• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Dynamic Road Incident Information Delivery Strategy to Reduce Urban Traffic Congestion

    2018-09-28 10:58:22LiangQiMemberIEEEMengchuZhouFellowIEEEandWenjingLuanStudentMemberIEEE
    IEEE/CAA Journal of Automatica Sinica 2018年5期

    Liang Qi,Member,IEEE,Mengchu Zhou,Fellow,IEEE,and Wenjing Luan,Student Member,IEEE

    Abstract—Advanced information and communication technologies can be used to facilitate traffic incident management.If an incident is detected and blocks a road link,in order to reduce the incident-induced traffic congestion,a dynamic strategy to deliver incident information to selected drivers and help them make detours in urban areas is proposed by this work.Time-dependent shortest path algorithms are used to generate a subnetwork where vehicles should receive such information.A simulation approach based on an extended celltransmission modelis used to describe traffic flow in urban networks where path information and traffic flow at downstream road links are well modeled.Simulation results revealthe influences ofsome major parameters of an incident-induced congestion dissipation process such as the ratio of route-changing vehicles to the total vehicles,operation time interval of the proposed strategy,traffic density in the traffic network,and the scope of the area where traffic incident information is delivered.The results can be used to improve the state ofthe artin preventing urban road traffic congestion caused by incidents.

    I.INTRODUCTION

    T RAFFIC incidents are any non-recurring events including traffic crashes,disabled vehicles,roadway maintenance and reconstruction projects,and specialnon-emergency events,e.g.,ballgames,concerts,or any other events thatsignificantly affect roadway operations[1].They can cause a signifi cant capacity reduction of roadways.Traffic incident management(TIM)makes a systematic effort to detect,respond to,and remove traffic incidents.It aims to offer the rapid recovery of traffic safety and capacity,and leads to many measurable benefits,such as decreases in fuel consumption,incident duration,secondary accidents,and traffic jams[1],[2].

    There are many traditional traffic control methods for TIM in highways,such as lane control[3],variable speed limitcontrol[4],and ramp metering control[5].So far,incident-based urban traffic congestion is mostly controlled and prevented through traffic flow diversion with the help ofthe traffic police.Such a strategy is unfortunately labor-intensive,inflexible,and costly.Intelligent transportation systems[6]-[8],such as advanced traveler information systems(ATIS),can be employed to improve the network efficiency via direct or indirect recommendation of alternative routes[9].Real-time traffic information can be sent to drivers through two main kinds of devices:in-car[10]and road-side devices[11].The type,such as radio GPS-navigators and Google Maps,helps drivers make sensible routing decisions at bifurcation nodes of the network.However,there are some disadvantages with these kinds of devices.On one hand,drivers who are familiar with the traffic conditions in a network may not use such agencies and thus optimize their individual routes based on past experiences.On the other hand,incident information is only useful to a finite number of selected drivers near the incident,and useless to others.The second kind of devices can be used to deliver information on major traffic events(e.g.,incidents and congestion)and reduce incident-based congestion or enhancing traffic safety.However,they are usually spatially and/or temporally limited and constrained in the amount of information delivered.Thus,to the best of our knowledge,we find no intelligent strategies that can decide which drivers should be informed of a particular traffic incident.Recently,the proliferation of mobile communication technologies and devices such as smartphones and on-board units of connected vehicles makes it possible to construct an accessible and cost-effective platform for public-sector Traffic Operation Centers to deliver location-based and personalized traveler information in a timely fashion[12].In this work,we design a new strategy to deliver incident information to a finite number of selected drivers in urban areas.The Dijkstra’s algorithm is used to generate a subnetwork where vehicles can receive the traffic incident information.This helps reduce incident-induced congestion at a manageable communication cost.Simulations are conducted to give a quantitative result regarding traffic congestion reduction with the proposed strategy.

    Many simulation models are proposed to model traffic jam formation due to incidents.Wrightand Roberg propose an incident-based jam growth model in[13]and discuss the impactofthe length ofthe channelized partofroads and stopline width assignment on jam formation.Roberg et al.develop several alternative strategies in[14]to prevent gridlock of a network and dissipate traffic jams once they have been formed.Long et al.[15]extend a cell transmission model(CTM)and apply it to simulate incident-based jam propagation in two-way rectangular grid networks.They also propose control strategies for dispersing incident-based traffic jam and evaluate their efficiency[16].CTM-based models can depicttraffic flow at downstream road links well.However,the aforementioned simulation models do notcontain any path-related information when studying travelers’detour behaviors and the incidentinduced congestion formulation.In this work we further extend the CTM,build a modelto simulate incident-based traffic jams in urban areas and illustrate the effectiveness of our proposed strategy.

    The rest of this paper is organized as follows.Section II reviews the related work.Section IIIpresents some definitions about the traffic network.Section IV gives traffic incident information delivery strategies.In this section,given some assumptions regarding traffic flow routing choices,a traffic flow sub-network is generated based on Dijkstra’s algorithm,and traffic flow in the network is modeled by an extended CTM.Section V gives a case study and evaluates the effectiveness of the proposed detour strategies via simulation.Section VI concludes this paper.

    II.RELATED WORK

    A.Traffic Incident Management(TIM)

    There are many traditionaltraffic controlmethods for TIM.For example,lane control systems[3]deploy lane control signals in the contextof lane closure.They are used to manage traffic at a lane level to facilitate a smooth lane change by informing drivers aboutan impending bottleneck.Variable speed limitcontrol[4]in highways is verified to be able to increase work-zone throughputs and decrease total vehicle delays.Traffic signals aton-ramps of freeway[5]can help manage the traffic inflow rate and reduce lane-blocking incident-induced traffic congestion.These methods are suitable for TIM in highways.So far incident-based urban traffic congestion is mostly controlled and prevented through traffic flow diversion with the help of traffi c police,which is unfortunately laborintensive,inflexible,and costly.Traffic lightcontrol[6]atroad intersections is regarded as a major strategy to guarantee the safe crossing ofconflicting streams ofvehicles and pedestrians and lead to efficientnetwork operations.They are suitable for non-saturated and stable traffic conditions.However,changing conditions in a non-predictable way such as an incident may lead to the invalidation of the aforementioned traffic light control strategies,and causes unexpected congestion.Some intelligentsystems have recently been designed for preventing incident-induced traffic congestion[17],[18].In such systems,ban signals are used to notify road users of a ban situation that might not be readily apparent[19]-[21].

    B.Dynamic Traffic Assignment(DTA)

    DTA is used to assign time-varying traffic flow to different highways given the vehicular demand and certain behavioral rules[22].It consists of two components:a travel choice principle and a traffic-flow component.The former models how travelers decide whether to travel or not[22],and if so,how they select their routes,departure time,modes,and destinations.The latter depicts how traffic propagates inside a transport network.DTA is an important research area because of its a wide range of applications in real-time traffic control and management[23].In fact,DTA models are key components in developing sophisticated intelligent transportation systems(ITS)technologies such as advanced traveler information systems(ATIS)[24]and advanced traffic management systems(ATMS)[25].In ATIS,DTA models can determine the best route and departure time and provide some anticipatory traffic information for travelers based on a forecasted traffic pattern.

    DTA models can be developed by either an analytical[26]or simulation-based approach[27].DTA problems can be formulated analytically in terms of mathematical problems[23],[28],such as mathematical programming[29],optimal control[30],and variational inequality problems[31].Most prior studies focus on determining in advance the solution properties of the models,such as solution existence and uniqueness.The simulation approach focuses on enabling practicaldeploymentof the DTA models for realistic highway networks,their applicability to real-life highway networks,and their ability to adequately capture traffic dynamics and microscopic driver behavior such as lane changing.However,a simulation-based approach cannot guarantee the solution properties of the model in general[23].

    DTA problems are formulated as both path-based[31],[32]and link-based models[28].An important feature of the former is that the path set has to be explicitly defined and can range from medium to large-sized networks.Hence,for large-scale network applications,path enumeration has not been used to obtain the path set.Link-based models can avoid path enumeration in the solution procedure,and hence can be applied to large-scale networks.However,they do notcontain path-related information and cannot capture certain realistic traffic dynamics such as dynamic traffic intersections across multiple links.

    The commonly adopted travel choice principle in DTA is the dynamic extension of Wardrop’s Principle called the Dynamic User Optimal(DUO)principle[23],[31].This principle assumes that travelers select their routes and/or departure times to minimize their travel costs such as travel time.Mostexisting planning and managementprocedures are developed with this notion.Virtually all network planning models adhering to Wardrop’s principle require the following strong assumptions:1)travelers know the travel time on all routes,and 2)travelers are able to select the paths costing the shortest travel time.While these assumptions may be reasonable in a static network,they are questionable for real-world networks because they are dynamic and can be highly stochastic.The current research is not presented as an operationalmodelforactualapplications.Forexample,we can deliver the incident information to the corresponding traveler if we know the path of each vehicle.However,we do not know such path information,and in this case we should design incident delivery strategy to travelers to deal with the cases in which an incident takes place.

    C.Advanced Traveler Information Systems(ATIS)

    ATIS are any systems that acquire,analyze,and present information to assistsurface transportation travelers in moving from theirstarting location(origin)to theirdesired destination.Relevant information may include locations of incidents,if any,weather and road conditions,optimal routes,recommended speeds,and lane restrictions[24].ATIS are considered a powerfultoolto enhance travelers’experience[33].ATIS are also claimed to be useful under recurrent network congestion as they reduce the uncertainty oftravelers with respectto travel time[33].Moreover,they are useful for travelers who are unfamiliar with the network(e.g.,tourists),as well as for all travelers when the network is temporarily affected by some significant disruptions and/or by unexpected or non-recurrent traffic conditions[34].Recently,the proliferation of mobile communication technologies and devices such as smartphones and on-board units of connected vehicles makes it possible to construct an accessible and cost-effective platform for publicsector Traffic Operation Centers to deliver location-based and personalized traveler information in a timely fashion[12].Our work lies in the scope of the ATIS when itselectively delivers incident information to a finite number of selected drivers but not all vehicles.The effectiveness is verified through a simulation approach.

    D.Cell Transmission Model(CTM)

    Daganzo[35]proposes a CTM to simplify the solution scheme of the Lighthill-Whitham-Richards(LWR)model[36],[37]such that it can be used to depict the road link traffic which is consistent with the kinematic property of traffic flow.The CTM has been used to accurately describe realistic highway traffic.Daganzo’s original development of the CTM is mainly intended to provide transportation planners with another way of predicting traffic behavior for a given roadway section.Researchers have employed the CTM in many real-world transportation applications such as dynamic traffic assignment[38],[23],signal control[39]-[41],ramp metering[42],[43],and traffic prediction.The advantage of this approach is that traffi c dynamics such as queue spillback and traffic interaction across links can be captured.The CTM has been used in the estimation of traffic flow density[44]-[46]and other traffic state variables such as flows and space-mean speeds[47].Long et al.[15]extend the CTM and apply it to simulate incident-based jam propagation in two-way rectangular grid networks.The interface of vehicles conducting different turns at urban road links can be well described[15].They also propose control strategies for dispersing incident-based traffic jams and evaluating their efficiency[16].The above cell-based simulation models do not contain any path-related information when studying incidentinduced congestion formulation.In this work we furtherextend CTM[15]to simulate travelers’detour and incident-based traffic jams in urban areas and illustrate the effectiveness of our proposed incident information delivery strategy.

    III.BASIC NOTATIONS

    First,some basic notations are presented:R is a realnumber set,R+is the set of positive real numbers,N={0,1,2,...}is a natural number set,N+=N/{0}is the positive integer set,Nm={0,1,2,...,m}and N+m={1,2,...,m}where m∈N+.We consider a multi-destination network as a directed and connected graph G(N,A),where N={1,2,...,m}denotes the set of nodes and A denotes the set of links.Link a=(la,ha)∈A is a link with a tail node laand a head node ha.A(j)and B(j)are the set of links leaving node j and heading to node j,respectively.We give some definitions regarding a multi-destination traffic network G(N,A).Usually a path is composed of a sequence of links.We assume that there is atmostone link from a node to another.Thus,a path can be expressed by a sequence of nodes.We give the formal definition of a path as follows.

    Definition 1:A pathσ1,m=(1,2,...,m)is defined as a sequence of nodes labeled from 1 to m,where(j,j+1)∈A,?j∈,1 is its origin and m is its destination.The setof all paths in G is denoted asΓ.The set of all paths from node 1 to node m is denoted asΓ1,m.If(j,j+1)is a link in path σ1,m,we denote that(j,j+1)∈ σ1,m,else(j,j+1)∈/σ1,m;if j is a node in pathσ1,m,we denote that j∈ σ1,m,else j∈/σ1,m;andσjdenotes a path with node j as its origin.We define a connection between two paths asσ1,m= σ1,j+σj,m,where j∈ σ1,m.

    Allconcepts in Definition 1 can be found in the graph theory in[48].

    Definition 2:l:A→R+is a link length function,where l(j,j+1)is the length ofthe link(j,j+1);anddenotes the length between two nodes j and j+1 where=l(j,j+1)if(j,j+1)∈A,and=+∞if(j,j+1)/∈A.

    Definition 3:L:?!鶵+is a path length function,where

    whereσ=(1,2,...,m)∈Γ.

    Definition 4:τ:(A,t)→ R+is a link travel-time function,whereτ(a,t)denotes the traveltime for a vehicle to pass link a when it stays at the tail of a at time t.denotes the time needed from nodes i to j.

    Definition 5:T:?!鶵+is a path travel-time function,where

    denotes the traveltime thata vehicle needs to pass pathσ∈Γ.

    Definition 6:f:?!鶱+is a node-count function,where f(σ)=|σ|-1 denotes node count in path σ ∈ Γ.

    T1,m=T()denotes the travel time to pass the timedependent shortest path with the fewest nodes from node 1 to node m;andis the setof alltime-dependent shortest path with the fewest nodes from 1 to m.Γ?denotes the set of all time-dependent shortest path with the fewest nodes.

    IV.INCIDENT INFORMATION DELIVERY STRATEGY

    This section presents a dynamic strategy to deliver incident information to a finite number of selected drivers in urban areas in order to help them make detours.According to[13],[14],and[16],the boundary of incident-induced traffic jams has an approximate diamond shape in grid networks with the firstblocked junction as the center.We need to provide traffic incident information to drivers heading towards the blocked link.First,we make some assumptions regarding the traffic flow evolution.Based on them,we can simplify the network and focus on only those links where traffic flow is affected by the incident.

    A.Drivers’Path Selection Assumptions

    In urban areas,for a traveler going from an origin to a destination,there are usually severalpaths.Regarding the path which is most selected by drivers,we make the following assumptions.

    Assumption 1:Time-dependent Shortest Path Selection:We assume that given two paths from an origin to destination,without any information regarding the traffic condition such as incident,drivers select the one requiring the least time.If two paths cost the same travel time,drivers will choose the one with the shortestpath.Formally given two pathsσ1,σ2∈Γ1,mwith T(σ1) < T(σ2),or T(σ1)=T(σ2)and L(σ1) <L(σ2),then drivers select path σ1from origin 1 to destination m.

    Assumption 2:Fewest-node Path Selection:We assume that given two same-travel-time and same-length paths from the origin to destination,drivers usually select a path with fewer road intersections to prevent extra traffic delay induced by traffic signals.Formally given two pathsσ1,σ2∈ Γ1,mwith T(σ1)=T(σ2),L(σ1)=L(σ2)and f(σ1) < f(σ2),drivers select pathσ1from origin 1 to destination m.

    Assumption 3:Equal Probability Selection:)If there are N same-travel-time,same-length and same-number-of-node paths from the origin to destination,the probability of each path to be selected is equal,i.e.,a driver has the probability of 1/N to select each path.

    B.Sub-network Construction

    Given a network G(N,A)and a link s=(ls,hs)where an incident happens and blocks the link,we adopt the Dijkstra’s algorithm to generate a sub-network G(N′,A′)which contains allpaths with each satisfying the following conditions:it is a time-dependentshortestpath from the origin to its destination hs;it has fewer nodes than other paths from the origin to hs;and it contains link s.The traffic fl ow in the sub-network could be affected by the incidenton s under Assumptions 1-3,because some vehicles are being driven to the blocked link.The detailed steps to obtain G(N′,A′)are shown as follows.

    Algorithm 1 Generate a Sub-network G(N′,A′)Input:A network G(N,A)and a link s=(ls,hs)where an incident occurs.Output:A sub-network G(N′,A′).Step 1.Initialization Set S:={hs,ls};//S contains the nodes whose timedependent shortest paths to hs have been obtained Set R:=N-S,N′:={hs,ls},A′:={(ls,hs)}and σls:=s;Set Tj,hs:=+∝and fls,hs:=0;SetΓ?1,m:= Γ? :={s}and Γ?j,hs:=?;Step 2.Calculation and update Select a node j∈R such that the paths from j to ls and then hs are the time-dependent shortest paths of those from a node in R to ls and then hs,i.e.,?σk=(k,...,ls,hs)∈ Γ?and(j,k)∈ A such that?σk′=(k′,...,ls,hs)∈ Γ?,j′∈ T and(j′,k′) ∈ A:T(σk)+ τj,k ≤ T(σk′)+ τj′,k′,L(σk)+lj,k ≤ L(σk′)+lj′,k′;For each pathσj f(σj):=f(σk)+1 ifσj=(j,k)+ σk.Ifσj is a time-dependent shortest path with the fewest nodes from j to hs,then Γ?j ,hs:=Γ?j,hs∪{σj};j,hs into N′,i.e.,N′:=N′+{r|r∈ σj};Put all links in each path σj ∈ Γ?j,hs into A′,i.e.,A′:=A′+{(r,k)|(r,k)∈ σj};End If Step 3.Iteration Repeat Step 2 until S=N;Return Take node j out of R,i.e.,R:=R-{j};Put node j into S,i.e.,S:=S+{j};End If End For If there exists no node j′such that(j′,j) ∈ A,then Put all nodes in each pathσj∈ Γ?

    Assume that the number of nodes in N is n.For each node in N,all paths with the shortest distance from it to hsshould be computed.Therefore,the complexity of the algorithm of generating such a sub-network is O(n2).

    C.Traffic Network Model Based on CTM

    Daganzo[35]proposes a CTM to simplify the solution scheme ofthe Lighthill-Whitham-Richards(LWR)model[36],[37]such that it can be used to depict the road link traffic which is consistent with the kinematic property of traffic flow.This work extends CTM to model urban network traffic flow.The path-related information will be contained in the model when studying the incident-induced congestion formulation.We use a time-step method based on the extended CTM to simulate the formation and dissipation of incident-based traffic jams and evaluate the efficiency of the proposed control strategies.

    As shown in Fig.1,each link a in the networks is divided into two distinct zones:downstream queue storage areas L,S and R where vehicles are organized into separate turning movements(left in L,straight in S,and right in R),and an upstream reservoir where the turning movements are mixed.Notice that there may be less than three storage areas,e.g.,the queue storage areas are composed of S and R where there is no left turn for the traffic outflow of link a.We assume that the upstream reservoir is composed ofλcells indexed from 1 toλ,and the channelized queue area occupies a cell indexed λ +1.We adoptφL,φS,and φRto denote the proportions of vehicles travelling in the left turning,straight,and right turning directions,respectively.Stopline width assignment variablesαL,αS,αR,respectively,denote the proportions of the segregated queue areas devoted to the left turning queue storage area,to the straightqueue storage area and to the right turning queue storage area.According to the definition,we haveφL+φS+φR=1 andαL+αS+αR=1.We adopt a“balanced”layout of stop line assignment[13]such that the stop line widths devoted to the straight and turning directions are in exactly the same ratio as the demands,i.e.,φL= αL,φS= αS,and φR= αR.

    Fig.1. Link a in networks.

    Note thattraffic rules willnotbe changed and the vehicles in the downstream queue areas will not change lanes.Using the network model,we design a network traffic simulation model based on the time-step method.Traffic flow formulation can be classified into the following categories:inflow of upstream reservoir of the origin and the other nodes(i=1),inflow of upstream cells(1<i≤λ-1),and inflow and outflow of channelized downstream queue area(i=λ).In the following equations,v(miles per hour)is the free flow speed and w(miles per hour)is the speed of all backward moving waves.yi(t)is the number of vehicles that enter cell i during time interval t,ni(t)is the number of vehicles in cell i before t,Ni(t)denotes the maximum number of vehicles that can be contained in cell i during t,and Qi(t)denotes the inflow capacity in cell i during t.More details regarding CTM can be referred to[35].The inflow formulation under normal traffic conditions,i.e.,without incidents,is presented as follows:

    1)Infl ow of Upstream Reservoir From an Origin:Let da(t)denote traffic demand rate from an origin node lato link a in time interval t,dsa(t)traffic demand rate from node lathrough link a to link s attime t,φsa(t)and the proportion of vehicles entering link a at time t with the destination to s.The inflow of upstream reservoir of the origin can be calculated as

    The number of vehicles that enter the first cell of link a in time interval t and choose b as the next link is calculated as

    The proportion of vehicles that enter the first cell of link a and head to link s in time interval t is computed as

    The number of vehicles that enter the first cell of link a in time interval t with the destination to s is calculated as

    The number of vehicles that enter the first cell of link a in time interval t,choose b as the next link and head to s is calculated as

    3)Inflow of Channelized Downstream Queue Area:The upper bound of inflow of the downstream queue area for vehicles travelling from link a to link b is computed as follows:

    Because of interference between turning vehicles and straight vehicles[30],the total inflow of the channelized queues area can be formulated as follows:

    The infl ow of each direction can be calculated as follows:

    The proportion ofvehicles thatentercellλoflink a,choose link b as the nextlink,and head to link s in time interval t is computed as

    where k=|A(ha)∩A′|.

    The number of vehicles that enter cellλof link a,choose link b as the next link,and head to link s in time interval t is computed as

    4)Outflow of Channelized Downstream Queue Area:yλ+1is defi ned as the outflow of the terminal cellλ.The outflow of the channelized downstream queue area can be calculated as follows:

    5)Inflow of Upstream Reservoir From a No-Origin Node:

    where ua(t)denotes the inflow rate from node lathrough link a at time t.

    where k=|A(ha)∩A′|and k1= φab(t)/P b∈A(ha)/A′φab(t).

    As a resultfrom the above formulae,the updated numberof vehicles contained in each cell is formulated as follows.For 1≤ i≤λ,we have

    Traffic incidents are modeled by modifying the value of the corresponding flow capacity of the affected cells.(t)=0 if t belongs to the period with an obstruction on cell i.We assume that(t)and(t)are independent of time and cells’indices.Hence,they are constants denoted as(t)=Q and(t)=N,where N,Q∈R+.

    Traffic jam size is used to describe the effectof congestion.A cellisjammed ifits density in the cellsofupstream reservoir or in any direction of the downstream channelized areas is greater than 0.9N[16],where N is the maximal number of vehicles that a cell in the upstream reservoir or an area in the downstream channelized areas can contain.The size of the traffic jam is described in terms of the total number of jammed cells.

    D.Drivers’Detour Model

    When drivers heading towards the incident-blocked link obtains information regarding the incident,they may detour at the following intersections along the path.In this section,we consider three detour strategies where the detour rates could be related to certain traffic conditions.Let s be a road link blocked by an incident.In the following discussion,αdenotes the proportion of vehicles heading to link s that will change their direction and release from a node along its path;βarepresents the proportion of flows that change their direction to the incident-blocked link and release link a’s head node.There are assumptions that we will adopt to defi ne the detour rate:

    Assumption 4: Equal Detour Rate: If a vehicle in link aheading to the incident-blocked link s receives the incidentinformation and decides to detour, it has equal probability todetour at each of the following nodes on its path to link s.Formally, letσhabe the path of vehicles from the head nodeof link a to s, and let the proportion of vehicles that detour at a’s head node be βa=1/f(σha).

    Assumption 5: Distance-related Detour Rate: If a vehicleheading to the incident-blocked link s receives the incidentinformation and decides to detour, its probability to detouris related with the distance to s, i.e., the detour probabilityis bigger when the distance is shorter. Formally, letσhabethe path of vehicles from the head node of link a to s; theproportion of vehicles detour at node a then equals

    Assumption 6: 100% Detour: The proportion of vehiclesthat detour at a’s head node is equal to 100% when thereis another equal-length time-dependent path containing noincidental link from the a’s head node to s’s head node.

    In the CTM model,givenα andβa,we first modify the number of vehicles in each cell as follows:

    At downstream queue channel areas, the number of vehiclesis changed as follows:

    We also need to change inflow of the upstream reservoirfrom an origin for the next time interval.(t)enters the1st cell, then α proportion of flows leading to link s willchange their direction immediately. Thus, we have

    We also need to change inflow of the upstream reservoirof links that are not the origin for the next time interval.Suppose that(t)vehicles enter the 1 st cell from b.Then α portion of flows change their direction immediately.Suppose the outflow from link b∈ A(la)∩A′to s without any traffic incident information from equals y′.Then,after receiving the incident information, the amount of y′α vehicles will change their directions while′αβbvehicles change their directions and leave from linkb,and y′α(1- βb)change directions at upcoming nodes in the path. In the next link a,the number of vehicles that change their directions is y′α(1-βb)βa.Weuse(t)to to denote the outflows of theterminal cell λ of link a that choose link b as the next link andhead to link s in time interval t. Thus, we have the followingequations:

    Given that

    we have that

    Replacingy′in(39),wehave

    As a result, we change the inflow of the upstream reservoirof link a during each next time interval as follows:

    Also, we change the following inflow value:

    V.CASESTUDY

    A.An Example to Construct a Sub-Network

    We give a one-way grid network as an example as shownin Fig. 2 (a) where it is composed of one-way road links withadjacent rows or columns having opposite directions. Note thatthis kind of road networks is very common in major cities,for example, New York City. We install a single incident inthe network: a single incident occurs on link (33, 34) in thenetwork as shown in the figure. Note that in the grid network,the shortest paths are the time-dependent shortest paths.

    According to Algorithm 1, for each node in G, we computeall the shortest paths leading to node 34 with (33, 34) as thelast link. After that, we obtain the following paths to generatethe sub-network.

    Path1:(3,23,28,33,34);

    Path2:(18,31,32,33,34);

    Fig.2. A traffic network with an incident in(a)and the generated subnetwork in(b).

    Path 3:(7,30,29,28,33,34);

    Path 4:(14,42,37,32,33,34);

    Path 5:(1,21,22,23,28,33,34);

    Path 6:(20,21,22,23,28,33,34);

    Path 7:(5,25,30,29,28,33,34);

    Path 8:(1,21,26,31,32,33,34);

    Path 9:(20,21,26,31,32,33,34);

    Path 10:(16,41,42,37,32,33,34).

    Thus,we have N′={34,33,28,23,3,32,31,18,29,30,7,37,42,14,22,21,1,20,25,5,26,41,16},A′={(33,34),(28,33),(23,28),(3,23),(32,33),(31,32),(18,31),(29,28),(30,29),(7,30),(37,32),(42,37),(14,42),(22,23),(21,22),(1,21),(20,21),(25,30),(5,25),(26,31),(21,26),(41,42),(16,41)}.After the above steps,the generated sub-network is shown in Fig.2(b).According to Assumptions 1-3,when a traffic incidenthappens,we only need to provide the incident information to drivers in the subnetwork.Drivers from other links of the network in Fig.2(a)will not head to the blocked link,and thus the incident information is useless for them.

    B.Simulation and Results

    Now we evaluate the effectiveness of the proposed strategy by employing MATLAB software through simulation.We first setspecific values forthe parameters in oursimulation.We set a single incidenton the 5th celloflink(33,34)in the network as shown in Fig.2(a).The corresponding values of the subnetwork are shown in Table I.In the traffic network in Fig.3,according to the special structure,the flow proportions for directions are set as:φT= αS=0.5 where φT∈ {φL,φR}.The analysis period of interest is divided into 2000 intervals(i.e.,2.78 h).The network is assumed to be empty initially.Traffic starts to enter the network from origins 1-20 at the first time interval.Several time intervals are required to allow the system to stabilize.The incidentoccurs at the t1=301st interval.Note thathere we do notconsider the effectof traffic light signal strategies regulating the traffic flow.This can be easily realized by modifying the value of the corresponding flow capacity of the affected cells.In the simulation,in order to keep the balance of the traffic flow,we set all inflows as well as all outflows of links to be equal.We have the value of inflow and outflow of the nodes.

    With the simulation of our designed model,we study the traffic jam in the traffic network in Fig.2(b).Afterthe incident messages are delivered,drivers will then detour.We identify the influences of some important parameters,i.e.,the inflow rate,the detour rate of drivers,and the start time for providing traffic incidentinformation.We provide a sensitivity testof the following parameters as shown in Table II.

    Fig.3. Congestion formulation and dissipation under no traffic control strategy when traffic incident is from the 300th to 1000th interval,and the proportion of traffic demand heading to the blocked link is p=0.1.

    First,let z denote a constant traffic demand at origins,i.e.,?t,a,z=da(t),and p denote the proportion of traffic flow heading to the blocked link s at origins.We study the effect of z on jam formation and dissipation if there is no traffic control strategy.The incident occurs at the 301st interval and is cleared at the 1000th interval.We set p=0.1.Some simulation results of congestion formation and dissipation are shown in Fig.3.We learn that when the traffic demand increases,the traffic jam forms more quickly.We have a result that if z≤1.3,the traffic jam can dissipate in 100 intervals(8.33 minutes).In the following simulation,we set the traffic demand z=0.8.

    Then,we study the proportion of traffic demand at origins that head to the blocked link,with the results being shown in Fig.4.Under the situation where z=0.8,with a increase of p,the number of jammed cells grows sharply.There is little congestion when p is below 0.01.

    Fig.4. Congestion formulation and dissipation under no traffic control strategy and the proportion oftraffic demand atorigins thathead to the blocked link is p=0.01,0.05,0.1,0.2,and 0.3,respectively,and z=0.8.

    We further study the end time of the traffic incident and the results are shown in Fig.5.Under the traffic conditions wherez=0.8 and p=0.1,if the incident is cleared and traffic capacity of the blocked link is recovered in 200 intervals(16.67 minutes),the number of jammed cells can be kept below 10.

    TABLE I PARAMETERS FOR THE CTM[16]

    TABLE II PARAMETERS TO TEST

    Fig.5.Congestion formulation and dissipation under no traffic control strategy and the incident is cleared at the 400th,500th,600th,700th,and 1000th intervals,respectively,where z=0.8 and p=0.1.

    We study when to provide incident information to drivers in the traffic network in Fig.6.Under Assumption 4 and the traffic conditions z=0.8 and p=0.1,if the proportion of flows that change their direction to link s is 0.9,there is little congestion when we start to deliver the incident information in less than 100 intervals(8.33 minutes).Under Assumption 5,we have similar results as shown in Fig.7.

    Fig.6. Congestion formulation and dissipation when traffic control strategy begins from the 300th,400th,410th,420th,430th,440th,and 450th intervals,respectively,under Assumption 4 and where z=0.8 and p=0.1.

    Fig.7. Congestion formulation and dissipation when traffic control strategy begins from the 300th,400th,410th,420th,430th,440th,and 450th intervals,respectively,under Assumption 5 and where z=0.8 and p=0.1.

    We study the detour proportionαand have the results as shown in Fig.8.We can find there is little congestion formed whenα>0.8,which means that if more than 80%vehicles can obtain the incident information and then detour when z≤0.8 and p≤0.1,no traffi c jam occurs.Under Assumption 5,we have similar results as shown in Fig.9.Lastly we study the detour models given by Assumptions 4 and 5,respectively.Under the traffic conditions that z=0.8 and p=0.1,we set z=2.5,p=0.4,t3=450.The results in Fig.10 show that there is more congestion under the traffic detour strategy of Assumption 5 compared to that of Assumption 4.It means that drivers approaching the blocked link need to leave the path earlier to help reduce the traffic congestion induced by the incidents.

    Fig.8.Congestion formulation and dissipation when the strategy begins from the 300th to 1000th interval,and the detour proportionα=0.5,0.6,0.7,0.8,and 0.9,respectively,under Assumption 4 and where z=0.8 and p=0.1.

    Fig.9.Congestion formulation and dissipation when the strategy begins from the 300th to 1000th interval,and the detour proportionα=0.5,0.6,0.7,0.8,and 0.9,respectively,under Assumption 5 and where z=0.8 and p=0.1.

    Fig.10.Congestion formulation and dissipation undertraffic conditions z=2.5,p=0.4,and when the traffic control strategy begins at t3=450,and under the two detour strategies of Assumptions 4 and 5,respectively.

    We study a link set A′′and a constantη where the number of nodes from a link in A′′? A′to link s is no more than η while the number of nodes from a link in A′-A′′to s is bigger thanη.We only deliver the incident information to drivers at road links in A′′instead of A′.Obviously,η represents the scope of area where incident information is delivered.Some simulation results are shown in Figs.11 and 12:whenα=0.95,we only deliver information to drivers in link(28,33)and(32,33)such thatatmostone cellis congested as shown in Fig.11.With the decrease ofα,when delivering the incident information to a larger scope of road links,we can have a better result with fewer jammed cells.

    Fig.11.Congestion formulation and dissipation when f =1-5 under Assumption 5,and whereα=0.95,z=0.8 and p=0.1.

    Fig.12.Congestion formulation and dissipation when f =1-5 under Assumption 5,and whereα=0.60,z=0.8 and p=0.1.

    VI.CONCLUSIONS

    This paper presents a new strategy,which provides incident information to drivers and helps them make detours in urban areas.Traffic incident information is only transmitted to the affected vehicles thathead towards the blocked link created by the incident.These vehicles are in a sub-network that can be generated by the Dijkstra’s algorithm.Simulations are done to testthe effectiveness ofthe proposed strategy.The CTM-based model is used to estimate the congestion and promote the implementation of our strategy.Future work should consider realworld traffic conditions when differentlinks have different traffic density.We also need to design algorithms to accurately estimate the time for vehicles to pass road links,and thus,obtain the time-dependent shortest path.

    好男人在线观看高清免费视频| 啦啦啦韩国在线观看视频| 国产 一区 欧美 日韩| 精品人妻一区二区三区麻豆 | 网址你懂的国产日韩在线| 成人亚洲欧美一区二区av| 美女大奶头视频| 亚洲精品国产成人久久av| 亚洲最大成人手机在线| 中文在线观看免费www的网站| 亚洲国产日韩欧美精品在线观看| 日本免费一区二区三区高清不卡| 深夜精品福利| 久久午夜亚洲精品久久| 亚洲天堂国产精品一区在线| .国产精品久久| 亚洲成人中文字幕在线播放| 国产精品精品国产色婷婷| 亚洲国产精品成人久久小说 | av在线亚洲专区| 22中文网久久字幕| a级毛片免费高清观看在线播放| 国内精品宾馆在线| 国产在线精品亚洲第一网站| 免费av不卡在线播放| 此物有八面人人有两片| АⅤ资源中文在线天堂| 人妻少妇偷人精品九色| 少妇的逼水好多| 亚洲第一区二区三区不卡| 久久这里只有精品中国| 六月丁香七月| av黄色大香蕉| 亚洲中文字幕一区二区三区有码在线看| 久久久成人免费电影| 丝袜美腿在线中文| 久久精品国产亚洲av天美| 少妇熟女aⅴ在线视频| 午夜福利在线在线| av在线天堂中文字幕| 欧美xxxx性猛交bbbb| 真人做人爱边吃奶动态| 亚洲精品日韩在线中文字幕 | 97超碰精品成人国产| 国产精品人妻久久久久久| 国产黄片美女视频| 日本色播在线视频| 国产精品人妻久久久影院| 国产成年人精品一区二区| 一级毛片我不卡| 免费在线观看成人毛片| 亚洲天堂国产精品一区在线| 亚洲成人久久性| 搡老岳熟女国产| 婷婷精品国产亚洲av| 国产一区二区在线观看日韩| 18禁在线无遮挡免费观看视频 | 日韩精品青青久久久久久| 九色成人免费人妻av| 校园人妻丝袜中文字幕| 亚洲久久久久久中文字幕| 国产欧美日韩精品一区二区| 亚洲精品在线观看二区| 国产av不卡久久| 好男人在线观看高清免费视频| 亚洲av不卡在线观看| 少妇熟女aⅴ在线视频| 91久久精品电影网| 国产精品久久久久久精品电影| 校园人妻丝袜中文字幕| 1024手机看黄色片| 欧美高清成人免费视频www| av天堂中文字幕网| 深夜精品福利| 性插视频无遮挡在线免费观看| 国产精品永久免费网站| 久久久久久久久久成人| 日韩中字成人| 亚洲av成人av| 少妇熟女欧美另类| 人妻丰满熟妇av一区二区三区| 日本-黄色视频高清免费观看| 国产 一区精品| 久久欧美精品欧美久久欧美| 有码 亚洲区| 欧美成人a在线观看| 亚洲人与动物交配视频| 久久久久久久亚洲中文字幕| 18+在线观看网站| 在线观看66精品国产| 婷婷亚洲欧美| 精品久久久久久久久亚洲| 国产国拍精品亚洲av在线观看| 国产精品日韩av在线免费观看| 国产黄色小视频在线观看| 最后的刺客免费高清国语| 久久草成人影院| 看片在线看免费视频| 免费av不卡在线播放| 无遮挡黄片免费观看| 长腿黑丝高跟| 乱系列少妇在线播放| 老师上课跳d突然被开到最大视频| 国产伦在线观看视频一区| 国产免费一级a男人的天堂| 草草在线视频免费看| 色综合站精品国产| 熟女人妻精品中文字幕| 国产精品亚洲美女久久久| 又粗又爽又猛毛片免费看| 我的女老师完整版在线观看| 嫩草影院入口| 毛片一级片免费看久久久久| 亚洲天堂国产精品一区在线| 熟女电影av网| 一a级毛片在线观看| 国产国拍精品亚洲av在线观看| 男女之事视频高清在线观看| 成人鲁丝片一二三区免费| 大又大粗又爽又黄少妇毛片口| 婷婷精品国产亚洲av| 亚洲精品日韩av片在线观看| 在线观看美女被高潮喷水网站| 在线观看午夜福利视频| 天堂影院成人在线观看| 久久久久国产精品人妻aⅴ院| 久久人人精品亚洲av| 国产国拍精品亚洲av在线观看| 中国美女看黄片| 久久99热6这里只有精品| 亚洲国产日韩欧美精品在线观看| 中文字幕av成人在线电影| 丰满人妻一区二区三区视频av| av在线播放精品| 免费在线观看成人毛片| 色5月婷婷丁香| 亚洲专区国产一区二区| 久久婷婷人人爽人人干人人爱| 我要搜黄色片| 欧美xxxx性猛交bbbb| 成人综合一区亚洲| 日韩欧美精品v在线| 欧美在线一区亚洲| 晚上一个人看的免费电影| 日韩在线高清观看一区二区三区| 欧美激情国产日韩精品一区| 91麻豆精品激情在线观看国产| 成人午夜高清在线视频| 精品99又大又爽又粗少妇毛片| 日韩欧美在线乱码| 在线观看一区二区三区| 性插视频无遮挡在线免费观看| 晚上一个人看的免费电影| 两性午夜刺激爽爽歪歪视频在线观看| 精华霜和精华液先用哪个| 亚洲国产欧美人成| 蜜桃亚洲精品一区二区三区| 少妇高潮的动态图| 日本色播在线视频| 国产精品久久久久久精品电影| 美女内射精品一级片tv| 精品久久久久久久久久久久久| 欧美潮喷喷水| 国产一级毛片七仙女欲春2| 久久99热这里只有精品18| 岛国在线免费视频观看| 老师上课跳d突然被开到最大视频| 亚洲中文字幕日韩| 91麻豆精品激情在线观看国产| 国产真实乱freesex| 欧美潮喷喷水| 日韩欧美 国产精品| 国产伦精品一区二区三区视频9| 日本欧美国产在线视频| 青春草视频在线免费观看| 男女啪啪激烈高潮av片| 国产精品精品国产色婷婷| 久久人人爽人人片av| 久久久久久久久久成人| 美女大奶头视频| 国产私拍福利视频在线观看| 亚洲欧美日韩高清专用| 国产精品野战在线观看| av天堂在线播放| 国产一区亚洲一区在线观看| 国产精品三级大全| 久久午夜福利片| 亚洲久久久久久中文字幕| 久久久久国产精品人妻aⅴ院| 五月伊人婷婷丁香| av卡一久久| 十八禁国产超污无遮挡网站| 欧美+亚洲+日韩+国产| 亚洲精品粉嫩美女一区| 99热6这里只有精品| 国产成人freesex在线 | 不卡一级毛片| 我的女老师完整版在线观看| 国产欧美日韩一区二区精品| 国产伦在线观看视频一区| 亚洲精品在线观看二区| 听说在线观看完整版免费高清| 性色avwww在线观看| 国产aⅴ精品一区二区三区波| 日本成人三级电影网站| 久久中文看片网| 18禁裸乳无遮挡免费网站照片| 久久久久精品国产欧美久久久| 人人妻人人澡人人爽人人夜夜 | 欧美bdsm另类| 亚洲精品影视一区二区三区av| 校园春色视频在线观看| 国产熟女欧美一区二区| 国产精品人妻久久久影院| 一级毛片久久久久久久久女| 久久精品国产亚洲网站| 特级一级黄色大片| 搡女人真爽免费视频火全软件 | 久久久久久久亚洲中文字幕| 日本免费一区二区三区高清不卡| 午夜亚洲福利在线播放| 亚洲在线自拍视频| 亚洲精品成人久久久久久| 亚洲最大成人手机在线| 人人妻人人澡人人爽人人夜夜 | 99久久成人亚洲精品观看| 男女啪啪激烈高潮av片| 一区二区三区免费毛片| 搞女人的毛片| 国产美女午夜福利| 亚洲在线自拍视频| 成年女人看的毛片在线观看| 成人综合一区亚洲| 黄色配什么色好看| 亚洲自偷自拍三级| 久久精品国产99精品国产亚洲性色| 日韩成人伦理影院| 亚洲精品成人久久久久久| 性色avwww在线观看| 天堂av国产一区二区熟女人妻| 小说图片视频综合网站| 日韩欧美精品v在线| www.色视频.com| 日日摸夜夜添夜夜爱| 人妻久久中文字幕网| 亚洲精华国产精华液的使用体验 | 免费一级毛片在线播放高清视频| 亚洲成av人片在线播放无| 亚洲中文字幕日韩| 美女黄网站色视频| 亚洲精品影视一区二区三区av| 午夜福利成人在线免费观看| 成人欧美大片| 欧美丝袜亚洲另类| 日韩欧美免费精品| 一夜夜www| 最近在线观看免费完整版| 欧美3d第一页| 国产色婷婷99| 国产又黄又爽又无遮挡在线| 欧美人与善性xxx| 三级国产精品欧美在线观看| 精品人妻视频免费看| 久久久久久久午夜电影| 最近在线观看免费完整版| 亚洲中文日韩欧美视频| 一a级毛片在线观看| 99riav亚洲国产免费| 国内精品久久久久精免费| 亚洲av中文av极速乱| 男女之事视频高清在线观看| 十八禁国产超污无遮挡网站| 国产男靠女视频免费网站| 听说在线观看完整版免费高清| 美女内射精品一级片tv| 可以在线观看毛片的网站| 一进一出抽搐gif免费好疼| 天堂√8在线中文| 午夜激情福利司机影院| 亚洲色图av天堂| 精品国产三级普通话版| 亚洲,欧美,日韩| 亚洲自拍偷在线| 成人午夜高清在线视频| 观看免费一级毛片| 国产三级中文精品| 日本爱情动作片www.在线观看 | 免费看av在线观看网站| 人人妻人人澡人人爽人人夜夜 | 日韩av不卡免费在线播放| 欧美一区二区亚洲| 一本精品99久久精品77| 麻豆久久精品国产亚洲av| a级毛片免费高清观看在线播放| 韩国av在线不卡| 欧美人与善性xxx| 日韩三级伦理在线观看| 一区二区三区免费毛片| 成人综合一区亚洲| 国产午夜福利久久久久久| 97在线视频观看| 久久草成人影院| 在线天堂最新版资源| 欧美性猛交黑人性爽| 久久精品国产99精品国产亚洲性色| 九九在线视频观看精品| 综合色av麻豆| 亚洲精品乱码久久久v下载方式| 国产免费一级a男人的天堂| 欧美性感艳星| 老师上课跳d突然被开到最大视频| 男女啪啪激烈高潮av片| 久久午夜福利片| 99久久精品一区二区三区| 国产免费一级a男人的天堂| 免费观看人在逋| 国产单亲对白刺激| 高清午夜精品一区二区三区 | www.色视频.com| 欧美色视频一区免费| 国产精品99久久久久久久久| 久久精品国产清高在天天线| 日韩欧美精品免费久久| 亚洲av中文字字幕乱码综合| 丰满的人妻完整版| 国产精品一区www在线观看| 中文字幕人妻熟人妻熟丝袜美| 国产女主播在线喷水免费视频网站 | 欧美日本视频| 国产蜜桃级精品一区二区三区| 亚洲国产精品成人久久小说 | 18+在线观看网站| 少妇丰满av| 亚洲欧美日韩高清专用| 国产白丝娇喘喷水9色精品| 搡女人真爽免费视频火全软件 | 中文资源天堂在线| 国产伦精品一区二区三区视频9| 国产精品美女特级片免费视频播放器| 国产精品1区2区在线观看.| 久久久久久国产a免费观看| 欧美极品一区二区三区四区| 22中文网久久字幕| 久久久久国内视频| 成年av动漫网址| 成年女人看的毛片在线观看| 久久久精品94久久精品| 校园春色视频在线观看| 成人永久免费在线观看视频| av国产免费在线观看| av卡一久久| 亚洲第一电影网av| 男女啪啪激烈高潮av片| 国模一区二区三区四区视频| 亚洲av不卡在线观看| 亚洲国产高清在线一区二区三| 变态另类丝袜制服| 国产av一区在线观看免费| 自拍偷自拍亚洲精品老妇| 亚洲av熟女| 亚洲国产精品国产精品| 人妻夜夜爽99麻豆av| 91在线精品国自产拍蜜月| 欧美一级a爱片免费观看看| 日韩,欧美,国产一区二区三区 | 麻豆国产av国片精品| 久久久久国产网址| 97超视频在线观看视频| 久久久久性生活片| 国产毛片a区久久久久| 欧美精品国产亚洲| 免费看日本二区| 国产高清视频在线播放一区| 偷拍熟女少妇极品色| 亚洲第一电影网av| 久久中文看片网| 最近最新中文字幕大全电影3| 菩萨蛮人人尽说江南好唐韦庄 | 在线观看午夜福利视频| 精品一区二区三区视频在线观看免费| 久久久色成人| 欧美+亚洲+日韩+国产| 在线免费观看不下载黄p国产| 神马国产精品三级电影在线观看| 久久99热6这里只有精品| 午夜影院日韩av| 97超级碰碰碰精品色视频在线观看| 亚洲av中文av极速乱| 日本撒尿小便嘘嘘汇集6| 亚洲精品在线观看二区| 蜜桃亚洲精品一区二区三区| 亚洲美女视频黄频| 日韩欧美国产在线观看| 国产成年人精品一区二区| 啦啦啦观看免费观看视频高清| 亚洲国产欧洲综合997久久,| 亚洲人成网站在线观看播放| 国产精品精品国产色婷婷| 久久久久久久久久成人| 卡戴珊不雅视频在线播放| 欧美最新免费一区二区三区| 男人的好看免费观看在线视频| 午夜福利在线观看免费完整高清在 | 国产亚洲精品久久久com| 日本黄色视频三级网站网址| 欧美色视频一区免费| 久久热精品热| 97超级碰碰碰精品色视频在线观看| 无遮挡黄片免费观看| 特大巨黑吊av在线直播| 成人国产麻豆网| 别揉我奶头 嗯啊视频| www.色视频.com| 午夜久久久久精精品| 久久精品影院6| 国产精品野战在线观看| 久久综合国产亚洲精品| 白带黄色成豆腐渣| 禁无遮挡网站| ponron亚洲| 最近的中文字幕免费完整| 神马国产精品三级电影在线观看| 中出人妻视频一区二区| 国产高清激情床上av| 老女人水多毛片| 国产亚洲91精品色在线| 欧美日本视频| 一个人观看的视频www高清免费观看| 日本成人三级电影网站| 国产真实乱freesex| 99国产极品粉嫩在线观看| 成年女人毛片免费观看观看9| 成人国产麻豆网| 伊人久久精品亚洲午夜| 久久精品久久久久久噜噜老黄 | 亚洲成人久久爱视频| 午夜福利高清视频| aaaaa片日本免费| 一边摸一边抽搐一进一小说| 中文在线观看免费www的网站| 亚洲欧美日韩无卡精品| 在线免费观看不下载黄p国产| 色哟哟哟哟哟哟| 国模一区二区三区四区视频| av专区在线播放| 小蜜桃在线观看免费完整版高清| 美女大奶头视频| 欧美色欧美亚洲另类二区| av在线蜜桃| 一区二区三区四区激情视频 | 久久草成人影院| 久久久午夜欧美精品| 国产淫片久久久久久久久| 波野结衣二区三区在线| 久久久精品欧美日韩精品| 欧美最黄视频在线播放免费| 久久精品夜夜夜夜夜久久蜜豆| a级毛色黄片| 22中文网久久字幕| 男人和女人高潮做爰伦理| 国产熟女欧美一区二区| 亚洲高清免费不卡视频| 久久久久国产精品人妻aⅴ院| 免费大片18禁| 天堂av国产一区二区熟女人妻| 亚洲国产欧洲综合997久久,| 国产 一区 欧美 日韩| 精品一区二区免费观看| 欧洲精品卡2卡3卡4卡5卡区| 亚洲国产精品sss在线观看| aaaaa片日本免费| 又粗又爽又猛毛片免费看| 日韩 亚洲 欧美在线| 精品一区二区三区人妻视频| 18禁在线无遮挡免费观看视频 | 亚洲av熟女| 国内精品一区二区在线观看| 俄罗斯特黄特色一大片| 国产伦在线观看视频一区| 综合色丁香网| 亚洲国产日韩欧美精品在线观看| 天堂动漫精品| 在线播放无遮挡| 少妇猛男粗大的猛烈进出视频 | 麻豆国产97在线/欧美| 亚洲欧美成人精品一区二区| 色播亚洲综合网| 麻豆久久精品国产亚洲av| 美女高潮的动态| 丰满的人妻完整版| 久久久久久久久中文| 色播亚洲综合网| ponron亚洲| 欧美丝袜亚洲另类| 久久婷婷人人爽人人干人人爱| 亚洲第一电影网av| a级毛片免费高清观看在线播放| 人妻制服诱惑在线中文字幕| 精品欧美国产一区二区三| 一进一出抽搐gif免费好疼| 免费看日本二区| 精品乱码久久久久久99久播| av在线亚洲专区| 亚洲精品久久国产高清桃花| 神马国产精品三级电影在线观看| 亚洲图色成人| 色哟哟·www| 欧美激情久久久久久爽电影| 精品一区二区三区视频在线| 蜜臀久久99精品久久宅男| 亚洲人成网站在线播| 精品午夜福利在线看| 久久亚洲国产成人精品v| videossex国产| 午夜福利高清视频| 亚洲久久久久久中文字幕| 国产成人福利小说| 色综合色国产| 麻豆成人午夜福利视频| eeuss影院久久| 精品久久久久久久久久免费视频| 综合色丁香网| 精品一区二区三区人妻视频| 欧美成人精品欧美一级黄| 日韩欧美三级三区| 亚洲欧美成人精品一区二区| 高清毛片免费观看视频网站| 亚洲美女黄片视频| 99热这里只有是精品50| 男女之事视频高清在线观看| 日本黄大片高清| 免费看av在线观看网站| 国产高清视频在线观看网站| 亚洲最大成人中文| 成人性生交大片免费视频hd| 婷婷色综合大香蕉| 日韩大尺度精品在线看网址| 欧美zozozo另类| 国产免费一级a男人的天堂| 欧美成人精品欧美一级黄| 久久精品影院6| 黄色配什么色好看| 可以在线观看的亚洲视频| 国产不卡一卡二| 免费观看精品视频网站| 国产高清有码在线观看视频| 色哟哟哟哟哟哟| 欧美成人免费av一区二区三区| 国产精品一区二区三区四区久久| 少妇熟女aⅴ在线视频| 久久久国产成人免费| 色在线成人网| 99热这里只有是精品50| 一区二区三区四区激情视频 | 国产精品爽爽va在线观看网站| 三级男女做爰猛烈吃奶摸视频| 亚洲人与动物交配视频| 久久久成人免费电影| 亚洲国产日韩欧美精品在线观看| 日本一二三区视频观看| 97人妻精品一区二区三区麻豆| 亚洲三级黄色毛片| 亚洲欧美日韩卡通动漫| 欧美+亚洲+日韩+国产| 中文字幕人妻熟人妻熟丝袜美| 免费看美女性在线毛片视频| 亚洲电影在线观看av| 成人鲁丝片一二三区免费| 国产男人的电影天堂91| 成人高潮视频无遮挡免费网站| 能在线免费观看的黄片| 丰满的人妻完整版| 亚洲,欧美,日韩| 精品一区二区三区视频在线| 日本 av在线| 在线播放无遮挡| 给我免费播放毛片高清在线观看| www日本黄色视频网| 99精品在免费线老司机午夜| 亚洲国产精品成人综合色| 日韩人妻高清精品专区| 午夜久久久久精精品| 一个人免费在线观看电影| 国内精品美女久久久久久| 精品久久久久久成人av| 九九热线精品视视频播放| 三级男女做爰猛烈吃奶摸视频| 最新在线观看一区二区三区| 91麻豆精品激情在线观看国产| 欧美绝顶高潮抽搐喷水| 亚洲成人久久爱视频| 国产精品一及| 久久久久久久久久成人| 亚洲欧美中文字幕日韩二区| 国产精品av视频在线免费观看| 欧美高清成人免费视频www| 99久久精品国产国产毛片| 色噜噜av男人的天堂激情| 免费av观看视频| 精品欧美国产一区二区三| 国产伦精品一区二区三区视频9| 91狼人影院| 国产精品嫩草影院av在线观看| 少妇被粗大猛烈的视频| 国产亚洲精品综合一区在线观看| 亚洲av免费高清在线观看| 一a级毛片在线观看| 欧美日本视频| 亚洲国产精品成人久久小说 | 亚洲最大成人手机在线| 一区福利在线观看| 精品久久久噜噜| 国产精品精品国产色婷婷| 变态另类成人亚洲欧美熟女| 亚洲成a人片在线一区二区|