Skip to main content

Modelling and Control on Urban Networks

Heuristic Fuzzy Approach to Traffic Flow Modelling and Control on Urban Networks


Computer-aided transport modelling is essential for testing different control strategies for traffic lights. One approach to modelling traffic control is by heuristically defining fuzzy rules for the control of traffic light systems and applying them to a network of hierarchically dependent crossroads. In this paper, such a network is investigated through modelling the geometry of the network in the simulation environment Aimsun.

This environment is based on real-world traffic data and is used in this paper with the MATLAB R2019a-Fuzzy toolbox. It focuses on the development of a network of intersections, as well as four fuzzy models and the behaviour of these models on the investigated intersections. The transport network consists of four intersections. The novelty of the proposed approach is in the application of heuristic fuzzy rules to the modelling and control of traffic flow through these intersections. The motivation behind the use of this approach is to address inherent uncertainties using a fuzzy method and analyse its main findings in relation to a classical deterministic approach.

Depending on the desired outcome, the fuzzy or the classical controller should be used. If the goal is to minimise total travel time and maximise the flow, the classical controller would be a better choice. However, if the delay in travel time per car unit is considered, the choice of preference should be the fuzzy controller with Fuzzy Controller 3 (three-valued logic for inputs and five-valued logic for outputs). Overall, Fuzzy Controllers 1 and 2 (two-valued logic for inputs) show the worst results compared with Fuzzy Controllers 3 and 4 (three-valued logic of inputs) and compared with the classical controller.

For this study, the benchmark was the classical controller. The goal of the research was to design a network of intersections represented as a hierarchical system of traffic light-regulated intersections managed by fuzzy controllers. These fuzzy controllers were designed and simulated separately in the hierarchical network according to traffic indicators such as flow, delay, travel time and total travel time. Overall, the fuzzy controllers lead to better results for the individual units of vehicles, while the classical controller leads to better results in terms of system-wide behaviour. 

The main contribution of this study is the development of a hierarchical transport network for an urban environment with interconnected junctions and the use of a traffic light control system for this network by using four different fuzzy controllers and one classical controller.
The main novelty of the study is that it examines, in a heuristic setting, the performance of the four different fuzzy controllers on the hierarchical system and compares them with a classical controller that is used as a benchmark.

The main relevance and significance of this study in relation to previous works is its systematic approach that guarantees the good capability of the associated expert based heuristics and makes it potentially useful for policy decisions in the chosen application area.

Future research will focus on the generalizability and scalability of the experiment so that larger or more complex urban networks can be simulated and tested with this method. It will also consider data-driven optimisation techniques for the fuzzy controllers in the context of scenarios that are different from the one investigated in this paper, as well as more robust statistical analysis of the data. It will also focus on a more advanced implementation of the current fairly basic heuristic fuzzy approach that will be complemented with an associated learning process based on machine learning techniques.

network security, computer networks, data communication, wireless networking, LAN, WAN, VPN, network topology, routing protocols, cybersecurity, firewall protection, cloud networking, IoT connectivity, network infrastructure, bandwidth management, network monitoring, server configuration, IP addressing, network performance, digital communication

#NetworkTechnology, #NetworkSecurity, #DataCommunication, #WirelessNetwork, #LAN, #WAN, #VPN, #Routing, #Cybersecurity, #CloudNetworking, #IoTNetwork, #NetworkInfrastructure, #FirewallProtection, #ServerSetup, #BandwidthControl, #NetworkMonitoring, #IPConfiguration, #DigitalConnectivity, #SmartNetwork, #TechNetwork

Comments

Popular posts from this blog

HealthAIoT: Revolutionizing Smart Healthcare! HealthAIoT combines Artificial Intelligence and the Internet of Things to transform healthcare through real-time monitoring, predictive analytics, and personalized treatment. It enables smarter diagnostics, remote patient care, and proactive health management, enhancing efficiency and outcomes while reducing costs. HealthAIoT is the future of connected, intelligent, and patient-centric healthcare systems. What is HealthAIoT? HealthAIoT is the convergence of Artificial Intelligence (AI) and the Internet of Things (IoT) in the healthcare industry. It integrates smart devices, sensors, and wearables with AI-powered software to monitor, diagnose, and manage health conditions in real-time. This fusion is enabling a new era of smart, connected, and intelligent healthcare systems . Key Components IoT Devices in Healthcare Wearables (e.g., smartwatches, fitness trackers) Medical devices (e.g., glucose monitors, heart rate sensors) Rem...
Detecting Co-Resident Attacks in 5G Clouds! Detecting co-resident attacks in 5G clouds involves identifying malicious activities where attackers share physical cloud resources with victims to steal data or disrupt services. Techniques like machine learning, behavioral analysis, and resource monitoring help detect unusual patterns, ensuring stronger security and privacy in 5G cloud environments. Detecting Co-Resident Attacks in 5G Clouds In a 5G cloud environment, many different users (including businesses and individuals) share the same physical infrastructure through virtualization technologies like Virtual Machines (VMs) and containers. Co-resident attacks occur when a malicious user manages to place their VM or container on the same physical server as a target. Once co-residency is achieved, attackers can exploit shared resources like CPU caches, memory buses, or network interfaces to gather sensitive information or launch denial-of-service (DoS) attacks. Why are Co-Resident Attack...

Network Architecture

An introduction to satellite network architecture Satellite networking is a digital revolution that connects people from across the world instantly -- from enabling real-time communications to making the world a safer place. A satellite is an artificial object put into the Earth's orbit to gather and distribute crucial data. Since the late 1950s, satellites have only transmitted and received data, as bent pipe satellites weren't able to perform other functions. In modern times, a group of satellites in the same orbit forms a satellite network. Satellite networks process data and provide accurate visual and textual information. Unlike terrestrial network infrastructure, satellite network scalability isn't limited by geography and cost. According to a March 2025 report from Goldman Sachs, the global satellite market is expected to hit $108 billion by 2035, growing sevenfold from its current valuation. Satellite networks consist of the following: The ground equipment. The sa...