Next Article in Journal
A Comprehensive Approach to Image Protection in Digital Environments
Next Article in Special Issue
Advanced Road Safety: Collective Perception for Probability of Collision Estimation of Connected Vehicles
Previous Article in Journal
Impact of the Implementation of ChatGPT in Education: A Systematic Review
Previous Article in Special Issue
Abstract Entity Patterns for Sensors and Actuators
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Cooperative Vehicles versus Non-Cooperative Traffic Light: Safe and Efficient Passing

1
School of Information Technology (ITE), Halmstad University, 301 18 Halmstad, Sweden
2
Rehabilitation Engineering and Design (Certec), Lund University, 221 00 Lund, Sweden
3
Institute of Applied Informatics and Formal Description Methods (AIFB), Karlsruhe Institute of Technology, 76131 Karlsruhe, Germany
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Computers 2023, 12(8), 154; https://doi.org/10.3390/computers12080154
Submission received: 21 June 2023 / Revised: 18 July 2023 / Accepted: 25 July 2023 / Published: 30 July 2023
(This article belongs to the Special Issue Cooperative Vehicular Networking 2023)

Abstract

:
Connected and automated vehicles (CAVs) will be a key component of future cooperative intelligent transportation systems (C-ITS). Since the adoption of C-ITS is not foreseen to happen instantly, not all of its elements are going to be connected at the early deployment stages. We consider a scenario where vehicles approaching a traffic light are connected to each other, but the traffic light itself is not cooperative. Information about indented trajectories such as decisions on how and when to accelerate, decelerate and stop, is communicated among the vehicles involved. We provide an optimization-based procedure for efficient and safe passing of traffic lights (or other temporary road blockage) using vehicle-to-vehicle communication (V2V). We locally optimize objectives that promote efficiency such as less deceleration and larger minimum velocity, while maintaining safety in terms of no collisions. The procedure is computationally efficient as it mainly involves a gradient decent algorithm for one single parameter.

1. Introduction

Current transportation systems are burdened with high accident numbers, long trip times and high CO 2 emissions due to congestion [1]. The recent advancement of vehicular technology and vehicular networks has enabled the development of cooperative intelligent transportation systems (C-ITSs), whose aim is to mend the issues of traditional systems using sensing, positioning and communication. Connected and automated vehicles (CAVs) are a key technology in future C-ITS as they are expected to eliminate the human error factor, which is the cause of 90 % of road accidents [2].
A CAV is either a driver-less vehicle or a vehicle with limited involvement of a driver that is connected to other vehicles and entities within the C-ITS. It is aware of its location and local topology of the road network. CAVs and respective road infrastructure are envisioned to use sensing, positioning and communication to collaboratively increase efficiency and safety in a wide range of traffic scenarios [3].
However, since the adoption of C-ITS is not foreseen to happen instantly, not all of its participants are going to be connected at the early deployment stages. In this paper, we consider a scenario, where vehicles approaching a traffic light (TL) are connected to each other, but the traffic light itself is not cooperative. More specifically, we address situations where a string of CAVs approach a TL and where the first vehicle in the string may stop due to a (sudden) red light. Even if the TL is cooperative and supports green light optimal speed advisory (GLOSA) or a similar function [4], the time-to-red information is normally not communicated for safety reasons (to avoid stimulating drivers to accelerate in order to catch up to the green phase). The only a priori knowledge required for our approach is the duration of the TL red phase (or an upper bound of it). Of course, if the TL can explicitly communicate the time-to-green information, our scheme will operate more efficiently.
To exchange the information within the string of vehicles, vehicle-to-vehicle (V2V) communication messages, such as a Decentralized Environmental Notification Message (DENM) [5] are sent between the vehicles. In terms of V2V radio technologies, two main examples are local-area-network-based 802.11p/ITS-G5 and broadband-cellular-based 5G NR [6,7]. The analysis in this paper is agnostic to the specific message formats and V2V communication technology.
For strings of platooning vehicles [8], common communication patterns include predecessor–follower, bidirectional, bidirectional leader and predecessor–follower–leader [9], where the last two imply direct communication with the first vehicle of the string/platoon. In this work, we assume a predecessor–follower V2V communication topology, where each vehicle communicates information to the follower. The first vehicle (i.e., the vehicle closest to the TL) is required to stop during the red phase while the rest of the vehicles in the string aim to optimize their trajectories to avoid coming to a complete stop if possible. The procedure is not based on feedback control such as cooperative adaptive cruise-control (CACC) [10] or more advanced methods such as model predictive control [11]. Instead, each vehicle uses the explicit trajectory of the vehicle in front to compute an optimal trajectory that is transmitted to its follower vehicle. The follower vehicle then computes its trajectory and passes it to its follower, and so on.
The trajectories have a compact description captured (besides initial conditions) by only four parameters specifying a first time interval of constant deceleration, a second time interval of constant velocity, and a time after which acceleration back to initial velocity occurs. The objective to be maximized is a convex combination of the constant deceleration (negative acceleration) during the first time interval and the constant velocity during the second time interval. The justification for this objective is that the magnitude of the constant deceleration shall be small and the magnitude of the constant velocity shall be large to reduce energy consumption and increase throughput. Safety is addressed by imposing additional constraints on no collisions for consecutive pairs of vehicles. The optimization routine reduces to a problem involving only one parameter, for which a gradient decent method is deployed for efficient local optimization.
Our contribution is as follows. For strings of vehicles, we propose an optimization-based V2V procedure for safe and efficient passing of TLs with the possibility of a full stop. The procedure is described by a simple algorithm involving explicit expressions, and is computationally efficient where the main computational complexity arises from a gradient-decent optimization procedure involving one single variable. Our approach is, besides computationally efficient, also robust in the sense that it accounts for V2V communication latices/delays.
The rest of the paper is organized as follows. Related work are discussed in Section 2, the studied scenario is described in Section 3, while Section 4 formalizes the problem and presents the main procedure. Section 5 discusses the results and Section 6 concludes the paper.

2. Related Work

Guaranteeing safe and energy-efficient trips for CAV use cases have been the topic of many works [12]. A significant portion of these works addressed the problem of safe maneuvering within and outside intersections where safe braking (including both slowing down and/or stopping) algorithms are crucial [13,14].
The multi-vehicle scenario of longitudinal driving [15] in a string formation, referred to as platooning [16,17], has been thoroughly investigated from a control-theoretic perspective in terms of concepts such as string stability [18], model predictive control (MPC) [11], and spacing policy [19,20].
Similar to human-driven vehicles, it is natural for a CAV to experience temporary braking and stopping for various reasons including, but not limited to, emergency braking [15,21,22,23], passing through signalized and nonsignalized intersections [24], stop-and-go waves [25] and pedestrian crossings.
In this work, we address the case of a string of CAVs passing a TL, which is not supposed to be cooperative, but a CAV is expected to be aware of its existence through the onboard sensors. The goal for the CAVs is to safely pass the TL in an optimal manner in terms of energy consumption and/or elapsed time.
In [26], the authors employ optimal control methods and information about the TL cycles such that the CAV can always reach the TL at a green phase, never needing to stop. Although the authors provide a real-time analytical solution, they consider the problem from the standpoint of a single vehicle passing the TL.
The authors of [27], on the other hand, propose a control algorithm for connected vehicles to cross traffic signals based on the driver’s preference. Whether the driver prefers to shorten the trip time or prefers to save energy affects the algorithm to either speed up to reach a green light or slow down. In spite of the interesting approach, the algorithm considers sparse traffic where preceding vehicles do not affect the way the target vehicle moves.
Existing works on CAVs assume, to a large extent, un-signalized roads, which will only be feasible if all vehicles on the road are autonomous. Until then, solutions for heterogeneous traffic include dedicated CAV lanes [28] where chains of CAVs will share the same infrastructure with human-driven vehicles, including signalized roads.
The aforementioned works consider a single vehicle crossing one or multiple traffic lights based on a known TL sequence. In addition, most of these works aim at crossing the TL during the green phase. Such green-light passing or crossing is not always possible due to external factors that may alter the sequence. Examples of such external factors include pedestrian crossings and emergency vehicle intervention [29].

3. Studied Scenario

As a step towards finding an efficient and safe way for CAVs to pass a TL, we restrict the class of trajectories for the vehicles to be of a specific (seemingly natural) form. We further frame our problem by considering two modes of operation. When the procedure starts, vehicles enter TL mode (TLM). Before that point in time (as well as after the procedure ends) the vehicles are in Normal mode. The start of the procedure is declared either by detecting a TL (non-cooperative TL) or receiving a message about a TL ahead (cooperative TL).
During TLM, each vehicle first decelerates at a constant rate (Phase 1), then drives with constant velocity (Phase 2), and then accelerates (Phase 3). As a special case, the first vehicle in the string is assumed to completely stop at the TL when the light is red (its constant velocity is zero during Phase 2).
We choose our objective as the maximization of a convex combination of deceleration during Phase 1 and minimum velocity during Phase 2. This covers the two extreme cases where braking should be as small as possible (i.e., minimization of braking or maximization of deceleration during Phase 1) and “loss” of kinetic energy should be as small as possible (i.e., maximization of minimum velocity in Phase 2), respectively. The main goal is to keep the successive vehicles’ trajectories as steady as possible. Note that the first vehicle is forced to necessarily stop, but for preceding vehicles this is not necessarily the case, which justifies the optimization procedure.
Safety is ensured by introducing additional explicit constraints. We do not optimize for total throughput of vehicles (at the TL). The reason is that such an objective would be cumbersome to optimize for in a distributed fashion. Instead, in our distributed approach, each vehicle solves an optimization problem with safety constraints that promotes high throughput. The computed locally optimal trajectory is then transmitted to the subsequent vehicle, which uses it to solve its optimization problem.

4. Methodology

The progression of this section is captured by Figure 1. We start by defining what safety means in this context. We continue by defining the trajectory constraints for a vehicle during TLM. Then, in Section 4.1, we first introduce the optimization objective in (2) and then the explicit trajectory constraints for subsequent vehicles in (3) and (4). We proceed to study the properties of the optimal solutions in Section 4.2. Then we show how the optimization problem can be reduced to a problem involving only one variable in Section 4.3. Then we find explicit expressions for the feasible region of the one-variable optimization problem in Section 4.4 and Section 4.5. Then we introduce the optimization procedure for the one-variable problem in Section 4.6. Finally the results are summarized in Algorithm 1 in Section 4.7.
We assume n vehicles V 1 , V 2 , , V n in a string formation (driving after each other on a road), where vehicle 1 or V 1 is the first vehicle that stops at the TL. This is shown in Figure 2. For each vehicle V i , the position (along the road) of the front of the vehicle is x i ( t ) . Furthermore, we let y i ( t ) be a position at some desired constant distance behind vehicle V i . If that constant distance is zero, this means that y i is the position of the rear end of vehicle V i . If the constant distance is larger than zero, this means that y i is a position behind the vehicle that is fixed in the coordinate frame of the vehicle. In the coordinate system of the TL, each vehicle i that has not passed the TL has negative coordinates x i and y i . As time progresses, the values of x i and y i increase and become positive as the vehicle passes the TL.
Definition 1. 
(Safety constraint). We define the system as safe when y i ( t ) x i + 1 ( t ) for t 0 for all i = 1 , 2 , , n 1 . This means the system is deemed safe if each successive vehicle i is able to maintain a distance of at least y i ( t ) away from its predecessor.
By choosing y i as a position strictly behind the vehicle allows for an additional safety margin. We assume that each vehicle i is described by the following dynamic model:
d d t ( x i ( t ) , v i ( t ) ) = d d t ( y i ( t ) , v i ( t ) ) = ( v i ( t ) , u i ( t ) ) ,
where v i ( t ) and u i ( t ) is the velocity and the acceleration of vehicle i, respectively.
Our aim is to develop a mechanism with which the string of vehicles may pass the TL efficiently while satisfying the safety conditions in Definition 1. Through a sequence of subsections, we provide the theory for such a mechanism, which is summarized as an algorithm in Section 4.7 at the end.
Formally, the TLM of V i is captured by Definition 2 further below (assuming without loss of generality that the time V i enters this mode is t = 0 ). Besides specifying vehicle dynamics in TLM, Definition 2 also includes the safety constraint in Definition 1. This means that V i first decelerates with constant deceleration a i , d e c until time t i , 1 , then moves with constant velocity until time t i , 2 , then accelerates with constant acceleration a i , a c c until time t i , 3 , and then, as it enters Normal mode again, moves with constant velocity. The constants a ¯ i , d e c , a ¯ i , a c c and v ¯ provide the upper bounds on deceleration, acceleration, and velocity, respectively.
The first vehicle, i.e., V 1 , might actually stop and stand still between the two given times t 1 , 1 and t 1 , 2 , where t 1 , 2 > t 1 , 1 . In such cases, it decelerates with constant deceleration a 1 , d e c between times 0 and t 1 , 1 and accelerates with a 1 , a c c between times t 1 , 2 and t 1 , 3 , after which it drives with constant velocity. Given these conditions, our objective is to render the trajectories of subsequent vehicles, i.e., for i > 1 , efficient.
Definition 2. 
(Trajectory constraints for Traffic light mode (TLM)).
u i ( t ) = a i , d e c f o r 0 t < t i , 1 , u i ( t ) = 0 f o r t i , 1 t < t i , 2 , u i ( t ) = a i , a c c f o r t i , 2 t < t i , 3 , u i ( t ) = 0 f o r t i , 3 t , a i , d e c a ¯ i , d e c , 0 a i , a c c a ¯ i , a c c , 0 v i ( t ) v ¯ f o r t 0 , d i ( t ) = y i ( t ) x i + 1 ( t ) 0 f o r t 0 . v i ( t i , 3 ) = v ¯ , 0 t i , 1 t i , 2 t i , 3 , x i ( t + ϵ ) x i ( t ) , v i ( t + ϵ ) v i ( t ) f o r a l l t 0 a n d ϵ > 0 .

4.1. Distributed Optimization Problem

We propose a distributed approach using a predecessor-follower V2V communication topology. Each vehicle j selects its parameters based on those received from its predecessor vehicle i = j 1 . More specifically, the parameters a i , d e c , a i , a c c , t i , 1 , t i , 2 and v i ( 0 ) are communicated from V i to V j and used to solve an optimization problem for the three parameters a j , d e c , t j , 1 and t j , 2 . In this optimization problem, we use an additional parameter τ j , which captures communication as well as computational delays.
For V j , the objective f to be minimized subject to the constraints in Definition 2 is given by
f ( a j , d e c , t j , 1 ) = α a j , d e c + ( 1 α ) t j , 1 a j , d e c ,
where 0 α 1 . The objective (2) is a convex combination of the deceleration magnitude during Phase 1 and an expression equivalent to the velocity (up to a constant) during Phase 2. The velocity during Phase 2 is equal to v j ( 0 ) t j , 1 a j , d e c . Maximization of this entity is equivalent to minimization of t j , 1 a j , d e c . The main goal is to keep the trajectory of the vehicles as steady as possible by minimizing the overall changes in both acceleration and the traveling velocity. Doing so will essentially ensure that the time each successive vehicle comes to a full stop will be as short as possible while the overall system remains safe. Intuitively it promotes high throughput of vehicles at the TL.
We solve for the dynamical system (1) in TLM without loss of generality assuming the start time is 0 where we use the constraints in Definition 2, and obtain the “Trajectory for vehicle V i ” shown below in (3). We further assume that V j enters TLM at time τ j > 0 . The instruction to enter TLM (with parameters) is sent with some latency or delay. On top of this delay comes additional computational delay. All such delays are captured by τ j . This τ j is the maximum difference between the time when V i enters TLM and the time when vehicle V j enters TLM. If vehicle V j enters TLM before τ j time has passed everything is safe and trajectories are feasible. However, this cannot be guaranteed if V j enters TLM after τ j time has passed. The choice of the τ j parameters should reflect communication quality and computational capacity. Increasing τ j results in worse performance with respect to objective (2) since a smaller time interval is left for trajectory planning.
With this delay τ j , we define the constraints for the trajectory until the time t j , 2 for vehicle V j , referred to as “Trajectory of vehicle V j ” below (see (4)). Note again that in this context i is short hand notation for j 1 , i.e., V i is vehicle V j 1 .
Trajectory for vehicle V i :
y i ( t ) = d i ( 0 ) + v i ( 0 ) t a i , d e c t 2 2 f o r 0 t t i , 1 , v i ( t ) = v i ( 0 ) a i , d e c t for 0 t t i , 1 , y i ( t ) = d i ( 0 ) + v i ( 0 ) t i , 1 a i , d e c t i , 1 2 2 + ( v i ( 0 ) a i , d e c t i , 1 ) ( t t i , 1 ) for t i , 1 t t i , 2 , v i ( t ) = v i ( 0 ) a i , d e c t i , 1 for t i , 1 t t i , 2 , y i ( t ) = d i ( 0 ) + v i ( 0 ) t i , 1 a i , d e c t i , 1 2 2 + ( v i ( 0 ) a i , d e c t i , 1 ) ( t t i , 1 ) + a i , a c c ( t t i , 2 ) 2 2 for t i , 2 t , v i ( t ) = v i ( 0 ) a i , d e c t i , 1 + a i , a c c ( t t i , 2 ) for t i , 2 t .
Trajectory for vehicle V j :
x j ( t ) = v j ( 0 ) t for 0 t τ j , v j ( t ) = v j ( 0 ) for 0 t τ j , x j ( t ) = v j ( 0 ) t a j , d e c ( t τ j ) 2 2 for τ j t τ j + t j , 1 , v j ( t ) = v j ( 0 ) a j , d e c ( t τ j ) for τ j t τ j + t j , 1 , x j ( t ) = v j ( 0 ) ( τ j + t j , 1 ) a j , d e c t j , 1 2 2 + ( v j ( 0 ) a j , d e c t j , 1 ) ( t τ j t j , 1 ) , τ j + t j , 1 t τ j + t j , 2 , v j ( t ) = v j ( 0 ) a j , d e c t j , 1 for τ j + t j , 1 t τ j + t j , 2 .

4.2. Properties for the Optimal Solutions

Proposition 1. 
There are three cases for the optimal solution to (2) with 0 < α < 1 subject to the constraints in Definition 2.
1.
The optimal solution does not exist and no other solution exists, as there is no solution that satisfies the safety constraints in Definition 1. The problem is ill-posed.
2.
The optimal solution is to choose a j , d e c = 0 .
3.
For the optimal solution it holds that
y i ( τ j + t j , 2 ) = x j ( τ j + t j , 2 )
v i ( τ j + t j , 2 ) = v j ( τ j + t j , 2 ) t i , 2 τ j + t j , 2 t i , 3 .
Proof. 
 
In the following, to simplify notation, we treat the parameters as dimensionless.
(1) Consider, for example, d i ( 0 ) = 10 , τ j = t i , 1 = 4 , t = 2 , v i ( 0 ) = a i , d e c = 1 , and v j ( 0 ) = 10 . We have that x j ( t ) = 20 > 10 = y i ( t ) .
(2) An example is when: d i ( 0 ) = 100 , v i ( 0 ) = 30 , a i , d e c = 14 , t i , 1 = 2 , t i , 2 = 5 , a i , a c c = 5 , v j ( 0 ) = 20 . Optimal solutions are obtained by setting a j , d e c = 0 . This is illustrated in Figure 3.
(3) Now we assume assume the trajectory is feasible and further assume that that t j , 1 > 0 and a j , d e c > 0 (otherwise we would end up in a case equivalent to case (2) above). Assuming (5) and (6) do not hold for an optimal solution x j , we show that this assumption leads to a contradiction. Since the trajectory x j depends continuously on its parameters, we may decrease t j , 1 slightly and obtain a new feasible solution with smaller objective value. See Figure 4, where the claimed optimal solution, yellow, is improved to a better solution, green.
Figure 3. The trajectory with a j , d e c = 0 , green, and feasible trajectories with a j , d e c > 0 , yellow, are below the trajectory of V i , blue, for all times. □
Figure 3. The trajectory with a j , d e c = 0 , green, and feasible trajectories with a j , d e c > 0 , yellow, are below the trajectory of V i , blue, for all times. □
Computers 12 00154 g003
Figure 4. The trajectory of V j for a feasible t j 1 in green performs better than another feasible trajectory with a t j 1 greater by a small value ϵ in yellow.
Figure 4. The trajectory of V j for a feasible t j 1 in green performs better than another feasible trajectory with a t j 1 greater by a small value ϵ in yellow.
Computers 12 00154 g004
Proposition 2. 
Let ( x j , v j ) be an optimal solution for vehicle V j to (2) with 0 < α < 1 subject to the constraints in Definition 2. The trajectory ( x j , v j ) is described by the parameters ( τ j , a j , d e c , t j , 1 , t j , 2 ) where τ j > 0 . Suppose 0 τ ˜ j τ j and suppose ( x ˜ j , v ˜ j ) is an alternative solution described by the parameters ( τ ˜ j , a j , d e c , t j , 1 , t j , 2 ) , x ˜ j ( 0 ) = x ( 0 ) and v ˜ j ( 0 ) = v j ( 0 ) . All that differs between the trajectories is that the alternative solution has a smaller time-delay.
It holds that x ˜ j ( t ) x j ( t ) for t 0 .
Proof. 
For notational convenience, when comparing the two trajectories, we may think of the alternative trajectory as belonging to an alternative virtual vehicle V ˜ j . Thus, we will henceforth refer to the trajectory of V j and that of V ˜ j in the comparison.
Let δ = τ j τ ˜ j 0 . It holds that
x ˜ j ( t ) = x j ( t ) if t τ ˜ j . x ˜ j ( t ) = x j ( t + δ ) v j ( 0 ) δ if t τ ˜ j .
We can show this by checking the solution for each time interval in (4). During the first time interval [ 0 , τ ˜ j ] , neither of the vehicles V j and V ˜ j has started the braking process. Thus, the trajectories are identical.
We proceed with the time interval [ τ ˜ j , τ ˜ j + t j , 1 ] i.e., when V ˜ j is braking.
x j ( t + δ ) = v j ( 0 ) ( t + δ ) a j , d e c ( t + δ τ j ) 2 2 . x j ( t + δ ) v j ( 0 ) δ = v j ( 0 ) t a j , d e c ( t τ ˜ j ) 2 2 . x j ( t + δ ) v j ( 0 ) δ = x ˜ j ( t ) .
We see that equality holds.
We proceed with the time interval [ τ ˜ j + t j , 1 , τ ˜ j + t j , 2 ] , i.e., when V ˜ j has finished the breaking maneuver and drives with constant velocity.
x j ( t + δ ) = v j ( 0 ) ( τ j + t j , 1 ) a j , d e c t j , 1 2 2 + ( v j ( 0 ) a j , d e c t j , 1 ) ( t + δ τ j t j , 1 ) = v j ( 0 ) ( t + δ ) a j , d e c t j , 1 2 2 + a j , d e c t j , 1 ( t τ ˜ j t j , 1 ) , x j ( t + δ ) v j ( 0 ) δ = v j ( 0 ) t a j , d e c t j , 1 2 2 + a j , d e c t j , 1 ( t τ ˜ j t j , 1 ) . x j ( t + δ ) v j ( 0 ) δ = x ˜ j ( t ) .
Again, equality holds. Now, it also holds that x j ( t ) x j ( t + δ ) v j ( 0 ) δ (since v j ( 0 ) is upper bounding the velocity of vehicle V j ). Thus it follows that
x ˜ j ( t ) x j ( t ) t 0 .

4.3. Reduction to a Problem Involving Only t j , 2

We now leverage the results in Section 4.2 in order to address the optimization problem in Section 4.1. The main focus will be on solutions of type 3) in Proposition 1. From such analysis, we also provide conditions for identification of cases (1) and (2) in Proposition 1. In the optimization problem, there are three free parameters or variables: ( a j , d e c , t j , 1 , t j , 2 ) . However, Proposition 1 case (3) provides constraints that allow reduction to only one variable. For this case we say that the trajectories “touch”. From a derivations perspective, the most suitable choice is to reduce the problem into one that only involves the variable t j , 2 . Once the problem has been reduced to a one-dimensional problem, an efficient local optimization procedure is used to solve it.
By using (4), we may express the constraints in Proposition 1, (3) as follows:
d i ( 0 ) + v i ( 0 ) t i , 1 a i , d e c t i , 1 2 2 + ( v i ( 0 ) a i , d e c t i , 1 ) ( t j , 2 + τ j t i , 1 ) + a i , a c c ( t j , 2 + τ j t i , 2 ) 2 2 = v j ( 0 ) ( τ j + t j , 1 ) a j , d e c t j , 1 2 2 + ( v j ( 0 ) a j , d e c t j , 1 ) ( t j , 2 t j , 1 ) ,
v i ( 0 ) a i , d e c t i , 1 + a i , a c c ( t j , 2 + τ j t i , 2 ) = v j ( 0 ) a j , d e c t j , 1 .
From these two equations, we obtain the expressions for a j , d e c and t j , 1 expressed as functions of t j , 2 .
a j , d e c = ( a i , d e c t i , 1 a i , a c c ( τ j t i , 2 + t j , 2 ) v i ( 0 ) + v j ( 0 ) ) 2 / ( 2 d i ( 0 ) 2 a i , d e c τ j t i , 1 + a i , d e c t i , 1 2 + a i , a c c ( τ j 2 2 τ j t i , 2 + t i , 2 2 t j , 2 2 ) + 2 τ j v i ( 0 ) 2 τ j v j ( 0 ) ) ,
t j , 1 = ( 2 d i ( 0 ) 2 a i , d e c τ j t i , 1 + a i , d e c t i , 1 2 + a i , a c c ( τ j 2 2 τ j t i , 2 + t i , 2 2 t j , 2 2 ) + 2 τ j v i ( 0 ) 2 τ j v j ( 0 ) ) / ( a i , d e c t i , 1 a i , a c c ( τ j t i , 2 + t j , 2 ) v i ( 0 ) + v j ( 0 ) ) ,
Furthermore, the term a j , d e c t j , 1 , which appears in the expression for f in (2), is expressed in terms of t j , 2 as
a j , d e c t j , 1 = a i , d e c t i , 1 a i , a c c ( τ j t i , 2 + t j , 2 ) v i ( 0 ) + v j ( 0 ) .

4.4. Feasible Region for t j , 2

In Section 4.3, we reduced the dimension of the optimization problem in Section 4.1 to a problem involving only the variable t j , 2 .
However, an important piece that is missing is how the constraints in Definition 2 translate to this one-dimensional representation of the optimization problem. We address this by using the expressions in Equations (9) and (10) in the constraints of Definition 2. The constraints from Definition 2 will be enumerated according to the order they are addressed below.
For each constraint k, we we obtain a lower or upper bound t k * for the feasible region of the time interval where t j , 2 resides in the optimization problem. After all the t k * ’s are computed, the feasible region is obtained by computing the maximum of the lower bounds and the minimum of the upper bounds among the t k * ’s.
Constraint 1: t j , 1 0 .
t j , 2 t 1 * = ( 1 a i , a c c ( 2 d i ( 0 ) 2 a i , d e c τ j t i , 1 + a i , d e c t i , 1 2 + a i , a c c ( τ j t i , 2 ) 2 + 2 τ j v i ( 0 ) 2 τ j v j ( 0 ) ) .
Constraint 2: a j , d e c 0 .
t j , 2 t 2 * = a i , a c c τ j + a i , d e c t i , 1 + a i . a c c t i , 2 v i ( 0 ) + v j ( 0 ) a i , a c c .
Constraint 3: t j , 2 t j , 1 .
t j , 2 t 3 * = ( ( 2 d i ( 0 ) 2 a i , d e c τ j t i , 1 + a i , d e c t i , 1 2 + a i , a c c ( τ j t i , 2 ) 2 + 2 τ j ( v i ( 0 ) v j ( 0 ) ) / ( a i , d e c t i , 1 + a i , a c c ( t i , 2 τ j ) v i ( 0 ) + v j ( 0 ) ) .
Constraint 4: t j , 2 + τ j t i , 2 .
t j , 2 t 4 * = t i , 2 τ j .
Constraint 5: a j , d e c a ¯ j , d e c .
t j , 2 t 5 , 1 * = τ j + t i , 2 + a ¯ j , d e c ( τ j t i , 2 ) + A a i , a c c + a ¯ j , d e c 1 a i , a c c ( a i , a c c + a ¯ j , d e c ) D .
t j , 2 t 5 , 2 * = τ j + t i , 2 + a ¯ j , d e c ( τ j t i , 2 ) + A a i , a c c + a ¯ j , d e c + + 1 a i , a c c ( a i , a c c + a ¯ j , d e c ) D .
where A = a i , d e c t i , 1 ( v i ( 0 ) v j ( 0 ) ) , D = a i , a c c 2 ( A + a ¯ j , d e c ( τ j t i , 2 ) ) 2 ) + a i , a c c ( a i , a c c + a ¯ j , d e c ) ( a ¯ j , d e c ( 2 d i ( 0 ) + a i , d e c t i , 1 2 2 τ j A ) + A 2 ) .
Constraint 6: no crossing at the first segment. Besides the Constraints 1–5 above, we need to additionally ensure that x j ( t ) y i ( t ) during the time interval [ 0 , t i , 1 ] . If indeed x j ( t ) y i ( t ) during the time interval [ 0 , t i , 1 ] , it holds that the trajectory is feasible for all later points in time. A sufficient (however not necessary) condition is that a j , d e c a i , d e c which yields
t j , 2 t 6 * = 1 a i , a c c ( a i , a c c + a i , d e c ) ( a i , a c c 2 τ j + a i , a c c a i , d e c t i , 1 + a i , a c c 2 t i , 2 a i , a c c v i ( 0 ) + ( a i , a c c a i , d e c ( 2 a i , d e c 2 τ j t i , 1 + 2 a i , d e c ( d i ( 0 ) + ( τ j + t i , 1 ) ( v i ( 0 ) v j ( 0 ) ) ) + a i , a c c ( 2 d i ( 0 ) + a i , d e c ( τ j 2 + ( t i , 1 t i , 2 ) 2 2 τ j t i , 2 ) + 2 t i , 2 ( v i ( 0 ) v j ( 0 ) ) ) ( v i ( 0 ) v j ( 0 ) ) 2 ) ) + a i , a c c v j ( 0 ) ) .

4.5. Feasible Region for d i ( 0 )

The procedure of choosing t j , 2 should be applied only if d i ( 0 ) < d i * where
d i * = ( v j ( 0 ) v i ( 0 ) ) t i , 2 a i , d e c 2 t i , 1 2 + + a i , d e c t i , 1 t i , 2 + 1 2 a i , a c c ( v j ( 0 ) v i ( 0 ) + a i , d e c t i , 1 ) 2
The distance d i * corresponds to the case when the trajectories touch even without a decelerating phase of the j-th vehicle. In other words, moving with initial constant velocity v j ( 0 ) , the follower vehicle V j touches the preceding vehicle, and then the inter-vehicle distance (IVD) d increases again. If the distance is larger than d i * , the adjustment of the velocity v j is not needed since the trajectories do not come to touch even in the worst case, i.e., when the j-th vehicle does not decelerate. The bound in (18) was received from Equations (7) and (8) under the assumption a j , d e c t j , 1 = 0 .

4.6. Optimization Procedure

Our objective is now to solve the following optimization problem:
min t j , 2 f ( t j , 2 ) = α a j , d e c + ( 1 α ) a j , d e c t j , 1 ,
(for some α between 0 and 1) over the interval [ t l o , t h i ] , where t l o = max { t 3 * , t 4 * , t 5 , 1 * } and t h i = min { t 1 * , t 2 * , t 5 , 2 * , t 6 * } . As previously mentioned, we want to minimize a convex combination of the deceleration and speed. By taking into account both the value and the rate of change of the velocity, we ensure each vehicle’s trajectory remains as close to its original path as possible.
One way to find the optimal t j , 2 value is to differentiate the cost function with respect to t j , 2 (after substituting the expressions of a j , d e c and a j , d e c t j , 1 from Section 4.3) and solve for t j , 2 . Thus, we resort to the gradient descent method which renders convergence to a local optimal solution quickly. Convergence is assumed when the difference in objective values for consecutive iterations has reach an ε -threshold. At each iteration, the value of t j , 2 is expressed as follows:
t j , 2 k + 1 = t j , 2 k γ f ( t j , 2 k )
where k is the iteration, γ is the learning rate and f ( t j , 2 k ) is the derivative of the cost function f, respectively.
Substituting the expressions of a j , d e c and a j , d e c t j , 1 from Section 4.3 into (19) above yields
f ( t j , 2 ) = ( α ( a i , d e c t i , 1 a i , a c c ( t i , 2 + τ j + t j , 2 ) + v j ( 0 ) v i ( 0 ) ) 2 ) / ( a i , d e c t i , 1 2 2 a i , d e c t i , 1 τ j + a i , a c c ( t i , 2 2 2 t i , 2 τ j + τ j 2 t j , 2 2 ) + 2 d i ( 0 ) 2 τ j v j ( 0 ) + 2 τ j v i ( 0 ) ) + ( 1 α ) ( a i , d e c t i , 1 a i , a c c ( t i , 2 + τ j + t j , 2 ) + v j ( 0 ) v i ( 0 ) ) .
We differentiate f ( t j , 2 ) above and obtain
f ( t j , 2 ) = a i , a c c ( ( 2 α t j , 2 ( a i , d e c t i , 1 a i , a c c ( t i , 2 + τ j + t j , 2 ) + v j ( 0 ) v i ( 0 ) ) 2 ) / ( a i , d e c t i , 1 2 2 a i , d e c t i , 1 τ j + a i , a c c ( t i , 2 2 2 t i , 2 τ j + τ j 2 t j , 2 2 ) + 2 d i ( 0 ) 2 τ j v j ( 0 ) + 2 τ j v i ( 0 ) ) 2 ( 2 α ( a i , d e c t i , 1 a i , a c c ( t i , 2 + τ j + t j , 2 ) + v j ( 0 ) v i ( 0 ) ) ) / ( a i , d e c t i , 1 2 2 a i , d e c t i , 1 τ j + a i , a c c ( t i , 2 2 2 t i , 2 τ j + τ j 2 t j , 2 2 ) + 2 d i ( 0 ) 2 τ j v j ( 0 ) + 2 τ j v i ( 0 ) ) + α 1 ) .

4.7. Algorithm for Each Vehicle V j

Here we summarize our proposed procedure as an algorithm (see Algorithm 1 below) for each vehicle V j (for j > 1 ) in the string of vehicles. Below we write j 1 (instead of i as before) as the index for the vehicle that preceeds vehicle j. Upon receiving a message from vehicle V j 1 , vehicle V j employs the algorithm below to calculate the necessary deceleration time and amplitude. The message received from V j 1 is assumed to contain the values of the following parameters: v j 1 ( 0 ) , a j 1 , d e c , t j 1 , 1 , a j 1 , a c c , t j 1 , 2 as well as a time stamp for the time the message was sent. By using the the time stamp, the time delay τ j is calculated/chosen. The vehicle V j then computes its intended trajectory and sends the parameters of the trajectory to vehicle V j + 1 .
Algorithm 1 Distributed V2V-based traffic lights passing
  • Input: V2V message containing v j 1 ( 0 ) , a j 1 , d e c , t j 1 , 1 , a j 1 , a c c , t j 1 , 2 and time stamp.
  • Output: V2V message containing v j ( 0 ) , a j , d e c , t j , 1 , a j , a c c , t j , 2 and time stamp.
  • if  d j 1 ( 0 ) d j 1 * then                                                                                              ▹ see (18)
  •  Continue driving with constant speed. 
  •      a j , d e c 0 , t j , 1 0 , a j , a c c 0 , t j , 2 0 .
  • else
  •     Compute t 1 * , t 2 * , t 3 * , t 4 * , t 5 , 1 * , t 5 , 2 * and t 6 * using expressions (11)–(17).
  •     Compute [ t l o , t h i ] , where t l o = max { t 3 * , t 4 * , t 5 , 1 * } and t h i = min { t 1 * , t 2 * , t 5 , 2 * , t 6 * } .
  •     Run the gradient descent algorithm
  •     for objective (19) in Section II-G
  •      k 0 .
  •     Initialize t j , 2 0                                                          ▹ e.g., mid-point on interval [ t l o , t h i ]
  •     repeat
  •          t j , 2 k + 1 t j , 2 k γ f ( t j , 2 k ) .
  •          k k + 1 .
  •     until  | f ( t j , k k + 1 ) f ( t j , k k ) | < ε or t j , 2 k + 1 [ t l o , t h i ]
  •      t j , 2 t j , 2 k 1 .
  •     Calculate a j , d e c and t j , 1 using the expressions (9) and (10) in Section III-D. Any choice of a j , a c c smaller or equal to a j 1 , a c c is feasible (or safe).
  • end if

5. Simulations

Algorithm 1 in Section 4.7 has been validated through MATLAB simulations as follows. We assume that vehicles enter a one lane road at a rate of 1200 vehicles per hour (i.e., a vehicle enters every 3 s). Each vehicle has a speed of 108 km / h . Without loss of generality, the first vehicle, denoted as V 1 , is assumed to enter at time t = 0 . The vehicle V 1 drives for t 1 , 0 seconds and then starts slowing down with a deceleration magnitude a 1 , d e c until coming to a full stop at time t 1 , 1 . V 1 stops for a known period T (related to the duration of the TL red phase) and then starts accelerating at time t 1 , 2 with acceleration a 1 , a c c until it reaches its initial speed at time t 1 , 3 . Now, for any vehicle V i , when it starts decelerating it sends a message, via V2V communication, to the vehicle behind it. This message includes information about its planned trajectory. V i + 1 then uses the proposed algorithm to calculate its trajectory and acceleration values, which are sent to vehicle V j + 2 and so on. In the experiments, we assume that V 1 starts slowing down after t = 10 s with a 1 , d e c = 12 m/s 2 and stops for a period of T = 10 s . Communication between vehicles is assumed to be 99.9 % reliable with a delay of 0.005 s for a single packet to travel from a vehicle to subsequent one.
Figure 5 shows that using the proposed algorithm, vehicles can slow down and accelerate again safely. It is worth noting here that the touch point between consecutive vehicles occurs sequentially such that, for example, the first and second vehicles, denoted by V 1 , V 2 , touch at around t = 23.6 s while the second vehicle and the third one, V 3 , touch at around t = 24.8 s . This shows that the algorithm can scale well to situations where the idle duration of the first vehicle is longer.
Figure 6, on the other hand, shows the evolution of the vehicles’ velocities over time, starting from the moment the first vehicle starts decelerating. It can be observed that while the first vehicle decelerates to a velocity of 0 m / s , the rest of the vehicles decelerate and then move with a constant velocity before accelerating again. It is also depicted in the figure that vehicle V 10 keeps driving with the same speed and does not need to use the proposed optimization procedure.

6. Conclusions and Discussion

The present paper proposes a distributed optimization procedure for safe and efficient passing of traffic lights for strings of vehicles. The procedure relies on predecessor–follower vehicle-to-vehicle (V2V) communication over the string of vehicles and is applicable to situations where the first vehicle (in the string) may (or may not) stop at the traffic light.
Each vehicle receives, via communication, a compact representation of the trajectory of its predecessor, which is used to compute a locally optimal solution for its own trajectory. The objective is to maximize a convex combination of minimum deceleration and minimum velocity, which promotes high energy efficiency and throughput. This is achieved, while ensuring safety in terms of no rear-end collisions. The computed trajectory is then subsequently passed on to the next (follower) vehicle.
The method is computationally efficient. Besides analytical expressions with constant computational time, the main computational complexity arises from a gradient descent procedure involving only one variable.
In terms of limitations, the proposed framework assumes vehicular dynamical models that are simple and explicitly solvable, excluding realistic nonlinear components. However, the proposed solutions still have potential to be used as worst-case solutions that bound the actual ones. The gap, in terms of performance, between the proposed solutions and the trajectories obtained for nonlinear vehicular dynamic models comprises an interesting future line of research to pursue.
An additional limitation is that the proposed method assumes trajectory-following without additional feedback. In essence, each vehicle computes a trajectory based on that communicated from the predecessor and is assumed to follow that trajectory during the passing of the traffic light. As a future extension to this procedure, one may consider re-computing and re-transmission of trajectories. Low computational complexity would allow for such a procedure in practice.
Lastly, in the presentation of the main procedure, it is assumed the velocities of involved vehicles are all constant and equal before entering traffic light mode where the algorithm is deployed. This is, however, not a necessary condition and may be relaxed to any type of initial velocity.
All-in-all, this new computationally efficient procedure provides a new perspective on cooperative vehicular coordination, which we believe would be of interest to the community.

Author Contributions

Conceptualization, J.T. and T.S.; Formal analysis, J.T. and G.S.; Funding acquisition, A.V.; Investigation, T.S. and F.V.; Methodology, J.T. and T.S.; Project administration, A.V.; Resources, T.S.; Software, T.S.; Supervision, J.T. and A.V.; Validation, T.S.; Visualization, T.S.; Writing—original draft, J.T., T.S., F.V. and A.V.; Writing—review and editing, J.T., F.V. and A.V. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Swedish Knowledge Foundation (KKS) “Safety of Connected Intelligent Vehicles in Smart Cities—SafeSmart” project (2019–2024), the ELLIIT Strategic Research Network and the Helmholtz Program “Engineering Digital Futures”.

Data Availability Statement

All data were presented in the main text.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Kopelias, P.; Demiridi, E.; Vogiatzis, K.; Skabardonis, A.; Zafiropoulou, V. Connected & autonomous vehicles—Environmental impacts—A review. Sci. Total Environ. 2020, 712, 135237. [Google Scholar] [CrossRef]
  2. Ye, L.; Yamamoto, T. Evaluating the impact of connected and autonomous vehicles on traffic safety. Phys. A Stat. Mech. Its Appl. 2019, 526, 121009. [Google Scholar] [CrossRef]
  3. Guo, G.; Zhao, Z.; Zhang, R. Distributed Trajectory Optimization and Fixed-Time Tracking Control of a Group of Connected Vehicles. IEEE Trans. Veh. Technol. 2023, 72, 1478–1487. [Google Scholar] [CrossRef]
  4. Bhattacharyya, K.; Laharotte, P.-A.; Burianne, A.; Faouzi, N.-E.E. Assessing Connected Vehicle’s Response to Green Light Optimal Speed Advisory From Field Operational Test and Scaling Up. IEEE Trans. Intell. Transp. Syst. 2022, 24, 6725–6736. [Google Scholar] [CrossRef]
  5. Vinel, A.; Koucheryavy, Y. On the delay lower bound for the emergency message dissemination in vehicular ad-hoc networks. In Proceedings of the 2009 IEEE 34th Conference on Local Computer Networks, Zurich, Switzerland, 20–23 October 2009; pp. 652–654. [Google Scholar] [CrossRef]
  6. Campolo, C.; Molinaro, A.; Berthet, A.O.; Vinel, A. On Latency and Reliability of Road Hazard Warnings over the Cellular V2X Sidelink Interface. IEEE Commun. Lett. 2019, 23, 2135–2138. [Google Scholar] [CrossRef]
  7. Naik, G.; Choudhury, B.; Park, J.-M. IEEE 802.11bd & 5G NR V2X: Evolution of Radio Access Technologies for V2X Communications. IEEE Access 2019, 7, 70169–70184. [Google Scholar] [CrossRef]
  8. Guo, G.; Li, P.; Hao, L.-Y. A New Quadratic Spacing Policy and Adaptive Fault-Tolerant Platooning with Actuator Saturation. IEEE Trans. Intell. Transp. Syst. 2022, 23, 1200–1212. [Google Scholar] [CrossRef]
  9. Prayitno, A.; Nilkhamhang, I. V2V Network Topologies for Vehicle Platoons with Cooperative State Variable Feedback Control. In Proceedings of the 2021 Second International Symposium on Instrumentation, Control, Artificial Intelligence, and Robotics (ICA-SYMP), Bangkok, Thailand, 18–20 January 2021; pp. 1–4. [Google Scholar] [CrossRef]
  10. Yu, W.; Hua, X.; Wang, W. Investigating the Longitudinal Impact of Cooperative Adaptive Cruise Control Vehicle Degradation Under Communication Interruption. IEEE Intell. Transp. Syst. Mag. 2022, 14, 183–201. [Google Scholar] [CrossRef]
  11. Thormann, S.; Schirrer, A.; Jakubek, S. Safe and Efficient Cooperative Platooning. IEEE Trans. Intell. Transp. Syst. 2022, 23, 1368–1380. [Google Scholar] [CrossRef]
  12. Sun, X.; Yu, F.R.; Zhang, P. A Survey on Cyber-Security of Connected and Autonomous Vehicles (CAVs). IEEE Trans. Intell. Transp. Syst. 2022, 23, 6240–6259. [Google Scholar] [CrossRef]
  13. Sander, U.; Lubbe, N.; Pietzsch, S. Intersection AEB implementation strategies for left turn across path crashes. Traffic Inj. Prev. 2019, 20 (Suppl. S1), S119–S125. [Google Scholar] [CrossRef] [Green Version]
  14. Elliott, D.; Keen, W.; Miao, L. Recent advances in connected and automated vehicles. J. Traffic Transp. Eng. 2019, 6, 109–131. [Google Scholar] [CrossRef]
  15. Sidorenko, G.; Fedorov, A.; Thunberg, J.; Vinel, A. Towards a Complete Safety Framework for Longitudinal Driving. IEEE Trans. Intell. Veh. 2022, 7, 809–814. [Google Scholar] [CrossRef]
  16. Guo, G.; Wang, Q. Fuel-Efficient En Route Speed Planning and Tracking Control of Truck Platoons. IEEE Trans. Intell. Transp. Syst. 2019, 20, 3091–3103. [Google Scholar] [CrossRef]
  17. Guo, G.; Li, P.; Hao, L.-Y. Adaptive Fault-Tolerant Control of Platoons with Guaranteed Traffic Flow Stability. IEEE Trans. Veh. Technol. 2020, 69, 6916–6927. [Google Scholar] [CrossRef]
  18. Feng, S.; Zhang, Y.; Li, S.E.; Cao, Z.; Liu, H.X.; Li, L. String stability for vehicular platoon control: Definitions and analysis methods. Annu. Rev. Control 2019, 47, 81–97. [Google Scholar] [CrossRef]
  19. Chien, C.C.; Ioannou, P. Automatic Vehicle-Following. In Proceedings of the 1992 American Control Conference, Chicago, IL, USA, 24–26 June 1992; pp. 1748–1752. [Google Scholar] [CrossRef]
  20. Sungu, H.E.; Inoue, M.; Imura, J.-I. Nonlinear spacing policy based vehicle platoon control for local string stability and global traffic flow stability. In Proceedings of the 2015 European Control Conference (ECC), Linz, Austria, 15–17 July 2015; pp. 3396–3401. [Google Scholar] [CrossRef]
  21. Koopman, P.; Osyk, B.; Weast, J. Autonomous Vehicles Meet the Physical World: RSS, Variability, Uncertainty, and Proving Safety. In Computer Safety, Reliability, and Security, Proceedings of the SAFECOMP 2019, Turku, Finland, 11–13 September 2019; Romanovsky, A., Troubitsyna, E., Bitsch, F., Eds.; Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2019; Volume 11698. [Google Scholar] [CrossRef]
  22. Vinel, A.; Lyamin, N.; Isachenkov, P. Modeling of V2V Communications for C-ITS Safety Applications: A CPS Perspective. IEEE Commun. Lett. 2018, 22, 1600–1603. [Google Scholar] [CrossRef]
  23. Fu, Y.; Li, C.; Yu, F.R.; Luan, T.H.; Zhang, Y. A Decision-Making Strategy for Vehicle Autonomous Braking in Emergency via Deep Reinforcement Learning. IEEE Trans. Veh. Technol. 2020, 69, 5876–5888. [Google Scholar] [CrossRef]
  24. Meng, Y.; Li, L.; Wang, F.-Y.; Li, K.; Li, Z. Analysis of Cooperative Driving Strategies for Nonsignalized Intersections. IEEE Trans. Veh. Technol. 2018, 67, 2900–2911. [Google Scholar] [CrossRef]
  25. Stern, R.E.; Cui, S.; Delle Monache, M.L.; Bhadani, R.; Bunting, M.; Churchill, M.; Hamilton, N.; Haulcy, R.; Pohlmann, H.; Wu, F.; et al. Dissipation of stop-and-go waves via control of autonomous vehicles: Field experiments. Transp. Res. Part C Emerg. Technol. 2018, 89, 205–221. [Google Scholar] [CrossRef] [Green Version]
  26. Meng, X.; Cassandras, C.G. Eco-Driving of Autonomous Vehicles for Nonstop Crossing of Signalized Intersections. IEEE Trans. Autom. Sci. Eng. 2022, 19, 320–331. [Google Scholar] [CrossRef]
  27. Guo, L.; Chu, H.; Ye, J.; Gao, B.; Chen, H. Hierarchical Velocity Control Considering Traffic Signal Timings for Connected Vehicles. IEEE Trans. Intell. Veh. 2023, 8, 1403–1414. [Google Scholar] [CrossRef]
  28. Ye, L.; Yamamoto, T. Impact of dedicated lanes for connected and autonomous vehicle on traffic flow throughput. Phys. A Stat. Mech. Its Appl. 2018, 512, 588–597. [Google Scholar] [CrossRef]
  29. Valle, F.; Vinel, A.; Erneberg, M. Traffic Light Priority in NordicWay. Communication Technologies for Vehicles. Nets4Cars/Nets4Trains/Nets4Aircraft 2021, 2021, 49–55. [Google Scholar] [CrossRef]
Figure 1. Overview of methodology.
Figure 1. Overview of methodology.
Computers 12 00154 g001
Figure 2. System model.
Figure 2. System model.
Computers 12 00154 g002
Figure 5. Positions of ten consecutive vehicles.
Figure 5. Positions of ten consecutive vehicles.
Computers 12 00154 g005
Figure 6. Velocities of ten consecutive vehicles.
Figure 6. Velocities of ten consecutive vehicles.
Computers 12 00154 g006
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Thunberg, J.; Saeed, T.; Sidorenko, G.; Valle, F.; Vinel, A. Cooperative Vehicles versus Non-Cooperative Traffic Light: Safe and Efficient Passing. Computers 2023, 12, 154. https://doi.org/10.3390/computers12080154

AMA Style

Thunberg J, Saeed T, Sidorenko G, Valle F, Vinel A. Cooperative Vehicles versus Non-Cooperative Traffic Light: Safe and Efficient Passing. Computers. 2023; 12(8):154. https://doi.org/10.3390/computers12080154

Chicago/Turabian Style

Thunberg, Johan, Taqwa Saeed, Galina Sidorenko, Felipe Valle, and Alexey Vinel. 2023. "Cooperative Vehicles versus Non-Cooperative Traffic Light: Safe and Efficient Passing" Computers 12, no. 8: 154. https://doi.org/10.3390/computers12080154

APA Style

Thunberg, J., Saeed, T., Sidorenko, G., Valle, F., & Vinel, A. (2023). Cooperative Vehicles versus Non-Cooperative Traffic Light: Safe and Efficient Passing. Computers, 12(8), 154. https://doi.org/10.3390/computers12080154

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop