A Traffic Control Strategy for Sensitive Junction under Disaster Conditions

Article Preview

Abstract:

This paper provides a contribution to the issue of signal control in a sensitive junction under disaster conditions. A signal control parameters optimization model is presented in order to prevent the spillback of queue in a short approaching link. Starting from an equilibrium equation, store-and-forward method based, this paper depicts the vehicular arrival and departure in a link. In addition, a minimum problem is presented aiming at that the evacuation demand approaching the sensitive junction can depart safely,efficiently with equal opportunities. Then a solution method, based on a improved FW, is proposed. At last, a simulate case via the simulation software – VISSIM is described. The results read that not only the model can prevent the spillback of sensitive phase but also enhance the entire throughout of the junction.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 255-260)

Pages:

4065-4069

Citation:

Online since:

May 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] The requisition of "863"program "The Traffic Organization Guaranteeing technology under major disaster conditions". ITS center, Jilin university, Changchun. 2008.

Google Scholar

[2] K.Aboudolas*,M.Papageorgiou,E.Kosmatopoulos Store-and-forward based methods for the signal control problem in large-scale congested urban road networks. Transportation Research Part C 17 (2009) 163–174

DOI: 10.1016/j.trc.2008.10.002

Google Scholar

[3] Pitu Mirchandani, Larry Head. A real-time traffic signal control: architecture, algorithms, and analysis. Transportation Research Part C9(2001) 415-432.

DOI: 10.1016/s0968-090x(00)00047-4

Google Scholar

[4] Saïda Arrache and Rachid Ouafi Accelerating Convergence of the Frank-Wolfe Algorithm for Solving the Traffic Assignment Problem. IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.5, May 2008.

Google Scholar