2017
DOI: 10.1155/2017/9243039
|View full text |Cite
|
Sign up to set email alerts
|

A Trial-and-Error Method with Autonomous Vehicle-to-Infrastructure Traffic Counts for Cordon-Based Congestion Pricing

Abstract: This study proposes a practical trial-and-error method to solve the optimal toll design problem of cordon-based pricing, where only the traffic counts autonomously collected on the entry links of the pricing cordon are needed. With the fast development and adoption of vehicle-to-infrastructure (V2I) facilities, it is very convenient to autonomously collect these data. Two practical properties of the cordon-based pricing are further considered in this article: the toll charge on each entry of one pricing cordon… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 38 publications
0
7
0
1
Order By: Relevance
“…We can obtain vehicle flows in the initial network by solving UE problems (4)- (12); when setting candidate AV link set̃= ⌀ without congestion pricing. After solving this UE problem for vehicle flows, we find that no AVs run on links (5,6), (6,5), (6,9), (7,8), (8,7), and (8,3) in the initial network. So we exclude these links from the candidate link set and form the following candidate link set: = {(1, 5) , (1,6) , (2,5) , (2, 6) , (5, 7) , (5, 9) , (6,8) , (9, 7) , (9,8) , (7,3) , (7,4) , (8,4)} .…”
Section: Network Descriptionmentioning
confidence: 99%
See 2 more Smart Citations
“…We can obtain vehicle flows in the initial network by solving UE problems (4)- (12); when setting candidate AV link set̃= ⌀ without congestion pricing. After solving this UE problem for vehicle flows, we find that no AVs run on links (5,6), (6,5), (6,9), (7,8), (8,7), and (8,3) in the initial network. So we exclude these links from the candidate link set and form the following candidate link set: = {(1, 5) , (1,6) , (2,5) , (2, 6) , (5, 7) , (5, 9) , (6,8) , (9, 7) , (9,8) , (7,3) , (7,4) , (8,4)} .…”
Section: Network Descriptionmentioning
confidence: 99%
“…AV link flow CV link flow (1,5) 35.000 0.000 (1,6) 0.000 35.000 (2,5) 35.000 0.000 (2,6) 0.000 35.000 (5,6) 0.000 0.000 (6,5) 0.000 0.000 (5,7) 55.774 0.000 (5,9) 14.226 0.000 (6,8) 0.000 42.768 (6,9) 0.000 27.232 (9,7) 4.450 18.119 (9,8) 9.775 9.113 (7,8) 0.000 18.119 (8,7) 0.000 0.000 (7,3) 30.000 0.000 (7,4) …”
Section: Journal Of Advanced Transportationunclassified
See 1 more Smart Citation
“…Zong et al applied a multiobjective stability control algorithm to improve the vehicle stability of a tractor semitrailer by using differential braking [35]. Recently, more and more people pay attention to intelligent vehicle based on Cooperative Vehicle Infrastructure System [36][37][38][39][40][41][42][43]. Besides, vehicle control and system model was combined with transportation simulation [44][45][46][47][48][49][50][51][52].…”
Section: And Wu Investigated Lyapunov Concept Exponents and Applicatimentioning
confidence: 99%
“…Neural network is an important method to detect driving risk [12]. With the fast development and adoption of vehicle-to-infrastructure (V2I) facilities, it is very convenient to detect driving risk, and the accuracy of the detection model is a key factor [13][14][15]. So, a neural network model of high accuracy will be established to identify driving risk in this paper.…”
Section: Introductionmentioning
confidence: 99%