Visible Light Communication( VLC) based on LED is a new wireless communication technology with high response rate and good modulation characteristics in the wavelengths of 380- 780 nm. Compared with conventional metho...Visible Light Communication( VLC) based on LED is a new wireless communication technology with high response rate and good modulation characteristics in the wavelengths of 380- 780 nm. Compared with conventional methods,the waveband of VLC is harmless to human and safe to communication because of no magnetism radiation. An audio information transmission system using LED traffic lights is presented based on VLC technology. The system is consisted of transmitting terminal,receiving terminal and communication channel. Some experiments were made under real communication environment. The experimental results showed that the traffic information transmission system works steadily with good communication quality and achieves the purpose of transmitting audio information through LED traffic lights,with a data transfer rate up to 250 kbps over a distance of 5 meters.展开更多
In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set f...In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set for ATC cybersecurity attacks is constructed by setting the feature states,adding recursive features,and determining the feature criticality.The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data.An autoencoder is introduced into the AI(artificial intelligence)algorithm to encode and decode the characteristics of ATC network security attack behavior to reduce the dimensionality of the ATC network security attack behavior data.Based on the above processing,an unsupervised learning algorithm for clustering detection of ATC network security attacks is designed.First,determine the distance between the clustering clusters of ATC network security attack behavior characteristics,calculate the clustering threshold,and construct the initial clustering center.Then,the new average value of all feature objects in each cluster is recalculated as the new cluster center.Second,it traverses all objects in a cluster of ATC network security attack behavior feature data.Finally,the cluster detection of ATC network security attack behavior is completed by the computation of objective functions.The experiment took three groups of experimental attack behavior data sets as the test object,and took the detection rate,false detection rate and recall rate as the test indicators,and selected three similar methods for comparative test.The experimental results show that the detection rate of this method is about 98%,the false positive rate is below 1%,and the recall rate is above 97%.Research shows that this method can improve the detection performance of security attacks in air traffic control network.展开更多
Starting from the reality of protective renovation of the historical environment of traffic cultural heritage,this paper discusses its necessity from the role and value of protective renovation of historical environme...Starting from the reality of protective renovation of the historical environment of traffic cultural heritage,this paper discusses its necessity from the role and value of protective renovation of historical environment on overall protection of traffic cultural heritage and contemporary value exploration.By analyzing the current research status of traffic history,protection theories and methods of historical environment,cultural routes,linear cultural landscape and heritage corridors and other theoretical methods,as well as the effectiveness of digital protection and other technical approaches,this paper demonstrates the theoretical basis and feasible technical approaches for protective renovation of the historical environment of traffic cultural heritage.Moreover,it is suggested to construct the historical environment evaluation system of traffic cultural heritage and form a systematic design process of protective renovation.展开更多
The effects of real-time traffic information system(RTTIS)on traffic performance under parallel,grid and ring networks were investigated.The simulation results show that the effects of the proportion of RTTIS usage de...The effects of real-time traffic information system(RTTIS)on traffic performance under parallel,grid and ring networks were investigated.The simulation results show that the effects of the proportion of RTTIS usage depend on the road network structures.For traffic on a parallel network,the performance of groups with and without RTTIS level is improved when the proportion of vehicles using RTTIS is greater than 0 and less than 30%,and a proportion of RTTIS usage higher than 90%would actually deteriorate the performance.For both grid and ring networks,a higher proportion of RTTIS usage always improves the performance of groups with and without RTTIS.For all three network structures,vehicles without RTTIS benefit from some proportion of RTTIS usage in a system.展开更多
The application and development of a wide-area measurement system(WAMS)has enabled many applications and led to several requirements based on dynamic measurement data.Such data are transmitted as big data information ...The application and development of a wide-area measurement system(WAMS)has enabled many applications and led to several requirements based on dynamic measurement data.Such data are transmitted as big data information flow.To ensure effective transmission of wide-frequency electrical information by the communication protocol of a WAMS,this study performs real-time traffic monitoring and analysis of the data network of a power information system,and establishes corresponding network optimization strategies to solve existing transmission problems.This study utilizes the traffic analysis results obtained using the current real-time dynamic monitoring system to design an optimization strategy,covering the optimization in three progressive levels:the underlying communication protocol,source data,and transmission process.Optimization of the system structure and scheduling optimization of data information are validated to be feasible and practical via tests.展开更多
With the wide applications of sensor network technology in traffic information acquisition systems,a new measure will be quite necessary to evaluate spatially related properties of traffic information credibility.The ...With the wide applications of sensor network technology in traffic information acquisition systems,a new measure will be quite necessary to evaluate spatially related properties of traffic information credibility.The heterogeneity of spatial distribution of information credibility from sensor networks is analyzed and a new measure,information credibility function(ICF),is proposed to describe this heterogeneity.Three possible functional forms of sensor ICF and their corresponding expressions are presented.Then,two feasible operations of spatial superposition of sensor ICFs are discussed.Finally,a numerical example is introduced to show the calibration method of sensor ICF and obtain the spatially related properties of expressway in Beijing.The results show that the sensor ICF of expressway in Beijing possesses a negative exponent property.The traffic information is more abundant at or near the locations of sensor,while with the distance away from the sensor increasing,the traffic information credibility will be declined by an exponential trend.The new measure provides theoretical bases for the optimal locations of traffic sensor networks and the mechanism research of spatial distribution of traffic information credibility.展开更多
The encoding and decoding processes of traffic channel in digital trunking system are studied. On the basis of computer simulation, the BER (bit error ratio) with different RCPC decoding step is analyzed. As a result,...The encoding and decoding processes of traffic channel in digital trunking system are studied. On the basis of computer simulation, the BER (bit error ratio) with different RCPC decoding step is analyzed. As a result, the optimal RCPC decoding step is provided, which gives essential theoretical evidences for the implementation of digital trunking system.展开更多
The Global Energy Interconnection is an important strategic approach used to achieve efficient worldwide energy allocation.The idea of developing integrated power,information,and transportation networks provides incre...The Global Energy Interconnection is an important strategic approach used to achieve efficient worldwide energy allocation.The idea of developing integrated power,information,and transportation networks provides increased power interconnection functionality and meaning,helps condense forces,and accelerates the integration of global infrastructure.Correspondingly,it is envisaged that it will become the trend of industrial technological development in the future.In consideration of the current trend of integrated development,this study evaluates a possible plan of coordinated development of fiber-optic and power networks in the Pan-Arctic region.Firstly,the backbone network architecture of Global Energy Interconnection is introduced and the importance of the Arctic energy backbone network is confirmed.The energy consumption and developmental trend of global data centers are then analyzed.Subsequently,the global network traffic is predicted and analyzed by means of a polynomial regression model.Finally,in combination with the current construction of fiber-optic networks in the Pan-Arctic region,the advantages of the integration of the fiber-optic and power networks in this region are clarified in justification of the decision for the development of a Global Energy Interconnection scheme.展开更多
The increasingly large number of electric vehicles(EVs)has resulted in a growing concern for EV charging station load prediction for the purpose of comprehensively evaluating the influence of the charging load on dist...The increasingly large number of electric vehicles(EVs)has resulted in a growing concern for EV charging station load prediction for the purpose of comprehensively evaluating the influence of the charging load on distribution networks.To address this issue,an EV charging station load predictionmethod is proposed in coupled urban transportation and distribution networks.Firstly,a finer dynamic urban transportation network model is formulated considering both nodal and path resistance.Then,a finer EV power consumption model is proposed by considering the influence of traffic congestion and ambient temperature.Thirdly,the Monte Carlo method is applied to predict the distribution of EVcharging station load based on the proposed dynamic urban transportation network model and finer EV power consumption model.Moreover,a dynamic charging pricing scheme for EVs is devised based on the EV charging station load requirements and the maximum thresholds to ensure the security operation of distribution networks.Finally,the validity of the proposed dynamic urban transportation model was verified by accurately estimating five sets of test data on travel time by contrast with the BPR model.The five groups of travel time prediction results showed that the average absolute percentage errors could be improved from 32.87%to 37.21%compared to the BPR model.Additionally,the effectiveness of the proposed EV charging station load prediction method was demonstrated by four case studies in which the prediction of EV charging load was improved from27.2 to 31.49MWh by considering the influence of ambient temperature and speed on power energy consumption.展开更多
In this paper, the lattice model is presented, incorporating not only site information about preceding cars but also relative currents in front. We derive the stability condition of the extended model by considering a...In this paper, the lattice model is presented, incorporating not only site information about preceding cars but also relative currents in front. We derive the stability condition of the extended model by considering a small perturbation around the homogeneous flow solution and find that the improvement in the stability of traffic flow is obtained by taking into account preceding mixture traffic information. Direct simulations also confirm that the traffic jam can be suppressed efficiently by considering the relative currents ahead, just like incorporating site information in front. Moreover, from the nonlinear analysis of the extended models, the preceding mixture traffic information dependence of the propagating kink solutions for traffic jams is obtained by deriving the modified KdV equation near the critical point using the reductive perturbation method.展开更多
Due to the characteristics of variability and dispersion in traffic information, to get the reliable real-time traffic information has been a bottleneck in the development of intelligent transportation systems. Howeve...Due to the characteristics of variability and dispersion in traffic information, to get the reliable real-time traffic information has been a bottleneck in the development of intelligent transportation systems. However, with the development of wireless network technology and mobile Internet, the mobile phones are rapidly developed and more popular, so it is possible to get road traffic information by locating the mobile phones in vehicles. The system structure for the road traffic information collection is designed based on wireless network and mobile phones in vehicles, and the vehicle recognition and its information computation methods are given and discussed. Also the simulation is done for vehicle recognition and computation based on fuzzy cluster analysis method and the results are obtained and analyzed.展开更多
Segmentation of moving objects in a video sequence is a basic task for application of computer vision. However, shadows extracted along with the objects can result in large errors in object localization and recognitio...Segmentation of moving objects in a video sequence is a basic task for application of computer vision. However, shadows extracted along with the objects can result in large errors in object localization and recognition. In this paper, we propose a method of moving shadow detection based on edge information, which can effectively detect the cast shadow of a moving vehicle in a traffic scene. Having confirmed shadows existing in a figure, we execute the shadow removal algorithm proposed in this paper to segment the shadow from the foreground. The shadow eliminating algorithm removes the boundary of the cast shadow and preserves object edges firstly; secondly, it reconstructs coarse object shapes based on the edge information of objects; and finally, it extracts the cast shadow by subtracting the moving object from the change detection mask and performs further processing. The proposed method has been further tested on images taken under different shadow orientations, vehicle colors and vehicle sizes, and the results have revealed that shadows can be successfully eliminated and thus good video segmentation can be obtained.展开更多
Unmanned aerial vehicle(UAV)was introduced as a novel traffic device to collect road traffic information and its cruise route planning problem was considered.Firstly,a multi-objective optimization model was proposed a...Unmanned aerial vehicle(UAV)was introduced as a novel traffic device to collect road traffic information and its cruise route planning problem was considered.Firstly,a multi-objective optimization model was proposed aiming at minimizing the total cruise distance and the number of UAVs used,which used UAV maximum cruise distance,the number of UAVs available and time window of each monitored target as constraints.Then,a novel multi-objective evolutionary algorithm was proposed.Next,a case study with three time window scenarios was implemented.The results show that both the total cruise distance and the number of UAVs used continue to increase with the time window constraint becoming narrower.Compared with the initial optimal solutions,the optimal total cruise distance and the number of UAVs used fall by an average of 30.93% and 31.74%,respectively.Finally,some concerns using UAV to collect road traffic information were discussed.展开更多
Re-routing system has become an important technology to improve traffic efficiency.The traditional re-routing schemes do not consider the dynamic characteristics of urban traffic,making the planned routes unable to co...Re-routing system has become an important technology to improve traffic efficiency.The traditional re-routing schemes do not consider the dynamic characteristics of urban traffic,making the planned routes unable to cope with the changing traf-fic conditions.Based on real-time traffic information,it is challenging to dynamically re-route connected vehicles to alleviate traffic congestion.Moreover,how to obtain global traffic information while reducing communication costs and improving travel efficiency poses a challenge to the re-routing system.To deal with these challenges,this paper proposes CHRT,a clustering-based hybrid re-routing system for traffic congestion avoidance.CHRT develops a multi-layer hybrid architecture.The central server accesses the global view of traffic,and the distributed part is composed of vehicles divided into clusters to reduce latency and communication overhead.Then,a clustering-based priority mechanism is proposed,which sets priorities for clusters based on realtime traffic information to avoid secondary congestion.Furthermore,to plan the optimal routes for vehicles while alleviating global traffic congestion,this paper presents a multi-metric re-routing algorithm.Through extensive simulations based on the SUMO traffic simulator,CHRT reduces vehicle traveling time,fuel consumption,and CO2 emissions compared to other systems.In addition,CHRT globally alleviates traffic congestion and improves traffic efficiency.展开更多
In order to make full use of heterogeneous multi-sensor data to serve urban intelligent transportation systems, a real-time urban traffic state fusion model was proposed, named federated evidence fusion model. The mod...In order to make full use of heterogeneous multi-sensor data to serve urban intelligent transportation systems, a real-time urban traffic state fusion model was proposed, named federated evidence fusion model. The model improves conventional D-S evidence theory in temporal domain, such that it can satisfy the requirement of real-time processing and utilize traffic detection information more efficaciously. The model frame and computational procedures are given. In addition, a generalized reliability weight matrix of evidence is also presented to increase the accuracy of estimation. After that, a simulation test is presented to explain the advantage of the proposed method in comparison with conventional D-S evidence theory. Besides, the validity of the model is proven by the use of the data of loop detectors and GPS probe vehicles collected from an urban link in Shanghai. Results of the experiment show that the proposed approach can well embody and track traffic state at character level in real-time conditions.展开更多
Effect of cars with intelligent transportation systems (ITSs) on traffic flow near an on-ramp is investigated by car-following simulations. By numerical simulations, the dependences of flux on the inflow rate are in...Effect of cars with intelligent transportation systems (ITSs) on traffic flow near an on-ramp is investigated by car-following simulations. By numerical simulations, the dependences of flux on the inflow rate are investigated for various proportions of cars with ITSs. The phase diagrams as well as the spatiotemporal diagrams are presented to show different traffic flow states on the main road and the on-ramp. The results show that the saturated flux on the main road increases and the free flow region is enlarged with the increase of the proportion of cars with ITS. Interestingly, the congested regions of the main road disappear completely when the proportion is larger than a critical value. Further investigation shows that the capacity of on-ramp system can be promoted by 13% by using the ITS information, and the saturated flux on the on-ramp can be kept at an appropriate value by adjusting the proportion of cars with ITS.展开更多
With the rapid growth of vehicle population and vehicle miles traveled, automobile emission has become a severe issue in the metropolitan cities of China. There are policies that concentrate on the management of emiss...With the rapid growth of vehicle population and vehicle miles traveled, automobile emission has become a severe issue in the metropolitan cities of China. There are policies that concentrate on the management of emission sources. However, improving the operation of the transportation system through apps on mobile devices, especially navigation apps, may have a unique role in promoting urban air quality. Real-time traveler information can not only help travelers avoid traffic congestion, hut also advise them to adjust their departure time, mode, or route, or even to cancel trips. Will such changes in personal travel patterns have a significant impact in decreasing emissions? If so, to what extent will they impact urban air quality? The aim of this study is to determine how urban traffic emission is affected by the use of navigation apps. With this work, we attempt to answer the question of whether the real-time traffic information provided by navigation apps can help to improve urban air quality. Some of these findings may provide references for the formulation of urban traffic and environmental policies.展开更多
The security of critical data is an important issue for distributed storage system design,especially for long-term storage.ESSA (An Efficient and Secure Splitting Algorithm for Distributed Storage Systems) is presente...The security of critical data is an important issue for distributed storage system design,especially for long-term storage.ESSA (An Efficient and Secure Splitting Algorithm for Distributed Storage Systems) is presented,which takes advantage of a two level information dispersal scheme to strengthen the security of data.In ESSA,the approach of knight’s tour problem,which is NP-Complete,is introduced to scramble data at the first level,and a split cube is used to split scrambled data at the second level.Thus,it is very difficult for the malicious user to get information because the task of reconstructing the original data needs more computation than they can tolerate.We prove that the security of ESSA is better than encryption algorithm and not inferior to erasure codes and secret sharing.Experimental results show that distributed storage systems exploiting ESSA has greater efficiency than that exploiting keyed encryption,erasure codes and secret sharing.展开更多
基金Sponsored by the National Science and Technology Innovation Fund for Small and Medium Enterprises(Grant No.10C26211200144)Tianjin Science and Technology Key Supporting Projects(Grant No.10ZCGYGX18300)
文摘Visible Light Communication( VLC) based on LED is a new wireless communication technology with high response rate and good modulation characteristics in the wavelengths of 380- 780 nm. Compared with conventional methods,the waveband of VLC is harmless to human and safe to communication because of no magnetism radiation. An audio information transmission system using LED traffic lights is presented based on VLC technology. The system is consisted of transmitting terminal,receiving terminal and communication channel. Some experiments were made under real communication environment. The experimental results showed that the traffic information transmission system works steadily with good communication quality and achieves the purpose of transmitting audio information through LED traffic lights,with a data transfer rate up to 250 kbps over a distance of 5 meters.
基金National Natural Science Foundation of China(U2133208,U20A20161)National Natural Science Foundation of China(No.62273244)Sichuan Science and Technology Program(No.2022YFG0180).
文摘In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set for ATC cybersecurity attacks is constructed by setting the feature states,adding recursive features,and determining the feature criticality.The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data.An autoencoder is introduced into the AI(artificial intelligence)algorithm to encode and decode the characteristics of ATC network security attack behavior to reduce the dimensionality of the ATC network security attack behavior data.Based on the above processing,an unsupervised learning algorithm for clustering detection of ATC network security attacks is designed.First,determine the distance between the clustering clusters of ATC network security attack behavior characteristics,calculate the clustering threshold,and construct the initial clustering center.Then,the new average value of all feature objects in each cluster is recalculated as the new cluster center.Second,it traverses all objects in a cluster of ATC network security attack behavior feature data.Finally,the cluster detection of ATC network security attack behavior is completed by the computation of objective functions.The experiment took three groups of experimental attack behavior data sets as the test object,and took the detection rate,false detection rate and recall rate as the test indicators,and selected three similar methods for comparative test.The experimental results show that the detection rate of this method is about 98%,the false positive rate is below 1%,and the recall rate is above 97%.Research shows that this method can improve the detection performance of security attacks in air traffic control network.
基金Sponsored by Social Science Planning Project of Chongqing City(2022NDYB83)Postgraduate Innovative Research Project of Chongqing City(CYS22418)。
文摘Starting from the reality of protective renovation of the historical environment of traffic cultural heritage,this paper discusses its necessity from the role and value of protective renovation of historical environment on overall protection of traffic cultural heritage and contemporary value exploration.By analyzing the current research status of traffic history,protection theories and methods of historical environment,cultural routes,linear cultural landscape and heritage corridors and other theoretical methods,as well as the effectiveness of digital protection and other technical approaches,this paper demonstrates the theoretical basis and feasible technical approaches for protective renovation of the historical environment of traffic cultural heritage.Moreover,it is suggested to construct the historical environment evaluation system of traffic cultural heritage and form a systematic design process of protective renovation.
文摘The effects of real-time traffic information system(RTTIS)on traffic performance under parallel,grid and ring networks were investigated.The simulation results show that the effects of the proportion of RTTIS usage depend on the road network structures.For traffic on a parallel network,the performance of groups with and without RTTIS level is improved when the proportion of vehicles using RTTIS is greater than 0 and less than 30%,and a proportion of RTTIS usage higher than 90%would actually deteriorate the performance.For both grid and ring networks,a higher proportion of RTTIS usage always improves the performance of groups with and without RTTIS.For all three network structures,vehicles without RTTIS benefit from some proportion of RTTIS usage in a system.
文摘The application and development of a wide-area measurement system(WAMS)has enabled many applications and led to several requirements based on dynamic measurement data.Such data are transmitted as big data information flow.To ensure effective transmission of wide-frequency electrical information by the communication protocol of a WAMS,this study performs real-time traffic monitoring and analysis of the data network of a power information system,and establishes corresponding network optimization strategies to solve existing transmission problems.This study utilizes the traffic analysis results obtained using the current real-time dynamic monitoring system to design an optimization strategy,covering the optimization in three progressive levels:the underlying communication protocol,source data,and transmission process.Optimization of the system structure and scheduling optimization of data information are validated to be feasible and practical via tests.
基金Project(61104164)supported by the National Natural Science Foundation of ChinaProject(2012AA112401)supported by the National High Technology Research and Development Program of ChinaProject(2012YJS059)supported by the Fundamental Research Funds for the Central Universities of China
文摘With the wide applications of sensor network technology in traffic information acquisition systems,a new measure will be quite necessary to evaluate spatially related properties of traffic information credibility.The heterogeneity of spatial distribution of information credibility from sensor networks is analyzed and a new measure,information credibility function(ICF),is proposed to describe this heterogeneity.Three possible functional forms of sensor ICF and their corresponding expressions are presented.Then,two feasible operations of spatial superposition of sensor ICFs are discussed.Finally,a numerical example is introduced to show the calibration method of sensor ICF and obtain the spatially related properties of expressway in Beijing.The results show that the sensor ICF of expressway in Beijing possesses a negative exponent property.The traffic information is more abundant at or near the locations of sensor,while with the distance away from the sensor increasing,the traffic information credibility will be declined by an exponential trend.The new measure provides theoretical bases for the optimal locations of traffic sensor networks and the mechanism research of spatial distribution of traffic information credibility.
文摘The encoding and decoding processes of traffic channel in digital trunking system are studied. On the basis of computer simulation, the BER (bit error ratio) with different RCPC decoding step is analyzed. As a result, the optimal RCPC decoding step is provided, which gives essential theoretical evidences for the implementation of digital trunking system.
基金supported by the Corporation Science and Technology Program of Global Energy Interconnection Group Ltd. (GEIGC-D-[2018]024)by the National Natural Science Foundation of China (61472042, 61772079)
文摘The Global Energy Interconnection is an important strategic approach used to achieve efficient worldwide energy allocation.The idea of developing integrated power,information,and transportation networks provides increased power interconnection functionality and meaning,helps condense forces,and accelerates the integration of global infrastructure.Correspondingly,it is envisaged that it will become the trend of industrial technological development in the future.In consideration of the current trend of integrated development,this study evaluates a possible plan of coordinated development of fiber-optic and power networks in the Pan-Arctic region.Firstly,the backbone network architecture of Global Energy Interconnection is introduced and the importance of the Arctic energy backbone network is confirmed.The energy consumption and developmental trend of global data centers are then analyzed.Subsequently,the global network traffic is predicted and analyzed by means of a polynomial regression model.Finally,in combination with the current construction of fiber-optic networks in the Pan-Arctic region,the advantages of the integration of the fiber-optic and power networks in this region are clarified in justification of the decision for the development of a Global Energy Interconnection scheme.
基金supported by the National Natural Science Foundation of China(No.U22B20105).
文摘The increasingly large number of electric vehicles(EVs)has resulted in a growing concern for EV charging station load prediction for the purpose of comprehensively evaluating the influence of the charging load on distribution networks.To address this issue,an EV charging station load predictionmethod is proposed in coupled urban transportation and distribution networks.Firstly,a finer dynamic urban transportation network model is formulated considering both nodal and path resistance.Then,a finer EV power consumption model is proposed by considering the influence of traffic congestion and ambient temperature.Thirdly,the Monte Carlo method is applied to predict the distribution of EVcharging station load based on the proposed dynamic urban transportation network model and finer EV power consumption model.Moreover,a dynamic charging pricing scheme for EVs is devised based on the EV charging station load requirements and the maximum thresholds to ensure the security operation of distribution networks.Finally,the validity of the proposed dynamic urban transportation model was verified by accurately estimating five sets of test data on travel time by contrast with the BPR model.The five groups of travel time prediction results showed that the average absolute percentage errors could be improved from 32.87%to 37.21%compared to the BPR model.Additionally,the effectiveness of the proposed EV charging station load prediction method was demonstrated by four case studies in which the prediction of EV charging load was improved from27.2 to 31.49MWh by considering the influence of ambient temperature and speed on power energy consumption.
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 60904068,10902076,11072117,and 61004113)
文摘In this paper, the lattice model is presented, incorporating not only site information about preceding cars but also relative currents in front. We derive the stability condition of the extended model by considering a small perturbation around the homogeneous flow solution and find that the improvement in the stability of traffic flow is obtained by taking into account preceding mixture traffic information. Direct simulations also confirm that the traffic jam can be suppressed efficiently by considering the relative currents ahead, just like incorporating site information in front. Moreover, from the nonlinear analysis of the extended models, the preceding mixture traffic information dependence of the propagating kink solutions for traffic jams is obtained by deriving the modified KdV equation near the critical point using the reductive perturbation method.
文摘Due to the characteristics of variability and dispersion in traffic information, to get the reliable real-time traffic information has been a bottleneck in the development of intelligent transportation systems. However, with the development of wireless network technology and mobile Internet, the mobile phones are rapidly developed and more popular, so it is possible to get road traffic information by locating the mobile phones in vehicles. The system structure for the road traffic information collection is designed based on wireless network and mobile phones in vehicles, and the vehicle recognition and its information computation methods are given and discussed. Also the simulation is done for vehicle recognition and computation based on fuzzy cluster analysis method and the results are obtained and analyzed.
基金The work was supported by the National Natural Science Foundation of PRC (No.60574033)the National Key Fundamental Research & Development Programs(973)of PRC (No.2001CB309403)
文摘Segmentation of moving objects in a video sequence is a basic task for application of computer vision. However, shadows extracted along with the objects can result in large errors in object localization and recognition. In this paper, we propose a method of moving shadow detection based on edge information, which can effectively detect the cast shadow of a moving vehicle in a traffic scene. Having confirmed shadows existing in a figure, we execute the shadow removal algorithm proposed in this paper to segment the shadow from the foreground. The shadow eliminating algorithm removes the boundary of the cast shadow and preserves object edges firstly; secondly, it reconstructs coarse object shapes based on the edge information of objects; and finally, it extracts the cast shadow by subtracting the moving object from the change detection mask and performs further processing. The proposed method has been further tested on images taken under different shadow orientations, vehicle colors and vehicle sizes, and the results have revealed that shadows can be successfully eliminated and thus good video segmentation can be obtained.
基金Project(2009AA11Z220)supported by the National High Technology Research and Development Program of China
文摘Unmanned aerial vehicle(UAV)was introduced as a novel traffic device to collect road traffic information and its cruise route planning problem was considered.Firstly,a multi-objective optimization model was proposed aiming at minimizing the total cruise distance and the number of UAVs used,which used UAV maximum cruise distance,the number of UAVs available and time window of each monitored target as constraints.Then,a novel multi-objective evolutionary algorithm was proposed.Next,a case study with three time window scenarios was implemented.The results show that both the total cruise distance and the number of UAVs used continue to increase with the time window constraint becoming narrower.Compared with the initial optimal solutions,the optimal total cruise distance and the number of UAVs used fall by an average of 30.93% and 31.74%,respectively.Finally,some concerns using UAV to collect road traffic information were discussed.
基金This work was partially supported by the National Key R&D Program of China under Grant 2019YFB1803301the Key Research and Development Program of Shanxi under Grant 201903D121117+1 种基金Beijing Nova Program of Science and Technology under Grant Z191100001119028the National Natural Science Foundation of China under Grant 62001320.
文摘Re-routing system has become an important technology to improve traffic efficiency.The traditional re-routing schemes do not consider the dynamic characteristics of urban traffic,making the planned routes unable to cope with the changing traf-fic conditions.Based on real-time traffic information,it is challenging to dynamically re-route connected vehicles to alleviate traffic congestion.Moreover,how to obtain global traffic information while reducing communication costs and improving travel efficiency poses a challenge to the re-routing system.To deal with these challenges,this paper proposes CHRT,a clustering-based hybrid re-routing system for traffic congestion avoidance.CHRT develops a multi-layer hybrid architecture.The central server accesses the global view of traffic,and the distributed part is composed of vehicles divided into clusters to reduce latency and communication overhead.Then,a clustering-based priority mechanism is proposed,which sets priorities for clusters based on realtime traffic information to avoid secondary congestion.Furthermore,to plan the optimal routes for vehicles while alleviating global traffic congestion,this paper presents a multi-metric re-routing algorithm.Through extensive simulations based on the SUMO traffic simulator,CHRT reduces vehicle traveling time,fuel consumption,and CO2 emissions compared to other systems.In addition,CHRT globally alleviates traffic congestion and improves traffic efficiency.
文摘In order to make full use of heterogeneous multi-sensor data to serve urban intelligent transportation systems, a real-time urban traffic state fusion model was proposed, named federated evidence fusion model. The model improves conventional D-S evidence theory in temporal domain, such that it can satisfy the requirement of real-time processing and utilize traffic detection information more efficaciously. The model frame and computational procedures are given. In addition, a generalized reliability weight matrix of evidence is also presented to increase the accuracy of estimation. After that, a simulation test is presented to explain the advantage of the proposed method in comparison with conventional D-S evidence theory. Besides, the validity of the model is proven by the use of the data of loop detectors and GPS probe vehicles collected from an urban link in Shanghai. Results of the experiment show that the proposed approach can well embody and track traffic state at character level in real-time conditions.
基金Project partially supported by the National Basic Research Program of China(Grant No.2006CB705500)the National Natural Science Foundation of China(Grant Nos.70631001 and 70701004)the Innovation Foundation of Science and Technology for Excellent Doctorial Candidate of Beijing Jiaotong University(Grant No.141046522)
文摘Effect of cars with intelligent transportation systems (ITSs) on traffic flow near an on-ramp is investigated by car-following simulations. By numerical simulations, the dependences of flux on the inflow rate are investigated for various proportions of cars with ITSs. The phase diagrams as well as the spatiotemporal diagrams are presented to show different traffic flow states on the main road and the on-ramp. The results show that the saturated flux on the main road increases and the free flow region is enlarged with the increase of the proportion of cars with ITS. Interestingly, the congested regions of the main road disappear completely when the proportion is larger than a critical value. Further investigation shows that the capacity of on-ramp system can be promoted by 13% by using the ITS information, and the saturated flux on the on-ramp can be kept at an appropriate value by adjusting the proportion of cars with ITS.
文摘With the rapid growth of vehicle population and vehicle miles traveled, automobile emission has become a severe issue in the metropolitan cities of China. There are policies that concentrate on the management of emission sources. However, improving the operation of the transportation system through apps on mobile devices, especially navigation apps, may have a unique role in promoting urban air quality. Real-time traveler information can not only help travelers avoid traffic congestion, hut also advise them to adjust their departure time, mode, or route, or even to cancel trips. Will such changes in personal travel patterns have a significant impact in decreasing emissions? If so, to what extent will they impact urban air quality? The aim of this study is to determine how urban traffic emission is affected by the use of navigation apps. With this work, we attempt to answer the question of whether the real-time traffic information provided by navigation apps can help to improve urban air quality. Some of these findings may provide references for the formulation of urban traffic and environmental policies.
基金This study is supported by National Natural Science Foundation of China (No.60973146) National Natur al Science Foundation of Beijing (No.4092029) The Fundamental Research Funds for the Central Universities (No.2009RC0217). We also thank the anonymous reviewers for their constructive comments.
文摘The security of critical data is an important issue for distributed storage system design,especially for long-term storage.ESSA (An Efficient and Secure Splitting Algorithm for Distributed Storage Systems) is presented,which takes advantage of a two level information dispersal scheme to strengthen the security of data.In ESSA,the approach of knight’s tour problem,which is NP-Complete,is introduced to scramble data at the first level,and a split cube is used to split scrambled data at the second level.Thus,it is very difficult for the malicious user to get information because the task of reconstructing the original data needs more computation than they can tolerate.We prove that the security of ESSA is better than encryption algorithm and not inferior to erasure codes and secret sharing.Experimental results show that distributed storage systems exploiting ESSA has greater efficiency than that exploiting keyed encryption,erasure codes and secret sharing.