An extended coordinate descent method for distributed anticipatory network traffic control Marco Rinaldi (corresponding author) Research Assistant KU Leuven Leuven Mobility Research Centre Celestijnenlaan 300, B-3001 Heverlee, Belgium Phone: +32 (0)16 32 27 80 marco.rinaldi@kuleuven.be Chris M.J. Tampère, Ph.D. Assistant Professor KU Leuven Leuven Mobility Research Centre Celestijnenlaan 300, B-3001 Heverlee, Belgium chris.tampere@kuleuven.be 1 Abstract Anticipatory optimal network control can be defined as the practice of determining the set of control actions that minimizes a network-wide objective function, so that the consequences of this action are taken in consideration not only locally, on the propagation of flows, but globally, taking into account the user’s routing behaviour. Such an objective function is, in general, defined and optimized in a centralized setting, as knowledge regarding the whole network is needed in order to correctly compute it. This is a strong theoretical framework but, in practice, reaching a level of centralization sufficient to achieve said optimality is very challenging. Furthermore, even if centralization was possible, it would exhibit several shortcomings, with concerns such as computational speed (centralized optimization of a huge control set with a highly nonlinear objective function), reliability and communication overhead arising. The main aim of this work is to develop a decomposed heuristic descent algorithm that, demanding the different control entities to share the same information set, attains network-wide optimality through separate control actions. Keywords: Anticipatory Network Traffic Control, Control Distribution, Distributed Optimization 2 1. Introduction Road networks have been facing ever-increasing demand, a trend that pushed, in the last 30 years, researchers worldwide in investing considerable efforts in the attempt of addressing the issues of network traffic congestion. The characteristics of network supply pose a tight constraint on the maximum achievable level of service, but it is widely recognized that congestion and/or other traffic externalities can be reduced through intelligent traffic control strategies, efficiently managing demand. Traffic control applications originated as early as in the 1950s, their focus being that of determining locally optimal settings for single traffic light controlled intersections (Webster, 1958). Over the years, thanks to the increase in computational power, traffic control policies have evolved more and more towards coordination, recognizing the impact that separated intersections in the network might have onto each other, and the importance of taking these effects into account (Wallace et al., 1984). The late 80s and 90s witnessed a new trend in which, additionally to coordination, also on-line responsiveness to traffic conditions gained importance, together with research and development now including traffic control policies tailored to motorways, rather than mainly focusing on urban intersections (Hunt et al., 1981) (Lowrie, 1990). Finally, in the last decade, coordinated control policies integrating both urban and motorway have been researched. In the field of coordinated traffic control, a specific subset is that of anticipatory traffic control policies. These approaches follow from theoretical works developed in the 70s (Allsop, 1974), and the key contribution with respect to other control strategies is the fact that the road users’ reactions to changes in traffic control conditions are taken explicitly into account when determining the control law. This property yields considerable benefits to the traffic controller, as it can now place itself in the leading role of a Stackelberg interaction with the road users, allowing for greater efficiency. A major drawback of all coordinated approaches, anticipatory or not, is the fact that in order to achieve maximal performance the entire set of controllers on the network should be coordinated simultaneously. Model-based coordinated traffic control policies are, indeed, of considerable computational complexity, due to the possibly very high dimensionality (number of controllers being simultaneously coordinated) and the ever-growing size of the underlying road network. This complexity becomes even steeper when considering the anticipatory control subset, where sensitivity information over the whole road network is necessary to correctly anticipate the users’ behaviour, no matter which and how many controllers are taken into account. In order to tackle problems of increasing size and complexity, several decomposition, distribution and decentralization schemes have been developed for the coordinated traffic control problem in the last decade. These three words, which might sound very similar, warrant formal definitions, however in literature no widespread consensus is achieved on their meaning, and thus different works adopt different notions, e.g. (Katwijk, 2008) (Balaji and Srinivasan, 2010) 3 We therefore specify our chosen definitions for the three words, so to avoid misunderstanding: - - - Decomposition schemes: frameworks that aim at subdividing a centralized, global problem into more tractable sub-problems, while still performing centralized computation and retaining globally valid dynamics of the original problem; Distribution schemes: frameworks that subdivide a centralized, global problem into simpler sub-problems, and solve them separately, employing, if necessary, some central mechanism to ensure that the global dynamics of the original problems are retained; Decentralization schemes: frameworks that subdivide a centralized, global problem into simpler sub-problems, and solve them fully separately. Unlike the distributed approaches, no explicit guarantee that the global dynamics of the original problem are retained, although they might emerge from the decentralized behaviour; As we detail in the next section, so far while several researchers have been dealing with developing simplifications for the coordinated traffic control problem, little effort has been done towards applying the same ideas to the anticipatory traffic control domain. In this work, our main objective is indeed to fill this gap, and begin investigating if and how the anticipatory traffic control problem could be separated into simpler, smaller, eventually distributable problems. In order to do so, we develop a decomposition scheme, and study under which conditions this scheme is still able to retain globally valid dynamics and, therefore, yield the same level of optimality as a fully centralized anticipatory traffic control formulation. In order to ensure computational feasibility and ease of understanding, we perform this approach within the static time domain, although our focus for future research is that of extending these findings to the field of within-day dynamics. The of this paper is organized as follows: in Section 2 we present an extensive literature review; in Section 3 we detail our methodology; Section 4 will feature the implementation we developed to test our algorithm, together with a simple proof of concept scenario to show its convergence properties. In Section 5 we present numerical tests of this algorithm on different size networks, ranging from simple examples towards bigger instances aiming to real-life, discussing the scalability of our approach and comparing it with general purpose optimization algorithms. Finally, in Section 6, we gather conclusions and give insights towards future research topics. 2. Literature Review For the purposes of this work, we split the traffic control literature in two main categories, and focus mainly on reviewing the second: local traffic control strategies and coordinated traffic control strategies. Local strategies, such as the Webster formula (Webster, 1958) for urban intersections or, considering motorway control, the ALINEA ramp metering strategy (Papageorgiou et al., 1991) are based on 4 locally measured data (either for online or offline purposes) and disregard any interaction with other controllers deployed on the network. Coordinated traffic control strategies, instead, take multiple controllers into account simultaneously, and try to obtain an optimal set of solutions for the resulting combined problem. Several coordinated strategies have been developed over the years, starting from fixed time area based strategies such as the MAXBAND (Little et al., 1981) and TRANSYT-7F (Wallace et al., 1984) control policies, and then evolving so to include responsiveness to online traffic states, such as in the SCATS (Lowrie, 1990), SCOOT (Hunt et al., 1981) and UTOPIA/SPOT (Mauro and Taranto, 1990) control policies. Advances in the field of traffic modeling enabled in the 80s and 90s the development of simple model based coordinated traffic control policies, such as the OPAC (Gartner, 1983), PRODYN (Henry et al., 1984) and RHODES (Sen and Head, 1997) systems. More recently, thanks to the latest improvements and developments yielding more detailed, faster and computationally more efficient traffic flow models, coordinated control strategies based on the Model Predictive Control (MPC) framework were researched in several works, such as (Hegyi et al., 2005), (Dotoli et al., 2006), (Van Den Berg et al., 2007) and (Aboudolas et al., 2009). Anticipatory traffic control policies are a subset of the coordinated control policies, which not only employ a model to predict the future conditions of the network but also explicitly consider the user’s route choice reactions. These policies have received considerable attention from researchers especially in terms of analytical optimality and properties. Approaches as early as that of Allsop (1974) have been exploring the conditions of existence and uniqueness of solutions to this problem in the static domain. The impact of anticipatory control policies in static scenarios has been explored by several authors, dealing with both road pricing (Yang and Bell, 1997) (Yan and Lam, 1996) and signalized intersection control (Smith and Ghali, 1990), (Cantarella et al., 1991), (Yang and Yagar, 1995). In recent years, this concept has then been extended to the Dynamic Traffic Assignment (DTA) field by Taale, (2008) , Taale and Hoogendoorn (2012) and Taale and Hoogendoorn (2013). In their papers, the authors outlined this approach in a generic computational framework, through a bi-level formulation, discussing the implications of anticipatory control theory and its computational feasibility when expanding the problem to the time variant domain. More recently, (Ukkusuri et al., 2013) proposed an algorithmic model to solve the combined dynamic equilibrium based traffic signal control problem, which is expressed both as Nash-Cournot and Nash-Stackelberg games, based on an Iterative Assignment Optimization (IAO) procedure, and assessed the solutions’ quality in terms of optimality. As we discuss in the introduction, all coordinated control strategies, anticipatory or not, share a common difficulty to be tackled, being the considerable complexity arising from the need to align several controllers simultaneously into one optimization problem. Moreover, in practice traffic controllers are separated, geographically and/or hierarchically, with local influence to only subsets of the whole network. Indeed, the effort necessary to develop an architecture whose centralization level would be sufficient to attain full global optimality is often impractical, with robustness, communication and computational complexity being only some of the problems such a centralized system would face. 5 In this respect, several decomposition and distribution schemes have been developed for the coordinated traffic control problem; some works have focused on subdividing the problem by reducing the size of the underlying network, subdividing it into more tractable subnetwork, such as in the approaches of (Papageorgiou and Mayr, 1982), (Gartner et al., 2001), (Mirchandani and Head, 2001), (Kotsialos and Papageorgiou, 2004), (Wongpiromsarn et al., 2012) and (Boillot et al., 2006). Other authors have been focusing on reformulating the coordinated control problem in mathematical structures enabling the authors to exploit very fast and efficient optimization algorithms to determine the problem’s solution. Such works include, for example, the TUC control policy (Diakaki et al., 2002), the works of (Aboudolas et al., 2009), (Aboudolas et al., 2010), who employ a store-and-forward traffic flow model formulation to compute optimal green split and offsets in a network-wide scenario, exploiting the Rolling Horizon principle for online purposes and, finally, the approaches of (Lin et al., 2012), (Lin et al., 2011), and (Hajiahmadi et al., 2015) where a Model Predictive Control based problem is also redefined as a Mixed Integer Linear Programming problem, allowing for fast optimization. Other authors have been decomposing the problem by exploiting computer scientific programming frameworks, such as agent-based modeling. Such papers include the store-and-forward model based approach of (de Oliveira and Camponogara, 2010) and the works of (Wang, 2005), (Katwijk, 2008), (Balaji and Srinivasan, 2010) and (Du et al., 2014). In all of these coordinated traffic control decomposition strategies, though, no explicit modeling is included to take the users’ routing response into account, and therefore, while a few strategies can achieve, e.g. based on some area-aggregate measure, a redistribution of traffic and queues over the available capacity of the network, such as in the approaches of (Geroliminis et al., 2013) and (Haddad et al., 2013), no full-fledged anticipation is considered. A few studies dealt with decomposing User Equilibrium formulations, such as in the works of (Suwansirikul et al., 1987) and, more recently, the algorithms developed by (Dial, 2006), (Gentile et al., 2004) and (Bar-Gera, 2010); other focused, instead, on developing centralized algorithms to solve the road pricing problem efficiently (Dial, 1999), (Bar-Gera et al., 2013). As a first step towards developing decomposition and, ultimately, distribution schemes for the anticipatory traffic control problem, in (Rinaldi et al., 2013) we employed a Bi-Level formulation and an algorithmic solution, also based on the Model Predictive Control framework, and introduced a controller-wise decomposition scheme; while recognizing the importance of decomposing the problem within the time domain, through the Rolling Horizon technique, we wanted to explicitly consider the fact that controllers are, in real-life, pertaining to separate, distributed entities. Following the empirical results we obtained in that work, in this paper we explore the convergence properties of the controller-wise decomposition strategy in-depth, through simpler static scenarios, from a theoretical, analytic and algorithmic point of view; we once again express the anticipatory control problem as a Bi-level optimization formulation, in which the upper level problem is that of selecting optimal control values for either traffic light controlled intersections or pricing on a subset of the network’s links, while the lower level problem is Static, Deterministic User Equilibrium. The main aim of this work is establishing the conditions under which anticipatory network-wide control would maintain global optimality while decomposed. Our long term objective is to obtain a 6 solid methodology for real-life deployable anticipatory traffic control, determining shortcomings (if any) in terms of optimality with respect to a fully centralized approach. 3. Methodology This section outlines the methodology with which we tackle the problem of decomposing anticipatory optimal control. It is divided into subsections: we first deal with how the information gathering process can be performed by separated entities, thanks to a sensitivity-wise objective function reformulation; we then detail the decomposition of the optimization problem into different controlling units and how we obtain the necessary sensitivity approximations. Finally, we develop an optimization algorithm tailored to our problem and discuss its convergence properties and implications. 3.1 Objective function reformulation When dealing with anticipatory control, in order to determine the optimal control law we exploit the availability of some measures (be it traffic lights, pricing, ramp metering, variable speed limits, … ) to meet a network-wide goal, usually expressed in the form of an objective function. “Optimality” is to be understood in a broad sense; it could for example be related to emission levels, environmental constraints (Lin et al., 2014), more desirable distributions of traffic over the network’s hierarchy, etc. In this paper we focus on maximizing the usage of the network’s capacity. This objective can be formulated, in a static setting, as the minimization of the Total Cost function. For a generic network N , composed of a set of n arcs L [l1 ,..., ln ] and a set of nodes V , this function is defined as follows: TC N ( g ) f l g, cl ( g ) cl f l g , g l L (1) l where fl (·) and cl (·) are, respectively, the flow and cost functions for each link l , and g [ g1 ,..., g m ] is the control inputs vector. Flow and cost functions are recursively dependent due to the users’ equilibrium response. Following Wardrop’s 1st principle, this interdependency can be modeled through the following Variational Inequality (VI): c ( f )· f c ( f )·x x X l l l l l l l l f (2) where X f is the set of all feasible link flows. Under interior point existence assumptions (Verhoef, 2002), the anticipatory traffic control problem (1) can be formulated as the following optimization problem: min TCN ( g) g 7 (3) and its solution can be obtained by solving the following equation: g : TCN g 0 (4) In order to solve the problem (3), one would need to determine the objective function’s gradient TCN g for all controllers. The necessary sensitivity information would need to be collected from a fully centralized perspective though, while in this work our objective is that of assessing if and how the anticipatory control problem can be decomposed in a controller-wise fashion. We therefore devise a scheme that allows us to separate the sensitivity retrieval process so that part of it can indeed be performed controller-wise, while a simple and independent monitoring system can be employed to estimate the remaining portion. Following the sensitivity analysis algorithm proposed in (Yan and Lam, 1996), we apply a simple chain rule derivative formula to our problem, thus rewriting the 1st order derivative of the original objective function (1), explicitly separating three different sensitivity terms: TCN g J Tf g TTC f [ f ·c( g)]T (5) where f [ fl1 ,..., fln ] is the link flow vector, the Jacobian matrix J f g is the sensitivity of equilibrium flows to the control actions and the gradient TC f is the sensitivity of the objective function (in this case Total Cost, but this can be generalized to any cost function) to changes in the network flows. Finally, c ( g ) represents the sensitivity of link costs to control, having nonzero values only when a controller gi has direct influence on the link cost function, as, for example, in case of traffic light control. These three objects are defined as such: fl1 / g1 J f g f / g 1 ln fl1 / g m fln / g m TC f TCN / fl1 cl1 / g1 c( g ) c / g 1 ln 8 TCN / fln cl1 / g m ... cln / g m (6) (7) ... (8) In simple, linear cases these quantities can be determined analytically; minimizing the resulting Total Cost function would then, under existence and uniqueness assumptions, yield the optimal value for the control action. It’s worth mentioning that the reformulation of eqn. (5) is not limited to the Total Cost objective function, but can be applied to other, not necessarily linear or even link-additive objective functions. This objective function reformulation follows the idea that different, separate entities could be responsible for estimating the separate sensitivities, overcoming the need for one centralized monitoring and control system. J f g and c( g ) are quantities that we envision being estimated by the controllers themselves, through sensitivity analysis, following e.g. on-line approaches such as that of Zhang and Roberts (1990), which could be applied on a day-to-day basis. These terms contain, respectively, the whole network flows’ sensitivity to a change in control, and the local cost sensitivity to a change in control. From a centralized optimization perspective, the full Jacobian matrix J f g and cost gradient c( g ) are necessary to determine a descent direction for problem (3). If controllers are being optimized entirely independently of each other, though, as is in the application we discuss in the later stages of this paper, this sensitivity information can be obtained and employed entirely separately (controller-wise), as one controller needn’t know the sensitivity of another’s. This means that each separate controller gi only needs to estimate and know its own column J f ( g i ) . TC f is, instead, a quantity proper to monitoring systems; this sensitivity can be learned, over time, simply through data observations and statistical analysis; geographically separate portions of the network might be monitored by different entities, but as long as the variable of interest (flows) is being measured and stored, together with the respective variations in the chosen objective function, this sensitivity remains easily obtainable. This latter property is especially true for the Total Cost objective function, whose dependency on flows is entirely separable (sum over all links). When dealing with non-separable functions, the estimation process will increase in complexity, as the separate monitoring entities might need communication in order to assess the impact on common portions of the objective function. Independently from the chosen optimization framework, decomposed or centralized, all controllers need full access to TC f , as knowledge about the influence over the whole solution space is needed in order to pursue network-wide goals. We assume in this work that changes in Total Cost are solely dependent on link flows, we recognize that there might very well be a case in which this function is influenced by other traffic phenomena, such as changes in speeds or densities in the network. Our sensitivity decomposition approach could still be applied; its formulation should simply be extended by adding relevant terms to eqn. (5) so to account for this extra source of influence. 9 3.2 Separate sensitivities approximation As discussed in Section 3.1, we reformulate the objective function in terms of separate sensitivities in order to clearly address the problem of obtaining relevant data to compute them. We here introduce such a mechanism, in which we obtain linear approximations for the two sensitivity matrices by truncating their Taylor Series at the first polynomial degree. Through this approach the response of the traffic system to changes in control can be determined even when the two sensitivities are not analytically known or easily computable, as is for example when dealing with nonlinear link cost functions; linear approximations to these sensitivities can then be obtained through finite differences. Finite difference estimation of network sensitivity to control has been developed for real-life applications, e.g. by applying predetermined perturbations to the control variables (Roberts, 2000) or by using measurements observed in previous time steps (Brdys and Tajewski, 1994) to reconstruct the local approximation. Throughout this section the approximations of variables and derivatives are marked with a (·) symbol. Based on the objective function reformulation introduced in Section 3.1, we can write a first order approximation of the Total Cost function as follows: TC N g TCN g0 TC N g g g0 (9) with TC N g Jˆ Tf g TC T f [ f ·c( g)]T (10) and g 0 the initial control vector value. In the case of our link-additive objective function (1), we can also express this approximation as a sum of its link-wise components: TC N g TCN g0 (fl g TC fl g g0 fl ·cl ( g )·( g g0 )) (11) lL We choose to approximate the three separate sensitivity matrices J f g , TC f and c ( g ) linearly, through their Taylor Series, as follows: the columns composing J f g are in the form f g , which is a value immediately obtained from the 1st order approximation of the flow function: f g f ( g ) g g g0 f 0 (12) 0 Where f 0 is the initial flow vector and the gradient f ( g ) g is evaluated based on the full 0 network’s equilibrium response, around the initial control vector value. 10 The elements composing TC ( f ) , instead, need some elaboration: For a fixed value of the control vector g , the Total Cost for a network N has the following form: TCN ( fl (cl ) cl ( fl )) (13) lL any given element of TC ( f ) would bear the following form: TCN c( fl ) fl cl fl cl fl fl fl fl fl (14) in order to obtain an approximate value for these elements, the cost functions of the links can first be linearly approximated with respect to changes in their flow f l as follows: cˆl fl cl f l fl fl0 cl0 (15) f0 where f l0 is the initial flow for link l , and cl0 is the resulting link cost. Substituting this approximation into equation (14), we obtain the following formulation for the linear approximation of the link-wise total cost’s response to changes in flow: TC N cl fl fl fl fl0 f0 cl f l fl cl0 (16) f0 Finally, the linear approximation of the gradient of link costs with respect to changes in control is very straightforward, as its elements can be determined by taking the 1st order approximation of costs: cˆ( g ) c( g ) g g g0 cl0 (17) c( g ) c( g) g (18) 0 it follows naturally that 0 Summarizing, the elements of the linear approximations for the sensitivity matrices, presented here in a compact vector form, are obtained as follows: f l ( g ) g0 1 J f g fln ( g ) g0 11 (19) TC c( f ) f f f 0 c f f f c0 (20) c( g ) c( g) g (21) 0 0 0 As we will introduce in the next section, this choice of approximation neatly connects with how we plan to tackle the control-wise decomposition of the problem, yielding a quadratic approximation for the objective function. 3.3 Controller-wise optimization procedure decomposition In (Rinaldi et al. 2013) we explored the possibility of decomposing optimal, network-wide control by minimizing a network-wide objective function J (·) separately for each controller, given global information. In an effort to characterize the properties of this method, we analyze its convergence in detail when dealing with a static objective function, which we discussed in Sections 3.1 and 3.2. The practice of minimizing an objective function separately, variable by variable, is well-known in optimization, within the framework of Derivative Free Optimization (DFO) algorithms (Conn et al., 1997), and is basis of “coordinate descent” methods. The most well-known variant of coordinate descent methods, usually referred to as “coordinate search” method, performs a search along a specified direction, starting from the current iterate, for a point that provides a “sufficient” descent for the objective function J ( x1 ,..., xn ) where x [ x1 ,..., xn ] is the vector of decision variables. This method cycles through the 𝑛 coordinate directions [e1 ,..., en ] of x and obtains new iterates by performing a line search procedure, along each direction, in turn. At the first iteration, all components of x , save for x1 are fixed, a new value that reduces (minimizes) the objective function along that direction is sought. On the next iteration, we repeat the process for the second component x2 and so on. DFO algorithms operate under the assumption that the analytical expression of the objective function’s gradient is unknown, and therefore either approximate it numerically, or, as is usually with coordinate descent, seek for a descent direction through direct search methods, such as golden section search, ignoring any derivative information (Fletcher, 2013). In general, the convergence of this method is less than satisfactory, highly dependent on the chosen line search procedure, although it can be guaranteed under some assumptions (with convexity being a major constraint) as discussed in (Luo and Tseng, 1992). Recently, convergence for objective functions that are a combination of convex and non-smooth separable functions has also been discussed in (Tseng and Yun, 2009). In order to overcome or, at least, reduce the impact that these convergence limitations would pose on the method’s applicability, we study another class of methods, referred to as “Model-Based Methods”. These consist of constructing a linear or quadratic model of the objective function around the current working point, and obtaining the next iterate by minimizing this model within a trust region. This model is usually defined as the quadratic function mk (·) that interpolates the original 12 J (·) in a set of well-chosen sample points, and the first and second order derivatives are defined based on interpolation conditions. Once the model has been formed, these methods employ a trustregion sub-problem to approximate the descent step p , and move to the next iterate if a sufficient reduction in the objective function has been met (Wright, 1999). In order to improve the convergence rate of Coordinate Descent, we combine its properties with Model-Based methods: at the k -th iteration, rather than performing a line search over the objective function, possibly disregarding any derivative information, we build a quadratic model of the objective function J ( x1 ,..., xn ) for the i -th coordinate direction ei around the current value xk ,i , and choose the step pi that minimizes this model in a trust-region with radius k , obtaining then the next iterate: xk 1,i xx ,i pi . All other components of x are left unmodified. Other than improving the convergence rate by exploiting some approximation of derivative information, this method also takes in to account the fact that, in this application scenario, objective function evaluations tend to be quite expensive (a full Static Assignment procedure is needed each time), and that therefore a line search procedure based on function evaluations alone would be computationally cumbersome. Given the approximation for the first order derivative of the Total Cost function introduced in Section 3.2, it’s immediate to realize that obtaining a quadratic model for the i -th coordinate direction ei around the current control point g 0,i is straightforward: TC N gi TCN g0,i (fl gi TC fl gi g0,i [ fl ·cl ( gi )]T ·( gi g0,i )) (22) lL This means that the only needed objective function evaluations are those necessary to compute or update the linear approximations for the three sensitivity matrices J f ( g i ) , TC ( f ) and cl ( gi ) . As we will detail in the next section, our method of choice is a central finite differences scheme, meaning that two function evaluations per controller are needed. The size of the trust-region will be updated based on a metric assessing the goodness of the quadratic model mk : the more regular the shape of the objective function around the current point, the larger steps our approach will be able to take (Wright, 1999). Finally it’s worth noticing that, if the objective function J (·) is convex, minimizing the function along the coordinate directions ei introduces no error with respect to optimizing it against the full variable set; the only error introduced by this scheme is then that of the approximated model of choice. 13 3.4 Full Algorithm In this Section, we first develop and outline a decomposed algorithm for solving the bi-level pricing subject to user equilibrium problem, combining the different methodological steps introduced earlier in this chapter, and then discuss its inner workings in full detail together with clear definitions of its parameters, its convergence conditions and, finally, the implications of our choices with respect to developing large-scale control distribution mechanisms. Definitions of parameters employed in the following algorithm: g0 Initial condition vector k Max k Trust region radius at iteration k Trust region update threshold Maximum trust region radius Iteration counter The trust region radius is controller-dependent, and has the same units as those of the specific controller. Algorithm 3.1: Choose an initial point 𝑔0 Choose an initial value for the trust region radius Δ0 , an update threshold 𝜂 and a maximum trust region radius Δ𝑀𝑎𝑥 1. Set 𝑘 ← 0 2. repeat until a convergence test is satisfied: 3. compute 𝒇𝒌,𝟎 (Equilibrium Assignment) 4. for each coordinate direction 𝑒𝑖 in 𝒈: ̂ i. compute 𝐽̂𝑓 (𝑔𝑘,𝑖 ), ∇̂ 𝑇𝐶 (𝒇) and ∇𝑐 (𝑔𝑘,𝑖 ) around 𝑔𝑘−1,𝑖 and 𝒇𝒌,𝒊−𝟏 ̂ ii. form the quadratic model 𝑚𝑘 (𝑔𝑘,𝑖 ) = 𝑇𝐶𝒩,𝑖 (𝑔𝑘,𝑖 ) + (𝑔𝑘,𝑖 − 𝑔𝑘−1,𝑖 ) ⋅ ∇𝑇𝐶 𝒩,𝑖 (𝑔𝑘,𝑖 ) 𝑇 ̂ ̂ ̂ ̂ (𝒇) where ∇𝑇𝐶𝒩,𝑖 (𝑔𝑘,𝑖 ) = 𝐽𝑓 (𝑔𝑘,𝑖 ) ⋅ ∇ 𝑇𝐶 + 𝒇 ⋅ [∇𝑐 (𝑔𝑘,𝑖 )] iii. solve min 𝑚𝑘 (𝑔𝑘,𝑖 + 𝑝𝑖 ) 𝑠. 𝑡. ‖𝑝𝑖 ‖ ≤ Δ𝑘 𝑝𝑖 iv. update Δ𝑘 v. if 𝑝𝑖 meets satisfactory criteria Set 𝑔𝑘,𝑖 ← 𝑔𝑘−1,𝑖 + 𝑝𝑖 else Set 𝑔𝑘,𝑖 ← 𝑔𝑘−1,𝑖 vi. compute 𝒇𝒌,𝒊 (Equilibrium Assignment) 5. end(for) 6. Set 𝑘 ← 𝑘 + 1 7. end(repeat) After the initialization, the algorithm performs an iterative search of successive steps updating the full control vector gk , but each component g k ,i is updated separately over an inner loop iterating through the coordinate directions ei . Each outer iteration begins by computing a full equilibrium 14 assignment around the current value for the full control vector g k 1 , which will serve as a basis for the inner iterations. The inner iteration loop performs the following operations: i. the linear approximations for the sensitivity matrices are computed around the previous iteration’s i-th control and the current flow pattern; all three are obtained through finite central differences, with J f being computationally quite expensive (two full equilibrium assignment procedures), while the latter require only small link-wise perturbations in order to compute the link cost function’s sensitivity around the current flow and control patterns. The columns of J f not pertaining to controller i are simply left unmodified. ii. based on the updated sensitivities, the quadratic model mk is computed (see Appendix A for iii. a detailed formulation). we minimize the quadratic model within the current trust region, and obtain a candidate step pi iv. the trust region radius k is updated. v. the candidate step is either accepted or refused. vi. finally, the network is re-equilibrated based on the new value for g k ,i , the rest of the control vector is kept at the previous iteration’s values. Both steps (iv.) and (v.) are based on computing a metric that measures the goodness of the quadratic model mk , and how well it represents the real function’s behaviour. We choose a metric defined as follows: TCN ,i g k ,i TC N ,i g k ,i pi mk g k ,i mk g k ,i pi (23) Given a threshold , the trust region size update scheme is as follows: Δk min 2 Δk ,ΔMax , ρ η (24) 1 Δ k Δ k , ρ η 4 (25) The candidate step 𝑝𝑖 , instead, will be accepted if This is a common approach in trust region algorithms: is an indicator of the ratio between the actual reduction in the objective function and the reduction predicted by the model. The closer this indicator to one, the better the model is a fit for the real function, and therefore the more “trust” can be put into it. In a similar fashion, if the model can be trusted, the resulting descent step can also be accepted. While the k parameter gets updated over the iterations by the algorithm, the parameter is an exogenous input – depending on the regularity and convexity of the function, one might choose different values for it, with risk-averse values being those close to 1. 15 In order to complete this discussion, we now introduce two propositions regarding the convergence properties of our algorithm, following from simple assumptions on the objective function’s properties. Proposition 3.1: Given the objective function TCN g , if, along its coordinates ei [e1 ,..., en ] , the Total Cost components TCN ,i gi are quadratic in gi i , then Algorithm 3.1 will terminate in a finite number of iterations and the sequence of iterates {gk ,i } gi i . * Proposition 3.2 Given a convex objective function TCN g , under the assumptions that, at the k-th iteration: the link cost functions cl ( fl ) are twice differentiable on the open interval, with cl ( fl ) continuous on the closed interval between f l , k and fl ,k 1 the i-th separate Total Cost function component TCN ,i gi is twice differentiable on the open interval with TC N ,i ( g i ) continuous on the close interval between g k ,i and g k 1,i the approximation error of the quadratic model mk ( g k ,i ) of the separate Total Cost component TCN ,i gi is, following Taylor’s theorem’s application to our approximation, bound by g k ,i lL g k 1,i R1c fl ,k R1TC g k ,i (26) where R1c f l ,k 2 cl L 2! f l ,k f l ,k 1 2 (27) is the second order term of the Taylor series expansion of the link cost function in mean-value form with L [ f l ,k , fl ,k 1 ] and TC 1 R g k ,i 2TC N ,i L' 2! g k ,i g k 1,i 2 (28) the second order term of the Taylor series expansion of the Total Cost function in mean-value form with L ' [ g k ,i , g k 1,i ] when considering errors higher than second order to be negligible. 16 The trust region update scheme discussed earlier guarantees that the step size remains small, unless the quadratic model is considered a good fit for the original function. Following these propositions, we derive the conditions under which this scheme yields global optimality: 1. 2. 3. 4. 5. 6. Link cost functions are separable Link cost functions are monotonic An interior point solution for the optimization problem exists The chosen objective function is unimodal (i.e. uniqueness & existence of a minimum) All local entities collaborate to the gathering of cost sensitivities Network-wide equilibrium sensitivity to control is known, either exact or approximated 3.5 Final remarks In an effort to clarify the rationale behind the objective function reformulation and the decomposed optimization algorithm, we discuss an example showcasing how we envision this combined distributed monitoring and control system would operate in a real life scenario. In practice, various entities take care, for example, of managing the intersection timing for different portions of an urban area, while a separate authority, possibly residing in a completely different geographical location, would instead be dealing with a Ramp metering (RM) system onto an adjacent motorway (Carlson et al., 2014). The main concern, and clear motivation behind our line of research, is that when one system (usually, the motorway) is dealing with high levels of congestion, the consequences might resonate also through the adjacent urban network. Given such a scenario, we believe that coordinating the urban intersections together with the RM system on the motorway could help mitigate congestion effects on both systems. Implementing our approach in this scenario would require two separate stages: first we need to define the different monitoring entities and the way they communicate. Let’s imagine that, in this instance, the urban administration takes care of monitoring its own traffic state, but that this system is indeed independent from the traffic light servers. As for the motorway, we pose that the entity responsible for the RM system obtains its data from a third party private traffic data provider. Once the monitoring system is defined, we need to set up the coordination mechanism between the different controllers; this could be achieved by an additional entity, whose geographical location is irrelevant, that takes care of: communicating to the relevant monitoring systems, in order to acquire measurements necessary to estimate the sensitivities J f , TC and c computing and relaying this sensitivity information to both the traffic light and the RM servers The different players would still operate entirely separately, each optimizing its own part of the objective function (or, rather, the relevant quadratic model); thanks to the shared sensitivity information, though, the overall performance would point towards global optimum. 17 The aforementioned example helps to sketch how our approach could fit in one specific real-life (partial) control distribution instance, but it can be just as easily applied to any other control distribution nature, e.g.: distribution according to type of control: a traffic center having separate servers for traffic signals, for motorway access control (ramp metering), route guidance etc. but wishing to coordinate actions between these servers distribution according to hierarchy or geographical authority: a national motorway road authority interacting with various regional and urban road authorities, wishing to co-ordinate their traffic control actions alignment of various levels of control: pricing and operational traffic control with a common objective function … In this work we choose to explore the optimality conditions and feasibility of a full decomposition scheme, in which all controllers might be optimized separately while sharing common information. Naturally, the same scheme might be applied to instances in which only partial decomposition occurs, as would be for the scenario we just discussed. In fact, in (Rinaldi and Tampère, 2015) we developed a time dynamic version of this approach and applied it to cases in which clusters of controllers are considered, rather than fully separate controllers. In real life instances we realize that many of the assumptions we pose in the introduction of our paper, under which our approach can guarantee convergence and optimality, are far too restrictive; in later sections of this paper we show how an implementation of this algorithm performs when facing problems violating these assumptions. While not fully optimal, a consistent decrease in objective function can be obtained, fully comparable to centralized approaches. 18 4. Proof of Concept In this section we present a small case study and solve it analytically, in order to show how the objective function decomposition described in Section 3 can be applied. The case study is presented in Figure 4.1. This network represents the smallest example in which different controllers are responsible over different portions of a traffic network, and only share part of it between each other. Figure 4.1: Two-controller network with link labels This network is composed of three OD pairs A-D, B-E and C-F. All links but 10, 11, 12, and 13 have a constant cost function cl ( fl ) c0 , while for these a linear cost function is applied, as follows: Link 10 c10 ( f10 ) a10· f10 b10 Link 11 c11 ( f11 ) a11· f11 b11 g11 Link 12 c12 ( f12 ) a12· f12 b12 g12 Link 13 c13 ( f13 ) a13· f13 b13 Table 1 The control vector is defined as g [ g11 , g12 ] , pricing set on the two links 11 and 12. According to our decomposition procedure, the sensitivity matrices would, in this case, take the following form (for the sake of clarity, we only show values related to the four links with nonconstant cost functions): 19 f10 / g11 f / g11 J f g 11 f12 / g11 f13 / g11 f10 / g12 f11 / g12 f12 / g12 f13 / g12 TC f TCN / f10 TCN / f11 TCN / f12 TCN / f13 (29) (30) While the elements of J f ( g ) need to be computed based on full knowledge of the network, the single elements of TC ( f ) can be computed as such: TCN TCA TCB TCC fl fl fl fl (31) where by the notations TC A , TCB , TCC we mean the parts of the Total Cost objective function pertaining to the sub-networks that could be, for example, monitored by the three separate ODs A, B and C. This property, as we discussed earlier, is of considerable importance; it means that the process of constructing TC ( f ) can be entirely distributed among the different entities, who simply need sharing the results. In this example we imagine that the three entities A, B and C are responsible for data acquisition alone. This property is, though, valid only for objective functions fully separable with respect to flows; as we discussed above, if this property is violated, the different entities would then need some communication and iterations in this process before a stable sensitivity measurement is reached. In this simple scenario, the equilibrium problem can be analytically determined in terms of the following route flows: f10 f r1 f11 f r2 f r3 f12 f r4 f r5 (32) f13 f r6 where the routes r1 r6 are defined as follows: r1 {l1 , l4 , l10 , l14 , l20 } r2 {l1 , l5 , l11 , l15 , l20 } r3 {l2 , l6 , l11 , l16 , l21} r4 {l2 , l7 , l12 , l17 , l21} r5 {l3 , l8 , l12 , l18 , l22 } r6 {l3 , l9 , l13 , l19 , l22 } 20 (33) The elements of our sensitivity reformulation can be determined algebraically as function of equilibrium route flows, rather than equilibrium link flows (the full specification of this problem can be found in Appendix B). a12 a13 a11a13 a12 a13 a11a13 (a10 a12 a10 a13 ) a10 a13 a11a13 1 J fr ( g ) · a10 a13 a11a13 D a10 a12 a10 a13 a10 a12 a10 a11 a10 a12 a10 a11 (34) With D a10 a11a12 a10 a11a13 a10 a12 a13 a11a12 a13 2a10 f r1 b10 a11 f r2 a11 f r2 f r3 b11 a11 f r3 a11 f r2 a11 f r2 f r3 b11 a11 f r3 TTC f r a12 f r a12 f r f r b12 a12 f r 4 4 5 5 a f a f f b a f 12 r4 r5 12 12 r5 12 r4 2 a f b 13 r6 13 (35) Finally, in the case of pricing, the sensitivity of link costs to changes in control is null, due to the fact that these are counteracted by revenues: 0 c ( g ) 0 (36) Our first order sensitivity approximation can thus be compiled: TCN g J fr T g TC f r [ f r ·c( g)]T T (37) and the optimal values for the control vector g can be obtained by solving the following equation: g* g : TC N g 0 (38) 1 2 a10b11 a10b13 a13b10 a13b11 a10 a13 * g 1 a10b12 a10b13 a13b10 a13b12 2 a10 a13 (39) resulting in: 21 which can be shown to be exactly equal to the result of minimizing the original, full network Total Cost function TCN g . 22 5. Numerical Case Studies In this Section we confirm the convergence properties discussed in Section 3, and moreover study the algorithm’s performance when dealing with non-convex problems. We first introduce the algorithm implementation, together with the necessary basic information, and then proceed to the numerical tests. 5.1 Introduction: Dial’s B Algorithm In order to clarify our implementation, we first need to briefly introduce the reader to a well-known static deterministic traffic assignment algorithm, featuring implicit path enumeration, developed by Robert Dial (Dial, 2006), called B algorithm. The effectiveness of Dial’s B algorithm stems from the fact that it exploits the reduction in computational effort resulting from subdividing the full network equilibrium into sub-equilibrium problems posed in well-built network partitions, referred to as bushes: Def: A bush is a subset of arcs of the original problem’s network and comprises an acyclic subnetwork rooted at a given origin, together with the arc flows that carry all and only trips from that origin to their specific destinations. The algorithm performs successive equilibrations in the separate origin rooted bushes over iterations; in his paper, Dial proves that within this procedure any step resulting into an equilibrated, separate bush also yields a decrease in the full network’s gap function. Moreover, the different bushes’ topology may change during iterations while seeking a more efficient implicit route set. We introduce a simple sketch of the algorithm’s procedural steps, in order to help the reader relate these steps with those of our own algorithm. To achieve a network-wide, user optimal traffic assignment, Algorithm B proceeds as follows: Initialization. For each origin, create its initial bush and feasible arc flows. General step. For each origin, transform its current feasible bush into an equilibrated bush: i. Build max- and min-path trees: Find the cheapest path and costliest used path from the origin to each of the other nodes. ii. Equilibrate bush: Shift trips from max- to min-paths to make their path-cost difference minimal. iii. Improve bush: If the bush is not optimal, create a topologically improved feasible bush with feasible arc flows but containing some cheaper path(s). iv. Reiterate. if (iii) changed the bush, go back to (i) with a new bush for the same origin; otherwise, continue on at (i) with next origin’s current bush. Termination. Quit when every origin’s bush is optimal. 23 While referring the interested reader to Chapter 2 of (Dial, 2006) for further details on the separate steps, we now comment the rationale behind choosing this specific algorithm as a base for our own implementation: we chose to extend Dial’s algorithm since it performs an OD-wise decomposition of the network, when creating bushes. Given the objective of developing distributed optimal control approaches and the nature of the objective function reformulation introduced in Section 3.1 of this paper, we consider that extending an algorithm that, by its own nature, already operates based upon a network-wise separation, allows us to easily obtain all the relevant properties necessary to validate our ideas. 5.2 The BCD algorithm We now present an implementation of Algorithm 3.1, which we refer to as BCD Algorithm, short for “B with Control Distribution”. This algorithm is an extension of Dial’s B algorithm (Dial, 2006), in which not only static user equilibrium is computed, but, alongside, also optimal control settings (second best pricing and/or green split) are obtained. Definitions of parameters employed in the following algorithm: g0 Initial condition vector k Max k K Max Trust region radius at iteration k k Equilibrium precision threshold at iteration k Trust region update threshold Maximum trust region radius Iteration counter Maximum number of iterations Control variable convergence threshold Algorithm 5.1: BCD Choose an initial point g 0 . Choose an initial value for the trust region radius Δ0 , an update threshold η , a maximum trust region radius ΔMax and a maximum number of iterations K Max . Choose an initial value μ0 for the equilibrium precision threshold (discussed in details later). Choose a control variable convergence threshold δ. 1. Set 𝑘 ← 0 2. compute 𝒇𝒌,𝟎 (Equilibrium Assignment) 3. repeat until ‖𝒈𝒌 − 𝒈𝒌−𝟏 ‖ < 𝛿 or 𝑘 ≥ 𝐾𝑚𝑎𝑥 : for each bush B for each coordinate direction 𝑒𝑖 in 𝒈𝑩 , set of controls in bush B i. update 𝐽̂𝑓 (𝒈) around 𝒈𝑩 𝒇𝒌,𝒊−𝟏 𝒌−𝟏,𝒊 and 𝐵 ii. compute a local approximation for 𝑓𝑙 (𝑔𝑘−1,𝑖 )∀𝑙 𝑙 iii. compute a local approximation for 𝑐𝑙 (𝑓𝑘−1,𝑖 )∀𝑙 ∈ 𝐵 iv. compute a local approximation for 𝑐𝑙 (g Bk−1,i ) ̂ 𝑩 v. update ∇̂ 𝑇𝐶 (𝒇) and ∇𝑐 (𝒈 ), based on the approximations 24 vi. vii. viii. ix. x. 𝐵 form the quadratic model 𝑚𝑘 (𝑔𝑘,𝑖 ) ̂ ̂ (𝒇) ∇ 𝑇𝐶 and ∇𝑐 (𝒈) 𝐵 solve min 𝑚𝑘 (𝑔𝑘,𝑖 + 𝑝𝑖𝐵 ) 𝑠. 𝑡. ‖𝑝𝑖𝐵 ‖ ≤ Δ𝑘 based on 𝐽̂𝒇 (𝒈) 𝑝𝑖 update Δ𝑘 , 𝜇𝑘 if 𝑝𝑖 meets satisfactory criteria 𝐵 𝐵 Set 𝑔𝑘,𝑖 ← 𝑔𝑘−1,𝑖 + 𝑝𝑖𝐵 else 𝐵 𝐵 Set 𝑔𝑘,𝑖 ← 𝑔𝑘−1,𝑖 𝐵 compute 𝒇𝒌,𝒊 , to a precision threshold 𝜇𝑘 , based on 𝑔𝑘,𝑖 (Equilibrium Assignment) update bush 𝐵 xi. end(for) if 𝒈𝑩 = ∅ equilibrate bush 𝐵 update bush 𝐵 end(for) 4. Set 𝑘 ← 𝑘 + 1 5. end(repeat) Rather than iterating along the separate coordinate directions in the full control vector g as for the general formulation of Algorithm 3.1, we introduce a further subdivision of the network, following B Dial’s B algorithm, and therefore subdivide the full control vector among the separate bushes g . We obtain two inner nested loops for BCD; a loop among all origin-based bushes, that takes care of subdividing the control vector into all those controllers included in the current bush B. If no controller is present, the current bush is simply equilibrated following Dial’s B approach. The innermost loop is, instead, the coordinate-wise decomposition introduced previously. This innermost loop’s implementation differs with respect to the more general algorithm, we therefore comment its operations: B i. obtain a linear approximation for the Flow-Control Jacobian J f ( gi ) based on central ii. differences; while the control being approximated depends solely on the current bush, the flow response is that of the whole network. Fetch from J f ( g ) the sensitivity of all link flows in the network with respect to the current control value g k 1,i . iii. iv. collect the sensitivity of the local bush’s link costs to flows and controls. update the linear approximations of TC ( f ) and c ( g ) based on ii. and iii. v. based on the above sensitivities, compute the quadratic model mk (·) (see Appendix A for vi. the detailed formulation). minimize the quadratic model within the current trust region radius, and obtain a candidate B step pi vii. the trust region radius k and the equilibrium convergence threshold k are updated. viii. ix. the candidate step is either accepted or refused the network is re-equilibrated, rather than to a fully consistent equilibrium, to a possibly lesser threshold k . x. the current bush topology is updated, following Dial B’s algorithm. The main difference between BCD and Algorithm 3.1, other than the subdivision in bushes, lies in step ix.; here, rather than computing a full equilibrium every time we accept a change in control, we limit its convergence to an acceptable threshold k . 25 The idea behind this is that, as the iterations progress and the system gets closer to a stable local optimum in the objective function, the model mk (·) will perform better and better, allowing for bigger optimization steps. The threshold for equilibrium will increase accordingly, since even a few steps of re-equilibration are sufficient to obtain a stable, correct sensitivity response. As for Algorithm 3.1, the following indicator g m g p TCN ,i g kB,i TCN ,i g kB,i piB mk B k ,i k B k ,i B i (40) is obtained by measuring the punctual value of the objective function TCN g around the different conditions and comparing them with the model’s interpolation, and employed to update k and k over the iterations. 5.3 Case Study 1: three bushes network In this subsection we apply the BCD algorithm to the network we presented earlier in section 4. We first employ it on a simple, linear cost function scenario bearing quadratic objective function. We then introduce BPR cost functions to the problem, and evaluate the resulting error due to the quadratic approximation of the (non convex) objective function. We also show how the choice of the initial point 𝑔0 is of dire importance by employing two different scenarios. Finally, we also show a case in which one of the pricing controllers is substituted by a traffic light controller, and the related change in objective function solution space. We compare the performance of our BCD Algorithm with a simpler Bi-Level approach, in which the lower level problem is the network equilibration, solved by the standard Dial’s B algorithm, while the upper level problem is the minimization of the Total Cost objective function, performed by Matlab’s Optimization Toolbox’s fmincon function. Scenario 1: The network parameters for this scenario are as follows: Link 10 c10 ( f10 ) 0.1· f10 1 Link 11 c11 ( f11 ) 0.2· f11 0.2 g11 Link 12 c12 ( f12 ) 0.1· f12 0.4 g12 Link 13 c13 ( f13 ) 0.1· f13 1 * The analytically determined values for the control vector are g [0.4,0.3] . We set the algorithm’s parameters as follows: 26 g0 [0, 0] 0.75 0 100 0 102 10 3 In Figure 5.1 the descent of our algorithm (thin line), compared with the descent of fmincon (thick line), is shown. Figure 5.1: Algorithm convergence in quadratic solution space The computational times are 280 s for fmincon and 85.6 s for BCD, both algorithms converge to the correct solution. Scenario 2: This scenario employs the same network, with BPR l cl ( fl ) 1 l ·( fl / 400) and with parameter set as follows: Link 10 Link 11 Link 12 Link 13 10 0.5, 10 2 11 0.2, 11 4 12 0.5, 12 4 13 0.4, 13 2 27 cost functions in the form As for the previous case, links 11 and 12 are both subject to pricing, and we compute the optimal second best pricing values for both, comparing the performances of fmincon and BCD. The results from this comparison are shown in the following Table: Links 11, fmincon Links BCD 11, Comp. Time 12: 161 s Toll Values g 0.1574 * 11 𝑻𝑪 7.972 ⋅ 103 𝚫𝑻𝑪 g12* 0.1574 12: 97s g11* 0.1891 7.973 ⋅ 103 +0.01% g12* 0.1972 It’s worth mentioning that the solution space, even in a scenario as simple as this, is non-convex. Like any other locally approximate algorithm, convergence to a global optima cannot be guaranteed under non-convexity conditions, the algorithm will converge to some local minima, whose location will be depending on both the initial point g 0 and the trust-region size at each step k k . This is easily demonstrated by Figures 5.2, 5.3, 5.4 and 5.5, which show the different paths followed by fmincon(thick line) and BCD(thin line) starting from different initial points. Due to the clear nonconvexity of this example, some initial points lead to local optima, both for fmincon and BCD, a behaviour highlighted especially in Figures 5.4 and 5.5. 28 Figure 5.2: Algorithm convergence in non-convex solution space, 𝒈𝟎 = [𝟎. 𝟓, 𝟎. 𝟓] Figure 5.3: Algorithm convergence in non-convex solution space, 𝒈𝟎 = [𝟏, 𝟎. 𝟐𝟓] 29 Figure 5.4: Algorithm convergence in non-convex solution space, 𝒈𝟎 = [𝟎. 𝟐𝟓, 𝟏. 𝟒] Figure 5.5: Algorithm convergence in non-convex solution space, 𝒈𝟎 = [𝟏. 𝟒, 𝟏. 𝟒] 30 This scenario aimed at showcasing how even a very simple network might bear significant nonconvexities in the objective function, depending on the separate link cost functions. Our decomposed approach was anyway able to correctly descend from the given initial point towards the same local minimum as that reached by a fully centralized scheme. The slight difference in the final point is introduced by the quadratic models being minimized at each iteration, but this hardly influences the solution’s quality in terms of objective function (0.01%). Scenario 3: This scenario employs again the same network, but we now substitute the pricing control on link 11 with a traffic light controller on node 7. We model this traffic light controller by employing a modified BPR cost function for the two incoming links 5 and 6, modeled as follows: fl c5 ( f5 ) 1 5· 400· 5 5 fl c6 ( f 6 ) 1 6 · 400· 6 6 (41) where the two new parameters 5 and 6 model the green split that node 7 assigns to either of the two incoming links. Finally, we assume that no “all-red” phase is included, and we therefore add the following constraint to the problem: 5 6 1 The remaining link cost functions are again BPR in the form cl ( f l ) 1 l ·( f l / 400) (42) l and with parameter set as follows: Link 10 Link 5 Link 6 Link 12 Link 13 10 0.5, 10 2 5 0.2, 5 4 6 0.2, 6 4 12 0.5, 12 4 13 0.4, 13 2 Link 11’s dependence on flow has been removed in this case, in order to allow a fair comparison between the solution space for the two pricing controller case and that in which one has been substituted by a traffic light intersection. Link 12 remains a pricing controlled link, with variable g12 . Following constraint (42), the solution space for this three-dimensional problem can easily be expressed by showing only one of the two green splits, in this case we choose that of link 5 and show in Figure 5.6 the resulting descent from the initial vector g0 [0.56,0.44, 2.5] , respectively controllers 5 , 6 and g12 . 31 Figure 5.6: Algorithm convergence in non-convex solution space, with pricing and traffic light controls The computational times for the two algorithms were as follows: 114 s for fmincon and 63 s for BCD. As for the previous non-convex case, in this instance our decomposed algorithm was able to reach the same optimum found by the centralized approach. By analyzing the solution space shape of Figure 5.6 it’s moreover recognizable that for gradually increasing values of g12 choosing an initial point such that 5 0.47, 6 0.53 will lead either algorithm to a local minimum in g [0,1, g12 ] . We finally show the evolution of the trust region parameter k for this latter simulation in Figure 5.7. 32 Figure 5.7: Evolution of trust region size k over consecutive steps. From the two figures it’s quite clear that while the quadratic model’s fit to the behaviour of Total Cost with respect to g12 is quite good already from step 10 onwards, the same conclusion cannot be drawn for 5 . Indeed, the impact of the traffic light controller is considerably less convex, which means that the quadratic model’s fit is not to be trusted, at least until later in the iterations, when the operational point is closer to the well behaved minimum area. This conclusion is evident when looking at Figure 5.8, where the objective function shape around the operational point of iteration 10 and iteration 30 is shown for both controllers. 33 Figure 5.8: Shape of the Total Cost objective function for different iteration numbers 5.4 Case Study 2: Sioux Falls Network The second case study we present is devised in order to assess whether our distributed optimization approach is systematically able to successfully descend to a local minimum with the same properties as those reached by centralized approaches. The network used for this case study is shown in Figure 5.7; it’s a very well-known benchmark case; while it can’t be regarded as a real-life size network, it’s widely recognized as a good candidate for algorithmic testing. 34 3 1 2 1 5 2 4 8 3 4 6 7 35 11 9 13 23 10 31 9 25 33 12 36 15 5 26 32 34 40 6 12 16 21 48 10 29 51 49 30 14 42 71 44 72 23 13 74 39 24 15 18 54 50 18 58 56 60 19 45 46 67 22 59 69 65 68 66 55 7 52 57 70 73 76 16 20 17 28 43 41 38 17 22 47 53 37 19 8 24 27 11 14 21 75 61 63 62 20 64 Figure 5.7 (Prepared by Hai Yang and Meng Qiang, Hong Kong University of Science and Technology) Rather than employing the full Origin/Destination matrix available in literature, for the sake of computational speed we limit ourselves to a smaller case, in which the O/D relationships are all the combinations in which the following node set acts both as Origins and Destinations: [1, 2, 7, 10, 13, 20]. The total demand on this network is 30000veh/h. In order to validate our algorithm, we set up more than 200 different instances of this network, randomizing the BPR cost function of all links 𝑙 as follows: rand 2,4 1 fl cl fl 1 0.25 rand [120, 70] 3000 (43) The pricing control vector is g [ g4 , g14 , g28 , g43 ] , placed on the links highlighted in Figure 5.7 who frequently appear in the shortest paths of the different O/D patterns. For all scenarios, we set BCD’s parameters as follows: 35 g0 vect ([0.2]) 0.9 0 102 0 510 · 2 10 3 While the choice of g 0 is entirely arbitrary, the four other parameters are chosen following a simple consideration: as the size and complexity of the problem increases, especially regarding the route choice behaviour, we adjust the parameters in accordance to the lesser degree of faith we put in the fact that the solution space might be well-behaved. This shows especially in the decreased value of 0 and the increase of . To compare the goodness of the solutions found with our algorithm with classic, centralized approaches, once a random instance has been created, we first let BCD converge to a solution, and successively feed this in to MATLAB’s general purpose optimizer fmincon, whose objective function is the fully centralized Total Cost. We deem successful those instances in which, given an initial point coming from the decomposed BCD algorithm, little to no improvement is found by employing the centralized approach. The main idea behind this process is that of discovering whether or not BCD was able to converge to a local minimum, from which fmincon will not be able to escape. The instances in which fmincon yields a considerably lower objective function value than BCD mark the latter’s failure to find a suitable descent direction. We consider BCD’s performance, in terms of objective function reduction, as the baseline, and compare fmincon’s result in percentages; a value greater than 0% implies that the centralized approach was able to find a local minimum with an objective function value lower than that found by BCD. The results for these test results is shown in Figure 5.8. Figure 5.9 also includes the extra computational time spent by fmincon in the comparison criteria. 7000 Total Cost value 6500 6000 BCD 5500 fmincon 5000 4500 1 51 101 151 201 251 Test number Figure 5.8: Performance comparison between fmincon and BCD 36 1200 % Extra computational time 1000 800 600 400 200 0 0 50 100 150 200 250 % Additional obj. fun. improvement Figure 5.9: Performance and comp. time comparison between fmincon and BCD This computational time is also expressed in percentage: a value of 100% implies that the amount of extra time spent by fmincon equals that which was spent by BCD to determine the initial solution. The high concentration of test results in the neighborhood of 0% clearly shows that our decomposed algorithm is able to converge to local minima consistent with fully centralized solutions; moreover, the computational time analysis shows that seeking further improvement through the centralized approach is, in most cases, considerably expensive with respect to the actual gain to be found. The few instances that yield values noticeably different from 0% were analyzed in detail; this analysis showed that the Total Cost objective function can exhibit, in some cases, flat regions for determinate controllers. The rationale behind this behaviour can be found by considering the nature of Deterministic User Equilibrium: if, for a given OD pair containing the controller for which the sensitivity J f ( g ) is being computed, only one (shortest) route is being utilized, the minimum amount of cost increase needed to trigger the user’s routing response is the cost gap between this route and its “next best” alternative. Our approach obtains J f ( g ) by employing a simple Central Differences scheme, for which the amount of positive/negative control disturbance g is fixed; this might be smaller than the aforementioned cost gap, in which case the equilibrium will simply not respond to the cost variation. Matlab’s fmincon procedure, instead, employs techniques that dynamically recompute the cost disturbance used for the finite difference procedure, and might thus be luckier in reaching the threshold for activating alternative routes. This problem only affects deterministic assignment procedures; in a stochastic setting, due to the probabilistic nature of the users’ perceived costs, even a small disturbance will be sufficient to trigger an equilibrium response, regardless of the actual cost gap between the shortest and the next best alternative routes. 37 These insights will be exploited in the future, in order to identify those cases in which only one route alternative is being used by a certain OD pair, so that then a correct sensitivity step or, alternatively, a better initial point can be determined. 6. Conclusions We study and define how anticipatory network control can be decomposed while maintaining network-wide optimality, focusing on static scenarios. We define which and how the sensitivity information needed by each separate controller can be obtained, identifying through a simple objective function reformulation which parts of this sensitivity analysis depend on network-wide information and which, instead, can be estimated separately by entities different than the controllers themselves. We represent control decompositon by developing a decomposed optimization approach and algorithm, in which the physical separation is modeled by controller-wise partitioning of the original centralized optimization problem. This algorithmic definition allows us to determine the conditions under which a fully decomposed control scheme would yield performance equal to that of centralized approaches. Recognizing that the conditions under which our approach would be fully optimal are restrictive, we perform different tests, aimed at assessing the decomposed algorithm’s convergence properties and optimality when dealing with highly non-convex solution spaces. We employ a well-known general purpose optimization algorithm in order to provide comparisons between our decomposed approach’s performance and that of a fully centralized approach. Our test results show that, even when dealing with highly non-convex problems, our decomposed algorithm is still able to consistently converge to good local minima, therefore confirming our intuition that optimal control decomposition, even in bigger networks, is still feasible and yields solutions whose quality is fully comparable to other, local sensitivity based centralized optimization algorithms. The few instances in which an acceptable descent direction was not found have been analyzed in detail, and the rationale behind them was identified for future investigation. Future research directions include modifying our algorithm’s sensitivity analysis in order to achieve better robustness when dealing with discontinuities in the objective function’s gradient, to achieve better results when dealing with deterministic user response. Another interesting direction to pursue is that of achieving global optimality, e.g. by employing meta-heuristics to escape from local minima. Naturally distributed approaches, such as Particle Swarm Optimization, could be tuned in order to fully exploit the structure of our decomposed algorithm; it would be worth investigating how such an approach would compare to one based on a fully centralized optimization problem. Finally, our main topic for future research is that of extending the results and findings we obtained in this work to the domain of Dynamic Traffic Assignment, in order to develop mathematically solid methods and algorithms that accommodate the need for decomposition of real-life traffic control 38 systems and yet achieve performances comparable to those of a fully centralized anticipatory traffic controller. 7. Acknowledgments The authors would like to acknowledge the OT/11/068-project and the Vlaamse Overheid, SBO project IWT-140433 in the programs ‘Richting Morgen’ and ‘Vlaanderen in Actie Pact 2020’ for financial support and Willem Himpe for his support in understanding and coding the Dial B algorithm. 39 8. Appendix A: quadratic model formulation Due to its separable nature, the Total Cost objective function can be expressed as a sum of components over all links. Based on this consideration, we explicitly define the quadratic model mk (·) for each controller in the network gi , irrespective of the current iteration, in terms of the following parametric equation: 1 mk ( gi ) ·H ·gi 2 r·gi k 2 (44) where the three parameters are obtained by analytical expansion of Eqn (22): H lN cl fl · gi gi 2 (45) 2 f c f c f c c r lL g 0,i · l · l l · g 0,i · l · l fl · l cl fl · l gi fl gi fl gi fl gi f c f c c k TC0 lL g 0,i · l · g 0,i · l · l fl · l cl g 0,i · fl · l gi fl gi fl gi (46) (47) Within the trust region constraints of algorithms 3.1 and 5.1, the solution to this quadratic model is found through simple algebra: g i* H / r 40 (48) 9. Appendix B: analytic route flow solution derivation Given the link cost functions of Table 1 and the route definitions of (33), the route costs are simply determined through summation as follows: cr1 a10 f10 b10 4·c0 cr2 a11 f11 b11 4·c0 cr3 a11 f11 b11 4·c0 cr4 a12 f12 b12 4·c0 (49) cr5 a12 f12 b12 4·c0 cr6 a13 f13 b13 4·c0 the anticipatory traffic control problem subject to user equilibrium can be defined through the following system of equations: cr1 cr2 g11 cr3 g11 cr4 g12 c g c 12 r6 r5 f r1 f r2 DAD f f D r4 BE r3 f r f r DCF 6 5 (50) where the first three equations represent the user equilibrium response constraints, that is that the pair of routes serving the three OD’s share equal costs, while the other three are the demand satisfaction constraints. The resulting equilibrium route flows can be analytically determined in function of the demands and the two control values by solving system (50): 41 1 ·(a11a13b10 a12 a13b10 DBE a11a12 a13 DCF a11a12 a13 a11a13b12 D a11a13 g12 a12 a13b11 a12 a13 g11 a11a12b10 a11a12b13 DAD a11a12 a13 ) f r1 1 ·(a11 DAD a10 a12 a11a13b10 a12 a13b10 DBE a11a12 a13 DCF a11a12 a13 a11a13b12 D a11a13 g12 a12 a13b11 a12 a13 g11 a11a12b10 a11a12b13 DAD a10 a11a13 DAD a10 a12 a13 ) f r2 1 ·(a11 DAD a10 a12 a11a13b10 a13a10b11 a13a10 g11 DCF a10 a12 a13 DCF a11a12 a13 D a10 a13b12 a11a13b12 a10 a13 g12 a11a13 g12 a11a12b10 a10 a12b11 a10 a12b13 a10 a12 g11 f r3 a11a12b13 DAD a10 a11a13 DBE a10 a12 a13 DBE a11a12 a13 ) 1 ·(a11 DAD a10 a12 a10 DBE a11a12 a11a13b10 a13a10b11 a13a10 g11 DCF a10 a12 a13 D DCF a11a12 a13 a10 a13b12 a11a13b12 a10 a13 g12 a11a13 g12 a11a12b10 a10 a12b11 f r4 a10 a12b13 a10 a12 g11 a11a12b13 DAD a10 a11a13 a13a10 DBE a11 ) 1 ·(a11 DAD a10 a12 a10 DBE a11a12 a11a12b10 a10 a11b12 a10 a11b13 a10 a11 g12 D a10 a12b11 a10 a12b13 a10 a12 g11 a11a12b13 DCF a10 a11a13 DCF a10 a12 a13 DCF a11a12 a13 ) f r5 1 ·(a11 DAD a10 a12 a10 DBE a11a12 a10 DCF a11a12 a11a12b10 a10 a11b11 a10 a11b13 D a10 a11 g12 a10 a12b11 a10 a12b13 a10 a12 g11 a11a12b13 ) f r6 (51) With D a10 a11a12 a10 a11a13 a10 a12 a13 a11a12 a13 Based upon the analytic solution (51) the Jacobian matrix of route flows with respect to variations in the two controllers can be easily compiled by means of partial derivatives: f r1 f r2 f r3 J fr ( g ) f r 4 f r5 f r6 / g11 / g11 / g11 / g11 / g11 / g11 f r1 / g12 a12 a13 a11a13 f r2 / g12 a12 a13 a11a13 f r3 / g12 (a10 a12 a10 a13 ) 1 a a a a 10 13 11 13 · a10 a13 a11a13 D f r4 / g12 a10 a12 a10 a13 a10 a12 a10 a11 f r5 / g12 a10 a12 a10 a11 f r6 / g12 With D a10 a11a12 a10 a11a13 a10 a12 a13 a11a12 a13 42 (52) Bibliography Aboudolas, K., Papageorgiou, M., Kosmatopoulos, E., 2009. Store-and-forward based methods for the signal control problem in large-scale congested urban road networks. Transp. Res. Part C Emerg. Technol., Selected papers from the Sixth Triennial Symposium on Transportation Analysis (TRISTAN VI) 17, 163–174. doi:10.1016/j.trc.2008.10.002 Aboudolas, K., Papageorgiou, M., Kouvelas, A., Kosmatopoulos, E., 2010. A rolling-horizon quadraticprogramming approach to the signal control problem in large-scale congested urban road networks. Transp. Res. Part C Emerg. Technol. 18, 680–694. doi:10.1016/j.trc.2009.06.003 Allsop, R.E., 1974. SOME POSSIBILITIES FOR USING TRAFFIC CONTROL TO INFLUENCE TRIP DISTRIBUTION AND ROUTE CHOICE. Presented at the Transportation and Traffic Theory, Proceedings. Balaji, P.G., Srinivasan, D., 2010. Multi-Agent System in Urban Traffic Signal Control. IEEE Comput. Intell. Mag. 5, 43–51. doi:10.1109/MCI.2010.938363 Bar-Gera, H., 2010. Traffic assignment by paired alternative segments. Transp. Res. Part B Methodol. 44, 1022–1046. doi:10.1016/j.trb.2009.11.004 Bar-Gera, H., Hellman, F., Patriksson, M., 2013. Computational Precision of Traffic Equilibria Sensitivities in Automatic Network Design and Road Pricing. Procedia - Soc. Behav. Sci. 80, 41–60. doi:10.1016/j.sbspro.2013.05.005 Boillot, F., Midenet, S., Pierrelée, J.-C., 2006. The real-time urban traffic control system CRONOS: Algorithm and experiments. Transp. Res. Part C Emerg. Technol. 14, 18–38. doi:10.1016/j.trc.2006.05.001 Brdys, M., Tajewski, P., 1994. An algorithm for steady-state optimising dual control of uncertain plants, in: Proc IFAC Workshop on New Trends in Des of Cont Sys. pp. 249–254. Cantarella, G.E., Improta, G., Sforza, A., 1991. Iterative procedure for equilibrium network traffic signal setting. Transp. Res. Part Gen. 25, 241–249. doi:10.1016/0191-2607(91)90141-C Carlson, R.C., Papamichail, I., Papageorgiou, M., 2014. Integrated feedback ramp metering and mainstream traffic flow control on motorways using variable speed limits. Transp. Res. Part C Emerg. Technol. 46, 209–221. doi:10.1016/j.trc.2014.05.017 Conn, A.R., Scheinberg, K., Toint, P.L., 1997. Recent progress in unconstrained nonlinear optimization without derivatives. Math. Program. 79, 397–414. doi:10.1007/BF02614326 De Oliveira, L.B., Camponogara, E., 2010. Multi-agent model predictive control of signaling split in urban traffic networks. Transp. Res. Part C Emerg. Technol., Information/Communication Technologies and Travel Behaviour Agents in Traffic and Transportation 18, 120–139. doi:10.1016/j.trc.2009.04.022 Diakaki, C., Papageorgiou, M., Aboudolas, K., 2002. A multivariable regulator approach to trafficresponsive network-wide signal control. Control Eng. Pract. 10, 183–195. doi:10.1016/S09670661(01)00121-6 Dial, R.B., 2006. A path-based user-equilibrium traffic assignment algorithm that obviates path storage and enumeration. Transp. Res. Part B Methodol. 40, 917–936. doi:10.1016/j.trb.2006.02.008 Dial, R.B., 1999. Network-Optimized Road Pricing: Part II: Algorithms and Examples [WWW Document]. URL http://pubsonline.informs.org/doi/abs/10.1287/opre.47.2.327 (accessed 1.28.14). Dotoli, M., Fanti, M.P., Meloni, C., 2006. A signal timing plan formulation for urban traffic control. Control Eng. Pract. 14, 1297–1311. doi:10.1016/j.conengprac.2005.06.013 Du, L., Han, L., Li, X.-Y., 2014. Distributed coordinated in-vehicle online routing using mixed-strategy congestion game. Transp. Res. Part B Methodol. 67, 1–17. doi:10.1016/j.trb.2014.05.003 Fletcher, R., 2013. Practical Methods of Optimization. John Wiley & Sons. 43 Gartner, N.H., 1983. OPAC: A DEMAND-RESPONSIVE STRATEGY FOR TRAFFIC SIGNAL CONTROL, in: Transportation Research Record. Presented at the 62nd Annual Meeting of the Transportation Research Board. Gartner, N.H., Pooran, F.J., Andrews, C.M., 2001. Implementation of the OPAC adaptive control strategy in a traffic signal network, in: 2001 IEEE Intelligent Transportation Systems, 2001. Proceedings. Presented at the 2001 IEEE Intelligent Transportation Systems, 2001. Proceedings, pp. 195–200. doi:10.1109/ITSC.2001.948655 Gentile, G., Meschini, L., Papola, N., 2004. Fast heuristics for continuous dynamic shortest paths and all-or-nothing assignment, in: AIRO 2004. Geroliminis, N., Haddad, J., Ramezani, M., 2013. Optimal Perimeter Control for Two Urban Regions With Macroscopic Fundamental Diagrams: A Model Predictive Approach. IEEE Trans. Intell. Transp. Syst. 14, 348–359. doi:10.1109/TITS.2012.2216877 Haddad, J., Ramezani, M., Geroliminis, N., 2013. Cooperative traffic control of a mixed network with two urban regions and a freeway. Transp. Res. Part B Methodol. 54, 17–36. doi:10.1016/j.trb.2013.03.007 Hajiahmadi, M., van de Weg, G., Tampère, C., Corthout, R., Hegyi, A., De Schutter, B., Hellendoorn, H., 2015. Integrated Predictive Control of Freeway Networks Using the Extended Link Transmission Model. IEEE Trans. Intell. Transp. Syst. Hegyi, A., De Schutter, B., Hellendoorn, H., 2005. Model predictive control for optimal coordination of ramp metering and variable speed limits. Transp. Res. Part C Emerg. Technol. 13, 185–209. doi:10.1016/j.trc.2004.08.001 Henry, J.J., Farges, J.L., Tuffal, J., 1984. THE PRODYN REAL TIME TRAFFIC ALGORITHM. Presented at the IFACIFIPIFORS CONFERENCE ON CONTROL IN. Hunt, P.B., Robertson, D.I., Bretherton, R.D., Winton, R.I., 1981. SCOOT - A TRAFFIC RESPONSIVE METHOD OF COORDINATING SIGNALS. Publ. Transp. Road Res. Lab. Katwijk, R.T. van, 2008. Multi-agent look-ahead traffic-adaptive control. Netherlands TRAIL Research School, Delft, The Netherlands. Kotsialos, A., Papageorgiou, M., 2004. Efficiency and equity properties of freeway network-wide ramp metering with AMOC. Transp. Res. Part C Emerg. Technol. 12, 401–420. doi:10.1016/j.trc.2004.07.016 Lin, S., De Schutter, B., Xi, Y., Hellendoorn, H., 2012. Efficient network-wide model-based predictive control for urban traffic networks. Transp. Res. Part C Emerg. Technol. 24, 122–140. doi:10.1016/j.trc.2012.02.003 Lin, S., De Schutter, B., Xi, Y., Hellendoorn, H., 2011. Fast Model Predictive Control for Urban Road Networks via MILP. IEEE Trans. Intell. Transp. Syst. 12, 846–856. doi:10.1109/TITS.2011.2114652 Lin, X., Tampère, C.M.J., Viti, F., Immers, B., 2014. The Cost of Environmental Constraints in Traffic Networks: Assessing the Loss of Optimality. Netw. Spat. Econ. 1–21. doi:10.1007/s11067014-9228-8 Little, J.D.C., Kelson, M.D., Gartner, N.M., 1981. MAXBAND: A PROGRAM FOR SETTING SIGNALS ON ARTERIES AND TRIANGULAR NETWORKS, in: Transportation Research Record. Presented at the 60th Annual Meeting of the Transportation Research Board. Lowrie, P.R., 1990. SCATS, SYDNEY CO-ORDINATED ADAPTIVE TRAFFIC SYSTEM : A TRAFFIC RESPONSIVE METHOD OF CONTROLLING URBAN TRAFFIC. Luo, Z.Q., Tseng, P., 1992. On the convergence of the coordinate descent method for convex differentiable minimization. J. Optim. Theory Appl. 72, 7–35. doi:10.1007/BF00939948 Mauro, V., Taranto, C. di, 1990. UTOPIA. Control Comput. Commun. Transp. Mirchandani, P., Head, L., 2001. A real-time traffic signal control system: architecture, algorithms, and analysis. Transp. Res. Part C Emerg. Technol. 9, 415–432. doi:10.1016/S0968090X(00)00047-4 Papageorgiou, M., Hadj-Salem, H., Blosseville, J.-M., 1991. ALINEA: A LOCAL FEEDBACK CONTROL LAW FOR ON-RAMP METERING. Transp. Res. Rec. 44 Papageorgiou, M., Mayr, R., 1982. Optimal decomposition methods applied to motorway traffic control. Int. J. Control 35, 269–280. doi:10.1080/00207178208922618 Rinaldi, M., Tampère, C., 2015. Dynamic Traffic Control Clustering. Presented at the Annual meeting of the Transportation Board, Washington, DC. Rinaldi, M., Tampère, C.M.J., Himpe, W., Holvoet, T., 2013. Centralized and Decomposed Anticipatory Model Predictive Control for Network-Wide Ramp Metering, in: Proceedings of the 16th International IEEE Annual Conference on Intelligent Transport Systems (ITSC 2013). Presented at the ITSC 2013, The Hague, pp. 461–467. Roberts, P.D., 2000. Broyden derivative approximation in ISOPE optimising and optimal control algorithms, in: Proceedings of the 11th IFAC Workshop on Control Applications of Optimization, St Petersburg, Russia. pp. 293–298. Sen, S., Head, K.L., 1997. Controlled Optimization of Phases at an Intersection. Transp. Sci. 31, 5–17. doi:10.1287/trsc.31.1.5 Smith, M.J., Ghali, M., 1990. The dynamics of traffic assignment and traffic control: A theoretical study. Transp. Res. Part B Methodol. 24, 409–422. doi:10.1016/0191-2615(90)90036-X Suwansirikul, C., Friesz, T.L., Tobin, R.L., 1987. Equilibrium decomposed optimization: a heuristic for the continuous equilibrium network design problem. Transp. Sci. 21, 254–263. Taale, H., 2008. Integrated Anticipatory Control of Road Networks. A Game-Theoretical Approach. Taale, H., Hoogendoorn, S., 2012. Network-wide Traffic Management with Integrated Anticipatory Control. Presented at the Transportation Research Board 91st Annual Meeting. Taale, H., Hoogendoorn, S.P., 2013. A Framework for Real-Time Integrated and Anticipatory Traffic Management, in: Intelligent Transportation Systems-(ITSC), 2013 16th International IEEE Conference on. IEEE, pp. 449–454. Tseng, P., Yun, S., 2009. A coordinate gradient descent method for nonsmooth separable minimization. Math. Program. 117, 387–423. doi:10.1007/s10107-007-0170-0 Ukkusuri, S., Doan, K., Aziz, H.M.A., 2013. A Bi-level Formulation for the Combined Dynamic Equilibrium based Traffic Signal Control. Procedia - Soc. Behav. Sci. 80, 729–752. doi:10.1016/j.sbspro.2013.05.039 Van Den Berg, M., Hegyi, A., De Schutter, B., 2007. Integrated traffic control for mixed urban and freeway networks: A model predictive control approach. Eur. J. Transp. Infrastruct. Res. 7. Verhoef, E.T., 2002. Second-best congestion pricing in general static transportation networks with elastic demands. Reg. Sci. Urban Econ. 32, 281–310. Wallace, C.E., Courage, K.G., Reaves, D.P., Schoene, G.W., Euler, G.W., 1984. TRANSYT-7F USER’S MANUAL. Wang, F.-Y., 2005. Agent-based control for networked traffic management systems. IEEE Intell. Syst. 20, 92–96. doi:10.1109/MIS.2005.80 Webster, F.V., 1958. TRAFFIC SIGNAL SETTINGS. Road Res. Lab Tech Pap. UK. Wongpiromsarn, T., Uthaicharoenpong, T., Wang, Y., Frazzoli, E., Wang, D., 2012. Distributed traffic signal control for maximum network throughput, in: 2012 15th International IEEE Conference on Intelligent Transportation Systems (ITSC). Presented at the 2012 15th International IEEE Conference on Intelligent Transportation Systems (ITSC), pp. 588–595. doi:10.1109/ITSC.2012.6338817 Wright, J.N.S.J., 1999. Numerical Optimization. Yang, H., Bell, M.G., 1997. Traffic restraint, road pricing and network equilibrium. Transp. Res. Part B Methodol. 31, 303–314. Yang, H., Yagar, S., 1995. Traffic assignment and signal control in saturated road networks. Transp. Res. Part Policy Pract. 29, 125–139. Yan, H., Lam, W.H., 1996. Optimal road tolls under conditions of queueing and congestion. Transp. Res. Part Policy Pract. 30, 319–332. Zhang, H., Roberts, P.D., 1990. On-line steady-state optimisation of nonlinear constrained processes with slow dynamics. Trans. Inst. Meas. Control 12, 251–261. doi:10.1177/014233129001200504 45 46