Next Article in Journal
In-Line Mach Zehnder Interferometer Based on Ytterbium Doped Fiber with Up-Taper Structure in Fiber Ring Laser and Its Application in Sensing
Next Article in Special Issue
Current Non-Contact Road Surface Condition Detection Schemes and Technical Challenges
Previous Article in Journal
Very Long-Length FFT Using Multi-Resolution Piecewise-Constant Windows for Hardware-Accelerated Time–Frequency Distribution Calculations in an Ultra-Wideband Digital Receiver
Previous Article in Special Issue
mm-DSF: A Method for Identifying Dangerous Driving Behaviors Based on the Lateral Fusion of Micro-Doppler Features Combined
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Automatic Incident Detection Method for a Vehicle-to-Infrastructure Communication Environment: Case Study of Interstate 64 in Missouri

Department of Civil, Computer and Electrical Engineering, Saint Louis University, St. Louis, MO 63103, USA
*
Author to whom correspondence should be addressed.
Submission received: 14 October 2022 / Revised: 22 November 2022 / Accepted: 23 November 2022 / Published: 26 November 2022
(This article belongs to the Special Issue On-Board and Remote Sensors in Intelligent Vehicles)

Abstract

:
Transportation agencies continuously and consistently work to improve the processes and systems for mitigating the impacts of roadway incidents. Such efforts include utilizing emerging technologies to reduce the detection and response time to roadway incidents. Vehicle-to-infrastructure (V2I) communication is an emerging transportation technology that enables communication between a vehicle and the infrastructure. This paper proposes an algorithm that utilizes V2I probe data to automatically detect roadway incidents. A simulation testbed was developed for a segment of Interstate 64 in St. Louis, Missouri to evaluate the performance of the V2I-based automatic incident detection algorithm. The proposed algorithm was assessed during peak and off-peak periods with various incident durations, under several market penetration rates for V2I technology, and with different spatial resolutions for incident detection. The performance of the proposed algorithm was assessed on the basis of the detection rate, time to detect, detection accuracy, and false alarm rate. The performance measures obtained for the V2I-based automatic incident detection algorithm were compared with California #7 algorithm performance measures. The California #7 algorithm is a traditional automatic incident detection algorithm that utilizes traffic sensors data, such as inductive loop detectors, to identify roadway events. The California #7 algorithm was implemented in the Interstate 64 simulation testbed. The case study results indicated that the proposed V2I-based algorithm outperformed the California #7 algorithm. The detection rate for the proposed V2I-based incident detection algorithm was 100% in market penetrations of 50%, 80%, and 100%. However, the California #7 algorithm’s detection rate was 71%.

1. Introduction

A component of intelligent transportation systems (ITSs), the incident management system, aims to mitigate the negative impacts of crashes. A 2007 study reported that incidents contributed to 25% of the congestion in the United States [1], and a 2017 study reported that the annual cost of congestion in the United States was USD 192 billion [2]. Additionally, traffic crashes may result in secondary crashes [3,4]. Incident management systems are developed to improve incident detection, verification, and the response process to reduce incident clearance and recovery times [5]. The reduced clearance and recovery time lead to less congestion, reduced fuel consumption and pollution, improved travel time reliability, and a reduced likelihood of secondary crashes [6]. Automatic incident detection (AID) systems, as the name implies, aim to automatically detect incidents on roadways and alert first responders, thereby reducing the response time to incidents. Expeditious detection and response could include the following benefits: (1) the prompt arrival of medical first responders could reduce the consequences of injuries; (2) first responders could set up temporary traffic control faster and thereby mitigate congestion; and (3) transportation management center (TMC) operators could notify travelers of the incident through other ITS devices, directing them to alternate routes and activating incident traffic control plans.
Traditionally, traffic incidents came to be known in only a few different ways, the most common being reports from other drivers via phone to emergency numbers, such as 112 or 911. Other methods included receiving notice by police or other officials or notice by TMC operators via closed-circuit television (CCTV) monitoring [7]. The advent of ITS technologies, such as traffic detectors, paved the way for the development of AIDs. Traffic detectors are installed on freeways to measure traffic stream characteristics, such as flow, speed, and occupancy. These data served as the traditional source of data for automatic incident detection algorithms. One common approach for detecting incidents from point-based traffic data is to compare and analyze traffic stream characteristics obtained from detectors both upstream and downstream of a roadway segment. One disadvantage of this method is that the exact location of an incident often cannot be determined [8]. If the link lengths are short or the detectors are closely spaced, then the approximate location of the incident can be known. However, a dense deployment of detectors is expensive, not only in capital costs but also in maintenance costs [9]. A potential disadvantage of point-based methods is that they may not detect an incident until the queue spills back towards downstream sensors. In addition to point-based sensor data, link travel times obtained from automatic vehicle identification (AVI) [10] and automatic vehicle location (AVL) [11] have been utilized to develop automatic incident detection methods.
Vehicle-to-infrastructure (V2I) communication is an emerging transportation technology that enables communication between a vehicle and the infrastructure. This paper explores the application of V2I data for automatic incident detection and contributes to the field of ITS and connected vehicles in the following ways: (1) This paper contributes to the ITS body of knowledge by developing a V2I-based incident detection algorithm. To the best of the authors’ knowledge, this is the first paper that investigates vehicle snapshots collected according to the Society of Automotive Engineers’ J2735 protocol for probe data collection on freeway facilities [12]. (2) The algorithm proposed in this paper is explainable and is developed based on statistical models, unlike some machine learning-based methods that are black boxes. (3) The proposed algorithm is investigated on the basis of various market penetration rates and for various virtual segment lengths. A freeway facility is partitioned into virtual segments, and the speeds of vehicles at these virtual segments are monitored to detect incidents. A simulation testbed of Interstate 64 in St. Louis, Missouri, USA, is developed to evaluate the proposed algorithm. The proposed algorithm is evaluated during peak and off-peak periods and under various market penetration rates for V2I technology. The performance of the proposed algorithm is compared with a traditional point-based incident detection algorithm, the California #7 algorithm.
The remainder of this paper is organized as follows. First, an overview of the V2I probe data is provided. Next, the state of the art in the simulation of V2I environments and AIDs is reviewed. Traffic incident management system architecture is briefly discussed. Then, the proposed methodology for the V2I-based incident detection is described, and performance measures for evaluating the proposed AID are defined. In the next two sections, the simulation testbed, the results obtained from the implementation of the proposed AID, and the California #7 algorithm are described. Finally, the findings of this research and directions for future research are discussed.

1.1. Vehicle-to-Infrastructure (V2I) Probe Data

Vehicle probe data in a V2I environment are collected and reported to traffic management centers and other ITS subsystems. Two of the elements of V2I that facilitate the data collected are on-board units (OBUs) and roadside equipment (RSE). OBUs are installed in vehicles and record vehicle activity data at certain intervals; recorded vehicle activities are referred to as snapshots. RSE is installed at interchanges and other locations to facilitate communication between vehicles and infrastructure. When a vehicle enters an RSE coverage area, the information stored in OBUs is transmitted to the RSE. The RSE may communicate relevant information to the OBUs.
The standards for and format of V2I probe data are established in the SAE J2735 standard [12]. Vehicle OBUs record three types of snapshots: periodic snapshots, start and stop snapshots, and event-triggered snapshots. Periodic snapshots are recorded at regular intervals. When the vehicle speed is greater than or equal to 60 mph, periodic snapshots are recorded at 20 s intervals. When the vehicle speed is less than or equal to 20 mph, snapshots are recorded at four-second intervals. For speeds between 20 mph and 60 mph, a linear approximation is used to identify the snapshot interval. Start and stop snapshots are recorded when (i) a vehicle does not move (i.e., speed = 0) for five seconds; and (ii) when there is no record of the vehicle stopping within a 15 s interval. When a stop snapshot is recorded, periodic snapshots are no longer recorded. A start snapshot is recorded when the vehicle speed exceeds 10 mph. Event-triggered snapshots are recorded when vehicle status elements change. Airbag activation is an example of an event-triggered snapshot. Regardless of snapshot type, each snapshot includes vehicle information, such as speed, position, turn signal and brake status, and airbag activation.

1.2. Literature Review

In this section, the state of the art in V2I simulation is reviewed, and an overview of incident detection methods is provided. Then, incident detection algorithms relevant to this paper are reviewed.

1.2.1. Vehicle-to-Infrastructure Simulation

Kianfar and Edara [13] proposed a methodology to optimize the placement of RSE for travel time estimations. A simulation testbed of a downtown network in Boise, Idaho was developed using the VISSIM traffic simulation software. Data were collected following the SAE J2735 standard. A genetic-based algorithm was proposed to find the optimal deployment of RSE to maximize the RSE’s coverage index. A sensitivity analysis was conducted to evaluate the performance of the models under various market penetration rates.
Olia et al. [14] proposed a methodology to optimize the deployment of RSE and increase the accuracy of travel time estimations. A nondominated sorting genetic algorithm was used to find the optimal location of the RSE in a 125 km long segment of a highway in the greater Toronto area.
Lin et al. [15] introduced a compression-sensing approach to solving the data storage problems resulting from the overcollection of traffic data in a connected vehicle environment. They evaluated the effect of their data collection approach on the travel time estimation. They implemented their approach to recapture data from a safety pilot model deployment program. The case study results revealed that the compression-sensing approach reduced the travel time estimation error to 65% relative to that of conventional data collection methods.
Chen et al. [16] proposed a new protocol to collect probe data in a V2I environment; this protocol was referred to as the R2 protocol. In the R2 protocol, a vehicle snapshot was collected only when a significant change in vehicle speed occurred. The R2 protocol was compared with the fixed 2 s, fixed 4 s, and SAE J2735 probe data collection protocols. The results indicated that the R2 protocol reduced the travel time estimation error. Additionally, fewer snapshots were collected by the R2 protocol in comparison with the fixed 2 s, fixed 4 s, and SAE J2735 protocols.
Liu et al. [17] developed a connected vehicle simulation platform in VISSIM and OMNeT++. The simulation testbed included a freeway in Edmonton, Canada. The number of data packets lost, network latency, the reporting interval between the time when a vehicle entered the simulation network and when it reported its packet lost, and travel time estimation were used to evaluate the performance of the proposed platform. The results showed that different traffic flow patterns affected the reported interval distribution and that RSE placement affected the travel time estimation. They recommended that the RSE deployment design should consider not only the performance of data communication but also different traffic flow patterns.

1.2.2. Incident Detection Algorithms

Incident detection algorithms are primarily classified into four categories: (1) pattern-based algorithms; (2) algorithms based on catastrophe theory; (3) statistical algorithms; and (4) artificial-intelligence-based algorithms [18]. Pattern-based algorithms mainly compare observed traffic parameters, such as speed, traffic volume, and occupancy, with pre-established thresholds. If the results are abnormal compared to the thresholds, an incident is identified. The California algorithm is an example of pattern-based algorithm that analyzes occupancy to detect incidents. TSC algorithm 7, TSC algorithm 8, the all-purpose incident detection (APID) algorithm, and the pattern recognition (PATREG) algorithm are all examples of pattern-based algorithms. Algorithms based on catastrophe theory detect an incident when one of the traffic parameters, such as flow, speed, and occupancy, abruptly changes while the other parameters remain unchanged. The McMaster algorithm is one such example. Statistical algorithms compare real-time traffic data obtained from roadway sensors with predicted traffic parameters for the same interval. If a discrepancy occurs between the real-time and predicted parameters, the algorithm detects an incident. The standard normal deviate (SND) algorithm and a Bayesian-based algorithm are examples of such incident detection methods. Artificial-intelligence-based algorithms learn to recognize incident patterns from historical traffic and incident data. Neural networks and fuzzy set methods have been used to develop artificial intelligence-based incident detection algorithms. AIDs are commonly assessed on the basis of three performance measures: (1) detection rate; (2) time to detect; and (3) false alarm rate. An ideal AID algorithm will achieve a high detection rate with a short period of time to detect and a low false alarm rate. However, it is not always possible to achieve an ideal balance between the detection rate, time to detect, and false alarm rate.
Hellinga and Knapp [19] proposed and evaluated the performance of three automatic incident detection algorithms (AIDs) in comparison to the McMaster algorithm. The algorithms detected incidents by evaluating changes in mean travel time, and the resolution of the proposed automatic incident detection algorithms was 20 s. The case study results indicated that the proposed algorithms outperformed the McMaster algorithm.
Deniz et al. [20] compared the performance of three categories of automatic incident detection algorithms: California #7, APID, and DES. California #7 is a derivative of the California algorithm. The all-purpose incident detection (APID) algorithm is considered a pattern-based algorithm, and the double exponential smoothing (DES) algorithm is a statistical algorithm built on time series theory. Various road conditions and traffic incident locations were used to compare the three algorithms. The results indicated that the location of incidents and road conditions, especially the traffic volume, strongly affect the performance of the algorithm.
Nathanail et al. [21] proposed a method to calibrate the California #7 incident detection algorithm that analyzes spatial differences in occupancy and spatial differences in occupancy relative to detected incidents. Threshold values for the spatial difference in occupancy and the relative spatial difference in occupancy were calibrated using the detection logic with smoothing (DELOS) algorithm. Instead of using a one-minute time interval, the DELOS algorithm utilized a three-minute average of spatial occupancy. A case study of 12 incidents indicated that the calibrated DELOS algorithm improved the detection rate from 60% to the optimum 100%.
Rossi et al. [22] proposed two incident detection algorithms that utilized fuzzy inference systems (FISs). To detect incidents, FIS1 compared the real-time traffic conditions of a roadway section with the normal traffic conditions of an upstream roadway section, and FIS2 compared the traffic conditions of a roadway section with downstream traffic conditions. The algorithms were evaluated in a simulation model of a 10 km tangent two-lane roadway. The performance of the models was assessed on the basis of the detection rate, false alarm rate, and mean time to detection.
Asakura et al. [23] utilized GPS data obtained from commercial vehicles to detect an incident. A simulation testbed was calibrated based on commercial vehicle data and proposed algorithms that detected incidents by analyzing: (1) the link travel time; and (2) traffic shockwaves.
Sun et al. [24] proposed an incident detection algorithm based on the set theory. The algorithm analyzed unique media access control (MAC) addresses sent to access points by the smartphones of drivers and passengers in vehicles.
While many researchers primarily focus on incidents, such as collisions between vehicles, Yoshida et al.’s [25] research looked to identify locations of roadway damage due to natural disasters. Yoshida et al. [25] proposed a method that analyzed the three-dimensional vehicle trajectory data obtained from probe vehicles to identify the location of incidents. The three-dimensional vehicle trajectory consisted of the time (i.e., the temporal dimension) and physical location on the roadway (i.e., the physical dimension).
Rizvi et al. [26] proposed an incident detection algorithm that applied the cell transmission model to estimate traffic flow parameters between successive traffic sensors. Macroscopic traffic flow parameters were compared with predetermined thresholds to detect incidents.
Li et al. [27] proposed a framework to address the imbalanced incident datasets and investigate the spatial and temporal correlation between traffic stream parameters and incidents. A hybrid model that consisted of a generative adversarial network (GAN) and stacked autoencoders was proposed. Data from traffic detectors were analyzed to detect incidents.
Evans et al. [28] proposed a random-forest-based incident detection algorithm to reduce false alarms by considering the context in the incident detection process. Holidays and sports events were examples of contexts that were factored into the incident detection process. Incidents were detected by analyzing traffic sensors’ data.
Sun et al. [29] proposed a series of weak learners to automatically label ground truth incident data. Then the labeled ground truth data were utilized for training the machine-learning-based incident detection algorithms. Incidents were detected by analyzing the upstream and downstream traffic sensors’ data.
Iqbal et al. [30] evaluated the application of basic safety messages (BSMs) obtained from the vehicle-to-vehicle (V2V) communication environments of connected vehicles (CVs) for travel time estimations and incident detection. Regression models were used to estimate vehicle travel times. An incident was detected by comparing the prevailing traffic speeds with normal traffic speeds. The results indicated that the CV data could increase the accuracy of travel time estimations and are effective for incident detection.
Wolfgram et al. [31] proposed an incident detection algorithm that utilized vehicle acceleration data obtained from CVs’ BSMs. The mean times to detect obtained from the case studies ranged between 20 s and 30 s.
The review of the literature indicated that the application of V2I probe data for automatic incident detection had not been previously investigated. Iqbal et al. [30], and Wolfgram et al. [31] utilized basic safety messages (BSMs) obtained from the vehicle-to-vehicle (V2V) communication environments for automatic incident detection. However, to the best of the authors’ knowledge, this paper is the first study to propose an automatic incident detection algorithm on the basis of V2I probe data.

1.2.3. Architectural Description

The incident detection algorithm proposed in this paper is a subsystem of the Advanced Traffic Management System (ATMS) and Advanced Traveler Information System (ATIS) of ITS. The fulfillment of tasks defined for various Information Technology (IT) subsystems depends on the cooperation of all the subsystems of the system [32]. A system architecture ensures interoperability between various subsystems and guarantees all the developed subsystems can be integrated into one overall solution. The V2I-based incident detection system follows the United States Department of Transportation’s National ITS Architecture [33]. The “Architecture Reference for Cooperative and Intelligent Transportation (ARC-IT)” consists of four views: (1) enterprise view; (2) functional view; (3) physical view; and (4) communication view [34]. The algorithm proposed in this paper falls in the traffic incident management service pack. Figure 1 demonstrates the physical view of the subsystem. Descriptions of the enterprise, functional, and physical views of the system, its goals and objectives, needs and requirements, security, standards, and system requirements are provided in [35].
In the next section, the proposed method for detecting incidents on the basis of V2I probe data is described.

2. Methods

The methods section is organized into three subsections. In the first subsection, the proposed algorithm for automatic incident detection using V2I probe data is explained. Next, the performance measures for assessing the automatic incident detection algorithms are defined. In the third subsection, the California #7 AID is explained. The California #7 algorithm serves as a benchmark for evaluating the results obtained from the V2I-based algorithm. California #7 utilizes point-based data (i.e., traffic sensor data) to detect incidents.

2.1. V2I-Based Incident Detection Method

When an incident occurs on a freeway, it often results in the temporary closure of one or more travel lanes, thus creating a temporary bottleneck. Vehicles traveling on the lanes where the incident occurred must shift their path to open lanes, and vehicles traveling on open lanes must accommodate the merging vehicles. Lane-changing maneuvers conducted by vehicles result in a temporary change in their speed and are expected to increase the measures of the dispersion of speed near the location of an incident moments after it occurrs. The algorithm proposed in this paper aims to detect incidents on a freeway by analyzing vehicle speeds reported in V2I probe snapshots. The freeway is partitioned into virtual segments, and the average speed and standard deviation of speeds in segments during detection intervals are calculated. The length of the virtual segments represents the spatial resolution of the AID, and the detection interval represents the temporal resolution of the AID. The average and standard deviation of vehicle speeds on a segment are calculated from speeds obtained from snapshots of vehicles traveling on the segment during the time interval. The average speed and standard deviation at each segment during an interval are compared with the average speeds and standard deviations reported for the same segment in the previous δ intervals. If the average speed and standard deviation are statistically different from those of the previous δ intervals, the algorithm identifies an incident. The AID algorithm is explained below. This algorithm is built on the work of Hellinga and Knapp [19], who utilized segment travel times obtained from automatic vehicle identification technology (AVI) through electronic toll collection (ETC) to detect incidents. Hellinga and Knapp [19] analyzed the lognormal mean and variance of the mean travel times to detect incidents and stated that mean travel times on a freeway section are lognormally distributed.
The standard deviation of speeds of vehicles equipped with connected vehicle technology that are traveling on a segment is calculated according to (1):
σ i , j = k = 1 n i , j l = 1 c i , j , k ( s i , j , k , l S ¯ i , j ) 2 k = 1 n i , j c i , j , k
S ¯ i , j = k = 1 n i , j s i , j , k , l / k = 1 n i , j c i , j , k
where
σ i , j = standard deviation of speed snapshots of all vehicles in segment j at time interval i;
n i , j = number of vehicles traveling on segment j at interval i;
c i , j , k = number of snapshots reported for vehicle k in segment j at time interval i;
s i , j , k , l = speed in the lth snapshot reported by vehicle k while traveling on segment j at time interval i;
S ¯ i , j = average speed of all reported snapshots in segment j at interval i.
The mean of the standard deviation of speeds during the previous δ intervals is calculated according to (3):
σ ¯ δ , j = 1 δ t = i i n δ σ t , j
where
σ ¯ δ , j = mean of standard deviations of speed σ t , j in the comparison window for segment j;
δ = number of intervals in the comparison window.
The variance of the standard deviation of speed ( v a r δ , j ) for segment j in the previous δ intervals is calculated according to (4):
v a r δ , j = 1 n δ 1 t = i i δ ( σ t , j σ ¯ δ , j ) 2
The following three steps are followed to detect incidents in a virtual segment:
Step 1: The lognormal mean (5) and lognormal variance (6) of the standard deviation of speed for previous δ intervals are calculated to determine the threshold values for the detection of incidents. The incident threshold values are calculated according to (7).
μ j = ln ( σ ¯ δ , j ) 0.5 τ δ , j 2
τ δ , j 2 = ln ( 1 + v a r δ , j σ ¯ δ , j 2 )
C W i + 1 = e ( μ j + Z τ δ , j )
where
μ j   = lognormal mean of σ ¯ δ , j ;
σ ¯ δ , j   = mean of standard deviations of speed σ δ , j in the comparison window for segment j as previously defined in (3);
τ δ = lognormal variance of v a r δ , j ;
Z = Z-value for the confidence level;
C W i + 1 , j = threshold for the standard deviation of speed segment j for current time interval i + 1.
Step 2: The average speed for the previous n δ intervals is calculated according to (8):
ρ δ = 1 n δ t = i i δ S ¯ t , j
where
ρ δ = average speed in the comparison window (i.e., the previous n δ intervals).
Step 3: If the standard deviation of speed for the current interval is greater than the corresponding upper limit ( C W i + 1 ) and the current speed is smaller than the average speed for the reference sample ( ρ δ ), an incident has occurred in segment j in the time interval i + 1. In the next subsection, performance measures for evaluating the developed algorithm are described.

2.2. Incident Detection Performance Measures

The performance of the AID algorithms was assessed based on the detection rate, time to detect, detection accuracy, and false alarm rate. These performance measures are defined as follows.
The detection rate (DR) is the number of incidents correctly detected by the algorithm divided by the total number of incident cases. Time to detect (TTD), as the name implies, is the time interval between the moment an incident occurred and the moment when the incident was detected by the algorithm. Detection accuracy and the false alarm rate are calculated based on true positive, false positive, true negative, and false negative values. True positive (TP) is the number of instances in which an incident occurred and was detected by the algorithm. False positive (FP) is the number of instances in which no incident occurred on the freeway, but the algorithm incorrectly detected an incident. True negative (TN) is the number of instances in which no incident occurred on the freeway, and no incident was detected by the algorithm. False negative (FN) is the number of instances in which an incident occurred on the freeway but was not detected by the algorithm. Detection accuracy (DA) is the number of cases correctly detected by the algorithm divided by the total number of cases, as shown in Equation (9).
D A = T P + T N T P + T N + F P + F N × 100
The false alarm rate (FAR) is the ratio of false positives to the total number of instances, as shown in Equation (10).
F A R = F P T P + T N + F P + F N × 100
DA ranges between 0 and 100, with higher values indicating better model performance. FA ranges between 0 and 100, with smaller values indicating better model performance. An ideal AID will maintain balance among DA, FAR, and TTD and will result in high DA, low FAR, and low TTD. The next subsection describes the benchmark algorithm for automatic incident detection.

2.3. Point-Based Incident Detection Method

The California #7 algorithm was used as a benchmark to evaluate the performance of the proposed V2I-based AID algorithm. Figure 2 shows an example of a section of a freeway with a detector upstream of the section and a detector downstream of the section. The California #7 algorithm analyzes occupancy (OCC) measured at the upstream detector (r) at time interval (x) and occupancy measured at the downstream detector (r + 1) at time interval (x) to detect an incident that has occurred between upstream and downstream detectors. The California #7 algorithm computes the difference in occupancy ( O C C D F r , x ) and the relative difference in occupancy ( O C C R D F r , x ) for segment r at a time interval x . The algorithm steps are outlined below:
Step 1: Calculate OCCDF between upstream and downstream detectors at time interval x :
O C C D F r , x = O C C r , x O C C r + 1 , x
Step 2: Calculate OCCRDF:
O C C R D F r , x = ( O C C r , x O C C r + 1 , x ) / O C C r , x
Step 3: Calculate the difference between downstream occupancy DOCCDF during two successive detection intervals:
D O C C D F r , x = O C C r + 1 , x O C C r + 1 , x + 1
Step 4:
  • If O C C D F r , x > T1, an incident occurred but is not detected by the algorithm;
  • If O C C D F r , x > T1 and O C C R D F r , x > T2, an incident occurred and is detected by the algorithms;
  • If O C C D F r , x > T1, O C C R D F r , x > T2, and D O C C D F r , x > T3, an incident that has already been detected continues. Otherwise, no incident occurred.
T1 is the threshold for maximum OCCDF during normal traffic conditions; T2 is the maximum value of the difference in OCCRDF during normal traffic conditions; and T3 is the maximum DOCCDF during normal traffic conditions. Nathanail et al. [21] outlined the process for calibration of T1, T2, and T3 thresholds.

3. Results

3.1. Simulation Testbed

A 2.13 km (7000 ft) section of Interstate 64 in St. Louis, Missouri, USA was selected as the case study location. The freeway section was coded in the VISSIM traffic simulation software, and the SAE J2735 Dedicated Short Range Communications (DSRC) protocol for probe data collection was coded in MATLAB. The VISSIM COM interface was used to connect the traffic simulation models with the V2I probe data collection module in MATLAB.
Ten real-world incidents that occurred on Interstate 64 were identified in the traffic management center data logs and were simulated in the model. The duration and coordinates of the incidents were obtained from the incident logs, and traffic volumes before, during, and after an incident were retrieved from traffic sensors located upstream of the incident location. Incidents were selected to represent diverse traffic patterns. The selected incidents occurred during peak and off-peak periods and during summer, fall, and winter. Table 1 provides the date, start time, and duration of the incidents. The location of the incidents is illustrated in Figure 3. Each event was simulated for 2 h and 30 min. The initial 30 min of the simulation was considered a warm-up period, and no data were collected during this period. The ten incidents in the case study were selected to represent various roadway and environmental factors. These factors included the duration of incident clearance times and severities, peak and off-peak periods, seasons, roadway geometry, and driver behaviors. It is worth to mention the size of the case study is a limitation of the work presented in this paper. In the future, it will be beneficial to investigate the V2I-based algorithm with a larger set of real-world incidents and with different types of roadway facilities.

3.2. Performance of V2I-Based AID Algorithm

Traffic incidents were simulated in the testbed, and the V2I-based automatic incident detection algorithm was evaluated under various V2I market penetration rates, two different virtual segment lengths, and two different detection levels of confidence. The performance of the AID was investigated under four different levels of market penetration for OBU-equipped vehicles: 20%, 50%, 80%, and 100%. With regards to the length of virtual segments, the performance of the algorithm was investigated for 500 ft and 1000 ft virtual segments. Furthermore, the performance of the model with levels of confidence (Z) of 80% and 95% was investigated. The DA, DR, FAR, and TTD were reported for each simulation scenario. Figure 4a,b illustrates the relation between the FAR and DA for virtual segments of 500 ft. Figure 4a shows the results for a confidence level of 80%, and Figure 4b displays the FAR and DA for a confidence level 95%. There are four data markers on each data series line on these figures. The first marker from the left corresponds to a 20% market penetration rate, the second marker corresponds to a 50% market penetration rate, the third marker corresponds to a 80% market penetration rate, and the fourth marker corresponds to a 100% market penetration rate. With a confidence level of 80%, the DA varied between 55% and 80%, and the maximum FAR of the algorithm was 18%. With a confidence level of 95%, the maximum FAR improved to 12%, and the DA improved with values ranging between 60% and 90%. As expected, the algorithm with a confidence level of 95% outperformed the algorithm with a confidence level of 80%. As a result, a confidence level of 95% was selected as an acceptable value for the confidence level, and a sensitivity analysis was conducted with respect to the market penetration and length of virtual segments.
Table 2 reports the DA, FAR, and TTD for the case study incidents. These performance measures are reported for market penetrations of 20%, 50%, 80%, and 100%, and for virtual sections of 500 ft and 1000 ft. The performance measures reported in Table 2 reveal several trends:
  • In general, when market penetration increased, the DA and FAR improved. This is not surprising because when the market penetration increases, the quality of probe data improves as more snapshots are reported to the V2I AID algorithm;
  • The FAR and DA were not correlated with the length of the virtual segment. However, the TTD decreased from 1.7 min to 1.3 min when the virtual segment length was reduced from 1000 ft to 500 ft.
  • It is worth mentioning that as the market penetration increased, the FAR increased. This is because an increase in the number of probe snapshots increased the number of FPs. However, the maximum observed FAR was less than 12%, which is considered desirable;
  • Increasing the market penetration from 20% to 50% resulted in meaningful improvements in the DA; however, increasing market penetration from 50% to 100% did not have a significant impact on the DA. This trend is illustrated in Figure 5;
  • When the market penetration increased from 20% to 50%, the TTD improved. However, when the market penetration increased from 50% to 80%, no meaningful improvements in the TTD were observed;

3.3. V2I-Based AID Algorithm vs. California #7 Algorithm

The performance of the proposed V2I-based AID algorithm was compared with the performance of the California #7 algorithm. First, the California #7 algorithm was modeled in the simulation testbed and was calibrated for Interstate 64. Inductive loop detectors were in 500 ft intervals in the testbed. Ground truth data collected by the Missouri department of transportation traffic sensors were used to simulate traffic on 32 workdays on which no incidents occurred on Interstate 64. The data collected by simulation testbed inductive loop detectors were used to determine the thresholds of the California #7 algorithm according to the process described by Nathanail et al. [21]. The T1 threshold was 0.18%, T2 threshold was 0.27%, and T3 threshold was 0.5%.
Next, incidents A to J were modeled in the testbed, and the V2I-based AID algorithm and California #7 algorithm were simulated. The V2I-based AID algorithm was modeled with virtual segments that were 500 ft long and with market penetration rates of 50%, 80%, and 100%. The TTD, FAR, and DR obtained for both algorithms are reported in Table 3.
For all three market penetration scenarios, the V2I-based AID algorithm’s DR was 100%, and the V2I-based AID algorithm consistently outperformed the California #7 algorithm. With regards to the FAR, the V2I-based AID algorithm outperformed the California #7 algorithm at the market penetration rates of 80% and 100%. However, the California #7 algorithm had a lower FAR than the V2I-based AID algorithm at 50% market penetration. Similarly, the TTD of the V2I-based AID algorithm at 50% market penetration was comparable to that of the California #7 algorithm, and when the market penetration was increased to 50% and 100%, the TTD improved by 39% and 50%, respectively.

4. Discussion

Traffic incidents are a source of non-recurrent congestion and may result in secondary crashes. The prompt detection of roadway incidents enables transportation agencies to employ a spectrum of strategies to mitigate the impacts of incidents and prevent additional crashes. AIDs enable transportation agencies to detect incidents on the roadway and implement the appropriate response automatically. Improving the performance of AIDs has an overall positive impact on incident clearance and the recovery process and reduces the environmental and economic costs of incidents. AIDs commonly utilize point sensors data, GPS and AVL data, and CCTV video feeds to detect incidents. This paper investigated the application of emerging sources of data—vehicle snapshots generated by OBUs—in the V2I environment for automatic incident detection. A novel V2I-based incident detection algorithm was proposed, and its performance was compared with a conventional AID algorithm.
A simulation testbed of a segment of Interstate 64 in St. Louis, Missouri was developed, and real-world incidents were modeled to evaluate the performance of the proposed incident algorithm. The detection rate (DR), detection accuracy (DA), false alarm rate (FAR), and time to detect (TTD) were used to evaluate the proposed algorithm. A sensitivity analysis was conducted to assess the performance of the proposed algorithm under two confidence levels of 80% and 95%, four market penetrations of 20%, 50%, 80%, and 100%, and two different virtual freeway detection segments lengths of 500 ft and 1000 ft. The performance of the algorithm significantly improved when the market penetration was increased from 20% to 50%; however, the same level of benefit was not achieved when the market penetration was increased from 50% to 80% and 100%. The performance of the proposed V2I-based AID algorithm was compared with that of the California #7 algorithm. With market penetrations of 80% and 100%, the V2I-based AID algorithm significantly outperformed the California #7 algorithm.
The V2I-based incident detection method proposed in this paper has several advantages and disadvantages. These strengths and weaknesses are discussed in the following two subsections.

4.1. Strengths of the Algorithm

Unlike machine-learning-based incident detection algorithms, which are often black boxes, the algorithm proposed in this paper follows statistical principles. This statistics-based approach makes the algorithm explainable and straightforward to implement for practitioners. The algorithm does not rely on propriety codes and does not require the extensive training needed for machine learning methods. Another strength of the algorithm is that the incident detection segments are defined virtually. In the conventional incident detection methods, such as the California #7 algorithm, the detection segments are constrained between the physical location of the two consecutive sensors on the road. As such, additional sensors should be installed on the road to shorten the length of the detection segments. However, in the V2I-based approach, the detection segments are defined virtually, and their lengths can be adjusted from the TMC. This flexibility would allow transportation operators to adjust the lengths of the detection segments throughout the day based on the market penetration or volume for the vehicles equipped with OBUs. For example, during overnight hours, when traffic volume is low, the TMC operators can adjust the length of detection segments to be longer to improve the algorithm’s performance. Another potential advantage of the algorithm proposed in this paper is its ability to identify which lanes are blocked because of an incident. The SAE J2735 messages include the coordinates of vehicles. After an incident is detected by the algorithm, it is possible to analyze the latitudes and longitudes received from vehicles to determine where the lane changes maneuvers are occurring and from which lanes’ latitudes and longitudes are not received. This information could determine how many lanes are blocked as a result of an incident. It is worth mentioning this feature was not investigated in this paper and is suggested as a research topic for future studies. It should be noted that conventional incident detection algorithms are not able to determine which lanes are blocked due to an incident.

4.2. Weaknesses of the Algorithm

The V2I-based incident detection method is not without disadvantages. For example, as illustrated in Table 3, the method requires a market penetration rate of at least 80% in order to outperform the conventional method. While the conventional methods only rely on the traffic sensors data that are owned by the Departments of Transportation (DOTs), the V2I-based method depends on consumer data. In other words, the DOTs do not have complete control over the data flow. False positives are a concern for incident detection algorithms. To address this concern, the TMC operators utilize multiple sources to verify an incident. These sources include travelers’ phone calls to emergency numbers, highway patrol reports, and CCTV cameras. However, V2I-based incident detection methods may be subject to additional factors for false incident detection. One such factor relates to cyber security attacks and involves malicious actors. To address the incident verification problem, Ahmed et al. [36] proposed a method based on blockchain technology. They proposed a privacy-aware mechanism to enable vehicles from non-trusted domains to review other vehicle messages’ authenticity and reliability. Then, they proposed a blockchain-enabled framework to ensure the trustworthiness of the messages transmitted by RSUs.

5. Conclusions

This paper investigated the application of an emerging source of data—vehicle snapshots generated by OBUs in the V2I environment—for automatic incident detection. A novel V2I-based incident detection algorithm was proposed, and its performance was compared with that of a conventional AID algorithm. Virtual incident detection segments were defined, and vehicle snapshots received from vehicles were analyzed to detect incidents. An incident was detected by comparing the standard deviation of speeds with the mean of the standard deviation of vehicle speeds in the previous detection intervals. The proposed algorithm was evaluated in a case study of a section of Interstate 64 in St. Louis, Missouri, USA, and the incident detection performance metrics were compared with the California #7 algorithm. The V2I-based algorithm significantly outperformed the California #7 algorithm at market penetrations of 80% or higher.
In future research, it is recommended to evaluate V2I-based incident detection algorithms on arterial streets and other interrupted-flow facilities. It is also recommended to evaluate the V2I-based technologies against algorithms that utilize AVL and AVI data. Finally, it is recommended to develop AIDs that fuse V2I sensors’ data with conventional data sources to detect roadway incidents.

Author Contributions

Conceptualization, K.Z. and J.K.; methodology, K.Z. and J.K.; software, K.Z.; formal analysis, K.Z. and J.K.; resources, J.K.; data curation, J.K.; writing—original draft preparation, K.Z.; writing—review and editing, J.K.; visualization, K.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. National Traffic Incident Management Coalition. Benefits of Traffic Incident Management. 2007. Available online: http://timnetwork.org/wp-content/uploads/NUG_PressRelease_Nov20_2007.pdf (accessed on 15 February 2022).
  2. Wang, S.; Zhang, X.; Cao, J.; He, L.; Stenneth, L.; Yu, P.S.; Li, Z.; Huang, Z. Computing Urban Traffic Congestions by Incorporating Sparse GPS Probe Data and Social Media Data. ACM Trans. Inf. Syst. 2017, 35, 40. [Google Scholar] [CrossRef]
  3. Su, Z.; Liu, Q.; Zhao, C.; Sun, F. A Traffic Event Detection Method Based on Random Forest and Permutation Importance. Mathematics 2022, 10, 873. [Google Scholar] [CrossRef]
  4. Mateen, A.; Hanif, M.Z.; Khatri, N.; Lee, S.; Nam, S.Y. Smart Roads for Autonomous Accident Detection and Warnings. Sensors 2022, 22, 2077. [Google Scholar] [CrossRef] [PubMed]
  5. Ali, F.; Ali, A.; Imran, M.; Naqvi, R.A.; Siddiqi, M.H.; Kwak, K.S. Traffic Accident Detection and Condition Analysis Based on Social Networking Data. Accid. Anal. Prev. 2021, 151, 105973. [Google Scholar] [CrossRef] [PubMed]
  6. Mercader, P.; Haddad, J. Automatic Incident Detection on Freeways Based on Bluetooth Traffic Monitoring. Accid. Anal. Prev. 2020, 146, 105703. [Google Scholar] [CrossRef]
  7. Thomas, S.S.; Gupta, S.; Subramanian, V.K. Event Detection on Roads Using Perceptual Video Summarization. IEEE Trans. Intell. Transp. Syst. 2018, 19, 2944–2954. [Google Scholar] [CrossRef]
  8. Zhang, Z. Traffic Event Detection from Consumer Vehicle Sensor Data: An Autonomous Vehicle Study. Transp. Res. Rec. 2022. [Google Scholar] [CrossRef]
  9. Ta, V.T.; Dvir, A. A Secure Road Traffic Congestion Detection and Notification Concept Based on V2I Communications. Veh. Commun. 2020, 25, 100283. [Google Scholar] [CrossRef]
  10. Bhaskar, A.; Chung, E. Fundamental Understanding on the Use of Bluetooth Scanner as a Complementary Transport Data. Transp. Res. Part C Emerg. Technol. 2013, 37, 42–72. [Google Scholar] [CrossRef] [Green Version]
  11. D’Andrea, E.; Marcelloni, F. Detection of Traffic Congestion and Incidents from GPS Trace Analysis. Expert Syst. Appl. 2017, 73, 43–56. [Google Scholar] [CrossRef]
  12. J2735_201603; Dedicated Short Range Communications (DSRC) Message Set Dictionary. SAE International: Warrendale, PA, USA, 2016. Available online: https://www.sae.org/standards/content/j2735_201603/ (accessed on 1 August 2020).
  13. Kianfar, J.; Edara, P. Placement of Roadside Equipment in Connected Vehicle Environment for Travel Time Estimation. Transp. Res. Rec. 2013, 2381, 20–27. [Google Scholar] [CrossRef] [Green Version]
  14. Olia, A.; Abdelgawad, H.; Abdulhai, B.; Razavi, S.N. Optimizing the Number and Locations of Freeway Roadside Equipment Units for Travel Time Estimation in a Connected Vehicle Environment. J. Intell. Transp. Syst. 2017, 21, 296–309. [Google Scholar] [CrossRef]
  15. Lin, L.; Li, W.; Peeta, S. A Compressive Sensing Approach for Connected Vehicle Data Capture and Its Impact on Travel Time Estimation. arXiv Preprint 2019, arXiv:1806.10046. [Google Scholar]
  16. Chen, C.; Kianfar, J.; Edara, P. New Snapshot Generation Protocol for Travel Time Estimation in a Connected Vehicle Environment. Transp. Res. Rec. J. Transp. Res. Board 2014, 2424, 1–10. [Google Scholar] [CrossRef] [Green Version]
  17. Liu, G.; Shao, L.; Qiu, T.Z.; Fang, J. Integrated Performance Evaluation of Roadside Equipment Placement for Real-Time Traffic Monitoring. In Proceedings of the 17th International IEEE Conference on Intelligent Transportation Systems (ITSC), Qingdao, China, 8–11 October 2014; pp. 1353–1358. [Google Scholar] [CrossRef]
  18. Mahmassain, H.S.; Haas, C.; Zhou, S.; Peterman, J. Others Evaluation of Incident Detection Methodologies. 1999. Available online: https://ctr.utexas.edu/wp-content/uploads/pubs/1795_1.pdf (accessed on 21 June 2022).
  19. Hellinga, B.; Knapp, G. Automatic Vehicle Identification Technology-Based Freeway Incident Detection. Transp. Res. Rec. 2000, 1727, 142–153. [Google Scholar] [CrossRef]
  20. Deniz, O.; Celikoglu, H.B.; Gurcanli, G.E. Overview to Some Incident Detection Algorithms: A Comparative Evaluation with Istanbul Freeway Data. In Proceedings of the 12th International Conference “Reliability and Statistics in Transportation and Communication” (RelStats’12), Riga, Latvia, 17–20 October 2012; pp. 274–284. [Google Scholar]
  21. Nathanail, E.; Kouros, P.; Kopelias, P. Traffic Volume Responsive Incident Detection. Transp. Res. Procedia 2017, 25, 1755–1768. [Google Scholar] [CrossRef]
  22. Rossi, R.; Gastaldi, M.; Gecchele, G.; Barbaro, V. Fuzzy Logic-Based Incident Detection System Using Loop Detectors Data. Transp. Res. Procedia 2015, 10, 266–275. [Google Scholar] [CrossRef]
  23. Asakura, Y.; Kusakabe, T.; Nguyen, L.X.; Ushiki, T. Incident Detection Methods Using Probe Vehicles with On-Board GPS Equipment. Transp. Res. Part C Emerg. Technol. 2017, 81, 330–341. [Google Scholar] [CrossRef]
  24. Sun, L.; Lin, Z.; Li, W.; Xiang, Y. Freeway Incident Detection Based on Set Theory and Short-Range Communication. Transp. Lett. 2018, 11, 558–569. [Google Scholar] [CrossRef]
  25. Yoshida, M.; Kawasaki, Y.; Umeda, S.; Kuwahara, M. Incident Alert by an Anomaly Indicator of Probe Trajectories. Transp. Res. Procedia 2018, 34, 179–186. [Google Scholar] [CrossRef]
  26. Rizvi, S.M.A.; Ahmed, A.; Shen, Y. Real-Time Incident Detection and Capacity Estimation Using Loop Detector Data. J. Adv. Transp. 2020, 2020, 8857502. [Google Scholar] [CrossRef]
  27. Li, L.; Lin, Y.; Du, B.; Yang, F.; Ran, B. Real-Time Traffic Incident Detection Based on a Hybrid Deep Learning Model. Transp. A: Transp. Sci. 2020, 18, 78–98. [Google Scholar] [CrossRef]
  28. Evans, J.; Waterson, B.; Hamilton, A. A Random Forest Incident Detection Algorithm That Incorporates Contexts. Int. J. Intell. Transp. Syst. Res. 2020, 18, 230–242. [Google Scholar] [CrossRef] [Green Version]
  29. Sun, Y.; Mallick, T.; Balaprakash, P.; Macfarlane, J. A Data-Centric Weak Supervised Learning for Highway Traffic Incident Detection. Accid. Anal. Prev. 2022, 176, 106779. [Google Scholar] [CrossRef]
  30. Iqbal, M.S.; Khazraeian, S.; Hadi, M. A Methodology to Assess the Quality of Travel Time Estimation and Incident Detection Based on Connected Vehicle Data. Transp. Res. Rec. 2018, 2672, 203–212. [Google Scholar] [CrossRef]
  31. Wolfgram, J.; Huang, P.X.; Zhao, Y.; Christofa, E.; Xiao, L. A Quick and Reliable Traffic Incident Detection Methodology Using Connected Vehicle Data. In Proceedings of the Transportation Research Board 97th Annual Meeting, Washington, DC, USA, 7–11 January 2018. [Google Scholar]
  32. Górski, T. The 1+5 Architectural Views Model in Designing Blockchain and IT System Integration Solutions. Symmetry 2021, 13, 2000. [Google Scholar] [CrossRef]
  33. United States Department of Transportation. Architecture Reference for Cooperative and Intelligent Transportation. 2022. Available online: https://www.arc-it.net/ (accessed on 12 October 2022).
  34. United States Department of Transportation. Architecture Overview. 2022. Available online: https://www.arc-it.net/html/architecture/architecture.html (accessed on 12 October 2022).
  35. United States Department of Transportation. TM08: Traffic Incident Management System. 2022. Available online: https://www.arc-it.net/html/servicepackages/sp127.html#tab-3 (accessed on 12 October 2022).
  36. Ahmed, W.; Di, W.; Mukathe, D. A Blockchain-Enabled Incentive Trust Management with Threshold Ring Signature Scheme for Traffic Event Validation in VANETs. Sensors 2022, 22, 6715. [Google Scholar] [CrossRef]
Figure 1. Traffic incident management system service pack: physical architecture view [35].
Figure 1. Traffic incident management system service pack: physical architecture view [35].
Sensors 22 09197 g001
Figure 2. Sample section of a freeway for California #7 AID algorithm.
Figure 2. Sample section of a freeway for California #7 AID algorithm.
Sensors 22 09197 g002
Figure 3. Boundaries of simulation testbed and location of incidents.
Figure 3. Boundaries of simulation testbed and location of incidents.
Sensors 22 09197 g003
Figure 4. Relation between DA and FAR at 500 ft virtual segments and 100% market penetration: (a) 80% confidence level; (b) 95% confidence level.
Figure 4. Relation between DA and FAR at 500 ft virtual segments and 100% market penetration: (a) 80% confidence level; (b) 95% confidence level.
Sensors 22 09197 g004
Figure 5. Relation between market penetration and DA for incidents A to I.
Figure 5. Relation between market penetration and DA for incidents A to I.
Sensors 22 09197 g005
Table 1. Incidents modeled in the simulation testbed.
Table 1. Incidents modeled in the simulation testbed.
Incident IDIncident DateIncident Start TimeIncident Duration (min)
A17 January 20159:08 AM24
B18 December 201510:16 AM46
C21 December 201511:31 AM35
D20 January 20165:37 AM64
E20 January 20169:03 AM65
F4 June 20169:40 AM25
G4 July 20169:02 AM22
H29 July 20167:57 PM22
I19 September 20164:25 PM11
J6 October 20167:59 AM38
Table 2. Sensitivity analysis of the performance of V2I-based AID.
Table 2. Sensitivity analysis of the performance of V2I-based AID.
Incident Market Penetration (%)DA (%)FAR (%)TTD (min)
1000 ft
Segment
500 ft Segment1000 ft
Segment
500 ft Segment1000 ft
Segment
500 ft Segment
A207073.130.7710
507173.76132
8072.673.99521
1007983131000
B2062714153
5068758832
80717911910
1007480149.902
C2083804.9754
5084815822
8084.6838921
10084.98491011
D20565910.945
5059602130
8060615211
10061629301
E2059661.20.485
5060702543
8061725612
1006272.896.811
F20797240.6810
50807350.772
8084826741
10086837821
G20747420.768
50767570.832
807775.58132
1008075.871.621
H20757450.497
50797560.654
8082766.5120
100827781.620
I20818060.643
5082847722
808385757.612
10085868811
J2066605276
5070716630
8072728721
10073749811
Table 3. Performance measures for V2I-based AID and California #7 algorithms.
Table 3. Performance measures for V2I-based AID and California #7 algorithms.
AlgorithmMarket Penetration
MP (%)
Detection Rate
DR (%)
False Alarm Rate
FAR (%)
Time-To-Detect
TTD (min)
V2I-based AID5010038.31.9
801005.51.1
1001006.70.9
California #71007121.01.8
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zhang, K.; Kianfar, J. An Automatic Incident Detection Method for a Vehicle-to-Infrastructure Communication Environment: Case Study of Interstate 64 in Missouri. Sensors 2022, 22, 9197. https://0-doi-org.brum.beds.ac.uk/10.3390/s22239197

AMA Style

Zhang K, Kianfar J. An Automatic Incident Detection Method for a Vehicle-to-Infrastructure Communication Environment: Case Study of Interstate 64 in Missouri. Sensors. 2022; 22(23):9197. https://0-doi-org.brum.beds.ac.uk/10.3390/s22239197

Chicago/Turabian Style

Zhang, Kun, and Jalil Kianfar. 2022. "An Automatic Incident Detection Method for a Vehicle-to-Infrastructure Communication Environment: Case Study of Interstate 64 in Missouri" Sensors 22, no. 23: 9197. https://0-doi-org.brum.beds.ac.uk/10.3390/s22239197

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop