OPTIMUM DISTRIBUTION OF TRAFFIC OVER A CAPACITATED STREET NETWORK By Charles Pinnell Project 2-8-61-24 Freeway Surveillance and Control Research Report 2 4-2 ) OPTIMUM DISTRIBUTION OF TRAFFIC OVER A CAPACITATED STREET NETWORK By Charles Pinnell Research Report Number 24-2 Freeway Surveillance and Control Research Project Number 2-8-61-24 Sponsored by The Texas Highway Department In Cooperation with the U. S. Department of Commerce Bureau of Public Roads I October I 19 64 TEXAS TRANSPORTATION INSTITUTE Texas A&M University College Station Texas I GLOSSARY CAPACITATED LINK - Network link with SJ:acific limitations on the total amount of traffic that can pass over this link. COPY - Street network having an input traffic volume at a single origin node and corresponding volume outputs at various destination nodeso E-TYPE CONVERSION - Form of numerical data output by which a decimal fraction is exp~ssed as a power of ten. For example 0.1~ 04 equals 0.15 X 104 and O.l5E-04 equals 0.15 x 10"'4. FREEWAY - High-type street or highway with full control of access and no intersections at-grade. ITERATION - Refers to the process of introducing a vector into the basis of the multi-cop,r linear programming model. LINK - One-way portion of street network connecting two adjacent nodes. LINK TRAVEL COST - Time required to move over a given link from one node to another. MAJOR ARTERIAL - Urban street with intersections at-grade whose function is to provide the through movement of tratfio. MINIMUM PATH ROUTE - Route through a network from a given origin node to a given destination node that requires the least amount of travel time. NODE - Point of intersection in a street network. STREET NETWORK - System of nodes and links representing an urban street system. There are numerous linear programming ter.ms used in the dissertation which are difficult to define in a brief manner. A reader not familiar with this terminology is directed to references (10), (11), (20) and (21) in the reference list. 1 INTR.ODUC TION One of the most significant problems facing those responsible for traffic movement in major urban areas is that of peak hour congestion. " Plans for adequate arterial street systems to cope with this problem · have been drafted but the required facilities are very costly and difficult to provide. It will require many years to provide the necessary facilities and during this time severe peak hour congestion will continua unless other mana are developed to cope with this problem. A freeway is the major traffic carrier in an arterial street system and is the facility which suffers most from peak hour congestion. Only a fraction of an over-all freeway system bas been developed in most urban areas and this partial system contributes greatly to the peak hour overload. The high level of operation provided by a freeway often re- sults in it attracting heavier traffic loads than it will ultimately be required to handle when the entire freeway system is developed. In order to ease the peak hour congestion problem there is a need to effect maximum utilization of urban arterial systems which include both freeways and at-grade facilities. Thus there is a need for oper- ational control during peak hours which would 11 spread11 the traffic load over the entire arterial system. Present operational technology in the traffic field does not extend to systems in a broad sense but rather is limited to individual facilities. This approach is inadequate as it does not consider the 2 interaction of the entire system or develop control measures which would achieve optimum system operation. Thus there is a great need to develop a systems analysis approach to the problem of operating arterial street ne~­ works. Systems Analysis Problem Figure l illustrates a typical master plan for a freeway system of a large urban area. As previously noted I such a system exists only on paper and the actual system presently being utilized may resemble that shown in Figure 2. Thus a single freeway facility may serve a rather large area of a city and as a result experience serious peak hour congestion. The area S shown in Figure 2 represents a typical "corridor area" for which peak hour operational controls are needed. If an expanded view of area A of Figure 2 is taken and the combination of freeway and at-grade arterials is shown as in Figl:lre 3 1 a basic network to which operational controls may be applied is obtained. There are two basic approaches to operational controls which might be as follows: l. Traffic could be controlled along the freeway proper by regulating input and output volumes at the various ramps and by controlling the traffic on the freeway through signing and/or control measures. 2. Traffic could be regulated over the entire system which would include both the freeway and the at-grade arterials. With this approach, traffic 3 MASTER PLAN FOR FREEWAY Figure I SYSTEM I _,' ,.--- I \ I \ I 'I ,------- ' ... ........ I \ ' I ', \ \ \ \ ( I ...,--- I I II 1 I ------~------------~-------\ '>- \ I / / ,"----------~:------~ ____ 1_____ I CBO } '/ I ~""''Y'?····.-l~~~} , . . I '~~i~)Th, -------j~ I I \ \ ', I .... , / . ( ; __ _ / \ \ I ' " I I ' ', I '', '.._ ............ ,I I I I I .,." ,~, , I ------------------ I I EXISTING FREEWAY Figure 2 SYSTEM ,/ "" I LEGEND EXISTING FREEWAY ---· PROPOSED FREEWAY 5 ' ' ' '' ' '\ \ \ \ \ AREA A STREET NETWORK FOR SYSTEM ANALYSIS Figure 3 6 might be controlled or routed at or near its origin rather than at the freeway and the operational controls required would be for the entire system. The first technique is already being applied in several surveillance projects across the country and offers a feasible approach to the problem. The second technique would be a more difficult one but would result in better utilization of the entire system of streets. In order to design a control system for an overall network, however 1 it would be necessary to know something of the desirable or optimum operations of traffic over the given network. The basic question that must be answered initially is as follows: Given a set of traffic inputs and the corresponding outputs for a street network (i.e. - origins and destinations) how should traffic be routed over this network to obtain optimum system operations. This is the basic problem which will be considered in this report. Existing Techniques The need for adequate data from which freeway systems could be planned and designed has led to the development of traffic assignment techniques. These techniques deal with trip desires expressed in terms of origin and destination requirements and a traffic network description defined by nodes 1 links and impedances. Through the use of high speed digital computers 1 it is possible to assign traffic volumes to a street network in a manner simulating 7 the daily loading of the system by individual drivers. The technique of traffic assignment has advanced r~pidly since 19 52 at which time it was stated (28}* that traffic assignment i.s considered to be more of an art than a science. At the present time numerous sophisticated assignment programs exist which-form a basis for an approach to a systems analysis study of arterial street operation. The biggest problem in utilizing existing network assignment techniques, however, is that they are designed to work with large systems and necessarily lack some of the sensitivity that would be desired in a critical operational analysis of a comparatively small system. The basic procedure in an assignment method is to find a minimum path (in terms of travel impedance} through the network from a given origin to a given destination and then to assign the interzonal volumes to this path in some manner. At the present, assignment methods fall into three general categories (28) which are as follows: 1. "All or Nothing" Assignment- all vehicles assigned to the path with the least travel resistance. 2. Diversion Curve Assignment- total number of trips divided between two routes depending upon the relative values of travel resistance on the two routes. 3. Proportional Assignment - total number of trips divided between several * Numbers refer to articles in Reference List. 8 routes depending upon the relative values of travel resistance for the several routes. All of the above procedures may utilize capacity restraints which serve to limit the amount of traffic which may be assigned to any given link. The manner in which tl}ese restraints are applied varies greatly and is a controversial subject {31). Requirements for Analysis Technique A desirable network analysis technique should possess the following character! sties: 1. It should have the ability to determine an optimum means of distributing traffic over a network as well as the ability to simulate network traffic flow. 2. It should provide the ability to place specific capacity limitations on any link in the system. Critical study of existing assignment techniques indicates that they do not have these desirable characterisitcs. A traffic assignment model developed by the Traffic Research Corporation for Metropolitan Toronto (25) selects as many as four alternate routes between a given origin and destination. Vehicles are then assigned to those routes on a proportional basis which varies as the inverse of the travel time on each route. A capacity restraint feature is provided which increases link travel time as a function of assigned volume. This feature would not enable one to hold link volumes at or below prescribed values. 9 The procedure used by the Chicago Area Transportation Study (13) might be termed an "all or nothing assignment." After finding a minimum time path between an origin and destination, all trips between the origin and destination are assigned to this path. After all trips in the system have been assigned, indiv~dual link travel times are adjusted, new minimum paths computed, and interzonal volumes are again assigned. This iterative process continues until the system stabilizes. There is no provision for minimizing over-all system cost or for holding link volumes to predetermined levels. The diversion curve technique of traffic assignment ( 14) also fails to provide a means of assuring optimum distribution of traffic or of holding link volume at or below a predetermined level. In this technique a minimum time path using only freeway links is computed for a trip between a given origin and destination. This same information is computed for a trip moving over the at-grade arterial street system. A ratio of freeway travel time to at-grade arterial travel time is determined and this value is used to select a percent assignment to each type facility from a diversion curve. Linear Programming Approach The technique of linear programming which optimizes a linear criterion function subject to a set of linear constraints appears to offer the required approach to the operational analysis of traffic assignments. Such a method offers an exact mathematical procedure for determining traffic distributions which would minimize travel costs and permit restricting volume levels on 10 network links to desired values. Two approaches to traffic network analysis using a linear programming technique were found in the literature. Heanue (23) proposed a linear pro- gramming model which sought to minize system travel time subject to two primary constraints. These constraints were: (a) Total volume assigned to a network link must be less than or equal to link capacity. (b) Trips assigned to alternate routes between an origin and destination must sum to total trip desire between the origin and destination. The primary disadvantage of this model is that a set of alternate routes between each origin and destination must be selected manually. Since an extremely large number of alternate routes exist between each origin and destination in a large system, this choice would be difficult and would introduce an arbitrary procedure into an otherwise exact method. Charnes and Cooper ( ll) discuss a class of "coupled" linear programming models which they propose has application to the capacitated transportation problem with specific destinations. This model is discussed further as a "multi- copy" model in a presentation made by Charnes (8) at a symposiumon the Theory of Traffic Flow conducted by General Motors in 19 59. Additional analyses of this model were presented by Pinnell and Satterly (34). This model satisfies the previously discussed requirements for a satisfactory network analysis method. The model associates a network description or "copy" 11 with each traffic origin yielding a 11 multi-copy" description of the traffic input data. The transportation problem when formulated as a general linear programming problem has the disadvantage of requiring an extremely large number of constraint equations and is not practical for solution by present computers. To avoid this problem, Charnes states (11) that a change of variable is possible which permits the large problem to be broken up into two smaller problems. The variable for this problem is the convex combination of copy extreme points and the solution becomes one of determing the proper 11 mixture 11 of individual copy extreme point solutions. The extreme points for each copy can be determined by a minimum path procedure and the proper convex combination of these points is found by a modified simplex technique. By utilizing this mixing technique, it becomes possible to convert the linear programming model to a practical computer program. This program could utilize existing techniques such as the modified simplex program and the minimum path algorithm. These two techniques could be combined so that the minimum path algorithm furnishes individual copy solutions and the modified simplex technique method solves the "mixing problem. 11 It is felt that the linear programming model proposed by Charnes fits all the requirements previously discussed and permits a very critical analysis of optimum network traffic flow. It was decided therefore to utilize this model as an approach to the study of optimum distribution of traffic through a capacitated network. 12 Once some basic knowledge is obtained regarding the optimum distribution of traffic through a network then it will be possible to consider the operational controls necessary to affect such optimum operations. The research work reported herein consisted of developing a computer program for the linear programming model and- of utilizing the model to study optimum traffic distribution over a street network. 13 MATHEMATICAL FORMULATION General Linear Programming Model The linear programming technique for traffic network analysis as proposed by Charnes and Cooper (8) has been termed a multi-copy model. This terminology arises from the association of a network copy with each traffic origin on the networkG Figure 4A shows a sample traffic network with traffic inputs and corresponding outputs (origins and destinations). Figures 4B and 4C illustrate individual copies associated with the given network. By selecting the minimization of over-all travel time as the basic criterion and utilizing the network copy concept, the network analysis problem can be formulated as a linear programming problem. Considering an individual copy such as copy 1 of Figure 4, traffic distribution over this network can be formulated as a linear programming problem as followsa Minimize where Cj XCI( j subject to l: j (1) cj xj = Travel cost (in time units) on link j =Amount of traffic (number of vehicles) assigned to link j on copy o( Lj eij xr = E{ where ~ij = Incidence number for the j-th branch at the i-th node (+1 for input, -1 for output, zero i f not conne oted to node) (2) 500 600 I B 9 2 7 10 3 6 II 4 5 TRAFFIC 12 600 500 NETWORK A 500 • I 8 9 2 7 10 3 6 II 4 5 -' 12 COPY 200 600 300 I 8 9 2 7 10 3 6 II 4 .. ===:I5 12 400 200 COPY 2 I c 8 SAMPLE TRAFFIC NETWORK WITH COPY DESIGNATIONS FIGURE 4 I-' ~ 15 E7 = Influx or efflux at the i-th node on copy o<.. The previous constraint equations specify the Kirchhoff node conditions (node input equals node output) for a given copy and assure that the desired origin-destination requirements for the copy are satisfied. A link in each direction (only one in the case of one-way streets) between adjacent nodes is provided to permit traffic flow in both directions and to permit study of directional flow. Similar formulations can be made for each copy of the network. Since each of the "copies" utilizes the same network (hence the name 11 copy11 ) , the traffic flow for the several copies will be superim- posed on various links of the system. In order to insure that no single link of the system will be overloaded, individual capacity limitations can be placed on any specific link of the system. This restraint is formulated as follows: Lc( x:-<J < Llj (J) where ~j =Capacity limitation (number of vehicles) on link j. The inclusion of a capacity limitation on various branches of the system provides a "coupling constraint" which ties the copies together. The network distribution problem can then be formulated as a general linear programming problem as follows: Minimize (4) 16 subject to ~Cij 0{ = xj E« i (5) b.j (6) 0 (7) J Lo( xf < «;:::... Xj- The structure of this formulation is shown in Figure 5. Multi-cow Mixing Model A problem of model size is encountered at once when the distribution problem is considered as a general linear programming problem. This can be readily illustrated by considering a sample network problem. Assume (see Figure 5) that the number of nodes (N) (L) =300 = 100, the number of links and that 20 copies (M) are required to describe the origin- destination requirements. If JO links are capacitated, then the total size of the matrix involved is: (N X M + K) by L X M or (100 X 20 + JO) by 300 X 30 = 2030 by 9000. The magnitude of these numbers readily indicates that it is not practical to treat the probl~m as a general linear programming problem. In order to reduce the size of the problem from a computational stand- point, Charnes and Cooper (11) have devised a special method which is 17 ~ ,.•• I . E. o I L..-!_ rn. j ... ... . ~I <-..!- < M • NUMBER OF COPIES N • NUMBER OF NODES rn. ) L • NUMBER OF LINKS K • NUMBER OF CAPACITATED LINKS PROBLEM TRAFFIC LINEAR STRUCTURE NETWORK PROGRAMMING Figure 5 PROBLEM 18 termed a multi-copy 11 mixing 11 technique. This technique provides a feasi- ble approach to the solution of the traffic network linear programming problem. By using a change of variable, the unknown in the linear programming problem is changed from the amount of traffic on a given branch for a specific copy (xf) to the percent of a given extreme point solution. Using vector and matrix notation, one may formulate the general linear programming problem as follows: Minimize (8) subject to (9) ~)'i~ s: o( (10) d =1 ( o< :::: 1,2, ••• m) where Co( :::: Cost vector for copy o<. Individual element cost on link j for copy o(. 7\,r.. cj is the j == Solution vector for copy 0(. Individual elenant )\. is the number of vehicles assigned to link j on copy o(. Ac( == Matrix of incidence numbers for copy ~. b~ ==Vector of node influxes or effluxes for copy ~. Individual elemnt bj node j on copy q(. is the influx or efflux at ko( r~ ==Matrix of structural coefficients ( 1 or 0 ) which specifies the capacitated links on copy o<. d == Vector of capacity constraints. Individual element dj is the limiting capacity on link j. 19 Note - Vectors are considered as column vectors unless otherwise indicated. For example c« T is a row vector obtained by the transpose of C Of. Thus~ represents a solution to a given copy P{ and satisfies the constraints Therefore, /l o< is one element of the total solution vector ;t where Assuming that the .i\o( (individual copy solutions) form a bo1.mded non-empty convex set, one can then express of extreme points as ittl( as a convex combination follows~ (12) with the condition ~ .,B~ fi~<{J ::: 1 (13) (1.4) 20 where atA...P ~ ~.p .o = The ~ -th extreme point solution on copy ~ = Percentage of the ,.t9 -th extreme point solution on copy s~en It can then be binations or 11 o(. that the total solution}\ consists of convex com- mixtures 11 of individual extreme point copy solutio~s. The problem Lm Minimize co<T /\.o< (15) o(=l (16) subject to (17) (18) can be reformulated as a 11 mixing 11 problem as follows: Minimize (19) subject to (20) =1 (21) (22) 21 In the preceding fornulation, A~ ~ d...P e ~ ./3 =l -~1 /-~ has been substituted for anrl the conditions (23) have been incorporated as part of the constraint eq un. tiona. The c.onstraints (25) (26) uro rodun,'lunt nnd omitted since E"'-H is a particular 'A.o<. which satisfies these conditionfl. 'l'he vu.riable for the mixj.ng problem is -C d..{J - - Cc< T e f:I.,P JA..tt"f'' with the cost • (27) The vectors from the constraint equations will be made up of (28) whore L~p =Vector of traffic assignments on capacitated links for copy c<: and tho .,B -th extreme point solution. An individual element L~ is the amount of traffic on capacitated link k on copy c< for the -/3-th extreme point solution 22 and the unity element from = 1. (29) Solution Technique The initial tableau for the problem can be set up ~ obtaining an extreme point solution from each copy ( eot,/1) and ~ adding the necessary slack or artificial vectors. in Figure 6. An example of the initial tableau is shown This tableau contains the basis vectors for a feasible solution to the problem. If the inverse of the basis is obtained (B-1 ), the initial basic feasible solution (P~) is found as follows: P(0) 1 = B-l P(O). (30) The mixing problem is now in the form of a simplex tableau and - optimality checks can be obtained by considering individual "Zj - Cj" expressions. Lemke (12) If a modified simplex method as developed by Charnes and is used to progress toward an optimum solution, then an in- dividual vector (Pj) to be checked as 11 come-in" vector may be expressed as follows: (31) The vector W is an "evaluation vector" and is computed as follows: 23 COST VECTOR SOLUTION VECTORS Cu C21 C31 P,, P21 P31 V2, v3, CAPACITATED VII LINK I CAPACITATED V12 LINK 2 ,. V22 V32 • • • • • • • • Lie • • I• CMt 0 00 PMI s, A, VMI I VM2 • • • • • • • • • • • • CAPACITATED LINK K COPY I VtK V2K V3K I • • • -~~ 0 SK l 62 • • • • • • VMK I I I - COPY I I 3 AK I I 2 p(O) 6, I • • • I COPY .i. • • • • • • • I • • • • • • COPY M I I CMI- COST OF FIRST SOLUTION ON COPY M PMI- VECTOR FOR SOLUTION I ON COPY M S1 - SLACK A1 - ARTIFICIAL VECTOR Vii- VOLUME ON LINK (j) FROM COPY ( i ) VECTOR INITIAL TABLEAU MULTI-COPY MODEL FIGURE 6 24 (32) where C =Total cost vector. - An individual element is Co</1 as previously defined. The W vector wiil be made up as follows: (33) where uT =Vector of individual uv elements associated with the constraint (34) and b""o<. = Individual CV element associated with the constraint (35) If an individual vector is checked as a "come-in" vector by con- - sidering its nzj - Cj" value, then (36) Letting j = oi..,B (37) and since Pc<.p = [ Lq ,e , 0, ••• 0,1, 0, ••• 0] (38) 25 and W (39) T Pc<,e then zo(.,s - - oc<.,e = uTL-<.fJ + ~- - oc( 11 .. (40) Rearranging (40) and using the relationships (41) and (42) then (43) • For optimality, it is necessary and sufficient that for all o( (44) For non-optimality and the indication of a vector (Po<;') as a vector, it is necessary and sufficient that for some 11 cc:>m~-in 11 c( (45) Thus at each stage, the value for (46) 26 must be obtained. Since~ is not a function of ,8 , the problem of finding Max over ..,8 [ (uT K(l(- efT) ec<.fJ + o-J- (47) for a particular,copy (o<) is equivalent to solving the following: Max (UT f{f1(- cf'T) f?o<,l subject to Ao< (48) e«.,11 = b"( (49) eo<.s ~ o (50) or Min € ('(,6' eo(.,a = b o< (51) o. (53) (co<T - ij! lfo() subject to A0( eCI(.,.~ (52) The solution to the above formulation, however, is a minimum-path solution to the copy network with the link costs given b,y Link Cost Vector (54) Thus obtaining a minimum-path solution for a particular copy supplies a € «.,11 - and a value for Ze<.p - 0«,8 • If this value is greater than zero, then the column vector for this extreme point may be used as a vector. 11 come-in11 If the value is less than or equal to zero, another copy solu- tion may be considered. If a vector is brought into the basis, then new values for W T and the "dummy" costs ( co(T - uTI(«.) may- be obtained. Using these new costs, a newe~is generated and the corresponding 27 vector may be checked for 11 come-:in11 • Thus the large over-all problem may be broken down 'into two smaller problems for computational efficiency. 1. These are: The solution of a m:inimum-path problem for a given copy network 11 2. The modified simplex procedure. One other condition that must be considered is the occurrence of a positive element in the uT vector. This condition indicates that a "slack vector" (a unity vector with a one in the position corresponding to the positive uT element) would improve the solution and such a vector must be entered at this time. The efficiency of the "mixing" technique is illustrated ing the problem discussed on page 15. qy consider- Whereas the solution of this ex- ample as a general linear programmjng problem would require wor.K:tng-wftli · a 2030 ey 9000 matrix, the 11 mixing 11 model technique would require only a 50th order "working" matrix. The order of the mixing model matrix is the number of copies plus the number of capacitated links. Example Problem In order to illustrate the model and to demonstrate the application of the mathematics previously developed, the step-by-step solution of a small network distribution problem will be presented and discussed. The simple four-node network with directional links and traffic requirements shown in Figure 7 will be used for analysis. The problem consists of determining the optimum routing of traffic over this network with 28 70 30 10 50 60 NETWORK COPY DESCRIPTION I COPY 30 50 2 20 10 60 50 ~- LINK CAPACITY 5 - LINK NUMBER ~ - LINK TRAVEL COST 50 ®- "'G) - NODE NUMBER INPUT VOLUME ~- O~TPUT VOLUME 10 NETWORK DESCRIPTION AND TRAFFIC DATA EXAMPLE PROBLEM FIGURE 7 29 capacity restrictions on links 3 and 9. A step-by-step solution of this problem is as follows: Step 1 - Determine minimum path solutions for each copy using actual link costs. Determine solution costs and solution vectors. Set up initial basis and P(O) vector. See Figure 8. An extremely high cost denoted by the letter M is assigned to the artificial vectors. Step 2 - Find inverse of initial basis and compute UJ T and P0 1 • Set up this information in a tableau as shown in Figure 9. Step 3 - Compute new "dummy costs" for the network and find new minimum path solution. (Figure 10). Note that the over- load of links 3 and 9 results in these links receiving high travel costs and that solution e1 2 does not utilize these links. "come-in.n The vector P12 is formed and checked for The large "Zj - Cj" indicates it would improve the solution and a standard simplex computation for e indicates its Step 11 come-in 11 point. 4 - Vector P12 is brought into the solution and the tableau shown in Figure 11 results. Dwnrny costs are computed and the solution el3 is obtained with the corresponding vector P13 • The "Zj - Cj" for this.vector is negative, which indicates it will not improve the solution and therefore copy 2 is now considered. positive nz j - c j" and 'oTill Vector P22 has a large be brought into the solution. 30 FIRST MINIMUM P,l PATH- COPY I - 7------- 3 50 COST e1 = 50 (10) + 10 (6) .. 560 10 60 FIRST MINIMUM PATH- COPY 2- 30 VEH 30 20 ./ I I ~I ~1 COST ./ = 30 (7) + 50 (6) • 510 / / &-:----50 INITIAL BASIS AND p(o) VECTOR pll p21 A, A2 560 510 M M p (o) 0 50 -I 0 40 50 0 0 -I 20 I 0 0 0 I 0 I 0 0 I INITIAL BASIS EXAMPLE PROBLEM FIGURE 8 31 INVERSE OF INITIAL BASIS 0 0 0 0 0 -I 0 0 50 0 _, 50 0 0 -I. B • - W = C B VECTOR -1 ' = t 560,510,M,M, l [e-J "r-M ,-M,560+50M,510+50M l I WT--+ P(o) BASIS P,, p21 0 0 I 0 I PII 0 0 0 I I p21 -I 0 0 50 10 A, 0 -I 50 0 30 A2 -M AI Az 5 60 510 1070 -M + + + 50M 50M 40M CURRENT COST INVERSE OF INITIAL BASIS EXAMPLE PROBLEM FIGURE 9 32 ..---------------------------------------------- FOR LINK 3 FOR LINK 9 DUMMY COST DUMMY COST = 6-~M >+M = 10- (-M) =10 +M r-----------,--------------- -------------------------------4 50 10 60 T p 12 • [ o, o ,t. o J COST • 5o (8) +so (7) + to(6) • 8to WP 12 - C • 560 +5o M -810 • -250 +5o M I I P(o) BASIS P,z 0 0 0 0 0 -I 0 0 50 10 A, 0 -I 50 0 30 Az -M -M 0 Pu 0 P,z 0 560 510 1070 + 0 + 50M 10 "_!1 • I -&- = 3~-50 0 50 +-Z·-C· J J INITIAL TABLEAU EXAMPLE PROBLEM FIGURE -& 0 -250 + 150M 5bM 40M P,z • ~5 4 - - 33 I p(o) BASIS pl3 I Pzz p22 0 ~0 0 0 ~5 Pn 0 0 ~ 0 0 0 I I p21 50 20 I -I 0 0 50 10 A, I 0 50 0 ~5 I -~o 0 -M -5 I 0 pl2 510 1220 810 5dM IO+M -e- = ~Y2,/s -e- = 1 %o • Ys - -/5 -330 -75 5dM T pl3. [0,50,1,0] c, 3 15 (5o) + 6 (lo) • 810 ~ WP, 3 -C 13 • -75 +810-810• -75 60 30 20 T P22 • [ o,2o,o,1 1 C22 • WP 22 5o(6)+30(8)+I0(20)• 740 - C22 • -100 +510 +5oM -740 • -330 +50 M 50 INVERSE OF SECOND BASIS EXAMPLE PROBLEM FIGURE II 1 -&=!/1•1 2 I · 34 Step 5 - Vector P22 is brought into the solution and the tableau shown in Figure 12 is obtained. Solution e23 is developed and the corresponding vector P23 has a positive "Zj - Cj"• Step 6 - Vector P23 is brought into the solution and the tableau sho!'lll in Figure 13 obtained. Solution € 24 is determined and vector P24 is found to be an alternate solution. Copy 1 is considered again and vector P14 is found to have a positive ttz j - Cj." Step 7 - Vector P is brought into the solution and the tableau 14 shown in Figure 14 is obtained. Vector P15 is found to be an alternate solution as is vector P • 25 Thus an optimum solution to the problem has been reached. The final solution to the example problem is given b,y the P0 1 vector in the tableau of Figure 14 and is as follows: Taking the indicated percentages of the copy solutions in the final basis and combining them yields the final optimum solution shown in . Figure 15. 35 I I p(Ol BASIS p23 I 2 ~50 /50 ~ -~5 ~5 ~0 0 0 -~c 0 0 I -4.6 30 % 810 -5 Pu 20 -%5 Ys p21 0 % -& • 'Y0/!5. 2 ~ p22 0 ~5 -& • !.---0/!5 • y3 I~ 25 P12 I %~ -& • ''Y2y% 5 • 1Y6 0 -~5C -.Yso 108 740 1266 _ _ffi_ - - 4 p23 20 3 / / / E, ./ ~ ./ 0 ~ ~23 0 N / v/ f6\ I 2 30 50 p T • 23 c23 • [ 20, 0, 0, I ] 8(30) WP23- C23 • + 6(30) + - 4.6(20! 20(6) + • 540 740-540 • 108 INVERSE OF THIRD BASIS EXAMPLE PROBLEM FIGURE I2 36 , , P(O) BASIS p24 0 1----- I~ ,__ __ ~0 0 0 0 -3<3 I~ 0 5/ / 3 ·-r-- ~ I ~0 -Xo -0 I , 0 -I '---- 0 - -~0 I 0 pll 25 ---15 p21 p23 IJ: pl2 25 -5 810 560 1230 ----- --- 50 pl4 pl4 50 0 +-·-1 - - - ~·----· 0 0 5/3 0 I -~ I 0 I -& = IC}f5~/3 = 2/§ - -& = 15~5~ = 3/5 0 -- -·--'--·--- [Aj.}ERNA TE 30 SOLUI@ij 20 T p24 - (50 ,0,0,1 J C24 - 1 (3o) + WP24- C24 • 50 P 14 C14 T =[ - 6 (so) • 510 -50 +560 -510-0 5o,o,I,OJ 6(60) + 6(50) • 660 c:JPI4 - C 14 =- -so +slo -6so= +loo INVERSE OF FOURTH EXAMPLE FIGURE PROBLEM 13 BASIS 37 P(o') BASIS pl5 p25 0 20 0 ~0 0 0 I~ /;o 0 0 -~5 2/. 5 pl4 50 0 0 0 0 I I p23 I 0 I I I 2/. 5 1/. 5 pl2 0 I 0 0 I -~0 -~0 -3 -5 25 pll 810 600 1190 T p 15 •[o,5o,l,oJ c1s :.lo(so)+ 6(10). 560 WP15- C15 • -250 + e1o -560. o 60 ALTERNATE SOLUTION T P2s • I 2o,o,o,1 I c25 • 20 (6) + 6 (30) + e (30). 540 l.JP25- C25 • -60 + 600 -540 • 0 50 ALTERNATE SOLUTION INVERSE OF FINAL BA Sl S EXAMPLE PROBLEM FIGURE 14 38 0 0 50 <:.o pll ( 10h5) 20 = '/,.0 10 4 60 24 50 10 P,2 (1/5) = 10 2 J. '12 0 50 pl4 (2;5) = 0 j1>- 10 4 24 30 20 30 p23 ( I ) 20 = 30 30 50 60 FINAL SOLUTION EXAMPLE PROBLEM FIGURE l5 39 COMPUTER PROGRAM DEVELOPMENT. In order to study the optimum distribution of traffic using a linear programming model, it was necessary to develop a computer program which would perform the arithmetic operations of the problem. A computer program to perform this technique was coded by staff m€mbers of the Data Processing Center of Texas A&M University. This coding was written in Fortran II with the exception of one subroutine which was written in FAP (Fortran Assembly Program). The logic, testing and operation of this program will be discussed· in the following sections of this chapter. Program Logic The basic logic of the program is illustrated in the block diagram shown in Figure 16. The program utilizes three basic operations in proceeding toward an optimum solution. These are as follows: ( 1) Computation of a minimum time path through the network. (2) Modified simplex technique of checking optimality at each stage. (3) Gaussian elimination technique of bringing new vectors into the basis. These three basic steps are repeated until an optimum solution is reached on all copies. Initial Program The initial program was not designed to handle a large network in INPUT : NETWORK DESCRIPTION, CAPACITY LIMITATIONS AND TRAFFIC REQUIREMENTS YES CONSTRUCT INITIAL BASIS INVERT INITIAL B'ASIS (FIND B- 1) CHANGE ORIGINAL CAPACIT.tm:D LINK COSTS TO NEW DUMMY COSTS FIND MINIMUM PATH TREE FOR COPY « AND TOTAL COST OF THIS SOLUTION FIND DUMMY COSTS FOR CAPACITATED LINKS ColT= U T Kol BRING Po~.s INTO BASIS WITH GAUSSIAN ELIMINATION FIND SMALLEST e = ~~,?Jl . . . .______"~ - ....,, PROGRAM SET UP SLACK VECTOR LOGIC FIGURE16 ,l:>. 0 41 order to insure that all main functions of the program could be ~rformed within core storage of the I.B.M. 709, a stored program digital computer with 32,768 words of core storage. The following size limitations were established for the initial program: 1. The main matrix was limited to an order of 20, which is determined by the sum of the number of copies plus the number of capacitated links. 2. The number of copies was restricted to 15. 3. The network was limited to a total of 400 links. 4. The number of output nodes per copy was limited to 15. These limitations did not seriously restrict the size of test problem that could be run and avoided the possibility of exceeding core storage. The initial computer program had 12 subroutines which performed the following functions: SUBROUTINE START - Subroutine to initialize all arrays and read all input data. Input data consist of a complete network description, individual copy flow data, capacitated link numbers and their capacities. See Figure 17 in Appendix A for flow diagram. SUBROUTINE TREE - Subroutine to assign traffic on one or all copies~ It is called initially with key of 1 and then finds minimum paths and makes traffic assignments on all copies. When called with a key of 2, the subroutine finds a minimum path for a specific copy and assigns traffic to this path. A flow diagram for this sub- routine is shown in Figure 18 in Appendix A. 42 SUBROUTINE PATH - This subroutine finds the minimum path route through a network from a given input node to all other nodes. The technique used in this subroutine is a modification of the procedure first described by Moore (32). in performing i~s functions. Subroutine PATH is called by TREE A flow diagram of this subroutine is shown in Figure 19 in Appendix A. SUBROUTINE KOST - This subroutine sets up the initial main matrix, the true cost vector and the P(o) vector. It also computes the indices which specify the (+) or (-) ones to be placed in the initial matrix. See Figure 20 in Appendix A. SUBROUTINE MULT - Subroutine to accomplish the various matrix and vector multiplications. See Figure 21 in Appendix Ae SUBROUTIIE CHKINT - Subroutine to compute the P(o) Prime and Omega vector for a copy solution being checked for entry into the basis. This subroutine utilizes subroutine MULT in this computatione After computation of the Omega vector, this vector is checked for a positive element and the need to enter a slack vector into the basis. See Figure 22 in Appendix A for a flow diagram. SUBROUTINE LOGIC - Subroutine to compute the "dummy costs" for the capacitated links of the network and to transfer these costs to the corresponding links. See Figure 23 of Appendix A. SUBROUTHE NEWVAL - Subroutine to utilize the "dummy costs" found by subroutine LOGIC in computing a new minimum path solution for a specific copy. After finding the minimum path and assigning traffic to it, the solution cost, the solution vector P(j) and Z(j) are 43 computed. See Figure 24 of Appendix A. SUBROUTINE OTHVAL- If a check of Z(j) - C(j) in the main program indicates a "come-in" vector, this subroutine finds the entry point of this vector into the basis by comparing elements of a computed P(j) prime vector and the P(o) prime vector to deter.mine a minimum Theta value. It then brings the new vector into the basis by a Gaussian Elimination technique and computes a new cost vector. Alternately, subroutine OTHVAL is called when the Zj - Cj check indicates an alternate solution. This subroutine then finds the entry point into the basis for the alternate solution. See Figure 25 of Appendix A. SUBROUTINE SLACK - Whenever a positive element is detected in the Omega vector by subroutine CHKINT, this subroutine is called to bring a slack vector into the basis. The slack vector comes into a position corresponding to the positive Omega element. See Figure 26 of Appendix A. SUBROUTINE SHELL - This subroutine computes the convex combinations (or percentages) of all copy solutions in the basis. It then com- bines the traffic volumes from the various copies for final output. See Figure 27 of Appendix A. SUBROUTINE PRNT - This subroutine outputs the answers in their final form. See Figure 28 in Appendix A. A flo\ol' diagram of the main control program illustrating the calling of the various subroutines is shown in Figure 29 in Appendix A. 44 Program Tests Two basic test problems were utilized in the initial checkout of the computer program. The first problem run (Test Problem 1) was the network problem previously illustrated in Figure 7. Test Problem 2 con- sisted of a 12-copy 1 3 5-node network problem with 4 capacitated links. The network description and data on traffic inputs and outputs are shown in Figure 3 0. These problems offered the advantage of a known solution in each case. Test Problem l was worked out manually as an example and Test Problem 2 was solved manually in a paper by Pinnell and Satterly. These. problems provided good checkout material and after some relatively minor modifications to the original program it was possible to duplicate the manual results obtained for both of the problems. After initial checkout of the program 1 a second phase of testing was initiated to ascertain the ability of the program to handle a wide range of input data over networks of various descriptions and to study the optimum distribution of traffic. The work of this phase was accomplished by the use of six additional problems numbered for reference as Test Problems 3 1 4, 51 6 1 71 and 8. Test Problem 3 - This problem was devised principally to test the ability of the program to handle the case where a network link was capacited at· several different levels. A two-copy problem with four capacitated links was developed for this purpose. Figure 31 illustrates the network descrip- tion and traffic requirements for this problem. Capacitating a link at several levels is necessary to provide a piecewise linear approximation to a travel time. This curve as 45 110 230 70 '~--~--~t~~=2~0--~~ 7 roo -r:=r--v-- 60\, 21 6 230 LINK CAPACITY LINK TRAVEL COST NETWORK DESCRIPTION AND TRAFFIC DATA TEST PROBLEM 2 FIGURE JO 46 80 8 6 r+-----'---"!. - ' - - - - - - - 1 a >+---·--'--"_L_-----< 1 - - . 20 !50 NETWOR!·< DESCRIPTION AND TRAFFIC DATA TEST PROBLEM 3 FIGURE JJ. 47 developed for freeways resembles the one shown in Figure 32. The piece- wise linear approximation to this nonlinear curve is slightly in error but improves in accuracy as the number of linear approximations is increased. As one level ·of capacity is satisfied, each vehicle utilizing the next level of capacity must be given a time penalty large enough to represent its effect on the entire traffic stream. this consider th~ As an explanation of following example: Assume the following conditions exist: For volumes from 0 to 100 vehicles per hour Travel time is 5 minutes per vehicle For volumes between 100 and 300 vehicles per hour --Travel time is 8 minutes per vehicle For volumes between 300 and 500 vehicles per minute --Travel time is 15 minutes per vehicle At 100 vehicles per hour total travel time is 500 veh/m.ln while at 300 vehicles per hour the total travel time is 2400 veh/min. Thus vehicles added in the 100-JOO volume range should have a time cost of 2400-500/200 or 9.5 minutes per vehicle. The vehicles added in the 300-500 volume range will be assigned a time cost of 7500-2400/200 or 25.5 minutes per vehicle. The previous example would be represented by a network description like that shown in Figure 33. 48 (/) w f- :;) z 4000 :E w ....J u - I w 3000 > w ' ..J ~ a:: w a.. LINEAR 2000 f- (/) 0 u ..J w 1000 ?' > <( 0:::: f..J <( f- 0 t- ::;..--- / ::;....- 0 0 400 800 1200 I GOO VOLUME -VEHICLES PER LANE PIECEWISE LINEAR APPROXIMATION OF TRAVEL COST FIGURE 32 CURVE 2000 49 ___ ..,I CAPACITY = 100 VEHICLES }----------------~ TRAVEL TIME = 5 MIN 2 .. r--~ 1 VEI-l CAPACITY = e>o TRAVEL TIME = 0 A CAPACITY TRAVEL = CAPACITY = 200 VEHICLES TRAVEL TIME :: 9. 5 MIN I VEH 8 ex:) TIME = 0 c NETWORK THREE CAPACITY = 200 VEHICLES TRAVEL CODING TIME = 25.5 MIN I VEH FOR LINK 0 WITH LEVELS OF CAPACITY FIGURE 33 Since Test Problem 3 involved numerous calculations when solved manually, a solution was obtained by use of' the LP/90 program of the Texas A&M University Data Processing Center. The LP/90 program is a comprehensive system for linear programming developed by C.E.I.R., Inc. (7). In order to utilize this system, it was necessary to provide a general linear programming formulation of the problem. is as follows: Minimize subject to This formulation 50 (1) xll - xl (2) X1 - X15 - x2 (3) x2- x3 (4) x3 + x (5) X4 + X13 · (6) x 5 + x12 (7) x6- x7 (8) x7 + x2o - x8 (9) x8 - x9 14 (10) X9 - X1o - X11 (11) X5 - X2o - xl8 + X19 (12) xl8 - xl9 - X13 - X16 + X17 (13) xl6 - xl7 - xl4 + xl5 = -50 =0 = 10 =0 =0 = 100 = 20 =0 = -80 =0 =0 =0 =0 (14) x3 ~ 70 (15) xl2 ~ 20 (16) X13 ~ 20 (17) x14 ~ 20 (18) xj ~ 0 The criterion function is a summation of individual link costa times the number of vehicles assigned to that link, which produces a total travel cost. Equations (1) through (13) are node equations, equations (14) through (17) represent capacity limitations and equation (18) imposes non-negativity restraints on the variables. The results of the LP/90 solution to this problem were identical to 51 those obtained with the Multi-Copy program. Test Problem 4 - Test Problem 4 was obtained by adding three additional copies to Test Problem 2. The same 35 node network was utilized but additional traffic inputs were added. This provided an extension of the number of copies considered and considerable overload of the capacitated links. The network and traffic data are shown in· Figure 3 4. Test Problem 5 - Problem 5 again utilized the 3 5 node network and its basic objective was to provide a larger study problem which could be verified by LP/9 0. The 8 copy, 10 capacitated link problem used is shown in Figure 3 5. Solution of this problem by LP/90 presented some difficulty because of the number of constraint equations involved when formulated as a general linear programming problem. For each copy, 35 node equations are required and the network size introduces 108 unknowns. The main matrix then must have an order of 280 by 864. When the capacitated link restrictions are added the total formulation has 29 1 rows and 8 7 5 columns. The coding of this information required more than 3000 cards which presented a very sizeable card punching job. This job was simplified, however, by the use of a data conversion program and the IBM 1401. Test Problem 6 - This problem (see Figure 36) was used to study special effects of data scaling on the linear programming solution. Test Problem 7 - This problem provided a larger system than could be handled by the initial program and was used as a test problem for the final program. The problem consisted of 10 copies and 20 capacitated links and required a 30 by 30 basic matrix. The network description and 52 r---------------------------------------------------------------------------~ 300 t 10 70, 80, ~-.--------------,~-------------",.---,~------·---····-,~------------"'~ ~7+-----------~~a~----------~21r------------~2~2L___________~35 ~r-------------{f;o}-------------{ 19;+------------{241)-------------\'33 ~ H 120~ 4 II ao"H H M 25 32 . . . 700 18 'i~-------....(~J-----------..{t -----------.....J26J------------....{'E 100'- eo'-. so" IIV:2:¥---------~v::l3't-----------rl~6,-.-- -------v-2--~:7~----------~30 ,.j--'-1'-------------"1-"4'---·-----·-_____,..._15.....____________..,)28 _ _ _ _ _ _ _ _ __..,2:_:;;9 100 320 NOTE -TRAVEL TIMES AND CAPACITY RESTRAINTS ARE THE SAME AS TEST PROBLEM 2 NETWORK DESCRIPTION AND TRAFFIC DATA TEST PROBLEM 4 FIGURE Jh 1500 600 t ,.. 600 600 ' _1ll I 8 7l 21 22 20 23 35 ~ 9 6 :--- [1 1200 h ~ tf fi7\ 117\ "1-i ~ . 117\ 25 \!V ® 122\ 24 H 18) l@QQJ \..!V 12 \gJ t'- 122\ 19 1200, II) ~ \!!! (22\ 10 till ... 4 ) ~ ~ 122\ 5 34 [@QQj ~ r- ~ ® 32 --.3000 ~ \!!! ~ 31 r- [900] \BI ~ 2 ~ 600 I 600 141__ --· NOTE - ' 15 (28(______ _______ ! TRAVEL TIME • 37 ON ALL LINKS NOT OTHERWISE INDICATED NETWORK 30 27 16) 13) 600 ' ---------' 29 1.500 DESCRIPTION AND TRAFFIC DATA TEST PROBLEM 5 FIGURE J) Ul w 18000 7000 7000 ' 7000 ~ t 8 7 '\, 21 22 35 20) 23 34 J..- :.- 00 6 9 r- C-. 6 13000~ 't---1 J..19 ~ ~ !? 13) 2 ~ H ~ 1'- ~ ~ 7000 NOTE - ~ . ' - - - ---~------' LINK TRAVEL TIMES FOR PROBLEM 5 ~ 32 ~ ~ 15 1'- 30 7000 28 J. SAME AS --+ 32000 h31 ~ 27) 7000 _jl4- H 16) I I 1'1 25 18) ~ 33 ~ t. H (11 13000--+ 4 ~ I 10 18000 ' 29 NETWORK DESCRIPTION AND TRAFFIC DATA TEST PROBLEM 6 FIGURE J6 c.n ~ 55 traffic inputs for this problem are shown in Figure 3 7. Test Problem 8 - This problem was designed to stlfdY run times for a large network using the final program. The network consisted of 2 56 nodes and 960 links 1 which approaches the network size limitations of the final program. Problems Encountered In developing the computer program for the linear programming model, problems of machine roundoff and slow conversions were encountered. These problems affected the accuracy of the output and the machine time required for problem solution. A detailed discussion of how these problems were treated is presented in reference (3 5). Final Program In order to handle a network analysis problem of the type encountered in a real system, it was necessary to make provisions in the initial program to handle much larger problems. This was done by placing the link data for individual copy loadings on tape instead of storing it in core. This provided more room in core for elements of a larger matrix and permitted the descrip-:tion of larger networks. In addition 1 a terminate-restart procedure was incorporated to allow a break in execution on a long problem. With this technique available, it was possible to divide an extremely long problem into several short runs on the computer. 56 t 7 21 8 ~ 35 ··~· 20 23 h ~ 9 34 ~ 5 10 H H 1300--t 4 II l.ill.QJ H \. 'ThQQ] ~ "6 3 '\. 22f I.§_QQJ 600 30 700 2000 700 1300, M J.--l ~ 12 25 IB) . [ilQQJ l.ill.QJ 17 '>--~ L!QQJ 33 M !.. 1 .lliQQJ 26 L1QQJ. J,.-..l, 32 l ~ ~ 13 2 ( 27 16 30 ill 700,. 700, . I / (14} 15 700 NOTE - TRAVEL TIMES SAME AS _(29 128 ~Q.2J ·~ ~J FOR l ·~_QJ 2000 TEST PROBLEM 5 NETWORK DESCRIPTION AND TRAFFIC DATA TEST PROBLEM 7 fiGURE J7 ~ --+ 3700 57 Except for the above noted changes 1 the logical flow of the prog is essentially the same. i.e. 1 The program divisions a main program and 12 subroutines. ;arne as l Many of the original subroutines required no alternation other than changes in DIMENSION and COMMON statements I which were changed uniformly throughout the program. The data input method was changed slightly to facilitate an improved minimum path procedure. The format of the output remained the same as for the initial program. A total of four scratch tapes {three for the initial program) are used in the normal operation of the final program in addition to the regular inputoutput tapes. An additional tape is required for the intermediate dump when the terminate-restart option is utilized. The use of one additional tape operation by the final program did not appreciably affect run time on the Test Problems considered. The limitations of the final program were as follows: 11 Oth order basic matrix 50 copies 60 capacitated links 1000 network links An analysis of the core storage required for a problem of the above magnitude explains these limitations. A total of 29,151 storage locations are needed for such a problem compared to the 32 I 768 locations available on a machine 58 with a 32K memory. The 3616 unused storage locations were reserved for additional modifications or additions to the program which might later be necessary. Run Time One of the most significant items for evaluation is that of the amount of computer run time required to obtain the solution to a given problem. This run time is related to a number of variables such as size of network, number of copies, number of capacitated links, and degree of overloading capacitated links. The most significant of these variables are ( 1) size of the network and (2) the number of copies. The most time consuming operation in the program, because of its repetitive nature 1 is that of determining a minimum path from an input node to all output nodes. As the network size increases, the time required for this operation increases also. Similarly 1 as the number of copies increases, the minimum path determinations also increase. Large networks with a great number of copies thus require a considerable amount of machine time to compute the necessary minimum paths. The 256 node and 960 link network of Test Problem 8 was utilized in connection with a two copy and five capacitated link system to study the run time on a large system. The minimum path calculations were timed to obtain -a measure of run time required for this operation. Table 14 shows 59 the findings of this run. Thus it was found that for a 256 node system, approximately one minute of machine time is required for each minimum path. The number of minimum paths that must be calculated for any given program is a function of the number of copies and the degree to which the capacitated links are overloaded and is impossible to predict accurately. The time required to determine a minimum path becomes a problem as the network size, the number of copies and the number of capacitated links increase. Improvement of computation speed on the path subroutine would significantly reduce over-all run time. TABLE 14 RUN TIME FOR MINIMUM PATH DETERMINATIONS - TEST PROBLEM 8 Path Number Time Required 1 1. 04 minutes 2 1. 02 minutes 3 1. 04 minutes 4 1. 04 minutes 5 1. 04 minutes 6 1. 02 minutes 7 1. 01 minutes 8 1. 01 minutes 9 1. 04 minutes Avg. Time == 1. 03 minutes 60 PROGRAM OUTPUT On a normal run, four separate types of data are output as follows: 1. Data on the progress of the problem solution, 2. Final solution data. 3. Individual traffic loadings for all copies in the final basis. 4. Link volumes for loaded links in the network. Solution Progress Three types of program output are possible as a means of following the progress of the solution. illustrated in Figure 38. 1. The first type, called nor.mal output is Data on the following items are furnished: Current Basis - Both the copy and extreme point solution number are provided. Thus, for example 6002 means 6-th copy and 2nd extreme point solution. A positive integer less than 1001 represents a slack vector and a negative integer represents an artificial vector. 2. Z(j) minus C(j) values -Separate values of Z(j) - C(j) are listed along with the copy and extreme point solution number. 3. Type of Vector Entered - This will be either a solution vector or slack vector. 4. The entry position in P(o)' is also indicated. Current Cost - The current cost of the solution after the entry of the indicated vector is provided. In order to locate sources of program error it was necessary to output more information than the normal output. Two other types of H~~~~IM 1e1 ~ lCC I ~CCI ~CCI I< 13 ~~ HCJCR I~ JC ZC C I I CCI 11 I< 15 ?CCL I? 4CC I 14 TC 17 ?CCI I? C.IC81~4<;<;E C~ CLRRHI CCST 4CC I 7CCI 8CCI 9CC I lOCO! SCCI HCI I~ 14• ~~ IE I7 te ICC I II ~ECTCR I~ ICC I II lCCI ~ECICR I~ IC <CCI I< I ( CI II I< 1; HCI IE 7CO I 11 BCCI 18 9COI ICCOI 19 zc c.1ce~cecce o5 I CCST ace 1 9COI ICCOI ECCI 7COL IE 18 19 2C 11 CLRRE~ 5CC1 15 zc If ~CCI 5CCI 15 I z l(J) I ~ ZIJI - ((J) 7 8 9 10 6 1 8 'J IL 3 C.55319SS6E 03 6 4 zccz 2QQj 8 9 lu - ~ C.H59~S~ZE 3 CIJI 5 6 3 - 4 zccz C3 I z z CIJI = 3 C.53014S92E 03 4 2004 zccz 2003 8 9 10 2 CIJI = 3 C.f5266E53E 03 4 2004 2CG5 2003 8 9 10 = C.EBE55416E 03 4 2CCS 2004 2CO 3 2C06 9 iC C.iC22SS97E 04 4 2004 2CCS 2003 2CC6 9 10 200J 2CC6 9 10 4CCI 14 C.I0781J33E C5 CLRREH CCST 9CCI !CCO I BCOI HCI 7CO I 5CCI 19 It 17 1e 2C I~ liJl 1 HCTCR I~ 1C ICC I 2CCI I< II 4CCI 14 CLRRH T CCST C.I0723C78E C~ 7(01 8COI 9CCI !CCC I SCCI fCOI IE 17 IE 19 2C 1~ l!JI ?CCI I; loECICR I~ IC ICC I ZCCI 11 I< IE ?CCI 1' CLRREU CCST C.ICEEEH6E C5 9CCi lOCO I ECCI 7CC 1 BCCI 5CCI 17 18 19 I~ IE ZIJI 4CCI 14 •ECTCR I~ IC ICC I ZCC I II I< I; 4CCI 14 C.lC':'5-'t<;c;GE C5 CLRRE'l CCST TCO t BCGI 9CC 1 ICCO I 5CCI tCOl !<; 15 17 1E 1t l l J) ~cc •ECICR I' I r !C C 1 2CCf II I< 2 ?CC 1 I; 4CCI !4 C.iC~54SS9E C~ CLRRE'I CCST BCCI 9CC I ICCOI SCG! HOI 7CC I !E 19 ~~ If !7 2C l!Jl - CIJl 1 2CC 7 2 C.311CCCCCE 03 2004 4 2CC5 11 EC I(R I' 1C ICC I 2CCE II I< C.I0424EC9E 05 CLRRE' T CCS I 7CC I BCC! 9CCI !CCO I 5CCI ECC! 1e 19 15 If 2C 17 ZIJl - CIJl : ;co7 I 2 c ?CCI !; ~l~(J( ICC 1 ; I ~L,CK ICC I <I I~ IC I~ I? 1 I~ 2CC~ <I ;cc 1 I< !; I~l( 2cc~ I< If ?CCI r: 4CC I l4 zc zc - l l C!Jl - 1 2 3 - c ( J) = 2 2CC 7 - 4 3CC2 03 2CC4 2003 ZCC6 9 !C .533~9<;<;5( 4CC I !4 ~COl fCC! If 7COI 17 BCOI 2 2007 4 3CG2 2CC4 2C03 2CG6 9 10 IE 9CO I !CCOI 19 2C I 15 4CCI !4 5CCl fCC! BCD! 18 9COI !CCCI 19 2C 2 2CC1 4 3CC2 22 2003 2006 9 10 It 7CO l 17 I I~ SOLUTION PROGRESS DATA-NORMAL OUTPUT FIGURE 38 Ol ,_. 62 output were used for this purpose - an intermediate output illustrated in Figure 39 and a detailed output as shown in Figure 40. For the detailed output, the following data are available: 1. Vector entered and position. 2. Current Cost and Z(j) - C(j) value. 3· Minimum paths from input nodes to all other nodes • 4o Elements of the cost vector showing costs of each cop,r solution in the current basis • 5. Elements of the entering copy or P(j) vector. 6. Elements of the primed entering cop,r or P(j)' vector. 7. Elements of the P(o) 1 or solution vector. 8. Elements of the current main matrix. 9. Elements of the Omega vector. The intermediate output eliminates the minimum path and matrix data. For all cases the data are output after each iteration of the problem. With detailed output it is possible to follow each specific step of the solution. Solution Outl2JJjt After convergence, the final solution data shown in Figure 41 are output. This provides information on the final basis, the cost of each copy solution in the final basis, the solution vector, the Omega vector and the total cost of the optimum solution. In addition, data on individual copy loadings (Figure 42) and total link loadings (Figure 43) are available. The individual copy 63 ----,B"'''G"IHmG 1915 --~- -1001 2001 3001 -001 !>001 6001 7001 CJ• Qo9)0000QOt o. ---------~o-o--··----· o, -0 .-· .-?_____ -I 8001 04 Oo30000000E 02 Oe30000000E 02 O. Oo09'ii99999E 01 ---------~0~·-------~0~·-------~0~·--P~JMEO E~fERING ------------·--o;TOOOOOOl!E""OI COPY - -3._ _-..::•,____-_,;,____-_,._ ___c·_,_7_ _-,_._ _ __ 1002 o, u, o. u. u. "· ··---------------------- o. -o. -0, 3T~5~~0lE·OS -~--2. lJMICJ• Ooltt490999[ 07 -0.54715?.0IE-08 o, 30000000E 02 0•14999999[ 02 -0.! 1760 4 4 SE -ol B o.s5197171E-09 Oo 3 0000000€ V 2 Oo4500000li:. 02 -o. -0.27939676£-07 02 Oo35762787E-06 Oo"lV?9999BE 02 0t)S76l787l:-06 Oo 14999999E 02 o.zooooootE 01 Q,99999998E 6o Oo3999999Bf 02 Oo94999990€ 02 Q,QY999999E 01 Oo9999??9SE 00 Ot9999999SE 00 Oo39999'?98E 02 0• 59999996E 02 O.S9999996E 02 Ot9999999JE 00 0.2000UC.03E 0(. OeU9999'li99E 01 Q.5oOGUUl2t 01 Oo2499999BE. 02 Oo24?9999bE 02 -0.09999999E 05 Oe4809H9H. 07 -0.09999999E 05 OeU;b2249t 07 -0.09999999E 05 -----·---~-u-t"TiroUUOUOC ------------------------------- - - - - - - - - · · ·-- tT;1199V99"TOf 00 Ool6999999E 03 OMEGA VECTOR - --uu.-,- - - - - - - u o o • ------~-'t!00',00'90';9,.,9"9'99'1'9.,971'E"<l"0,-5~-lrOOl,Uo-.9r;9"'9V9'1'9"1 ..971'f"<l"0.,.-5 -0.09999999E 0~ ---------~------o-,755578'q9E 07 -0,09999999F.: 05 -0.09999'199[ Oel201I24"9F 07-- 0~ Ot9300000QE 04 Ot'l05"2"0lt99E 06.. IJ.46093~91E VECIUR 1002 SJ· o.n9toouot: o5 07 10_03 ENT~RING 3001 4001 COPY - ------u-.---~ -------~---. o. 0· ---~----,.---------,.;-- -· -00 -~---- o;n·oo·ooo~f 07. _ _ _ _ _ _ _ .. _ Otl050000~~--~~-~-~~9_9_99993E OJ ZfJI- CIJI • I -2 2 O.IJOOOOOOOE 02 Ot90000000£ 02 o. o. a. PRjM£1] tF;l£R\Nb COPt Q, Q,99999999E --------,---;---·- ZJMICJ• O.ltt914491t Of -"(UQRf:!qiC"OS"T Oe402'R0396~ 07 5001 6001 7001 8001 -1 INIO··--Tli---~- 2001 0•907l2lt99l 06 06 Ot3063"5~98E ZJMI(J:. Ot ZJi IJ•]OOOOOOO!;. 02 Otlt7974497£"07 o. .. TYM( -~J--~20~0~2~---~'-----~·-----~~-----~·-------------- Q, 0,09999999( ~1 r), ····o. o, u. 'Jo o. o. 0.15000000f Ot 0 t8991"199?u(" 0] Ooi499'19'17E 02 Qj O,J499'1991H. 02 Ot o.B9999H6E o1···· O.IIooooo·or·o3· _ _ _ _ _....:.•..:.'-l!g:-~rit~<r;rilb7iO~mo.,.;~"i"'-cir6°r!"'---,.o,., ••,.,,,,,.,JrB0~~'"'"''"'"'00"-~r;-o'ft11>riJIJ1)r- ·o ,--· o.9•>9?iJ9<1~€"- ·oo-at~<l9~ ----:t~:z;:;lg~ g~---~;~~H~;j~~ ~:i:~:;~!i~ ~~ ~:~;~!~;~~~ ~~ O·~S714?R!l v2 gj Ot ---.;;1o~ooooo£ u3 0.99999993£ oo o.u999Y999E 01 0·142~-7~~-_p_2 ___ 0•476J9U)6E-Ol -----,o"'e"'rGXVtCTI)ll"-:--· - :g:g~~~;~::i g~ :g:g~~~~--~:c,,n'I'F'L.OlJ ___ g~'7'\0000G~t 04 -~~T-~~~bbm~iii'-ii-oi-;---,_,;,g-:-:r.~~r;!:;;.;;!;,~~ir~ii:~'-ii-gi-;--.;,g~:90i~i-i;rir-;-~:<,=;i-i:i-it'-+.~!;---o.7~557899E 07 Ooi7071249E 07 Q,H)S2C4'>19l 06 0.306J~998f 06 ~---------- s1.ACK uno 11\"~T"-111"~1 13 ·1no1 'lift" TNG COPY - o, ·- n, 4oOI soo1 6ooi a. £"1Tr;:llJ~G 1), Oo 0e9999999AE" (')(! aoo1 -I o. COPYo.9S]3Ar'J91r-o> OtU28S714f-OO ()o!11;,7}1.)7f!F:" 00 -2 -4 2002 o. 0.o.o. o. o. O•l"iti'JIJ<q-00 Oel4285111f··OO Oei15/I",'IJ\f ()J 0t'l'l'.l'l"/'1'1'>l. .(JQ 0,171,9Q'l?1r 0? 0 0 (o4'J'l9'J'Jl,( 0 oll.4'}'199M. U/ Ol o. r'J. ------------~0~·------------"' PPI"'f:D 71loi u. o. -·- 00 -1 -· U,O'I99999YE. OJ Uo 1,), u. ----------------------------u, o. O•t1!:171428JE LtO OelJ4l8HlE. 01 -0•9S,OtiU'Jiti:.-U2 u. Uo49'19'1'1'1S( uO Uo449'1't994f. l-l Ue99999'li9JI:. 00 (J,Jl~OvOVJt: 02 UoV99'i99'll9l:. 01 U•lbbbt.t.ciJt-oo Otl4iH;71H.-UO ------,pc,-J71"Qri-.....,..,~--:.---- o.tooooooJE 'll o.RPH121!~'" oo Oof.l'J't'l I 'I '>I'll n.9?'199970E (lO O,IS?51JOOOE 03 o.nt.99991l 0• f99999Bilf Ol o. 7lt•'i'-J9'/ li_ 1)'-!FGA vr:c fOR ''? 02 - ---------~~-..-n~.t~l9~9~9~99~9~9~E-o~,,-~-~o.~~77r~--cr.-· -0,09999999E IJS n.25~i:51B99E C.LArl TNTa-}002 200\ 07 -fJ,09999994f: 'lS O•l20712t.9[ fl7 o. nnH•ar·"J,--1!; ------- -=u-.-n~n>iv9~E"1T> ____ o. _,..Jofl'-1'199'1'191 0 • (J') 'l_WUOOuO( \.14 Ut\l9JOUfJl:l:. US Uell936241l:. 06 C.o09999999E 0 I Q, U, Ut90712lt99t. 06 ()tJ06l;99BE 0& Od0?2':lz.99r Ob J1 3001 4001 500\ t-001 r:NTF.RI NG (r)PY - -n.- 11001 -1 o. n. o. o. n. 0. n. o, o. 7001 o. o. \Jo o. "' PRIDED (NIEUINb COPt'lo .,, 1),81•999<;~~ :J-') O, (lo8lB))lP-Oi' Uo 'l.l?"!Jn"'"'0r--oo 1: C'J 'l.17'"~C'O'JOf-OO G,74'-FrJQ'1'-~ :Jolt'lo"}'-19"Ht 0•J2t,Y9997t.-OV ')o 149'-1'1'"'1 •'JO 00 -------•-'-r1lg-i-:ni6rr~rtibcu~rinooD'l~ri[..:.<1T~i-!--1To•.rnnJrnJJ,nr-~·!JtU'7'97VTT9'1r*U"J Oo99999970E - - - - - - -u-;,ooooaooc OQ Oo29999997E OJ o,J4999Y96f 02 02 Oo2'-I<:J9'-19'>11f Ol o.l49Y'1999£ 02 OV Oo Ge74Q999q6E 00 Llo -0.8750t.OO'JE OC V• -O,IJHJJllE-02 o. 9'79?9Q9St au --·-u• nTPJVV9st"·uo---u;v1T999~-!J.0~911'199"9T-or~-o.~999991J6f U? Ut4768J716E-u6 Ot6lt99Y998t Q2 Ot 1"99999Af 0? SOLUTION PROGRESS DATA INTERMEDIATE OUTPUT FIGURE J9 V•6bbbb6f.tltl OU 64 --·- 8£GINN1MG..18H 100' 2001 3001 400 l lJ• li.ZIC81ti999E 01 vee lOR INIO ?pol JC02 ~001 6001 CJ• O.I0600000E "CURRE,.,l COST I 1001 4001 5001 6001 .... MINIMUM .HTHS.-". --·2 17 11117 3~ 3 -·- ___ A1 ______ 4q ____ .H .. 11 .11717 9 79 65 l1 77777 l~ II l21U IZ u 22 15 17 1 11171 ______ .)4. -· 3l -- ... IS. - -- ..1 11111 49 35 11 11717 22 38 . ll -·- .15 - .1 l1111 1 17111 26 39 38 zg • i __ COSLVECIOR _,_ o.to•oooooe _______ o.JaooooooE o~ 0.4~000000E 04 7001 o. 9001 10001 11001 12001 13001 lltOOl 1 '5001 0~ lJHICJ• O. 39790998E Of 700_1 8001 9001 o. 20978999£ 01 - . o• L_____,2.__ ---------- - " " o~ •• • 0.8l999999E 04 O.l't99999YE: 04 o. 09999999£ 05 o. o._ PB(MED fNlfBlKG C.Opy o.09999999E at o. . TIME ~ .. • .. -3 ,, o. o. -2 1007 c ( Jl 0.20978999F 07 Zl J I lllO..OL.1...Ul.L.lZ1illL. . l.lQQJ__j..illl) I 15001 Q,')QQOOOOOE Olt o. 43000000E 04 o. ~traoooooE a .. 0.09999999~ 0. 09999999E 05 0.4~000000E 04 Olj ---::E-,;-NT:-:E7R'""IN:-=-G-:C:-=-OP:::Y:------------------. o.7oooooooe 02 o. o. o. o. -I 17 17111 49 61 49 35 IT 11711 5 H 11 17117 6 81 99 81 61 49 35 II 17117 8 97 19 65 51 49. . 35 51 49 35 17 11711 10 51 49 35 11 71f11 11 1 5 _ . . . . . 1 . _ I llZll 15 1 1I1U 13 15 I lZI..lL__.u_ ___ _ LJZZII 16 45 38 15 18 38 H 1 11111 33 15 I 17111 19 63 45 ]3 63 4S 15 20 11 38 I 17111 2"1 103 - 91 19 65 51 91 19 65 49 106 51 103 35 11 71111 23 61 4J 39 24 19 15 43 39 61 18 33 1 77171 25 15 38 lJ 5 5 33 15 1 11111 21 11 I 71771 28 4 1 lJ171 ___ _a_ ___ ......5,._ ______-t, _ ____ J...J_il~L __.11._---'.0______tl___...l.B..___ lllll 30 --- l 0.'58000000E 04 o• .,.t999999E o~ 8001 o. Q. '51 OOOOOOE 0~ O.lOOOiJoool Olt O.ltJOOOOOO.t O't 04 71000000E Olt o. 0.09999999€ 01 o. o. o. o. a. o. o. o. o. o. o• o. o. o. o. o. o. 70000000E 01 0. 61)999999E 02 ---'g~:~g~~'!~~:9'!'9:!-':":~~~g~:--.llg~::?':!':~:'!:~:'!':~~:~g.~~~-~~:::::~ g: g:g::::~}-~:g~!~!~:~~:~:~~{-~:~~~E--'o"'1~------ _____ , . o. o. o. . -- 0. 70000000E 02 0. 69999999E 02 o. PtO) PRIME VECTOR - ____ Q,Q9i99999E 01 Q,BDOODOOOE _.Ol 0.1000000lE Ol o.20999999E Ol o. o. o. O.l6999999E 03 ______ .IIAIRlJl_,___ -· o. o. 0. o. o. - - - 1 1 · - - - - - - - - .o. - o. ------.a..__ -----0-•--------o. _ _ _ .a_&.-.-_________ o. o. ·-· _____ Q. __ _ o. o. ____0~--------o. o. . o. o. o. 00 o. o. o. o. -· o. o.o9999999E 01 o. o• • _ _ _ _ _ _ __o. o. o. o. 0.09999999£ 01 o. a. o. o. o. o. o. o. 0,09999999( Ol o. o. o. a. o. 0,09999999E Ol ____a. o. o. 99999999[ o. o. ___o~---o.__ _ o. ____.ao... _________________ o_.. o. _________ o. o. .o. o. o. o. o. o. o. o.... o. o. o. o. o. o. o. a. o. o. o. o._ o. o. o. -. ··-------------- ~--------- u. o. o. o. u. ....ll~- o. o.09999999E 01 o. o. o. o. a. o.fJ9999999E oo o. a. o. o. a. o. o. o. o. a. o. u. o. --~0~.~-----....llo-.-------:ol...--·-----g:-------~"~-ll'----"o'"-.-_ _ _ _o_. ____ . ____ a. a. o. o. o. o. o. o. o. 0.999999991::: 00 o. ·--~--D· - .a. o. o. o. a. o. a.. o. a. a. Q. Oo _ _o u . . - - - - - - - - - - - - . o. o. o. o. o. o. -g:---------g:nqq••••9Ln.t_~:-----------·---t-------------o. o. o. o. o. o. a. o. o. - ·-- ·- o._ o. o.o999999'R at o. o. o. o. o. . o.__ o. o. o. u• o. o. o. o. o. o. o. o. o. --------D......--····-·--- ___ o...o_g_gg_q~9'1E. .Ol ____ L--------------D0. o. o. u. o. o. o. o. o. o. u• o. o. .. o•. ·-·Oo 0.09Y99<J99l 01 Q. O. o. o. o. .. .a._ o. o. o. o• . o• o. o. o. o. o. o. o. oo.______ --.-a...n.!l9.9..'l!lg_gL..Jl.L __ o....._ ________ .o.. o. o. o. u. o. o. o. __o•.. o. o. o. o. o. o. O. 0.09999999f 01 O. Uo0999999Yl:. Ol o, o. o. -o.rooooaooE 02 o. o. o. o•. o. - .o. o. o. o. o. o. o. o. --~IU..------....._-------'o'".------~999999£ 03 o. eooooOo-o~-o2-~:TDOOoooOE_02-:.~=o~~~;~~~g~~------a. o. 9 o.- o. . o. O. o. 40000000[ 02 0 .lOOOOOOOE 02 Q. 9'19'19999E 02 . Do . o• Q., 0. 5999q999E oz o. 40000000[ 02 p '9999999f 02 D "9999999f 02 ---~l'l'llU~IL.llL-~~~~~~---!g~,'-: -::-::99::c9:-:9:-:9:::9-::E-0:-:-2 o. 79999999£ 02 o. ______ Q,JaaaooooLD2. a. 4oooooooe 02 O.lOOOOOaOE 02 O.Z9999999E 02 o. 69 ---':.'o~.z:-:o:-:o:-:4-:~-=-••"'•:-:e:-:o-::,-'~o!--.'!1 ~:~~!~~~~~~~:E~e~g ~ __ Q.~OOOOOOa£_ 04 __ .o.HOaOOOO£ o• -t ~~~~~:::: O. . o. 79999999E 02 O. a. 0.69999999l: 01 0.~9999999E Oo O. 02 {~q-q-9E-02---~9-ci99-.J[(>-~qqqqq-9q(Qz o. o. o.29999999E oz -O,.OY99Y9'19E 01 O. ~99999'19(; 02 OolOOOOOOOI: 02 -~. ~:~~------o.zoooaoau~ u2 g~ -t,~~~:!~~-~-~:-~~3~~~-:~~~~~~~~~~----till~:"-9•""·-'o"6-'------ a. 9076H98E 06 t J• o.1060ooooe o5 . Oal00"3000E 07 O.BO"tl9"191l: Oft l JMICJ•-0.36621 09~E-Ol --.Ll.LI•!L..ID1.o..Z2AI>~:05o.Ju9L>9'-"o"-F..J011.JI'-------'CUJ'''--"O~.A!uuou.owo,uownowE'-'lo~•-----l.J1U..t~.il......2J.U.l.U9L.Il1-. SOLUTION PROGRESS IDOl ··----...Lilll2. DATA- DETAILED FIGUR£ 40 OUTPUT PAGE ll~EAR Fl~Al ~Cl1 ~C~S CC~T EA~l 1C1 1 PPCGRA~~l~G CE~C~IFTIC~ ~C1f 4CCS 1; 1~ - ~lXl~G TRAFFIC STUCY FCR PRCBLE~ NL~BER e SCCS 1CC12 7C01 7C 16 1CC17 8CC1 1€ 2C30 19 1Cl4 2C fC12 2 lOll 10C18 1CC15 48 10016 6013 4018 5006 HCTCP - C.ll~'lCCCCE C4 C.l~S~'iSS<;E C.El4CCCCCE C.ECCCCCCCE c. c. C~ C.l:l4SCCCCE C4 c. c. C~ C~ c. FICJ FPlH \.ECTCRC.t~~tf~?~E CC -C.1S3i1~1CE-Ct c.csssssssE ct c.3333327EE-CC c. C.lE2~~C~3E-C~ C.4l'iS~~~tE C.SSSS~~ESE Cl CC OECII ~ECT(R -C.7ioCCJC<;JE C2 -c • .ccccc~~IE c.c -C.l'<ECCCCSE c; C.ISceCC<;~E Ct. C.~~~CCII~E C3 T~E ~CCEL 1 C~ERlll CC~T C. C.5CCCCCCCE Cl c. -c.;ec;~s~:co;E c~ (. C.ll6ioCC2loE C4 C .lCE~CCCCE C4 CF T~E FI~Al C.E33CCCCCE C3 C.l258CCCCE C4 C.775CCCCCE C3 c. C.tCCCCOC5E Cl C.5CCCCOC8E CO -C.3'54MU:H-C'i c. -C.2CCCCCCCE -C.l'iCCC2':7E -C. ~CCCCC38E C.'i2'5CCOCCE ~CLLTIC~ IS C2 C2 C1 C3 C.Elo'iCCCCCE C~ C. 737CCCCCE C3 C.777CCCCCE 03 c. C. 5COCf7t2E-Ol -G.'59604645E-07 C.<J<J9'i<J'i61:E GC C.2CGCCt6CE-CC c. c. C.3'>1CCCCCE 03 c. C.'i25CCCCCE o. C.14740C'53E 04 04 04 03 03 C.67699999E 03 0.75500000E 03 0 .13420000!: 04 c. C.1CCCCC17E 01 C.t,ECCCCUE Cl c.so:cccf:C7E cc c.~cccccccE c1 C.7S99994'7E CC C.4S999998E-CC C.lCCCCCOCE 01 C.l3333345E-OC 0.09999999E 01 C.66669099E-01 C.l6763606E-06 c.scooooocE 01 Cl -C.'SCOC1'793E 01 -C.439995'llE 02 C.6S6'>9'i99E 03 O.l56400COE 04 C.81400000E 03 -C.~CCC19(:4E c. 03 c.tcacccoc·E C.l227999'iE C.<J4300COCt C.75'50000CE c. c. C.l.!21CCC3E C4 c. c. c. C.877tS9'i9E 04. FINAL SOLUTION FIGURE LQ DATA (J) Ul 66 PAt;t il<e COPIES -11. ~THYFiNAl COLUMN SASIS ARE AS FCLLOWS - COPY --~[INK 1001 -NO. CORRESPC~OING LINK NC. . -·· 3 1 15 68 2 . 2. P(OI PRIME ELEMENT • LOAD .__ 0.763592 - LINK NO. lOAD liNK NO. 4 5 6 8 26 ----!~ 52 I~ LOAD 3 2 PAGE - ) CCPV 7001 ~C~O~l~UM~N~--~--------~~~~~--------~C~ORRESPC~OING!_~~~~-~~--ELE~M;E~N~T--· __~0~·~4~1~1~0~9~4__- _____________________________ NC. li~K LCAO LINK ~C. 3 4 64 60 68 so LCAO LINK NO. l 4 2 LOAD H 3 62 2 LINK NO. 33 63 lOAO ~ 2 PAGE COLUMN COPY liNK NC. 8001 CORRESPC~OING PIOI PRIME ELEMENT • LCAO l l NK NO. H 73 1C 7 49 10 3 32 86 ~ 1.000000 - lOAD 59 2 106 2 lOB PAGE ----------------------'-"'--""'--_;;_ CORRESPCNDING PIOI PHIMF. ELEM£NI • 5.000081 - ----------~----~-~-----------~-------~--~--~ COL~MN CCPV 12 L l~K NC. LCAO LINK NO. LOAD LINK NO. . LOAD LINK (.W. - . lOAD ---~--------------------------~-------- PAGE CCPY 12 CORRESPC~DING -------l'I"N"'k..,N~c-.-ITA1l----~-------T TMIS_SLACK kAS IN CDL~~N P(OI PHIMF tLF.MENI • 6 4.000106 - I Nr~r·;-··-rc.ID 22 CF THE CRIGINAL UASIS. PAGE CCL~MN CCPY 23 LINK NO. LCAD 13 CDARF~PC~CING LINK NC. PIOI PRIM£ ElfMENI • LOAD J.000003 - LINK NO. LOAD liNK NO. LOAD PAGE INDIVIDUAL COPY LOADING DATA 8 67 ll~~-~ ~c. lCAC ll N~ E IJ IC ~ I~• H ~! ·~ 26 _ _ _IC _ 4 _ _ _ _ _ _ _ _ _ _ _ 34 n e H 4 !~ 4 !e ~ e ' tC _,_l,_(A,_,C.__ i lC I,_INK)~t. 5 13 9 ~ ---- ·- -i1~ .. ~QA~ LINK NO. lOAO 5 13 13 9 9 ~ 13 17 ~ 19 5 4 3C 7 32 36 47 52 57 62 66 ~ ~ 8 12 "35 - i-- 46 7 ~I f 55 59 4 9 II 4 ~6 2 fC 18 t4 1~ f5 6 · ii; I ~ 5 13 86 H 83 9C 3 9I I ICC 107 ~ 1 ICI ICA 1 !~ S7 ICf ,_._ 43 5C ___ u~-------LE ~( 3 7 II I 19 88 96 103 12 4 7 13 2 I 9 I I 6 3 4 5 PAGE I~E fCllC~I~( ~RE I~E •tiEP~Aif SClliiC~S IH'I ((URREC --.nr----r----nn--11- -- ·-nz-c· ··rr Hll I~ I~E FI~Al a•SIS ~IIH ·tore--· _2_ _ _ 7_o,."o'6--.l'l----;;a"'o~a 15 I! TOTAL LINK LOADING DATA FIGURE 3J teEIA r.cARESPCNOihG ENTRY POINTS- ld 68 loadings show the links in the copy solution, the traffic assigned to each link and the percent of the copy solution that will be utilized. In the case of a slack vector in the final solution, it will be indicated as shown in Figure 42. The principal ~nswer loading data in Figure 43. to a given problem is shown by the total link The proper percentages of the link loadings on each copy are obtained and combined to give total traffic on each loaded link of the system. Copy Solutions Since any network problem whose combined minimum path flow overloads any given capacitated link will produce a "mixture .. of copy solutions, it is of interest to consider the multiple copy solutions. These solutions represent a diversion from minimum path flow and correspond to the proportional assignment technique developed by Irwin, et al. From the listing of traffic flow on each of the copy solutions in the final basis (Figure 42), the diverted traffic and the routes it follows can be observed. Omega Vector The Primal of the multi-copy problem is formulated as follows: subject to ): 1 69 The criterion function for the dual to the problem· is as follows: Max wl dl + w2 dz + • •. + w n dn + w n+l + w n+2 + ••• + wk where di = capacity limitation on link (i) w1 = the i-th variable of the dual solution n = number of capacitated links k = sum of copies plus capacitated links At an optimum solution the total cost of the solution (G) is given by G Since then :11 C P(O)'. P(O)' = B-l P(O) G = C B-l P(O). -1 but w is defined as C B Therefore G = w P( 0) • or Thus the Omega vector contains the dual variables of the optimum solution and provides evaluators for the capacitated links. Consideration of the first n elements of the Omega vector make it possible to determine which capacitated links contribute the greatest detrimental effect to the network flow. For example, consider the ex- 70 ample problem (Figure 7) which had two capacitated links and the following Omega vector when an optimum solution was re~ched. w = [-3, -5, 810, 600] w1 is associated with link 3 and w2 with link 9. If it were possible to increase the link capacity values, the greatest improvement in the total network flow costs would result from changing link 9 •.Thus 1 the final output provides a valuable tool to analyze the capacitated links of a traffic network. The results obtained from the solution from the various test problems indicate that the desired answer can be obtained by the multicopy program and that it provides insight to the distribution problem. The program con- siders each origin to destination requirement and the routing of this trip concerning capacity requirements and over-all system travel times. The output of the computer program for an optimum solution to the problem shows how traffic moving from each input node to all output nodes should be routed. These optimum routings can then be compared to the minimum path routings to find that traffic which should be diverted from the freeway by some type of operational control. Figure 44 shows an example of the traffic diversion previously discussed, The first drawing in Figure 44 shows the minimum path that traffic would follow from a given input node to the specified output nodes if there were no capacity restraints. However 1 the solution of the problem 71 by the optimization technique produced the combination of routings shown in the next three drawings. It would be impossible to route traffic exactly as indicated by the solution shown in Figure 44 but it would be possible to affect some diversion of traffic from the <Jenera! area of the city represented by the input node in question. Thus from the solution it would be possible to pinpoint the specific origins of traffic which should be diverted. This diversion could possibly be accomplished through ramp closures, one-way street operation, advisory signing, etc. In most cases the traffic which must be diverted from the freeway is short trip traffic. However, the ability of the at-grade facility to move traffic would also be reflected in the assignment to the freeway. Traffic . moving relatively short distances in areas where a poor supporting street system exists might be more adversely affected than traffic moving much greater distances over better at-grade facilities. 72 -----¢ -----¢ ¢------¢------9----: t I I I I \ I ----.0 6------6------0----MINIMUM ~--+U PATH -----Q------Q---- -Q )-.--......C ------<;r----v----Q I I I I I COPY 3-3 COPY 50% \.)----+() --- --Q---I I 3- 9 25 'ro -v---- -Q I I I I 6- - - - -6- --- < l - - _ , COPY 3-10 25% TRAFFIC DIVERSION BY COPIES FIGURE ld.f 73 OPTIMUM DISTRIBUTION OF TRAFFIC Solution Required Before it is possible to develop a control system to operate a street network, the basic question of which traffic will be controlled must be answered. The freeway links of the network have the greatest potential for traffic movement and thus it is extremely important that their ability to move traffic be maintained at a high level. The basic question can therefore be narrowed to ask what traffic must be diverted from the freeway to maintain its high level of efficiency and to provide for an optimum assignment of traffic over the system. An algorithmic approach which was tried might be stated as follows: 1. Close off all capacitated links or assign them a very high cost and search a minimum path of each origin to all destinations on all copies. 2.. Compute the time cost of each of the above minimum paths and rank. these in order with the highest cost path first followed by the second highest cost path and so forth. , 3. Assign traffic to the network considering the previously developed ranking. Allow traffic to utilize the capacitated links of the network until the indicated capacity of some link is reached. When the capacity of a link is reached this link is removed from the system and the assignment is continued until all traffic has been assigned. The advanced procedure was programmed by Blumentritt and it provided a very rapid assignment technique. It was found that this algorithmic technique produced the correct answer to test problem 2 and approximated very closely the correct answer to test problem 4. It was found 1 however 1 that it would be 74 necessary to introduce some refinements into the technique in order to duplicate the multi-copy solution over a wide range of problems. Work with this algorithmic approach is being continued and it offers a good approach to studying optimum distribution of traffic over a street network. The advantage of the algorithmic .assignment technique is that it can be programmed to run much faster than the multi-copy model and can deal with much larger traffic networks than is possible with a linear programming solution. Algorithmic Assignment A technique which shows a great deal of promise for the study of optimum traffic distribution is an algorithmic assignment to a given network which would approach the linear programming solution produced by the multi-copy model. Such techniques are being studied by Blumentritt (2} and some progress has been made toward obtaining successful solutions by this method. The basic element in the algorithmic assignment is the individual movements between a given origin and destination. It is possible to consider the effect or cost of a trip between a given origin and destination if this trip cannot be made over the capacitated freeway. link~ of the system or, in the case of a real problem, the Those trips which sustain the most adverse effect are then assigned to the capacitated links in that order until link capacity is reached. The remain- ing trips must then be diverted from their minimum cost path and would become the subjects of a traffic control program. 75 CONCLUSIONS AND RECOMMENDATIONS Conclusions The research reported herein has concerned itself with the development of a computer program to provide a linear programming solution for the optimum distribution of traffic over portions of a street network. This program was developed, evaluated and its application to the problem of developing operational controls for street networks was studied. The following conclu- sions were reached as a result of this research. l. The multi-copy linear programming model can be adapted to a computer program which will provide a solution to the optimum distribution problem for small networks. 2. The solution to the optimum distr lbution problem provides information which would be of significant value in planning and designing a traffic control system to operate an arterial street network. The origin of trips which should be diverted from the freeway can be determined and this information utilized in the design of the control system. 3. The multi-copy program was found to be limited to the following conditions: 50 input nodes 6 0 capacitated links 300 network nodes 1000 links In addition to the network limitations the problems of slow convergence 76 and long machine times indicated the undesirability of utilizing the linear programming solution when dealing with large networks. 4. Preliminary investigations indicate that it is possible to duplicate the linear programming solution of the optimum distribution problem by an alg.~rithmic technique. Such a technique offers the decided advantage of a much faster solution on the computer and the ability to handle a large network. 5. The multi-copy program is not applicable to normal traffic assignments for urban planning but is intended only as a tool for the critical analysis of small street networks. In this capacity it could be a useful technique for planning operational controls for freeway-major arterial systems. The concept of the optimum distribution of traffic is one which might well be applied to the general traffic assignment problem. It appears that the algorithmic technique could be developed to permit traffic assignment to urban street systems on a optimum distribution basis. Recommendations The following recommendations for additional research seem pertinent: 1. The development of the algorithmic technique for solving the network problem in a much faster manner appears to have much promise. Studies which would compare the results of multi-copy solutions to algorithmic 77 solutions and lead to the development of a satisfactory assignment technique seem highly warranted. 2. After development of the algorithmic technique so that large networks could be studied with a reasonable amount of machine time it would be desirable to study the optimum distribution of traffic over actual systems. To do this it would be necessary to break a system up into links and nodes and to arrive at the origin-destination requirements for this network. 78 RE:FERENCES 1. Berry, D. s., "Evaluation of Techniques for Determining Overall Travel Time", Proceedings of the Highway Research Board, PP• 429-440, 1952. 2. Blumentritt, Charles w., "Algorithmic Techniques For Traffic Network Analysis," Unpublished Report, Texas A&M University, 1963. 3. Brokke, G. E. , 11 As signing Traffic to a Highway Network", Public Roads, PP• 77-87, 1958. 4. Brown, R. "Expressway Route Selection and Vehicular Usage", Bulletin No, 16, Highway Research Board, pp. 12-21, 1948. 5. Bureau of Public Roads, "Electronic Computer Program for Assignment of Traffic to Street and Freeway Systems", Division of Development, Bureau of Public Roads, 1959. M., 6. Carroll, J, Douglas, Jr., 11 A Method of Traffic Assignment to an Urban Network", 64-71. Bulletin~~ Highway Research Board, PP• 7. CEIR Inc., LP/90 Usage Manual - /! Comprehensive Computing Syatem for Linear Programm~, July, 1961, 8~ Charnes, A., and Cooper, W. w., 11 Multicopy Traffic Network Models", Proceedings of £mposill!J1 QU Theocr .Qf Traffic Flow, General Motors Corporation, PP• 85-96, 1959. 9. Charnes, A., and Cooper, W. W., "External Principles for Simulating Traffic Flow in a Network", Proce~ings !fational ,Academy Q! Science, 1958, pp. 201-204. 10. Charnes, A., Cooper, W. w., and Henderson, Introguction !Q Linear Programming, John Wiley & Sons, Inc., New York, 1953. 11. Charnes, A., and Cooper, W. w., Management M~ and !ngustrial Applications Q! Linear Programming, Volume II, John Wiley and Sons, Inc., pp. 785-796. 12. Charnes, A., and lemke, C. E., 11 A Modified Simplex Method For Control of Round-off Error in Linear Programming, 11 Proceed~ Qt the Association for Computing Machinery, Pittsburgh, May 1952, PP• 97-98. 79 13. Chicago Area Transportation Study. Chicago, 1960. Final Report, Volume II, 14. Cleveland, D. E., "A Study of Highway Traffic Assignment", Doctoral Dissertation, A&M College of Texas, 1962. o., R., l5e Covault, D. and Roberts, R. "The Influence of On-Ramp Spacing on Traffic Flow on the Atlanta Freeway and Arterial Street System", Paper presented at the 42nd Annual Highway Research Board Meeting, 1963. 16. Dantzig, C. B., "On the Shortest Route Through a Network", Management Science, 1960, pp. 187-190. 17. Dantzig, G. B., "Maximization of a Linear Function of Variables Subject to Linear Inequalities", Chapter XXI of Koopmans (27). 18. DeRose, F., "The Developnent and Evaluation of the John c. Lodge Freeway Traffic Surveillance and Control Project", presented to the Annual Meeting of the Highway Research Board, 1963. 19. Forbes, T. W., "Speed, Headway and Volume Relationships on a Freeway", Proceedings of the Institute of Traffic Engineers, PP• 103-126, 1951. 20. Fuller, Leonard 1963. 21. Gass, Saul I., Linear Programming Methods and Applications, McGraw-Hill Book Company, Inc., 1958. 22. Gomory, R. E., and Hu , T. C., "An Application of Generalized Linear Programming to Network Flows", Research Report RC 319, International Business Machines Corporation, September, 1960. 23. Heanue, Kevin E., and Covault, Donald o., "The Developnent of Criteria for Closing a Freeway Ramp Using Linear Programming", Committee Report, Theory of Traffic Flow, Highway Research Board, January, 1962. 24• Irwin, N. and von Cube, H. G., 11 Capacity Restraint in MultiTravel Mode Assignment Programs, P~per presented to the Origin and Destination Committee of the Highway Research Board, January, 1962o 25. Irwin, N. A., Dodd, Norman and von Cube, H. G., "Capacity Restraint in Assignment Programs", Bulletin ?.YL, Highway Research Board, pp. 109-127. E., Basic Matrix Theory, Prentice Hall, Inc., A., 80 26. Keese, C. J., Pinnell, c., and McCasland, W. R., "A Study of Freeway Traffic Operations", Bulletin ill, Highway Research Board, PP• 73-132. 27. Koopmans, T. C., Editor, "Activity Analysis of Production and Allocation", Cowles Commission Monograph 13, John Wiley & Sons, Inc., New York, 1951. 28. Martin, B. v., Memmott, F. w., and Bone, A. J., Principles and Technigues of Predicting Future Demand for Urban Area Transportation, Research Report No. 38, Joint Highway Research Project, Massachusetts Institute of Technology, 1961. 29. May, A. D., Athol, P. J., Parker, W. L. and Rudden, J. B., "Development and Evaluation of Congress Street Expressway Pilot Detection System", presented at the Annual Meeting of the Highway Research Board, 1963. 30. McCracken, Daniel D., ! Guide to FORTRAN Programming, John Wiley and Sons, Inc., New York, 1961. 31. Mertz, William L., "Review and Evaluation of Electronic Computer Traffic Assignment Programs", Bulletin w_, Highway Research Board, PP• 94-105. 32. Moore, E. F., "The Shortest Path Through a Maze", Proceedings of an International Symposium QU the Theory: of Switching Part II, April, 1957. 33. Moskowitz, K., "Research on Operating Characteristics of Freeways", Procee~ Q£ the Institute of Traffic Engineers, pp. 85-110, 1956. 34. Pinnell, Charles and Satterly, G. T., "Systems Analysis Technique for the Evaluation of Arterial Street Operation", Paper presented at the Annual Meeting of the American Society of Civil Engineers, Detroit, Michigan, October, 1962. 35. Pinnell, Charles, "Development of a Linear Programming Technique for a Systems Analysis Study of Arterial Street Operation" 1 Doctoral Dissertation, Texas A&M University, 1964. 36. Pollack, M., "The Maximum Capacity Through a Network", Operations Research, 1960, pp. 733-736, 37. Saaty 1 Thomas L., Mathematical Methods of Operations Research McGraw-Hill Book Company, Inc. , 19 59. . 81 )8.. Schneider, M., "Traffic Distribution on a Road Networ~ Chicago Area Transportation Study Publication 66538, May, 1961. 39. Smock, Robert B., 11 An Iterative Assignment Approach to Capacity Restraint on Arterial Networks'', paper presented at the Annual Meeting of the Highway Research Board, January, 1962. 40. Texas Highway Department, Highway Planning Survey, Traffic Survey, Houston, Texas, 1951. 41. Tomazinis, A. R., 11 A New Method of Trip Distribution in an Urban Area", Paper Number 15, Penn Jersey Transportation Study, 1962. 42 .. Voorhees, A. M., 11 A General Theory of Traffic Movement", Proceed~gs Institute of Traffic Engineers, 1955. 43. Wattleworth, Joseph A., "Peak-Period Control of a Freeway SystemSome Theoretical Considerations", Report 9, Expressway Surveillance Projec~ Illinois Department of Highways, August, 1963. ~ Freeway A., and Shuldiner, Paul W., "The Inclusion of Left Turns in Traffic Prediction Models of the Charnes-Cooper Type", Paper presented at the Amerlcan Society of Civil Engineers Annual Meeting, October, 1962. 44. Wattleworth, Joseph 45. Webb, G., and Moskowitz, K., "California Freeway Capacity Study1956 11 , Proceedings of the Highway Research Board, Volume 12_, PP• 587-642, 1957. 82 APPENDICES 83 CALLING CALL SEQUENCE : START (NOV,K,NOKAP) NOV = NUMBER OF "LINKS K = NUMBER OF COPIES NOKAP = NUMBER OF CAPACITATED LINKS. REWIND TAPES 2 , 3 I AND 4 CALL LIBRARY ROUTINE ERASE FOR ARRAY I Nl T IALIZAT ION INPUT : NETWORK DESCRIPTION, INPUT VOLUME DATA,. OUTPUT VOLUME DESCRIPTION, CAPACITATED LINKS, FLOW DIAGRAM SUBROUTINE START FIGURE 17 84 CALLING SEQUENCE : CALL TREE KOPY , KEY, IND, LINK , NO) KOPY = NUMBER OF COPIES KEY = I OR 2, WHICH SPECIFIES ENTRY POINT IND = COPY NUMBER UNDER CONSIDERATION LINK = NUMBER OF LINKS NO = NUMBER OF NODES MINUS TWO KEY = I BUILDS MINIMUM PATHS FOR THE INITIAL BASIS KEY = 2 BUILDS THE MINIMUM PATH FOR I TH COPY. r I THE KEY = N_G_E_ NETWORK-C-OS_T_S OM FIXED POINT TO FLOATING POINT -~~-----------~ ~J0--@ ................- ........................... ~-----~-- _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __..J 85 (A) // / // J IS / THE Nlll ELEMENT , rc\'!'_~K OF THE MIN I MUM ' '-,,.._ \_' /joG PATH ARRAY EQUAL T 0 // -JHE K!!l OUTPUT NODE / . · 0 F THE 1".1! C 0 P Y / / ·--. 7 .. / ./' -(0) ____ ______ __ __ ,~4fNo 204 (KEY • 2) FLOW DIAGRAM SUBROUTINE TREE Bu__ _ _ _ _ _ _ _ _ ____.l c___ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _fi_G_UA~la.~- 86 ----------------------------- IS THE DESTINATION OF THIS MINIMUM PATH EQUAL TO ITS ORIGIN? ~YE~S4r~j";2 120 FOR COPY (I), LOAD ALL LINKS OF THE MINIMUM PATH OF THIS OUTPUT NODE WITH THE VOLUME OF THE OUTPUT NODE B KEY= 2 NO E IS THIS LAST THE COPY? l YES ~----ADD ROUNDING FACTOR TO FLOATING POINT COSTS OF THE NETWORK DE~CRIPTION AND TRUNCATE (KEY= I) FLOW DIAGRAM SUBROUTINE TREE FIGURE L _ __ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ - 18-C ----------------------------1 87 r---------------·-------------------, CALLING CALL ESTABLISH INPUT NODE AS REFERENCE NODE. SEQUENCE : PATH (I, LINK, NO) WHERE l• COPY NUMBER LINK= NUMBER OF LINKS NO • NUMBER OF NODES MINUS TWO. PLACE CONNECTING NODES AND CUMULATIVE COSTS IN SCRATCH TABLE. REMOVE SCRATCH TABLE ENTRY THAT RETURNS TO REFERENCE NODE. SCAN SCRATCH TABLE FOR MINIMUM COST CONNECTING NODE. IS THIS NODE ALREADY IN THE SEQUENCE TABLE 7 YES REFERENCE NODE IS NOW THE LAST ENTRY IN SEQUENCE. NO PLACE THIS NODE IN THE SEQUENCE TABLE AND REMOVE FROM SCRATCH TABLE HAS A PATH BEEN BUlLT TO ALL OTHER NODES IN THE SYSTEM? NO FLOW DIAGRAM SUBROUTINE FIGURE ----·----···----------·---- --·-· -·-- PATH 19 --·--------------------------' 88 CALLING SEQUENCE : CALL KOST (NOV , K , NOKAP) NOV • NUMBER OF LINKS K • NUMBER OF COPIES NOKAP • NUMBER OF CAPACITATED LINKS SE1 FIRST NOKAP ELEMENTS OF THE P(O) VECTOR EQUAL TO THE CAPACITIES OF THE CAPACITATED LINKS SET UP FIRST NOKAP ROWS OF MATRIX NO DID THE INITIAL ASSIGNMENT OVERLOAD THE CAPACITATED LINK ~ NO IIH I) PLACE POSITIVE SLACK IN ARRAY 2) SET CORRESPONDING POSITION OF COST VECTOR • 0 I) PLACE NEGATIVE SLACK IN ARRAY 2) SET CORRESPONDING POSITION OF COST VECTOR EQUAL TO 10000 (HIGH M COST ) t--------------- FLOW DIAGRAM SUBROUTINE FIGURE KOST 20-A 89 SET FIRST K POSITIONS OF BASIS VECTOR = COPY NUMBER AND FIRST ITERATION .......,--------~!_______,. I) SET REMAINDER OF P (0) VECTOR ELEMENTS = I 2) COMPLETE REMAINDER OF ARRAY BY PLACING UNIT ELEMENTS IN CORRESPONDING COPY POSITIONS ,-------_]_~-------' ADD TO EACH COST VECTOR ELEMENT THE COST OF THE MINIMUM PATH FOR THIS COPY 11 WRITE~ PiOllvECToR;;]N TAPE 2 2) WRITE COPY LOADINGS ON TAPE 1··---·-- I END FILE 2 REWIND 2 I j 1 RETURN FLOW DIAGRAM SUBROUTINE KOST FIGURE 20-B 90 CALLING SEQUENCE : CALL MUL T (KEY, SUM, ICOLA) KEY" I ICOLA = ORDER OF MATRIX MUTIPL Y COST VECTOR BY MATRIX TO OBTAIN OMEGA ROW IS THE ABSOLUTE VALUE OF ANY OMEGA ELEMENT LESS THAN SET THAT ELEMENT = 0 ,~ I.E-04! KEY • 3 ENTER MULTIPLY B·l BY THE P(J) VECTOR TO GET THE PRIME OF THAT VECTOR KEY= 2 MULTIPLY COST VECTOR BY Po TO GET THE OVERALL COST OF THE PRESENT SOLUTION KEY= 4 ~EL~ L TIPL Y THE OMEGA W TIMES THE TERING COPY VECTOR [] GET THE Z(J) RETURN FLOW DIAGRAM SUBROUTINE MULT FIGURE 21 91 CALLING SEQUENCE : CALL CHKINT (KEY, KEYA, NOKAP) KEY II I ENTER NOKAP= NUMBER OF CAPACITATED LINKS. IS THERE A POSITIVE ELEMENT IN THE OMEG ROW? KEY= 2 KEYA = I ENTER FLOW DIAGRAM SUBROUTINE FIGURE ---···· CHKINT 22 ---·-- -- ---- --- -· -------~------- 92 CALLING CALL SEQUENCE LOGIC ( NOKAP) NOKAP =NUMBER OF CAPACITATED LINKS. ENTER PLACE NEW DUMMY COST ON THE CAPACITATED LINKS OF THE SPECIFIED COPY. FLOW DIAGRAM SUBROUTINE LOGIC FIGURE 23 93 CALLING SEQUENCE : CALL NEWVAL (KOPY, LINK, N, ND) KOPY =NUMBER OF COPIES LINK • NUMBER OF LINKS N ., COPY NUMBER UNDER CONSIDERATION ND • NUMBER OF NODES MINUS Z REMOVE ' DUMMY COSTS' FROM CAPACITATED LINKS AND REPLACE WITH ACTUAL TRAVEL COSTS. -~ SUM TOTAL COST FOR THIS C~~ (C ) SET THE NOKAP +N-th POSITION OF THE ENTERING VECTOR P (J) EQUAL TO ONE. (OBTAIN Zj) (.)Pj = Zj FLOW DIAGRAM SUBROUTINE NEWVAL FIGURE 2lf- 94 CALLING SEQUENCE CALL OTHVAL (KOPY,LINK,IND) KOPY = NUMBER OF COPIES LINK = NUMBER OF LINKS IND = POSITION THAT VECTOR (OR SLACK) WILL BE ENTERED (DETERMINED IN THIS SUBROUTINE) YES IS NORDER WHERE NORDER IS THE ORDER OF THE MATRIX? It >N_O_ _ _ _~ DETERMINE SMALLEST POSITIVE 9.1. AND SET IND = 1 YES ENTER BY P; INTO THE BASIS GAUSSIAN ELIMINATION (COMPUTE NEW OMEGA ROW) FLOW DIAGRAM SUBROUTINE OTHVAL FIGURE 25 95 CALLING SEQUENCE : CALL SLACK (KOPY, LINK, NOKAP) KOPY =NUMBER OF COPIES LINK= NUMBER OF LINKS NOKAP = NUMBER OF CAPACITATED LINKS. DETERMINE THE LARGEST POSITIVE ELEMENT IN THE OMEGA ROW SET THE P(J) VECTOR ELEMENT CORRESPONDING TO THE POStnVE ABOVE = I INCREASE NUMBER OF SLACK ITERATIONS BY I (ENTER THIS SLACK INTO BASIS) WRITE ZERO LINK LOADINGS ON TAPE 3 FOR THIS BASIS VECTOR WRITE OUTPUT TAPE 6 : ENTRY POINT OF THIS SLACK AND OUTPUT CURRENT BASIS DESCRIPTION FLOW DIAGRAM SUBROUTINE -------- FIGURE SLACK 26 ---------------------------------~ 96 ~T0 CALLING SEQUENCE CALL SHELL (K,NOV,NOKAP) S L L ERAUS FOR COPY _OAD ARRAY K = NUMBER OF NOV = NUMBER .----I___~3 COPIES OF LINKS KOKAP = NUMBER OF CAPACITATED LINKS READ TAPE 2, ENTERING COPY VECTOR AND ALL LINK LOADINGS -1 REL21 J TAPE 3 T EOF ).:READ V Y>-E_S_ _.., TAP~NE-COPY- -1 L·TERAT~~""-~rc;~e~-~·-"'""sJ /ls~-- NO 1------< /THIS COP~ IN THE FINAL;> --- l --r~-------~~~r~= ~----- SUM ALL LINK LOADINGS ACCORDING TO THE AMOUNT SPECIFIED BY THE P(O) ELEMENT FOR COPIES IN THE FINAL BASIS APPLY ROUNDING FACTOR -----------r BASISV AND FIX RESULTS YES ~ TO COPY LOAD ARRAY FLOW DIAGRAM SUBROUTINE SHELL FIGURE 27 97 CALLING SEQUENCE ( KOPY , LINK , NOKAP) KOPY = NUMBER OF COPIES LINKS= NUMBER OF LINKS NOKAP : NUMBER OF CAPACITATED LINKS . .-[j{-R-1-TE P_~[~~_NU~_BE§J NOTE : ALL STATEMENTS [WRiTEPROBLEMHEADINGJ TO OUTPUT WRITE REFER TAPE 6 · ~-L- ----------- ~-----___l___ ----, WRITE COS~~CTOfU ~ITE FINAL BASIS DESCRIP~ ~AULL~-\ KEY=J FLOW DIAGRAM SUBROUTINE PRNT FIGURE 28-A '------------------------------------------------' 98 r------------------------------------------, WRITE COPIES IN FINAL BASIS WRITE MATRIX POSITION, COPY NUMBER, CORRESPONDING P ( o)' ELEMENT FOR EACH COPY IN FINAL BASIS. ALSO LIST RESPECTIVE NON- ZERO LINK LOADINGS. WRITE FINAL CONVEX COMBINATION OF NON-ZERO LINK LOADINGS FOR ALL COPIES ARE THERE ANY ALTERNATE SOLI,ITIONS? NO WRITE INDICATION THAT ALTERN ATE SOLUTIONS WERE FOUND >--~ NO REWIND 2 REWIND 3 k - - - - - - - - - - - ' REWIND 4 FLOW DIAGRAM SUBROUTINE PRNT FIGURE 28-B ---------------------------------~ 99 ~--~~--=---- INPUT CONTROL CARD ( NUMBER OF COPIES, NUMBER OF LINKS, NUMBER OF CAPACITATED LINKS, NUMBER OF NODES, ITERATION FACTOR CONVERGENCE LIMIT, TITLE OF PROBLEM, INTERMEDIATE OUTPUT CONTROL NUMB_=-:ER_:_:_·.:_l- . - - - - - ~CE __ ] ____ _ ]OUTPUT - ~--- ] .. L_IQ__NEW PAGE ~LiZE-COUNTIN~ -~~g$_ \g~~ LL EE y =I YES [ ~~~~~r~~g~·] 7 AVE 10 CONSECUTIVE ENTRIES BEEN MADE INTO THE SAME BASIS POSITION OR HAVE 10 CONSECUTIVE SLACKS BEEN INTRODUCED? N_Q__ -----@ CALL MATINVJ (LIBRARY MATRIX INVERT ROUTINE ~~ ~MATRIX >r~§____ _ __ ', SINGUL~Y 1000 104 _NO CALD CHKINT ---K_EY = 2 l___ - - ·-·· ------------ N= N +I OfX N~:I:REMENTI ALN B__ J ____ NITIALI>E PY ITERATIONS NUMBER I to FLOW DIAGRAM MAIN CONTROL PROGRAM FIGURE 2. 9 -A 100 DID . FINDS~~~- ;~~~',,, YES NOKAP~ ELEMENT IN FIRST POSITIONS OF OMEGA ROW, WHERE NOKAP = NUMBER ~OF CAPACITATED ~"LINKS? 108 '> NO T(N)= IT(N)+I REMENT CURRENT Y ITERATION BY I ~~~~;~~~t:~~·J L THIS POINT -·..-----·----- · - - - - - - ' DOES·,,"' THIS SUM "-, EXCEED THE ORDER~­ OF THE MATRIX TIMES THE INPUT ITERATION FACTOR ':1 OUTPUT: NO FEASIBLE SOLUTION FOUND IN --ITERATIONS ---- ---------------- ----------, OUTPUT THE FOLLOWING: I) MINIMUM PATH 2) COST VECTOR 3) ARRAY -------------14) ENTERING COPY VECTOR 5) PRIMED ENTERING COPY VECTOR 6) P- rERO VECTOR 7) OMEGA VECTOR FLOW DIAGRAM MAIN CONTROL PROGRAM 29-B ----- - - - - - - - - - - - - - - - - - - - - - - - - - - ' FIGURE ________________ ..._ -- ------- 101 THIS IS AN ALTERNATE SOLUTION CALL OTH VAL LINK=O WRITE TAPE 4•COPY AND ITERATION NUMBER, AND POSI· TION WHERE THIS VECTOR COULD ENTER BASIS HAS ANYTHING ENTERED THE BASIS IN NOKOP TTEMPTS ? 218 YES OUTPUT Zj,Cj,Zj-Cj, AN 0 CURRENT COPY ITERATION FLOW DIAGRAM MAIN CONTROL PROGRAM FIGURE 29-C 102 --------------------------~ (ENTER THIS VECTOR INTO BASIS) WRITE COPY AND ITERATION NUMBER; LINK LOADINGS FOR THIS COPY ON TAPE 3 PUT POINT OF ENTRY, URRENT COST, ~j- Cj I AND NEW BASIS SUM ALL ITERATIONS TO THIS POINT DOE~''," THIS SUM "'~ NO '>-----< EXCEED MAXIMUM ITERATION / CRITERION? IS "'--" INTERMEDIATE OUTPUT INFORMATION DESIRED FOR THIS ENTRY? --~ YES OUTPUT THE FOLLOWING : I) ENTERING COPY VECTOR 2) PRIMED ENTERING COPY VECTOR 3) P- i!ERO VECTOR 4) OMEGA VECTOR FLOW DIAGRAM MAIN CONTROL PROGRAM FIGURE 29-D ----- ---------- - - - - - - - - - - - - - - - - - - - - - - - l PUBLICATIONS Project 2-8-61-24 Freeway Surveillance and Control 1. Research Report 24-l, , Theoretical Approaches to the Study and Control of Freeway Congestion, by Donald R. Drew. 2. Research Report 24-2, ''Optimum Distribution of Traffic Over a Capacitated Street Network, by Charles Pinnell.