Table of Contents Author Guidelines Submit a Manuscript
Journal of Advanced Transportation
Volume 2017 (2017), Article ID 9243039, 8 pages
https://doi.org/10.1155/2017/9243039
Research Article

A Trial-and-Error Method with Autonomous Vehicle-to-Infrastructure Traffic Counts for Cordon-Based Congestion Pricing

1Jiangsu Key Laboratory of Urban ITS, Jiangsu Province Collaborative Innovation Center of Modern Urban Traffic Technologies, School of Transportation, Southeast University, Jiangsu, China
2Department of Logistics & Maritime Studies, The Hong Kong Polytechnic University, Hung Hom, Hong Kong

Correspondence should be addressed to Zhibin Li; nc.ude.ues@nibihzil

Received 19 April 2017; Accepted 31 May 2017; Published 2 July 2017

Academic Editor: Xiaopeng Li

Copyright © 2017 Zhiyuan Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

This study proposes a practical trial-and-error method to solve the optimal toll design problem of cordon-based pricing, where only the traffic counts autonomously collected on the entry links of the pricing cordon are needed. With the fast development and adoption of vehicle-to-infrastructure (V2I) facilities, it is very convenient to autonomously collect these data. Two practical properties of the cordon-based pricing are further considered in this article: the toll charge on each entry of one pricing cordon is identical; the total inbound flow to one cordon should be restricted in order to maintain the traffic conditions within the cordon area. Then, the stochastic user equilibrium (SUE) with asymmetric link travel time functions is used to assess each feasible toll pattern. Based on a variational inequality (VI) model for the optimal toll pattern, this study proposes a theoretically convergent trial-and-error method for the addressed problem, where only traffic counts data are needed. Finally, the proposed method is verified based on a numerical network example.