraints.2.1TractabilityThe set of behaviors generated by qualitative simulation may include many distinctions unimportant to the model-builder,due to thefixed level of description implied by the qualitative value and qualitative state representations.There are two classes of such unimportant distinctions.In thefirst,there is a region of the state space of the QDE where the qualitative behavior is unconstrained.Recently,methods have been developed for identifying such a“chattering”region and replacing it with an abstract state whose predecessors and successors describe the trajectories into and out of that region[4].In the second class,two or more events(qualitative value transitions)take place,but their temporal order is not constrained by the QDE.Based on the concept of interacting histories[14,32]methods have been developed for qualitative simulation of a QDE decomposed into sub-models[5].The interactions between the histories of the sub-models are considered only when they are needed to permit simulation of the sub-model.Events internal to separate sub-models are not explicitly related,so they do not require explicit branches in the graph of qualitative behaviors.While the behavior graph predicted for a complex QDE model may still be quite large,these two methods have,in principle,eliminated the problem of intractable branching in qualitative simulation by eliminating the two sources of explicit distinctions unimportant to the model-builder.2.2Querying the behavior graphAn individual qualitative behavior is a description of the time-evolution of the variables in the QDE,and is not difficult to interpret,whether it is purely qualitative or if it is augmented with bounding intervals and envelopes.However,a large behavior graph represents a disjunctive prediction with many disjuncts,and requires automated interpretation tools.A particularly interesting tool that has been developed recently is temporal logic model-checking,ap-plied to the behavior graph output by QSIM[29].The branching-time temporal logic CTL[11]is particu-larly well suited to expressing statements of interest about the QSIM behavior graph.We can express:QSIM predicates on states qvalue,quiescent,cycle,etc.Logical connectives and,or,not,implies.Temporal path relations eventually,always,next,until,etc.Modal quantifiers necessarily,possibly.The behavior graph output by QSIM can be interpreted as a branching-time temporal model,against which a temporal assertion can be checked for validity.There are efficient incremental model-checking algorithms that can be used to check whether a temporal model structure is an interpretation of a given statement in CTL[2].The model-checking algorithm is sound and complete.However,the QSIM Guaran-teed Coverage Theorem provides only a one-sided guarantee about the relation between the QSIM behaviorQualitative Simulation9 graph and the set of predicted behaviors:QSIM predicts every real behavior,but some predictions could be spurious,and not correspond to any real behavior.Therefore,model-checking can prove a universal statement in temporal logic(one of the form),but not an existential statement(one of the form),since the behavior that is identified as the interpretation for could be a spurious be-havior[29].Temporal logic model checking can be used to prove properties of dynamical systems such as non-linear controllers,even with incomplete knowledge[22].2.3Guided SimulationThe relation between temporal logic and qualitative simulation can be carried one step farther,to allow as-sertions in temporal logic to be treated as part of the model[3].The extended qualitative simulator,TeQSIM, generates only qualitative behaviors that satisfy the temporal logic assertions as well as the constraints in the QDE and the requirements of continuity.This approach has two major uses.First,it extends the expressive power available to the model-builder to state properties of the system that are difficult to capture in the constraint language of the QDE.An example is the ability to describe time-varying behavior of exogenous variables,including specifying bounds on the time of occurrence of discrete events.The second use is to allow the model-builder to focus the simulator’s attention on a subset of the state space of the model described by the temporal logic assertions,rather than to explore the larger space of all possible behaviors.3Semi-Quantitative SimulationPartial knowledge can be quantitative as well as purely qualitative.The QDE and the qualitative behaviors produced by QSIM can serve as a symbolic and algebraic framework for reasoning with several representa-tions of incomplete quantitative knowledge.A landmark value is a symbolic name for an unknown real number,described in terms of its ordinal relations with other landmark values,and the corresponding value tuples it participates in.A natural form of partial quantitative knowledge about the unknown real number corresponding to a landmark is a bounding interval,whose endpoints can be real numbers or.Two assertions of bounding intervals for the same landmark can be combined simply by intersecting the intervals.A smaller resulting interval corresponds to more precise knowledge about the value of that landmark.An empty intersection means that no value can be consistently assigned to that landmark,so the current qualitative behavior is refuted.A monotonic function constraint(M+x y)is a qualitative description of an unknown function,describing the shape of only as monotonically increasing.A natural form of partial quantitative information about is to provide a pair of real-valued“static envelope”functions that bound above and below:for all(Figure3).It can also be useful to assert bounds on the slope of a monotonic function.The QDE,augmented with bounds on landmark values and static envelopes on monotonic function constraints,is referred to as a“semi-quantitative differential equation”or SQDE.Qualitative simulation augmented with semi-quantitative inference is called“semi-quantitative simulation”or SQSIM.Figure3 shows a SQDE model of a water tank.Purely qualitative simulation of the water tank SQDE predicts three qualitative behaviors:equilibrium partly full,overflow,and equilibrium exactly at the brim.The following table of qualitative values shows the three states of the equilibrium-partly-full behavior,including the creation of new landmarks for uniquely specified values.Qualitative Simulation10Qualitative Simulation113.1Propagating Interval BoundsThe simplest semi-quantitative extension to QSIM,called Q2,is based on interval arithmetic[21,chapter9].A qualitative behavior can be interpreted as a set of algebraic and functional constraints among landmark values.The following constraints,called the“Q2equations”,are derived from the corresponding landmark value tuples implied by time-point qstates in the qualitative behavior above,from the bounding envelopes on monotonic function constraints,and from time-interval states via the Mean Value Theorem.represents the distance between landmarks and;is the interval enclosing both and;and is the range bound on for a monotonic function.The initially given interval values associated with the landmarks,and are propagated across the Q2equations,following the rules in Table2.Newly derived values are intersected with old values until afixed point is reached or until an empty interval is derived.The result of propagation for the equilibrium-partly-full behavior is the following set of bounds for landmark values.In the other two behaviors,an empty interval is derived for some landmark,so the behaviors are refuted.Qualitative Simulation12ifandThe entries for and describe only the cases where.It is straight-forward to extend to the full case split on possible combinations of signs,and to handle as bounds.Table2:Interval arithmeticQualitative Simulation13 Semi-quantitative inference is implemented in QSIM as afilter applied to each partial behavior whenever a successor state is added to the behavior graph.When a partial behavior is refuted,its extensions need not be computed,reducing the branching factor of the behavior graph.3.2Order-of-Magnitude ConstraintsA different form of partial quantitative knowledge is order-of-magnitude constraints on landmark values [6,26].These relations can also be propagated across the Q2equations derived from a behavior.The result is additional predicted order-of-magnitude relations,or contradictions that refute behaviors from the behavior graph,just as in Q2.3.3State InterpolationThe temporal granularity of the qualitative behavior description predicted by QSIM,and hence of the Q2 equations,is determined by the qualitative value changes that take place in the behavior.Thus,semi-quantitative inference takes place over time intervals that are quite large and sometimes infinite,making it difficult to draw strong conclusions.Q3[1]addresses this problem by interpolating new landmarks into intervals in quantity spaces,including new time-points into large time-intervals.This provides smaller intervals of change,so the derived error bounds are tighter.The effect is essentially the same as Euler integration,approximating a continuous curve above and below by rectangles.It is possible to show that as the uncertainty in the SQDE approaches zero,and as the size of largest time-interval in the behavior approaches zero,the resulting semi-quantitative prediction converges to the real-valued solution to the corresponding ODE[1].3.4Dynamic EnvelopesThe rectangular bounds on a variable’s behavior derived for time-interval states by Q2and Q3are con-sequences of the Mean Value Theorem and the bounds on the rate of change of the variable over that time-interval.In many cases,we can derive stronger bounds.Just as static envelopes define real-valued functions providing upper and lower bounds to partially known monotonic functions,it is possible to infer real-valued functions providing upper and lower bounds on the values of variables over time.These“dynamic envelope”functions are the solutions to a real-valued ODE model that can be derived from the bounds and static envelopes in the SQDE and simulated numerically [19].For example,consider a model of an open-ended U-tube,with constantflow into tank A and a pressure-drivenflow out of tank B:The SQDE includes interval bounds on the landmark value and static envelopes,,, on the unknown functions.The bounding ODE system,which must have double the order of the original QDE,is:Qualitative Simulation14 Dynamic envelopes give improved bounds on the behavior over an interval starting at the initial state,but eventually diverge and provide no constraint farther away(Figure4).Thus,dynamic envelopes shouldbe combined with inference using the symbolic Q2and Q3methods.3.5Research Problem:Soft BoundsSemi-quantitative inference based on intervals and envelopes preserves the QSIM Guaranteed Coverage Theorem:only behaviors that are provably inconsistent are deleted.An important research direction is extending semi-quantitative inference to partial knowledge of quantity in the form of probability distribution functions:Gaussian distributions and more general pdfs.These representations seldom support inference of direct contradictions,making it difficult to refute a behavior entirely.Rather,the goal must be to infer a degree of belief in a behavior,and a distribution of belief over a set of behaviors.In the monitoring context (next section),it will be useful to distribute belief over a set of alternate hypothesized models as well.4Monitoring and System IdentificationMonitoring is the process of comparing an observation stream with predictions from a model of the system being observed.Monitoring is typically used to detect failures by detecting differences between the observa-Qualitative Simulation15 tion stream and predictions from a model of the healthy system[24].System identification is the process of combining a partially-specified model with observations from a system to converge on a more accurate and precisely specified model[23].Traditional approaches to monitoring and system identification deal with incomplete knowledge of the system being observed by attempting to select precise models that are close approximations to the unknown true system.In the qualitative framework,by contrast,the attempt is to select SQDE models that cover sets of precisely-specified models and behaviors.SQUID[17]uses semi-quantitative simulation to unify the quan-titative observation stream with a SQDE model to derive a more precisely specified model,still guaranteed to cover all ODE models consistent with the SQDE and the observations;or to derive a contradiction,refut-ing an entire family of ODE models.MIMIC[10]is an approach to monitoring that tracks multiple SQDE models in parallel,proposing and doing system identification with potential fault models even before the nominal model is refuted.4.1SQUID:Semi-Quantitative System IdentificationAn SQDE model represents a hypothesis about the qualitative structure of the system being observed.The quantitative uncertainty in a given SQDE model is represented by bounds on landmark values,static en-velopes around monotonic functions,and dynamic envelopes around predicted rmation from the observation stream can be used to shrink each of these types of uncertainty.SQUID[17]first segments the observation stream into qualitatively distinct regions of monotonic change, called trends,separated by critical points(Figure5(a)).Then it uses MSQUID[18],a specialized neural-net-based method for estimating monotonic functions and bounding envelope functions covering the observed data points out to a specified confidence level(Figure5(b)).Since the observations and the predictions are now in the same bounds-and-envelopes representation, they can be combined to either refine(Figure5(c))or refute(Figure5(d))the current hypothesized model. Refinements to the dynamic envelopes predicted by the SQDE model can then be propagated back to the landmark bounds and the static envelopes around monotonic functions,so the SQDE model will be able to make more precise predictions for future cases.More precise predictions are useful for many purposes,of course,but in particular they make the model easier to refute,so that more subtle contradictions between observation and prediction can be detected in the future.4.2MIMIC:Monitoring with Semi-Quantitative ModelsStarting with an SQDE representing the nominal(“healthy”)state of a system,SQUID can be used to monitor the system by using the information in the observation stream to progressively refine the uncertainty in the model(Figure6).If the observation stream refutes the nominal model,then fault diagnosis is required.However,if the system is complex and there is significant uncertainty in the SQDE,then indications of possible faults may have appeared in the observation stream well before the nominal model could actually be refuted.It is well known that operator failure in complex dynamic systems(e.g.the Three Mile Island nuclear plant failure)often occurs due to operatorfixation on a single hypothesized model of the system that is only refuted after it is too late tofix a developing problem[25].The MIMIC approach to monitoring[10,27]tracks multiple hypotheses in parallel,each expressed as an SQDE model.Any desired features in the observation stream can be used to trigger fault hypotheses, launching additional trackers to run in parallel,even before the nominal model is refuted.Multiple active trackers and their predictions can be analyzed to select observations or plan experiments for differential。

美国国家BIM标准(NBIMS)第一版_(一)

美国国家BIM标准(NBIMS)第一版_(一)

ForewordNational Building Information Modeling Standard™©2007 National Institute of Building Sciences. All rights reserved .ForewordThe construction industry is in the middle of a growing crisis worldwide. With 40% of the world’s raw materials being consumed by buildings, the industry is a key player in global economics and politics. And, since facilities consume 40% of the world’s energy and 65.2% of total U.S.electrical consumption, the construction industry is a key player in energy conservation, too! With facilities contributing 40% of the carbon emissions to the atmosphere and 20% of material waste to landfills, the industry is a key player in the environmental equation. Clearly, the construction industry has a responsibility to use the earth’s resources as efficiently as possible.Construction spending in the United States is estimated to be $1.288 trillion for 2008. The Construction Industry Institute estimates there is up to 57% non-value added effort or waste in our current business models. This means the industry may waste over $600 billion each year.There is an urgent need for construction industry stakeholders to maximize the portion of services that add value in end-products and to reduce waste.Another looming national crisis is the inability to provide enough qualified engineers. Someestimate the United States will be short a million engineers by the year 2020. In 2007, the United States was no longer the world’s largest consumer, a condition that will force United States industry to be more competitive in attracting talented professionals. The United States construction industry must take immediate action to become more competitive.The current approach to industry transformation is largely focused in efforts to optimize design and construction phase activities. While there is much to do in those phases, a lifecycle view is required. When sustainability is not adequately incorporated, the waste associated with current design, engineering, and construction practices grows throughout the rest of the facility’s lifecycle. Products with a short life add to performance failures, waste, recycling costs, energyconsumption, and environmental damage. Through cascading effects, these problems negatively affect the economy and national security due to dependence on foreign petroleum, a negative balance of trade, and environmental degradation. To halt current decline and reverse existing effects, the industry has a responsibility to take immediate action.While only a very small portion of facility lifecycle costs occur during design and construction, those are the phases where our decisions have the greatest impact. Most of the costs associated with a facility throughout its lifecycle accrue during a facility’s operations and sustainment. Carnegie-Mellon University research has indicated that an improvement of just 3.8% in productivity in the functions that occur in a building would totally pay for the facility’s design, construction, operations and sustainment, through increased efficiency. Therefore, as industry focuses on creating, maintaining, and operating facilities more efficiently, simultaneous action is required to ensure that people and processes supported by facilities are optimized.BIM stands for new concepts and practices that are so greatly improved by innovative information technologies and business structures that they will dramatically reduce the multiple forms of waste and inefficiency in the building industry. Whether used to refer to a product – Building Information Model (a structured dataset describing a building), an activity – Building Information Modeling (the act of creating a Building Information Model), or a system – Building Information Management (business structures of work and communication that increase quality andefficiency), BIM is a critical element in reducing industry waste, adding value to industry products, decreasing environmental damage, and increasing the functional performance of occupants.ForewordNational Building Information Modeling Standard™©2007 National Institute of Building Sciences. All rights reserved .The National Building Information Model Standard™ (NBIMS) is a key element to building industry transformation. NBIMS establishes standard definitions for building information exchanges to support critical business contexts using standard semantics and ontologies. Implemented in software, the Standard will form the basis for the accurate and efficientcommunication and commerce that are needed by the building industry and essential to industry transformations. Among other benefits, the Standard will help all participants in facilities-related processes achieve more reliable outcomes from commercial agreements.Thus, there is a critical need to increase the efficiency of the construction process. Today’s inefficiency is a primary cause of non-value added effort, such as re-typing (often with a new set of errors) information at each phase or among participants during the lifecycle of a facility or failing to provide full and accurate information from designer to constructor. With the implementation of this Standard, information interoperability and reliability will improve significantly. Standard development has already begun and implementable results will beavailable soon. BIM development, education, implementation, adoption, and understanding are intended to form a continuous process ingrained evermore into the industry. Success, in the form of a new paradigm for the building construction industry, will require that individuals andorganizations step up to contribute to and participate in creating and implementing a commonBIM standard. Each of us has a responsibility to take action now.David A. Harris, FAIAPresidentNational Institute of Building SciencesTable of ContentsNational Building Information Modeling Standard™©2007 National Institute of Building Sciences. All rights reserved .ForewordTable of ContentsSection 1 – Introduction to the National Building InformationModeling Standard™ Version 1 - Part 1: Overview,Principles, and MethodologiesChapter 1.1 Executive SummaryChapter 1.2 How to Read Version 1 -Part 1 of the NBIMStandard Navigation guide for readers with varied interests, responsibilities, and experience with BIM.Section 2 – Prologue to the National BIM StandardChapter 2.1 BIM Overall Scope An expansive vision for building informationmodeling and related concepts.Chapter 2.2 Introduction to the National BIM Standard Committee The Committee’s vision and mission,organization model, relationships to otherstandards development organizations,philosophical position, and the Standardproduct.Chapter 2.3 Future Versions Identifies developments for upcoming versionsof the Standard including sequence ofdevelopments, priorities, and planned releasedates.Section 3 – Information Exchange ConceptsChapter 3.1 Introduction to ExchangeConcepts What is an information exchange? Theory and examples from familiar processes.Chapter 3.2 Data Models and the Role of Interoperability.High level description of how BIM informationwill be stored in operational and projectsettings. Compares and contrasts integrationand interoperability and the NBIM Standardrequirement for interoperability.Chapter 3.3 Storing and SharingInformation Description of conceptual need for a shared, coordinated repository for lifecycle information.Presents an approach to providing the sharedinformation for a BIM which can be used byinformation exchangesTable of ContentsNational Building Information Modeling Standard™©2007 National Institute of Building Sciences. All rights reserved .Chapter 3.4 Information Assurance Discusses means to control information inputand withdrawal from a shared BIM repository.Section 4 – Information Exchange ContentChapter 4.1 BIM MinimumDefines quantity and quality of information required for a defined BIM. Chapter 4.2 Capability Maturity Model Building on the BIM Minimum chapter, furtherdefines a BIM and informs planning to improvethe capability to produce a mature BIM.Section 5 – NBIM Standard Development ProcessChapter 5.1 Overview of ExchangeStandard Developmentand Use ProcessDiagrams and describes major components in NBIM Standard development process. Chapter 5.2 Workgroup Formationand RequirementsDefinition Introduces the concept of forums and domain interest groups forming around needed exchange definitions. Discusses theInformation Delivery Manual (IDM) process andtools for requirements definition activities.Chapter 5.3 User-Facing Exchange Models Covers the IDM requirements for IFC-independent data model views.Chapter 5.4 Vendor-Facing Model View Definition, Implementation and Certification Testing Explains Model View Definition (MVD)requirements for schema-specific modeldefinition and the NBIMS Committee’s role infacilitating implementation and certificationtesting.Chapter 5.5 Deployment Discusses Project Agreements and use ofGeneric BIM Guides associated with BIMauthoring (creating a BIM) using certifiedapplications, validating the BIM construction,validating data in the BIM model, and using theBIM model in certified products to accomplishproject tasks through interoperable exchanges.Chapter 5.6 Consensus-Based Approval MethodsDescribes various methods of creating,reviewing, and approving the NBIM StandardExchange Requirements, Model ViewDefinitions, Standard Methods, Tools, andReferences used by and produced by theNBIMS Committee.Table of ContentsNational Building Information Modeling Standard™©2007 National Institute of Building Sciences. All rights reserved .AcknowledgementsReferencesGlossaryAppendicesIntroduction to AppendicesAppendix A Industry Foundation Classes(IFC or ifc) IFC define the virtual representations of objects used in the capital facilitiesindustry, their attributes, and theirrelationships and inheritances.Appendix B CSI OmniClass ™OmniClass is a multi-table facetedclassification system designed for useby the capital facilities industry to aidsorting and retrieval of informationand establishing classifications forand relationships between objects ina building information model.Appendix C International Framework for Dictionaries (IFDLibrary ™)A schema requires a consistent set ofnames of things to be able to work.Each of these names must have acontrolled definition that describeswhat it means and the units in which itmay be expressed.Section 1 – Introduction to the National BIM Standard V 1 - Part 1Chapter 1.1National Building Information Modeling Standard™©2007 National Institute of Building Sciences. All rights reserved .Chapter 1.1 Executive SummaryNational Building Information Modeling Standard™ Version 1 - Part 1:Overview, Principles, and MethodologiesIntroductionThe National Building Information Modeling Standard (NBIMS) Committee is a committee of the National Institute of Building Sciences (NIBS) Facility Information Council (FIC). The vision for NBIMS is “an improved planning, design, construction, operation, and maintenance process using a standardized machine-readable information model for each facility, new or old, which contains all appropriate information created or gathered about that facility in a format useable by all throughout its lifecycle.”1 The organization, philosophies, policies, plans, and working methods that comprise the NBIMS Initiative and the products of the Committee will be the National BIM Standard (NBIM Standard), which includes classifications, guides, recommended practices, and specifications.This publication is the first in a series intended to communicate all aspects of the NBIMS Committee and planned Standard, which will include principles, scope of investigation,organization, operations, development methodologies, and planned products. NBIMS V1-P1 is a guidance document that will be followed by publications containing standard specifications adopted through a consensus process .Wherever possible, international standards development processes and products, especially the NIBS consensus process, American Society for Testing and Materials (ASTM), AmericanNational Standards Institute (ANSI), and International Standards Organization (ISO) efforts will be recognized and incorporated so that NBIMS processes and products can be recognized as part of a unified international solution. Industry organizations working on open standards, such as the International Alliance for Interoperability (IAI), the Open Geospatial Consortium (OGC), and the Open Standards Consortium for Real Estate (OSCRE), have signed the NBIMS Charter inacknowledgement of the shared interests and commitment to creation and dissemination of open, integrated, and internationally recognized standards. Nomenclature specific to North American business practices will be used in the U.S. NBIMS Initiative. Consultations with organizations in other countries have indicated that the U.S.-developed NBIM Standard, once it is localized, will be useful internationally as well. Continued internationalization is considered essential to growth of the U.S. and international building construction industries.BIM Overall Scope and DescriptionBuilding Information Modeling (BIM) has become a valuable tool in some sectors of the capital facilities industry. However in current usage, BIM technologies tend to be applied within vertically integrated business functions rather than horizontally across an entire facility lifecycle. Although the term BIM is routinely used within the context of vertically integrated applications, the NBIMS Committee has chosen to continue using this familiar term while evolving the definition and usage to represent horizontally integrated building information that is gathered and applied throughout the entire facility lifecycle, preserved and interchanged efficiently using open and interoperable technology for business, functional and physical modeling, and process support and operations. 1 Charter for the National Building Information Modeling (BIM) Standard, December 15, 2005, pg.1. See /bim/pdfs/NBIMS_Charter.pdf .Section 1 – Introduction to the National BIM Standard V 1 - Part 1Chapter 1.1National Building Information Modeling Standard™©2007 National Institute of Building Sciences. All rights reserved .NBIM Standard Scope and DescriptionThe NBIMS Initiative recognizes that a BIM requires a disciplined and transparent data structure supporting all of the following.x A specific business case that includes an exchange of building information. x The users’ view of data necessary to support the business case. x The machine interpretable exchange mechanism (software) for the required information interchange and validation of results.This combination of content selected to support user needs and described to support open computer exchange form the basis of information exchanges in the NBIM Standard. All levels must be coordinated for interoperability, which is the focus of the NBIMS Initiative. Therefore, the primary drivers for defining requirements for the National BIM Standard are industry standard processes and associated information exchange requirements.In addition, even as the NBIM Standard is focused on open and interoperable informationexchanges, the NBIMS Initiative addresses all related business functioning aspects of the facility lifecycle. NBIMS is chartered as a partner and an enabler for all organizations engaged in the exchange of information throughout the facility lifecycle.Data Modeling for BuildingsKey to the success of a building information model is its ability to encapsulate, organize, and relate information for both user and machine-readable approaches. These relationships must be at the detail level, relating, for example, a door to its frame or even a nut to a bolt, whilemaintaining relationships from a detailed level to a world view. When working with as large a universe of materials as exists in the built environment, there are many traditional verticalintegration points (or stovepipes) that must be crossed and many different languages that must be understood and related. Architects, engineers, as well as the real estate appraiser or insurer must be able to speak the same language and refer to items in the same terms as the first responder in an emergency situation. Expand this to the world view where systems must be interoperable in multiple languages in order to support the multinational corporation. Over time ontologies will be the vehicles that allow cross communication to occur. In order to standardize these many options, organizations need to be represented and solicited for input. There are several, assumed to be basic, approaches in place that must come together in order to ensure that a viable and comprehensive end-product will be produced.The Role of InteroperabilitySoftware interoperability is seamless data exchange at the software level among diverseapplications, each of which may have its own internal data structure. Interoperability is achieved by mapping parts of each participating application’s internal data structure to a universal data model and vice versa. If the employed universal data model is open, any application canparticipate in the mapping process and thus become interoperable with any other application that also participated in the mapping. Interoperability eliminates the costly practice of integrating every application (and version) with every other application (and version).The NBIM Standard maintains that viable software interoperability in the capital facilities industry requires the acceptance of an open data model of facilities and an interface to that data model for each participating application. If the data model is industry-wide (i.e. represents the entire facility lifecycle), it provides the opportunity to each industry software application to become interoperable.Section 1 – Introduction to the National BIM Standard V 1 - Part 1Chapter 1.1National Building Information Modeling Standard™©2007 National Institute of Building Sciences. All rights reserved .Storing and Sharing InformationOne of the innovations, demonstrated by some full-service design and engineering firms and several International Alliance for Interoperability (IAI) demonstration projects, has been the use of a shared repository of building information data. A repository may be created by centralizing the BIM database or by defining the rules through which specific components of BIM models may be shared to create a decentralized shared model. As BIM technology and use matures, thecreation of repositories of project, organization, and/or owner BIM data will have an impact on the framework under which NBIMS operates. Owners are likely to create internally as-built and as-maintained building model repositories, which will be populated with new and updated information supplied via design/construction projects, significant renovations, and routine maintenance and operations systems.Information AssuranceThe authors caution that, while a central (physical or virtually aggregated) repository of information is good for designing, constructing, operating, and sustaining a facility, and therepository may create opportunities for improved efficiency, data aggregation may be a significant source of risk.Managing the risks of data aggregation requires advanced planning about how best to control the discovery, search, publication, and procurement of shared information about buildings and facilities. In general, this is addressed in the data processing industry through digital rights management. Digital rights management ensures that the quality of the information is protected from creation through sharing and use, that only properly authorized users are granted access, and only to that subset of information to which they should have access. There is a need toensure that the requirements for information are defined and understood before BIMs are built, so that facility information receives the same protection that is commonplace in world-wide personnel and banking systems.Minimum BIM and the Capability Maturity ModelThe NBIM Standard Version 1 - Part 1 defines a minimum standard for traditional vertical construction, such as office buildings. It is assumed that developing information exchange standards will grow from this minimum requirement.The Standard also proposes a Capability Maturity Model (CMM) for use in measuring the degree to which a building information model implements a mature BIM Standard. The CMM scores a complete range of opportunity for BIMs, extending from a point below which one could say the data set being considered is not a BIM to a fully realized open and interoperable lifecycle BIM resource.The U.S. Army Corps of Engineers BIM Roadmap 2 is presented as a useful reference for building owners seeking guidance on identifying specific data to include in a BIM from a design or construction perspective.2 See https:///default.aspx?p=s&t=19&i=1 for the complete roadmap.Section 1 – Introduction to the National BIM Standard V 1 - Part 1Chapter 1.1National Building Information Modeling Standard™©2007 National Institute of Building Sciences. All rights reserved .NBIM Standard Process DefinitionProposals for the processes the NBIMS Committee will employ to produce the NBIM Standard and to facilitate productive use are discussed. A conceptual diagram to orient the user is provided. Components of this diagram correspond to section 5 chapters.Both the process used to create the NBIM Standard and the products are meant to be open and transparent. The NBIMS Committee will employ consensus-based processes to promote industry-wide understanding and acceptance. Additionally, the Committee will facilitate the process whereby software developers will implement standard exchange definitions and implementations tested for compliance. Finally, the NBIMS Committee will facilitate industry adoption and beneficial use through guides, educational activities, and facilitation of testing by end users of delivered BIMs.The Information Exchange Template, BIM Exchange Database, the Information Delivery Manual (IDM), and Model View Definition (MVD) activities together comprise core components of the NBIM Standard production and use process. The Information Exchange Template and BIM Exchange Database are envisioned as web-based tools to provide search, discovery, and selection of defined exchanges as well as a method of providing initial information necessary to propose and begin a new exchange definition discussion. The NBIMS workgroup formation phase teams will use the IDM, adapted from international practices, to facilitate identification and documentation of information exchange processes and requirements. IDM is the user-facing phase of NBIMS exchange standard development with results typically expressed in human-readable form. MVD is the software developer-facing phase of exchange standard development. MVD is conceptually the process which integrates Exchange Requirements (ERs) coming from many IDM processes to the most logical Model Views that will be supported by softwareapplications. Implementation-specific guidance will specify structure and format for data to be exchanged using a specific version of the Industry Foundation Classes (IFC or ifc) specification. The resulting generic and implementation-specific documentation will be published as MVDs, as defined by the Finnish Virtual Building Environment (VBE) project,3 the Building Lifecycle Interoperability Consortium (BLIS),4 and the International Alliance for Interoperability (IAI).5 The Committee will work with software vendors and the testing task team members to plan and facilitate implementation, testing, and use in pilot projects. After the pilot phase is complete, the Committee will update the MVD documents for use in the consensus process and ongoing commercial implementation. Finally, after consensus is reached, MVD specifications will be incorporated in the next NBIMS release.NBIMS AppendicesReference standards in the NBIM Standard provide the underlying computer-independent definitions of those entities, properties, relationships, and categorizations critical to express the rich language of the building industry. The reference standards selected by the NBIMSCommittee are international standards that have reached a critical mass in terms of capability to share the contents of complex design and construction projects. NBIMS V1-P1 includes three candidate reference standards as Appendix documents: IAI Industry Foundation Classes (IFC or ifc), Construction Specifications Institute (CSI) OmniClass ™, and CSI IFDLibrary ™.3http://cic.vtt.fi/projects/vbe-net/4 5Section 1 – Introduction to the National BIM Standard V 1 - Part 1Chapter 1.1National Building Information Modeling Standard™©2007 National Institute of Building Sciences. All rights reserved .The IFC data model consists of definitions, rules, and protocols that uniquely define data sets which describe capital facilities throughout their lifecycles. These definitions allow industrysoftware developers to write IFC interfaces to their software that enable exchange and sharing of the same data in the same format with other software applications, regardless of the internal data structure of the individual software application. Software applications that have IFC interfaces are able to exchange and share data with other application that also have IFC interfaces.The OmniClass ™ Construction Classification System (OmniClass or OCCS) is a multi-tableclassification system designed for use by the capital facilities industry. OmniClass includes some of the most commonly used taxonomies in the capital facilities industry. It is applicable for organizing many different forms of information important to the NBIM Standard, both electronic and hard copy. OCCS can be used in the preparation of many types of project information and for communicating exchange information, cost information, specification information, and other information that is generated throughout the facility’s lifecycle.IFDLibrary ™ is a kind of dictionary of construction industry terms that must be used consistently in multiple languages to achieve consistent results. Design of NBIMS relies on terminology and classification agreement (through OmniClass ) to support model interoperation. Entries in the OmniClass tables can be explicitly defined in the IFDLibrary once and reused repeatedly,enabling reliable automated communications between applications – a primary goal of NBIMS. ReferencesNBIMS References in this document represent the work of many groups working in parallel to define BIM implementation for their areas of responsibility. Currently there are four types of references.x Business Process Roadmaps are documents that provide the business relationships of the various activities of the real property industry. These will be the basis for organizing the business processes and will likely be further detailed and coordinated over time. The roadmaps will help organize NBIMS and the procedures defined in the InformationDelivery Manuals (IDMs).x Candidate Standards are documents that are candidates to go through the NBIMS consensus process for acceptance as part of future NBIMS. It is envisioned that Part 2 or later releases of the Standard will incorporate these documents once approved.x Guidelines have been developed by several organizations and include items that should be considered for inclusion in NBIMS. Since NBIMS has not existed prior to this, there was no standard from which to work, resulting in a type of chicken-or-egg dilemma.When formal NBIMS exists there will need to be some harmonization, not only between the guidelines and NBIMS, but also in relating the various guidelines to each other.While guidelines are not actually a part of NBIMS, they are closely related and therefore included as references.xOther Key References are to parallel efforts being developed in concert with NBIMS. Not part of NBIMS, they may, in fact, be standards in their own right.。

乘用车操稳转向性能指标分解技术应用研究

乘用车操稳转向性能指标分解技术应用研究

汽车文摘蒋永峰王晓燕田玲玲郝文权(中国第一汽车股份有限公司研发总院,长春130013)【摘要】车辆动力学性能开发包括性能目标设定、目标分解、优化设计、底盘调校,逐渐向目标达成逼近,开发结束后实现目标达成。

性能目标分解即指标分解,用简单有物理意义的理论公式关联整车指标与总成指标,将整车的客观性能指标分解至系统特性,是整车性能目标达成的关键环节,在性能开发中承上启下,是各主机厂的核心技术。

性能指标分解正常在车辆开发初期,用于指标分解的模型应采用尽可能少的建模参数,建模分析迅速且模型能明确表达系统参数对整车性能的影响规律。

ADAMS 或CarSim 模型,由于模型结构过于复杂,不适用于车辆性能的指标分解。

本文建立了用于性能指标分解的模型,并基于此模型研究底盘动力学操稳转向性能指标的分解及应用方法,为车辆动力学性能开发工作提供理论指导。

主题词:车辆动力学性能底盘指标分解中图分类号:U461.1文献标识码:ADOI:10.19822/ki.1671-6329.20190035Development of Handling and Steering Performance Target CascadingFor Passenger CarJiang Yongfeng,Wang Xiaoyan,Tian Lingling,Hao Wenquan(General Research and Development Institute,China FAW Corporation Limited,Changchun 130013)【Abstract 】Vehicle dynamic development includes targets setting,target cascading,optimization design,chassis tuning,gradually approaching the goal,and achieving the goal after development.Target cascading is the key link to achieve the performance target of the whole vehicle,which decomposes objective performance indexes of the whole vehicle into system characteristics.It is the core technology of the OEM.Performance index cascading is normal in the early stageof vehicle development.The model used for index cascading should adopt as few modeling parameters as possible.Modeling analysis is fast and the model can clearly express the influence of system parameters on vehicle performance.ADAMS or Carsim models are not suitable for vehicle performance index cascading because of their complex structure.This paperestablishes a model for performance index cascading,and studies the decomposition and application method of vehicle dynamic handling and steering performance index based on this model,which provides theoretical guidance for vehicledynamic performance development.Key words:Vehicle dynamics,Chassis,Target cascade【引用】蒋永峰,王晓燕,田玲玲,等.乘用车操稳转向性能指标分解技术应用研究[J].汽车文摘,2020(4):39-43.【Citation 】Jiang Y.,Wang X.,Tian L.,et al.Development of Handling and Steering Performance Target Cascading For Passenger Car[J].Automotive Digest (Chinese),2020(4):39-43.乘用车操稳转向性能指标分解技术应用研究1概述车辆动力学性能开发过程中,根据产品定位、市场需求、竞品表现、品牌DNA 进行整车性能目标设定,以此为依据开发具有竞争力车型。

世界野生动物日的英语作文

世界野生动物日的英语作文

In the vast tapestry of life on Earth, wildlife represents an irreplaceable and invaluable treasure trove of diversity, beauty, and ecological balance. World Wildlife Day, observed annually on March 3rd, serves as a global platform to raise awareness about the intrinsic worth of these creatures, the threats they confront, and the collective responsibility we bear in conserving them. This essay, with a minimum length of 1438 words, delves into the profound significance of this day, while also offering a comprehensive, multi-faceted analysis of the challenges faced by the world's fauna and the strategies necessary for their preservation.**The Significance of World Wildlife Day**World Wildlife Day was established by the United Nations General Assembly in 2013 to mark the adoption of the Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES) in 1973. This international observance underscores the crucial role that wildlife plays in maintaining the ecological, economic, social, scientific, and cultural fabric of our planet.Firstly, wildlife is the bedrock of biodiversity, which underpins the resilience and stability of ecosystems. Each species, no matter how small or seemingly insignificant, contributes to intricate food webs, pollination, seed dispersal, nutrient cycling, and other vital ecological processes. The loss of any species can trigger cascading effects that undermine ecosystem health and services, ultimately threatening human well-being.Secondly, wildlife holds immense economic value. Ecotourism, for instance, relies heavily on the presence of diverse and healthy wildlife populations, generating billions of dollars annually and providing livelihoods for millions worldwide. Moreover, many plants and animals serve as sources of food, medicine, and raw materials for various industries.Thirdly, wildlife is deeply entwined with human culture and spirituality. Indigenous communities around the globe have developed rich knowledge systems and traditions centered around local flora and fauna, which form an integral part of their identity and worldview. Additionally, wildlife inspires art,literature, and scientific inquiry, enriching human experience and fostering a sense of wonder and connection with nature.**Challenges Facing World Wildlife**Despite its importance, wildlife faces a myriad of threats, ranging from habitat destruction and climate change to overexploitation and illegal trade. These challenges are interconnected and mutually reinforcing, creating a formidable obstacle to conservation efforts.**Habitat Loss and Fragmentation:** Unsustainable land use practices, such as deforestation, urbanization, agriculture expansion, and infrastructure development, have led to massive habitat loss and fragmentation. This not only reduces the available space for wildlife but also disrupts migration routes, breeding patterns, and gene flow, increasing the vulnerability of species to extinction.**Climate Change:** Rising temperatures, altered precipitation patterns, sea-level rise, and extreme weather events are reshaping ecosystems at an unprecedented pace, pushing many species beyond their physiological limits or rendering their habitats inhospitable. Climate change exacerbates existing threats, such as habitat loss and disease outbreaks, and creates novel challenges, like mismatches between species' life cycles and shifting seasons.**Overexploitation and Illegal Wildlife Trade:** Driven by demand for wildlife products, including bushmeat, traditional medicines, ornaments, and pets, overexploitation and illegal trade pose severe threats to numerous species. The illicit wildlife trade, estimated to be worth billions of dollars annually, fuels corruption, undermines governance, and finances criminal networks, making it a serious transnational organized crime.**Invasive Species and Disease Outbreaks:** Invasive alien species, introduced through human activities, often outcompete native wildlife for resources, introduce new diseases, or alter habitats. Concurrently, disease outbreaks, sometimes exacerbated by climate change and human encroachment, can decimate wildlife populations, as witnessed in the case of chytridiomycosis inamphibians or white-nose syndrome in bats.**Conservation Strategies and the Way Forward**Addressing these complex challenges requires a multifaceted, integrated approach that combines science-based policy, effective law enforcement, community engagement, and global cooperation.**Policy and Legislation:** Strengthening and enforcing national and international laws, such as CITES and the Convention on Biological Diversity, is essential to curb illegal wildlife trade, protect critical habitats, and promote sustainable land use. Governments must prioritize biodiversity conservation in national development plans and allocate adequate funding for conservation initiatives.**Science and Innovation:** Advancements in technology, such as remote sensing, genetic analysis, and artificial intelligence, can greatly enhance monitoring, research, and management of wildlife populations and habitats. Moreover, predictive modeling can help anticipate and mitigate the impacts of climate change on wildlife.**Community Engagement and Empowerment:** Recognizing the rights and knowledge of indigenous peoples and local communities, and involving them in decision-making processes, is crucial for successful conservation. Community-based conservation initiatives, such as ecotourism, agroforestry, and payment for ecosystem services, can provide incentives for wildlife-friendly land management while improving local livelihoods.**Education and Awareness-Raising:** World Wildlife Day serves as a catalyst for educational campaigns that foster appreciation for wildlife, highlight the consequences of its decline, and promote responsible consumer choices. Engaging the public, particularly young people, through social media, documentaries, and educational programs can inspire behavioral changes and nurture a new generation of conservation advocates.In conclusion, World Wildlife Day is a timely reminder of the immense value and vulnerability of our planet's wildlife. As we celebrate this occasion, itis imperative that we acknowledge the multifaceted challenges faced by wildlife and commit to implementing comprehensive, collaborative, and innovative solutions to ensure their survival for generations to come. By doing so, we safeguard not only the rich tapestry of life on Earth but also the very foundations of our own existence.。

基于社团划分的复杂网络级联抗毁攻击策略

基于社团划分的复杂网络级联抗毁攻击策略

基于社团划分的复杂网络级联抗毁攻击策略作者:丁超姚宏杜军彭兴钊李浩敏来源:《计算机应用》2014年第06期摘要:为研究在社团划分基础上复杂网络的级联抗毁攻击策略,采用节点及其邻居节点介数定义初始负荷,这种定义方式综合考虑了节点的信息,采用局部择优分配策略处理故障节点负荷,研究了网络耦合强度,WS(WattsStrogatz)小世界网络、BA(BarabásiAlbert)无标度网络、ER(ErdsRényi)随机网络、局域世界(WL)网络在社团划分攻击策略下抗毁性,以及不同攻击策略下具有重叠和非重叠社团结构网络的抗毁性。

仿真结果表明,网络的耦合强度与抗毁性成负相关;不同类型网络在快速分裂算法识别社团前提下,攻击介数最大节点时网络抗毁性最弱;具有重叠社团结构的网络在集团渗流算法(CPM)识别后,采用攻击重叠部分介数最大节点的策略时网络抗毁性最弱。

结论表明采用社团划分的攻击策略可以最大规模破坏网络。

关键词:攻击策略;社团划分;复杂网络;级联抗毁性;网络模型中图分类号: TP393;N945.1文献标志码:A6 结语级联故障普遍存在现实网络中,研究网络的攻击策略对网络抗毁性的影响对于有效打击敌方网络,指导我方网络建设提高网络抗毁性具有重要意义。

本文提出了一种基于社团划分的网络级联抗毁攻击策略,节点初始负荷根据节点及其邻居节点介数定义的“负荷容量”模型,故障负荷分配方式采用局部择优策略。

仿真分析了网络的负荷分配指数对抗毁性的影响,结果表明当α=1时网络的抗毁性最强。

研究分析了WS、BA、ER、WL四种网络模型在社团划分下的攻击策略,重点研究了具有重叠和非重叠社团结构网络的抗毁攻击策略,仿真结果表明基于社团划分的蓄意攻击策略在四种网络模型中均具有较好攻击效果。

研究了社团结构参数对网络抗毁性的影响,结果表明网络的耦合强度与抗毁性成正相关。

在非重叠社团网络中首先快速实现社团划分,然后分社团攻击介数最大的节点取得了最好的攻击策略;在重叠社团结构网络中,实现社团划分后蓄意攻击重叠部分介数最大的节点,然后分社团攻击介数最大节点为最有效网络攻击策略。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Eur.Phys.J.B46,101–107(2005) DOI:10.1140/epjb/e2005-00237-9T HE E UROPEANP HYSICAL J OURNAL BModeling cascading failures in the North American power gridR.Kinney1,P.Crucitti2,R.Albert3,a,and tora41Department of Physics,University of Missouri-Rolla,MO65409,USA2Scuola Superiore di Catania,95123Catania,Italy3Department of Physics and Huck Institutes of Life Sciences,Pennsylvania State University,University Park,PA16802,USA 4Dipartimento di Fisica ed Astronomia,Universit`a di Catania and INFN,95124Catania,ItalyReceived17February2005Published online8August2005–c EDP Sciences,Societ`a Italiana di Fisica,Springer-Verlag2005Abstract.The North American power grid is one of the most complex technological networks,and itsinterconnectivity allows both for long-distance power transmission and for the propagation of disturbances.We model the power grid using its actual topology and plausible assumptions about the load and overloadof transmission substations.Our results indicate that the loss of a single substation can result in up to25%loss of transmission efficiency by triggering an overload cascade in the network.The actual transmissionloss depends on the overload tolerance of the network and the connectivity of the failed substation.Wesystematically study the damage inflicted by the loss of single nodes,andfind three universal behaviors,suggesting that40%of the transmission substations lead to cascading failures when disrupted.While theloss of a single node can inflict substantial damage,subsequent removals have only incremental effects,inagreement with the topological resilience to less than1%node loss.PACS.89.75.Fb Structures and organization in complex systems–02.10.Ox Combinatorics;graph theory–84.70.+p High-current and high-voltage technology:power systems;power transmission lines and cables–89.75.Hc Networks and genealogical trees1IntroductionThe US power transmission system was built over the past 100years by vertically integrated utilities that produced and transmitted electricity locally.Interconnections be-tween neighboring utilities were later created to increase reliability and share excess generation.In a major policy decision,in1996the Federal Energy Regulatory Commis-sion introduced free and competitive access to the grid, with the goal of lowering costs to consumers by increasing the efficiency of operation[1].Today the North Amer-ican power grid is one of the most complex and inter-connected systems of our time,and about one half of all domestic generation is sold over ever-increasing dis-tances on the wholesale market before it is delivered to customers[2].Unfortunately the same capabilities that allow power to be transferred over hundreds of miles also enable the propagation of local failures into grid-wide events[3].As the demand on the transmission system continues to rise and generation patterns shift,the power grid is subjected toflows in magnitudes and directions that have not been studied or for which there is mini-mal operating experience[2].It is increasingly recognized that understanding the complex emergent behaviors of the power grid can only be understood from a systems a e-mail:ralbert@ perspective,taking advantage of the recent advances in complex network theory[4].Here we focus on modeling cascading failure events such as that causing the August 2003blackout.Recently a great deal of attention has been devoted to the analysis of error and attack resilience of both artifi-cially generated topologies and real world networks.The first approach that has been followed by researchers is that of static failures[5–11]and consists in removing a certain percentage of elements of the system and evaluating how much the performance of the network is affected by the simulated failure.Following such an approach it has been shown that the removal of a sizable group of nodes can have significantly deleterious consequences.Nevertheless, in most real transportation/communication networks,the breakdown of a single or of a very small size group of el-ements can be sufficient to cause the entire systems to collapse,due to the dynamics of redistribution offlows on the networks.To take into account this phenomenon,dy-namical approaches have been developed[12–19].Those are based on the fact that the breakdown of a single com-ponent not only has direct consequences on the perfor-mance of the network,but also can cause an overload and consequently the partial or total breakdown of other com-ponents,thus generating a cascading effect.102The European Physical Journal BHere,we use data on the network structure of the North American power grid obtained from the POWERmap mapping system developed by Platts,the energy information and market services unit of the McGraw-Hill Companies [20].This mapping system con-tains information about every power plant,major sub-station,and 115–765kV power line of the North Ameri-can power grid.Our reconstructed network contains N =14099substations and K =19657transmission (power)lines.The substations can be divided into three differ-ent groups:the generation substations set G G ,whose N G =1633elements produce electric power to distribute,the transmission substations set G T ,whose N T =10287elements transfer power along high voltage lines,and the distribution substations set G D ,whose N D =2179ele-ments distribute power to small,local grids [11].2The modelWe model the power grid as a weighted [21,22]graph G ,with N nodes (the substations)and K edges (the trans-mission lines)and we represent it by the N ×N adjacency matrix {e ij }.The element e ij of this matrix is 0if there is no direct line from the substation i to the substation j ;otherwise it is a number in the range [0,1]that represents the efficiency of the edge.Initially,for all existing edges,e ij is set equal to 1,meaning that all the transmission lines are working perfectly.We define the efficiency of a path (succession of consecutive edges)between two nodes i and j as the harmonic composition of the efficiencies of the component edges.The harmonic composition of Nnumbers x 1,x 2,...,x N is defined as [ Ni 1/x i ]−1and finds extensive applications in a variety of different fields:in particular it is used to calculate the average performance of computer systems [23,24],parallel processors [25],and communication devices,for example modems and Ether-nets [26].A simple example will help to understand why the harmonic composition is,in our case,a better option than the arithmetic mean.Let us consider the following three different paths connecting a given node pair.The first path contains two edges,each with efficiency e =0.5,the second path contains three edges,each having e =0.5,the third path contains two edges,one with e =0and one with e =1.By using the arithmetic mean to calculate the efficiency of a path,we would get that all three paths above have equal efficiency e a =0.5,despite the obvious differences between the three paths.In contrast,the har-monic composition gives three different numbers,1/4,1/6,and 0,indicating that the first path is the most efficient.Notice that the harmonic composition takes into account the number of edges traversed,and that it is equal to zero whenever a path contains an edge with e =0,i.e.an edge that is not working at all.As previously observed,the North American power grid forms a connected network,thus in principle power from any generator is able to reach any distribution sub-station[11].But the nature of the product to be delivered imposes some very peculiar rules on the way the electric-ity is distributed from generators to users.First of all,thetotal amount of electricity produced by generators must at any time be equal to the total amount consumed by users,plus any loss incurred in the high voltage trans-portation system.Since the users are in complete control of the the amount of electricity they use,the generators must continually match the request,even if daily fluctua-tions in demand of more than 100%are not uncommon.In addition,there are few mechanisms to control how the product flows through the transmission system from gen-erators to distribution substations.Electric current flows through the grid as dictated by the impedances of the transmission lines and the precise location where the en-ergy is injected by the generators and removed by the users.Grid operators struggle to balance their own com-pany’s service to its customers with third party users and overall grid reliability,while frequently lacking necessary information [27].All these factors make it very difficult to quantify the exact available transfer capacity (ATC)of the electric grid.And once a set of ATC values has been determined,it must be continuously updated because the number of users and their requests are constantly chang-ing,and because some transmission lines and generators might be momentarily out of service [28].For all such reasons,an exact treatment of the spatio-temporal distributions of electric current in the grid,based on standard potential theory,would require an enormous amount of information and computer power[29].Here,we consider a simplified model in which we assume that the electricity is transferred with equal probability from any generator to any distribution substation and that the elec-tricity is delivered by following the most efficient path.The second hypothesis is the generalization of the short-est path assumption commonly and successfully adopted in many complex networks [4,30].This way we are able to follow the dynamical response of the system to failures,and in particular to model how the failure in one location can propagate and have consequences over the whole net-work.The modeling of the electric power grid as a global system,with the main focus on the effects of local struc-tures on dynamics,is something that has been practically absent from the research to date.Both in the static and in the dynamic approach,in or-der to quantify how well networks operate before and after the occurrence of breakdowns,a measure of performance has to be used.Here,as in [10,16,17],we use the average efficiency of the network [22]that,adapted to the case of the North American power grid,is defined as follows:E =1N G N Di ∈G G j ∈G Dij (1)where ij is the efficiency of the most efficient path be-tween the generator i and the distribution substation j .Once defined the efficiency E as a measure of performance,the natural definition of the damage D that a failure causes is the normalized efficiency loss [31]:D =E (G 0)−E (G f )E (G 0),(2)R.Kinney et al.:Modeling cascading failures in the North American power grid103 where E(G0)is the efficiency of the network before theoccurrence of any breakdown and E(G f)is thefinalefficiency that is reached by the system after the end ofthe transient due to a breakdown,i.e.when the networkefficiency stabilizes.In this paper we use the dynamical approach of theCrucitti-Latora-Marchiori(CLM)model of reference[16],adapting it to our network.We assume that each generatortransfers power to all the distribution substations throughthe transmission lines.The generators also have transmit-ting capabilities,so they are both sources and intermedi-aries in power transmission.This scenario could seem un-realistic in the early days of electricity,when power wasproduced by local generators and transmitted only to thenearest distribution substations[3].Nowadays,however,power is often redirected hundreds of kilometers away andour hypothesis that power from each generator can reacheach distribution substation is not far from reality.Adapting previous work on complex networks[32,33]we define the load(also called betweenness)of each nodewith transmitting capabilities as the number of most ef-ficient paths from generators to distribution substationsthat pass through the node.This definition extends theshortest paths node betweenness proposed by Freeman inreference[34]to weighted networks[35].As in the CLMmodel,we associate to each node i a capacity C i directlyproportional to the initial load L i it carries in the unper-turbed network[13]:C i=αL i(0)i=1,2..N(3)whereα>1is the tolerance parameter that represents theability of nodes to handle increased load thereby resistingperturbations.If,due to external causes,a breakdown occurs at oneor more nodes,so that they cannot work at all,the mostefficient power transmission paths will change and thepower/load,since it cannot be destroyed,will redistributeamong the network.Sometimes this leads to a situationin which a certain number of nodes,forced to carry a loadhigher than their capacity,cannot function regularly any-more and show a degradation of their performance.Sucha degradation can modify the most efficient paths,redis-tribute the load on the network,and cause new nodes tobe overloaded.If the overload caused by the initial break-down is small,degradation will involve only a tiny partof the system,while if the overload to be reabsorbed islarge enough,it will spread over the entire system in anavalanche mechanism,hindering any interaction amongnodes.The degradation of performance is represented bythe following dynamical model:e ij(t+1)=e ij(0)/L i(t)C iif L i(t)>C ie ij(0)if L i(t)≤C i(4)where j extends to all thefirst neighbors of i.In other words,when a node i is congested,it is assumed that the efficiency of power transportation from(to)i to(from) itsfirst neighbors decreases linearly with the overload L i(t)/C i.A benefit of the CLM model,and a difference from the model in Ref.[14],is that it does not assume that overloaded nodes fail irreversibly.Overloaded nodes have the possibility of working again if,by power rerouting,their load decreases below their capacity.In other words,the effects of overload on nodes are reversible.Since thesubstations of the US power grid are equipped with fail-safe mechanisms that take them out of service in case ofa local supply/demand imbalance[36],but also can berestarted when operating conditions normalize,reversible node congestion is a better model of power grid failuresthan irreversible loss of overloaded nodes.Moreover,noexplicit assumptions are made about the redistributionof loads,but this redistribution emerges naturally from the reorganization of efficient transmission paths follow-ing a node failure.In this sense,the model is different frommodels studied in references[12,15]where the load is thequantity that is physically redistributed.Simulating a network failure involves removing a nodefrom the network and monitoring the progression of over-loading nodes.If the tolerance parameterαis high enough the network does not present the cascading effect typicalof the redistribution offlows and its efficiency remains un-affected by the failure.If the tolerance parameter is verysmall,a cascading effect takes place and the transmission efficiency of the network degrades rapidly.For intermedi-ate values ofαthe network degrades more slowly and itsefficiency stabilizes to a value that is lower than or equal to the initial one.We observed that the efficiency of thenetwork stabilizes into a steady state or small oscillationsaround an efficiency value in about10-20steps(see insetof Fig.6).The reason for the occurrence of oscillations is stronglyrelated to the reversibility of the effects of overload.Sup-pose that two paths exist from generator i to the distribu-tion substation j(path A and path B)and that under the condition of perfect functioning(i.e.before the occurrenceof any breakdown)path A is more efficient than path B.If at time t some nodes of path A become overloaded,B becomes the most efficient path from i to j.If this impliesthat most of the load passing through A is redirected toB,the nodes of the former path will recover efficiency tothe detriment of some nodes of the latter one.Therefore the situation in which the most efficient path from i toj is A is restored and the redistribution offlows starts again its cycle.This switching between alternative pathscauses the global efficiency to oscillate.Of course in the real power grid the behavior is more complicated becausethe described cycle is concurrent with a redistribution offlows that involves the whole network.However the oscil-lations are evident all the same[27].3ResultsIn our study,we have adopted two different types of node overload progression schemes.Thefirst is single node re-moval in which a single node is removed at time zero and the network is progressed in time.This way,we can model the effects of an external perturbation of a single trans-mission node or generator.Nevertheless,it could happen that several nodes fail at the same time or in close suc-cession or are shut down to save the equipment.In fact,104The European Physical Journal BFig.1.Global efficiency of the power grid after the removalof random(triangles)or high-load(circles)generators(a)or transmission substations(b).The unperturbed efficiency isE(G0)=0.04137.As the overload toleranceαof the substa-tions increases,thefinal efficiency approaches the unperturbedvalue.The random disruption curves were obtained by averag-ing over10–100individual removals.The load-based disruptioncurve is obtained by removing the highest load generator and transmission node,respectively.blackouts often occur because generators and transform-ers are hardwired to protect themselves in response to a drastic change.To model such type of cascading failure, we develop a second node overload progression scheme in-volving many cycles of node selection and removal and network progression.In both schemes,adopting the removal strategy from [16],we have chosen nodes either randomly(random re-moval)or selectively by highest load(load based removal) and once removed,the efficiency of the network and the load of the nodes were continually recalculated in time. Only generation and transmission substations were re-moved using the above strategy.Ourfirst results use the single-node progression scheme for both removal types.Figure1shows a load based (circle)removal and an average of at least10random removals(triangle)for transmission and generation sub-stations withfinal global efficiency as a function of the tol-erance of the network.Thesefigures indicate that above a critical tolerance value of approximately1.42,the removal of the highest loaded transmitter and generator substation has little effect on the overall network efficiency.How-ever at values of tolerance below the critical value,the global efficiency can be reduced by over20%.For random removals,the critical value is near1.18in bothfigures. These results clearly indicate that the loss of nodes with high load causes a higher damage in the system than the loss of random nodes.The North American power grid has a moderately heterogeneous topology characterized by an exponential distribution of the number of transmission lines per sub-station(degree distribution)[11,37]and a generalized power-law distribution of the node loads[11].Thus the topology of the power grid is an intermediate between Erd˝o s-R´e nyi random graphs that have a binomial de-gree distribution and exponential load distribution andFig.2.Scatterplot offinal network efficiency for given toler-ance values for the removal of randomly selected generators(a) or transmission substations(b).A total of1668generator and 1558transmission node removals are presented on thisfigure. between scale-free networks that have a power-law degreedistribution and a power-law load distribution[4,32].Pre-vious studies of cascading failures in the above networkclasses[14,16]found that homogeneous networks and ran-dom graphs are tolerant to both random and load-basednode failures,while scale-free networks are vulnerable to cascading failures caused by the loss of high-load nodes.Our results suggest that despite the limited variabilityin the number of transmission lines per substation(be-tween one andfifteen),the power grid has the potential ofexhibiting the same type of dynamical vulnerability thatscale free networks have[38].Moving beyond averages,Figure2presents scatter-plots of the efficiency of the network after the loss of ran-domly selected nodes for40different tolerance values.Twodistinct trends are suggested from the efficiency versustolerance scatterplot.Thefirst,a horizontal line of points close to the unperturbed efficiency,indicates no efficiencyloss for any tolerance level.The second,corresponding totolerance-dependent damage,is a curve that initially in-creases linearly,then saturates at high tolerance levels. Thisfigure confirms that an efficiency loss(damage)of upto25%is possible after the loss of a single generator ortransmission substation.The scatterplot cannot illustrate the multiplicity of the observed(tolerance,efficiency)points.To gain insightsinto the distribution of efficiency loss we determine thecumulative damage distribution P(d>D),i.e.the prob-ability of observing damage larger than a given value D. Figure3shows the cumulative damage distribution forfivetolerance values:α=1.025(circles),α=1.1(squares),α=1.2(diamonds),α=1.4(upward triangles)and α=1.8(downward triangles).As expected,the curves corresponding to distinct tolerance values have markedlydifferent ranges,indicating that the higher the tolerancevalue,the lower the probability to cause high damage. The long horizontal regions of theα=1.025andα=1.1 curves indicate a gap between high and low damage, corresponding to the separation into two distinct dam-age behaviors observed in the scatterplot.However,theR.Kinney et al.:Modeling cascading failures in the North American power grid105Fig. 3.Cumulative damage distribution after transmission node removal for four different tolerance values,α=1.025 (circles),α=1.1(squares),α=1.2(diamonds),α=1.4(up-ward triangles)andα=1.8(downward triangles).Note that all the curves start relatively far from unity,indicating a non-zero probability of no damage.The continuous line indicates the cumulative distribution of disturbances on the power grid, i.e.P(d>D)=D−δ+1,withδ 1.1[39,40].other distributions are relatively continuous,and all have power-law scaling regions with exponents whose magni-tude increases with tolerance,varying between0.5and2. The probability distribution of disturbances on the power grid has been found to be a power law with exponent close to−1.1[39,40],corresponding to an almostflat cumula-tive distribution.This is in closest agreement with our cumulative damage distributions forα=1.1andα=1.2, suggesting that the overload tolerance of the North Amer-ican power grid is low.Comparing Figures2and3suggests the following question:do the two distinct(tolerance-dependent and independent)behaviors correspond to different classes of nodes?And if the answer is yes,what distinguishes the nodes in the two domains?To answer these questions we selected a sample of15nodes whose degrees and loads cover the entire range of degrees and loads,and stud-ied the effect of their(separate)removal for a range of tolerance values.As Figure4shows,wefind that some nodes’removal causes no decrease in network efficiency for the entire range of tolerance values.Therefore,the North American power grid is resilient to the loss of these nodes. Other nodes’removal causes tolerance-dependent damage that approaches zero only for tolerance values higher than a critical value.Included within the set of selected nodes is the node with the highest initial load.Interestingly,the removal of that particular node does not have the greatest effect upon the network.The node that has the greatest effect initially and a substantial effect over the entire range of tolerance values has roughly80%the maximum load.Based on Figure4we conclude that there are three separable classes of nodes:1.Nodes whose removal causes no or very little damageat any tolerance.The abundance of these nodes can beFig.4.Representative sample of node-dependent damage for different tolerance values.Two main types of behavior can be distinguished,one corresponding to no damage,and the other to a universal damage-versus-tolerance curve.A third type rep-resents a transition from tolerance-dependent to no-damage behavior.The continuous curve corresponds to equation(5). Inset:comparison of equation(5)with a cumulated scatter-plot of damage at different tolerance levels that contains all the points of Figure2.calculated from Figure3as1−Pα 1(D>0),thus we can conclude that around60%of the nodes are in this category.2.Nodes whose removal causes a tolerance-dependentdamage following the functional formD=D01−xβKβ+xβ(5)where x=α−1,D0=0.23is the maximum damage, K+1∼1.2corresponds to the tolerance value causing half-maximal damage,and the exponentβ 2.The removal of these nodes causes the maximal damage to the system possible at any given tolerance,and there-fore these nodes comprise the tail end of the cumu-lative damage distribution presented in Figure3(see also the inset of Fig.4).According to equation(5),a tolerance value ofα 3would be needed in order for the damage caused by the removal of a substation in this class to be negligible(less than0.5%).3.Nodes that follow the tolerance-dependent curve(Eq.(5))for low tolerances,then transition to the no-damage behavior.The tolerance values corresponding to this transition are in the rangeα∈(1.05,1.4)and differ from node to node,and the transitions are usu-ally steep.These nodes make up the bulk of the cumu-lative damage distribution presented in Figure3. Based on this picture,the range of damage possible at a given tolerance value is from zero(behavior1)to the value given by equation(5)for behavior2,in good agreement with the maximum damage indicated by Figure3.Wefind that the nodes causing no efficiency loss(be-havior1)have both low betweenness and low degrees while the nodes that do affect the network upon removal have106The European Physical JournalBFig.5.(a)The relationship between node degree,load,and the efficiency loss its removal causes for 43randomly selected nodes.The overload tolerance is α=1.2.The loss of nodes with very low load and degree (filled circles)causes no damage.(b)Load histogram for the generators (white bars)and transmis-sion substations (dashed bars)whose removal does not cause any damage at α=1.025.Each bin corresponds to a load range of 1000.A total of 639generators and 476transmission substations were included in this plot.higher betweenness/degree.Figure 5a relates node degree and load with the damage caused by the node’s removal for a set of 43randomly selected nodes.The plot indicates that,although there is no direct correlation between de-gree,load and efficiency loss,nodes that have both low degree and relatively low load will cause little damage when perturbed.Figure 5b shows the load histogram of generators and transmission substations whose removal at tolerance α=1.025leads to no efficiency loss.It is evident from the figure that the majority of nodes whose removal causes no damage have loads <1000.Overall we find that 90%of no-damage-causing generators have loads <1000and degree <3,while 90%of non-damage-causing trans-mission nodes have load <2000and degree =2.The frac-tion of generators with degree 1(also called leaf nodes),expected to cause insignificant efficiency loss,is 72%,and no transmission substations are leaf nodes.Thus the net-work’s resilience is higher than expected from the number of leaf nodes alone.Moving to the cascading failure,Figure 6a shows a transmitter substation load-based failure at a tolerance of α=1.025.Here we remove the highest-load node,wait for the system to stabilize,then find and remove the current highest-load node,repeating this iteration several times.The successive node removals cause periodic oscillations in the network efficiency,and the amplitude of these oscilla-tions seems to increase then decrease again.Interestingly,the first node removed does the most damage while each successive removal does little to the worsening of the aver-age efficiency.Similar behavior is recorded for generators.In random removals most behaviors,due to the higher probability of selecting a low degree and low betweenness node,reach stability,where the efficiency remains roughly constant after the first removal as in Figure 6b.These results are complementary and similar in spirit to the re-sults of static transmission node removals [11]where the removal of up to 1%of the nodes had little effect on the connectivity of the power grid.As reference [11]has found,in this regime the connectivity of the grid,in other wordsFig.6.Cascading failure with 30consecutive node removals.A new node was removed at multiples of 50iterations,the selection was either based on the highest load (a)or random (b).The upper and lower curves correspond to the two values in a period-two oscillation of the network efficiency.Inset:typical evolution of network efficiency after the removal of a single node.the reachability between generators and distribution substations,decreases approximately proportionally with the fraction of nodes removed.Here we obtain efficiency loss (damage)of 40%after the removal of 0.33%of the high-load transmission nodes.Both of these results sug-gest that perturbations higher than 1%are needed for catastrophic failure.The picture suggested by our results is simultaneously reassuring and ominous.The North American power grid has been proven both theoretically and empirically to be highly robust to random failures.We also find that 60%of single substation losses do not cause cascading failure but only limited perturbations in the transmission efficiency of the power grid.However,this research highlights the possi-ble damage done to the network by a more targeted attack upon the few transmission substations with high between-ness and high degree.Our results,taken together with the observed disturbance distribution on the power grid [39,40],suggest that even the loss of a single high-load and high-degree transmission substation reduces the efficiency of the power grid by 25%.This vulnerability at the trans-mission level deserves serious consideration by government and business officials so that cost-effective counter mea-sures can be developed.Changes in the topology of the power grid,especially in its heterogeneous load distribu-tion [11],will decrease its sensitivity to the failure of high-load transmission lines.The possible stabilizing measures include reducing the load upon the highly loaded nodes by building more transmission lines and substations,con-trolling the spread of the cascade [38,41],or producing power on a more local level via environmentally friendly methods.The authors wish to thank Gary L.Nakarado,Donna Heimiller and Steven Englebretson for their help in obtaining the POW-ERmap network data.The work of R.K.was supported by the Pennsylvania State University Research Experiences for Un-dergraduates program.R.A.gratefully acknowledges a Sloan Fellowship in Science and Engineering.。

相关文档
最新文档