<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Traffic Flows System Development for Smart City</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Krisl</string-name>
          <email>irynakrislata@gmail.com1</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>toliy K</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>Lviv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>The work is devoted to the development of an information system, where the movement of vehicles is a central element. Another key element is research and development of theoretical and methodological foundations and mathematical tools for performing all kinds of tasks for managing these flows, improving the transport network and maintaining good quality of the roads. To achieve this, the following questions were raised in this document: analysis of existing methods of solving various problems related to the traffic of a large city; development of a formalized approach to solving this class of problems; development of algorithm for optimization of these tasks; implementation of developed algorithms in the complex traffic management program. As a result, specific practical problems regarding managing the traffic flow of a large city were solved, the adequacy of developed models and algorithms was proved, and the usefulness of their use was shown.</p>
      </abstract>
      <kwd-group>
        <kwd />
        <kwd>Traffic flow management</kwd>
        <kwd>information system</kwd>
        <kwd>information technologies</kwd>
        <kwd>management system</kwd>
        <kwd>transport network</kwd>
        <kwd>vehicles</kwd>
        <kwd>road quality</kwd>
        <kwd>traffic congestion</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Transport infrastructure is one of the most important infrastructures that provide the
life of cities, villages, regions, regions, and even countries [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5 ref6 ref7">1-7</xref>
        ]. According to the
definition, it is a collection of certain objects (enterprises) involved in the
construction, repairing, as well as the maintenance of the roads, bridges etc. The transport
infrastructure ensures the availability and preservation of transport routes in proper
condition. It includes railways, railway stations and stations, highways, public
transport, streets, airlines and airports, river routes and ports, seaports, bus stations,
tram lines, etc. In recent years, many major cities have completely exhausted the
potential of transport networks development. That is why optimal planning of transport
networks, improvement of traffic organization, optimization of the public, industrial
and other route types of transport have become of particular importance [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14 ref15 ref8 ref9">8-15</xref>
        ].
      </p>
      <p>
        Due to the intensive use of infrastructure, the transport sector is an important
component of the economy and a common tool used for development [
        <xref ref-type="bibr" rid="ref16 ref17 ref18 ref19 ref20">16-20</xref>
        ]. A stable,
efficient and well-supported transport infrastructure gives urban and rural residents
the opportunity to participate in economic opportunities and access to basic services.
2
      </p>
      <p>
        System Analysis of the Research Object
A goal tree is a structured, hierarchical principle (distributed in levels) of a set of
goals of a system, program, plan, in which the general purpose ("the top of a tree") is
allocated; subordinate to her subculture of the first, second and subsequent levels
("branches of the tree") [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. The name of the "goal tree" is due to the fact that the
schematically presented this set of goals resembles the inverted tree.
      </p>
      <p>The term "tree" involves the use of a hierarchical structure (from senior to
younger), obtained by dividing the general purpose into its subculture. The goal tree method
is oriented towards obtaining a relatively stable structure of goals, problems, and
directions. To achieve this, when constructing the initial version of the structure, one
should take into account the patterns of the formation of the goal and use the
principles of the formation of hierarchical structures.</p>
      <p>This method is widely used to predict possible trends in the development of
science, technology, technology, as well as for the compilation of personal, professional
or the goals of any company. A goal tree closely links prospective goals and specific
tasks at each level of the hierarchy. At the same time, the purpose of the higher order
corresponds to the top of the tree, and below several tiers are located local goals
(tasks), through which provides the achievement of the goals of the upper level.</p>
      <p>When constructing a "goal tree" its design is based on the method "from general to
specific". The termination of the decomposition of the purpose occurs at a time when
the subsequent process is inappropriate in relation to the main goal. In general, the
structure of the objectives tree is as follows: the root of a tree is a general purpose,
formulated in the form of one or two sentences in a natural language. The following
levels are aspects of the general purpose, if need be - later examples that can be
represented as a hierarchy of sub-targets, and eventually the level of "leaves" of the tree
criteria. The criteria can be either quantitative - that is, measured directly and
represented by numerical values with a certain dimension, and qualitative ones - the values
of which are obtained from experts and processed by systematic methods.</p>
      <p>Accordingly, at the first stage we will form the main, global objective of the
system, which has a long-term, strategic nature and is aimed at the introduction and
operation of the system. Since the system can have only one main (general) purpose, for
this information system it has - management of traffic flows (cities) (Fig.1).
1.1. Quantitative and qualitative transport composition Data collection and monitoring
1.1.1. Number of a camera that meets the set requirements
1.2. Data collection and public transport organization
1.2.1. Optimization of public transport traffic interval
1.2.2. Prompt information on arrival of transport
2.1. Analysis and optimization of traffic lights
2.1.1. Effective functioning of traffic lights
2.2. Collection of road conditions in different weather conditions
2.2.1. The promptness of the call for equipment for clearing roads</p>
    </sec>
    <sec id="sec-2">
      <title>Analysis of primary information and management of traffic flows</title>
    </sec>
    <sec id="sec-3">
      <title>City traffic management</title>
    </sec>
    <sec id="sec-4">
      <title>Analysis and effective management of the transport network</title>
      <p>Analysis of the
constraints and
problems
encountered
1.1
1.2
2.1
2.2
2.3
3.1
3.2
3.3
1.1.1
1.2.1 1.2.2
2.1.1 2.2.1
2.3.1</p>
      <p>3.1.1 3.2.1 3.2.2 3.3.1 3.3.2
2.3. Roads monitoring
2.3.1. Effective schedules of repair work
3.1. Data collection and raising financial capital
3.1.1. Optimization of tariffs for transport services
3.2. Reporting overview and troubleshooting
3.2.1. The promptness of informing drivers about traffic jams
3.2.2. Optimal congestion routes
3.3. Obtaining and minimizing information from police about violations
3.3.1. The optimal number of police
3.3.2. Maximizing sentencing</p>
      <p>
        The main goal of the development of the main goal is the analysis of the external
and internal environment of the system, assessment of its resources and capabilities.
At the second stage we will make a decomposition of the main goal of the system for
the purpose of the second level (aspects of the general purpose). Formation of the
objectives of the second level (aspects) in the directions is in line with the main
strategic goal, which should guarantee its implementation. Such aspects in this case are:
analysis of primary information and vehicle management, analysis and efficient
management of the transport network, analysis of constraints and solving problems.
Aspects of general purpose characterize the specialized directions of activity and
functioning of the system. Each direction represents a clearly defined sphere of specialized
activity of the system. In the third stage, we decompose the objectives of the second
level (aspects of the general purpose) in accordance with the specific tasks
(subaspects of the general purpose). For the first aspect, when decomposing, there are new
exits: data collection and monitoring of quantitative and qualitative transport
composition, data collection and optimization of public transport; for the second - analysis
and optimization of traffic lights, data collection on the condition of highway in
different weather conditions, monitoring of the state of roads; and accordingly, for the
third, data collection and raising financial capital, an overview of reporting and
solving the problem of corruption, receiving information from the police about the
violation and minimizing it. At the next stage, the decompositions describe the "leaves" of
the tree, which are the criteria for achieving the goal. As shown in Fig. 1 the
following criteria for achieving the main goal of the information system of traffic flows of a
large city in accordance with the sub-aspects of the general goal are: the number of
cameras that meet the requirements, optimization of the interval of public transport,
efficiency of informing about the arrival of transport, the effective operation of traffic
lights, the speed of calling vehicles for cleaning roads , effective schedules of carrying
out of repair works, optimization of tariffs for transport services, efficiency of
informing drivers about traffic jams, optimal routes of traffic collapse, optimal number of
police, maximization of penalties. The interaction of the system with elements of the
environment with sufficient completeness will be reflected within the notation of the
DFD (flowcharts) using the context diagram, and the detailing - by constructing the
DFD hierarchy of the following levels. Data Flow Diagrams (DFDs) depict the flow
of information for any process or system. They use symbols such as rectangles, circles
and arrows, as well as short text labels to show incoming and outgoing data, storage
points and routes (information transfer) between each destination [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. These charts
can be used to analyze an existing system or create a new one.
      </p>
      <p>The data flowchart may become more detailed by levels. Levels DFD are numbered
0, 1 or 2, and sometimes you can go to level 3 or go beyond its limits. The required
level of detail depends on the amount of what they are trying to achieve. The level of
DFD 0, also called the context diagram, is depicted in Fig. 2.
This is a basic overview of the entire traffic information system of a large city to be
analyzed and modeled. It is designed for clarity and in order to display the system as a
single high-level system, with its interconnections and external objects. The context
diagram is easily understood by a wide audience, including stakeholders, business
analysts and developers. This context diagram depicts only one main process "to
enElements of the
transport
network</p>
      <p>Management
Information about transport
network elements</p>
      <p>Information about</p>
      <p>traffic flows
Transport Personnel
flows Funds Management</p>
      <p>Cars</p>
      <p>Road status information</p>
    </sec>
    <sec id="sec-5">
      <title>Road Control</title>
      <p>Department
Address and
management</p>
    </sec>
    <sec id="sec-6">
      <title>Department of</title>
      <p>fixing violations
Traffic congestion
information
Management</p>
    </sec>
    <sec id="sec-7">
      <title>Ensure</title>
      <p>management of
city traffic flows
Public transport
information</p>
      <p>Management
Address and
management
Management</p>
    </sec>
    <sec id="sec-8">
      <title>Traffic Management Department</title>
    </sec>
    <sec id="sec-9">
      <title>Public Transport Management Department</title>
      <p>Information about
traffic lights</p>
    </sec>
    <sec id="sec-10">
      <title>Traffic lights management department</title>
      <p>Accident
informationTraffic violation</p>
      <p>information
Results
7</p>
      <p>Scoreboard
information</p>
      <p>Results
Management Public transport
information
sure the management of traffic flows (cities)" and the following external entities:
"traffic flows", "elements of the transport network", "the department of fixing
violations", "the department of control of traffic jams," the department of public
management transport "," traffic lights management department "and" road control
department ", which will provide stream management. Level DFD 1, shown in Fig. 3,
provides a more detailed breakdown of parts of the context chart. Here are the main
functions performed by the system, by separating the system of high level on its
subprocesses.
Databases:
1 – Vehicle information;
2 – Reporting of violations;
3 – Traffic light information;
4 – Report on repair work;
5 – Cards;
6 – Transport service information;
7 – Information about the characteristics of the scoreboard.</p>
      <p>Processes:
1.1 – Collect vehicle information from surveillance cameras;
1.2 – Fix violations;
1.3 – Solve congestion issues;
1.4 – Ensure proper use of traffic lights;
1.5 – Optimize public transport;
1.6 – Check the condition of the roads;
1.7 – Check the weather on the roads;
1.8 – Provide payment for transport services.</p>
      <p>From this diagram it is clear that at this stage, according to the standard, there are
no new entities, but only duplicates those that were on the context. In addition, there
are new processes (subprocesses) and data warehouses.</p>
      <p>The sub-processes in this chart are "collect information about vehicles", "fix
violations", "solve problems with congestion", "optimize the traffic of public transport",
"ensure the proper use of traffic lights", "monitor the state of roads", "conduct road
traffic control "and" provide payment for transport services ". In addition, there are 7
data warehouses on the chart: "vehicle information", "transport service information",
"violation reporting", "traffic lights information", "table information and
characteristics", "maps" and "reporting on conducting repair works". At this stage, the diagram
describes in more detail the essence of the system. However, in my opinion, it can be
decomposed more in order to describe in detail some of the subprocesses. As a result
we get DFD 2 level. DFD level 2 are divides into more parts the 1st level graph. In
order to achieve the required level of detail about the functioning of the system, a
more detailed description of the system will be required. To begin with, consider the
process of "collecting information about vehicles" (Fig. 4).
As you can see, the diagram shows new processes: "to determine places with no
observation cameras", "to install surveillance cameras", "to recognize machine numbers
and other characteristics". The results of these processes will be recorded in the data
store "vehicle information", which will be used in the future by the system in the
execution of other processes.</p>
      <p>Next we decompose the process of "fixing violations" (Fig. 5). We see that in this
second level diagram there are new processes: "fixing traffic accidents", "fixing
traffic offenses", "delaying the offender", "imposing a punishment", "calling police
officers", "calling for ambulance if necessary". The external essence of the "Department
for fixing violations" will send information and collect all the results.</p>
    </sec>
    <sec id="sec-11">
      <title>Traffic violation information</title>
    </sec>
    <sec id="sec-12">
      <title>Management Results</title>
    </sec>
    <sec id="sec-13">
      <title>Person information Results</title>
      <p>2.2.1
Report traffic
violations</p>
    </sec>
    <sec id="sec-14">
      <title>Results</title>
    </sec>
    <sec id="sec-15">
      <title>Person information</title>
      <p>2.2.6
To impose a
measure of
punishment</p>
    </sec>
    <sec id="sec-16">
      <title>Results</title>
    </sec>
    <sec id="sec-17">
      <title>Person information</title>
    </sec>
    <sec id="sec-18">
      <title>Detain the offender</title>
    </sec>
    <sec id="sec-19">
      <title>Data on the nature of the violation</title>
      <p>2.2.2</p>
    </sec>
    <sec id="sec-20">
      <title>Fix an accident</title>
      <p>2.2.5</p>
    </sec>
    <sec id="sec-21">
      <title>Challenge</title>
      <p>2.2.3</p>
    </sec>
    <sec id="sec-22">
      <title>Call the police</title>
    </sec>
    <sec id="sec-23">
      <title>Accident information</title>
    </sec>
    <sec id="sec-24">
      <title>Challenge</title>
      <p>2.2.4
Call an ambulance
if necessary</p>
    </sec>
    <sec id="sec-25">
      <title>Personnel</title>
    </sec>
    <sec id="sec-26">
      <title>Personnel</title>
      <p>Fig. 5. Detailing the process of fixing violations
And all recorded violations and road accidents with information about place, time,
date, person and the actual violation and punishment for it will be stored in the data
warehouse "reporting of violations", which the police will also use to review the
frequency of relevant events committed by that or another person to determine the
penalties for this person. This data storage is depicted on a higher level chart. The process
of solving the problem with congestion is extremely relevant and at the same time
quite complicated. It includes several subprocesses with much entities and data
storage. How this issue will be solved by the information system is shown below (Fig.6).</p>
      <p>GPS
information</p>
    </sec>
    <sec id="sec-27">
      <title>Routes</title>
      <p>Personnel
2.3.5
Send directions to
GPS
2.3.2
Send police
officers</p>
    </sec>
    <sec id="sec-28">
      <title>Routes</title>
    </sec>
    <sec id="sec-29">
      <title>Results</title>
    </sec>
    <sec id="sec-30">
      <title>Results</title>
      <p>2.3.4
Consider possible
detours</p>
    </sec>
    <sec id="sec-31">
      <title>Results</title>
      <p>2.3.7
Management Solve congestion
issues</p>
    </sec>
    <sec id="sec-32">
      <title>Results</title>
    </sec>
    <sec id="sec-33">
      <title>Routes</title>
      <p>2.3.6
Send a message to
the radio station</p>
    </sec>
    <sec id="sec-34">
      <title>Analyze the density of congestion</title>
      <p>2.3.1
When the cameras observe an excessive accumulation of vehicles on one or another
section of the transport network, a signal with this information is sent to the traffic
control unit. Accordingly, the unit assigns the task of solving this problem to the
following processes: "to send police officers", "analyze the density of the trick," "to
consider possible options for a detour", which are taken from the data warehouse
"maps", "send directions to GPS", "send message on the radio station", "adjust the
pace of work of the traffic light "and, of course, "solve the problems with traffic jams"</p>
      <p>When fixing the camera of the observation of excessive replenishment of vehicles
in one or another department of the transport network, signal with the information is
sent to the department of traffic jam management. As a result, he refuses to solve the
problem of the following processes: "breaking the bottlenecks", "analyze the
integrity", "expand the possible options for exchange", which are displayed with the data
warehouses "maps", "dispatch sending to GPS", "sending messages". message on the
radio station "," prepare the pace of work of the traffic lights ", usually" solve
problems with the traffic jam". If we describe in detail the process of optimizing public
transport, then several new processes will appear in the diagram (Fig. 7). Among
them: "analyze the population at stops," "determine the required amount of each
transport," "determine the required frequency of vehicles," set the scoreboard, "send
data with the arrival time on the scoreboard" and "calculate the failure." In my
opinion, with the help of these data, the traffic of taxis, trams, trolleybuses and other
vehicles people will be much more satisfied, since all possible factors for comfortable
movement of people and informed expectations will be taken into account.</p>
      <p>2.4.2</p>
      <p>Determine the
required amount of
each transport</p>
      <p>Number of
machines
Results</p>
      <p>2.4.1
Analyze weather Public transport</p>
      <p>conditions information
Results</p>
      <p>2.4.3
Determine the
desired machine</p>
      <p>speed
Arrival time</p>
      <p>Data
2.4.5
Results Send data with</p>
      <p>time of arrival on
Management the scoreboard</p>
      <p>Crash
information
Edited data</p>
      <p>2.4.4
Install the
scoreboard
Next we consider the process of "ensuring the proper use of traffic lights", or rather its
decomposition (Fig.8).</p>
    </sec>
    <sec id="sec-35">
      <title>Results</title>
      <p>Management
Disconnect
information
2.5.2
Turn off the traffic
light</p>
    </sec>
    <sec id="sec-36">
      <title>Low density</title>
    </sec>
    <sec id="sec-37">
      <title>Address</title>
      <p>3
Here the managing link is the external essence of the "traffic lights management
department". The diagram also shows the processes "analyze the density of the road at a
certain hour of the day", as a result of which the following processes will be
performed depending on the results: "turn off the traffic light", "put an additional traffic
light" or "adjust the light speed". All results of the above actions are stored in the data
store "information about traffic lights", which is also used to read current data of a
given traffic light and further work with it. Fig. 9 depicts the process of "monitoring
Funds</p>
    </sec>
    <sec id="sec-38">
      <title>Results</title>
    </sec>
    <sec id="sec-39">
      <title>Road status information</title>
    </sec>
    <sec id="sec-40">
      <title>Results</title>
      <p>Build a new road</p>
    </sec>
    <sec id="sec-41">
      <title>Check the condition of the roads</title>
    </sec>
    <sec id="sec-42">
      <title>Address</title>
      <p>2.6.1</p>
    </sec>
    <sec id="sec-43">
      <title>Time</title>
    </sec>
    <sec id="sec-44">
      <title>Schedule</title>
      <p>2.6.2
Schedule repair</p>
      <p>work
the state of roads". This chart is managed by the "road control department", as it
provides information about a specific address and requests the processes of "constructing
a new road" and "checking the state of the roads." The funds for such actions are
partly received as a result of the process of "ensuring payment for transport services". The
results of the construction are recorded in the already mentioned card data repository.
After checking, if necessary, there is a process of "drawing up a schedule of repairs"
and "carrying out repairs", the results of which are reduced to "reporting on the repair
work." This data warehouse is also analyzed in the process of checking the state of
roads for a decision on the need for the start of repair. The next process, which we
will decompose, is "to provide payment for transport services" (Fig.10).
The processes that perform the function of ensuring payment for transport services:
"to gather information about transport services", "to establish optimal tariffs", "to
raise funds". Funds are collected from drivers of vehicles, some of which are
transported for the construction and reconstruction of roads. All information on tariffs and
collected funds is stored in the "transport service information" repository. The final
process that we will decompose is to "control the weather on the highways" (Fig.11).</p>
    </sec>
    <sec id="sec-45">
      <title>Address</title>
      <p>2.8.2</p>
    </sec>
    <sec id="sec-46">
      <title>Results</title>
      <p>2.8.3</p>
    </sec>
    <sec id="sec-47">
      <title>Funds</title>
    </sec>
    <sec id="sec-48">
      <title>Results</title>
    </sec>
    <sec id="sec-49">
      <title>To raise funds</title>
    </sec>
    <sec id="sec-50">
      <title>Funds</title>
      <p>Address
The external essence of this process is the "Department of Road Weather
Monitoring". The processes in this chart are "to analyze weather conditions" and "send cars to
clear roads". In general, the system can be further elaborated to 3.4 and further levels,
but going beyond Level 3 can lead to significant complexities as the model may
become less comparable and effective. Therefore, at this stage, we will stop.
According to the definition, description and rules, the DFD diagram of the
information system of traffic flows of a large city was built, which is a generalized
intellectual transport system. Let's take a closer look at what it is.</p>
      <p>
        Intelligent Transport Systems (ITS) are advanced applications that, without the
intelligence as such, are aimed at providing innovative services related to different
modes of transport and traffic management and allow different users to be more
informed and make transport networks safer, coordinated and "smarter" [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Intelligent
transport systems differ in applied technology, from basic control systems such as
automotive navigation; traffic light control systems; container management systems;
automatic speed detection for monitoring applications such as video surveillance
systems; and more advanced applications that integrate real-time data and feedback
systems from a number of other sources such as parking systems and other information
systems; weather information, etc. In addition, prognostic methods are developed to
make modern simulations progress in comparison with historical data.
3
      </p>
      <sec id="sec-50-1">
        <title>Building a Hierarchy of Tasks</title>
        <p>This information system consists of many tasks that can be represented hierarchically
(Fig.12). From the figure, we see that the main task, located at the top of the
hierarchy, is "the task of regulating traffic flows." It breaks up into 8 sub-tasks, which, in
turn, also have several tasks at their lower levels. Including:</p>
        <p>1) "task of collecting information on vehicles", which includes the "task of
installing surveillance cameras" and "the task of recognizing the machine number";
2) "task of fixing violations", which is divided into 2 subtasks - "task of fixing
violations of traffic rules" and "task of fixing an accident". For them, the lowest level of
the hierarchy will be "the task of delinquent offender";</p>
        <p>3) the "problem of solving the problem with congestion", which includes the "task
of collecting information about the jam" and "the problem of analysis of the density of
the flood", which also branch out to "the problem of considering possible alternatives
to detour", "the task of adjusting the pace of the traffic light "And" the task of calling
police officers ";</p>
        <p>4) "task of optimization of public transport", which includes the "task of setting the
table" and "task of determining the frequency of vehicles." The latter includes the
"task of sending data to the scoreboard" and "task of calculating failures";
5) "the task of ensuring the proper use of traffic lights", which includes the
"problem of analyzing the density of the road at a certain hour of the day" and "the task of
collecting information about current traffic lights", which also branch out to the "task
of turning off the traffic light", "the task of installing additional traffic lights" and "the
task of setting the pace of change of light";</p>
        <p>6) "task of collecting fees for transport services", which include "the task of
collecting information about transport services" and "the task of optimizing tariffs". They in
turn, at the lower level of the hierarchy, have a "task of raising funds";
7) "task of monitoring the state of roads", which is divided into "the task of
constructing a new road" and "the task of checking the state of roads". The latter also has
a lower level of "the task of scheduling repair work" and "the task of repair";
8) "task of monitoring the weather on highways" includes the "task of collecting
information on the availability of appropriate equipment" and "the task of weather
analysis", which in turn include the "task of sending cars to clear roads".</p>
        <p>1
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.1.1 1.1.2 1.2.1 1.2.2 1.3.1 1.3.2 1.4.1 1.4.2 1.5.1 1.5.2 1.6.1 1.6.2 1.7.1 1.7.2 1.8.1 1.8.2
A</p>
        <p>B</p>
        <p>C</p>
        <p>D</p>
        <p>E</p>
        <p>F</p>
        <p>G</p>
        <p>H</p>
        <p>I</p>
        <p>J</p>
        <p>K</p>
        <p>L</p>
        <p>M
Tasks:
1 – Management of city traffic flows;
1.1 – Information about vehicles;
1.1.1 – Installation of data collection from chamber storage;
1.1.2 – Machine number recognition;
1.2 – Commit message;
1.2.1 – Fix traffic messages;
1.2.2 – Fixing of an accident;
1.3 – Traffic congestion management;
1.3.1 – Collection of congestion information;
1.3.2 – A real congestion;
1.4 – Optimization of public transport traffic;
1.4.1 – Propose machine speeds;
1.4.2 – Installation of a simple scoreboard;
1.5 – Specially protected light of traffic lights;
1.5.1 – Analysis of the reliability of expensive at a certain hour of acquisition;
1.5.2 – Collection of information about current traffic lights;
1.6 – Complete set of payment for transport services;
1.6.1 – Information on transport services;
1.6.2 – Tariff optimization;
1.7 – Existing roads are observed;</p>
        <p>Description of the Created Software
Let's launch the program and select the required characteristics. We select the number
of cars and press the start button. Let's see how cars ride without starting a congestion
drive algorithm (Fig. 13). Next, we will switch to the mode of using the required
algorithm (Fig. 14). We see that the paths of some cars differ considerably in these modes,
and in the mode with the algorithm traffic is not formed. Now let's consider and
compare the timelines of unmanned vehicle fares with initial data and algorithm (Fig. 15).
We see that taking into account the algorithm used, the time of travel of some cars has
significantly decreased, and for the rest of the cars remained almost unchanged
(difference to 0.5 s). So, the program is workable and the goal is achieved. For this
purpose, the most active part of it was chosen, which creates the greatest discomfort for
the participants of the traffic movement. In particular, a program implementing one of
the methods for solving congestion problems was developed. Motivation of the
driver's actions determines the place, time and way of movement. Each driver individually
decides whether he needs to go this or that way, or whether he relies on minimizing
fuel costs or time. Therefore, to avoid the influence of the human factor on the
movement of vehicles, this program works with unmanned cars. When planning a
route to your destination, an unmanned car determines the shortest path. However,
with obstacles such as traffic jams, this path may cause significant delays. The
program is also designed to schedule commuting trains, minimizing the time for which
the vehicle will arrive at destination.
The program works with Unity, where we set the number of vehicles that will move,
and the locations of their movement and destination will be read from the statistics
stored in the database of the traffic information system of the big city. Then the cars
are moving according to the traffic rules, and taking into account the traffic lights.
When detecting a significant number of vehicles at an intersection (intersection), the
car according to the Dijkstra algorithm is looking for a shorter route, bypassing the
overloaded road. Vehicle movement stops when the planned place is reached. The
program is called by executing executable file (with extension .exe).</p>
        <p>The input data is the number of cars that will move on the map (the starting points
and destinations of each of the cars are indicated in Unity) and the choice of motion
algorithm or not. The starting point is the actual traffic of cars on the map, which
shows the fastest route itself.
5</p>
      </sec>
      <sec id="sec-50-2">
        <title>Conclusion</title>
        <p>The work of predecessors was highlighted and issues remained unpublished and those
that require further research. Then a systematic analysis of the functioning of the
system was performed, the purpose of the system was specified by constructing a goal
tree, the main variants of its achievement were given by decomposition to aspects,
sub-aspects and criteria for evaluating the quality of implementation. Next, a
hierarchy of data flow diagrams was constructed, which, with a sufficient degree of detail,
describes the processes of the functioning of the IP, the links between them and the
information necessary for the successful operation in the context of the selected type
of IP. On the basis of DFD a task hierarchy is constructed taking into account the
sequence of their execution. The main characteristics, methods of problem solving,
methods of presentation of knowledge, software, system and auxiliaries, which are
used in work for construction of mechanisms of choice of the optimal route of a
detour passage, are given. The description and analysis of methods for solving the
problem with congestion is presented, as well as for the implementation of the C #
language and the Unity tool for developing a graphical interface for working with the
map and unmanned cars. The composition, structure, content and functions of the
developed software and the processes of their joint operation were described. The
reference example confirms the working capacity of the development, and the results
of the system's operation correspond to the task. As a result of this work an
information system was developed, the main element of which is the traffic flows of a
large city. The theoretical and methodological provisions and mathematical tools for
performing various types of tasks for managing these flows and improving the
transport network and supporting the state of roads were also researched and
developed.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>You</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ling</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liang</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zimmermann</surname>
          </string-name>
          , R.:
          <article-title>Dynamic urban surveillance video stream processing using fog computing</article-title>
          .
          <source>In: IEEE second international conference on multimedia big data (BigMM)</source>
          ,
          <fpage>105</fpage>
          -
          <lpage>112</lpage>
          . IEEE. (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Ermacora</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toma</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bona</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chiaberge</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Silvagni</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gaspardone</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Antonini</surname>
            ,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>A cloud robotics architecture for an emergency management and monitoring service in a smart city environment (Turin,</article-title>
          <source>Italy: Tech. Rep.)</source>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Banzhaf</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hofer</surname>
          </string-name>
          , R.:
          <article-title>Monitoring urban structure types as spatial indicators with CIR aerial photographs for a more effective urban environmental management</article-title>
          .
          <source>IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing</source>
          <volume>1</volume>
          (
          <issue>2</issue>
          ),
          <fpage>129</fpage>
          -
          <lpage>138</lpage>
          . (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Dr</surname>
          </string-name>
          .
          <source>Henry Lieu: Revised Monograph on Traffic Flow Theory. Transportation Research Board (TRB) Special Report 165, "Traffic Flow Theory"</source>
          (
          <year>2001</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Hoogendoorn</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Knoop</surname>
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Traffic flow theory and modeling</article-title>
          .
          <source>Edward Eldar Publishing</source>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Georgian</surname>
            ,
            <given-names>M. I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Myroniuk</surname>
            ,
            <given-names>V. V.</given-names>
          </string-name>
          :
          <article-title>Decoding the species composition of forest plantations according to satellite imagery Sentinel-2. Forestry and landscape gardening</article-title>
          , http://nbuv.gov.ua/UJRN/licgoc_2017_
          <volume>11</volume>
          _
          <fpage>6</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Golej</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Adamuscin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>The overview of green building sector in Slovakia</article-title>
          .
          <source>In: EAI Endorsed Transactions on Energy Web</source>
          <volume>19</volume>
          (
          <issue>23</issue>
          ): e8. https://eudl.eu/pdf/10.4108/eai.13-
          <fpage>7</fpage>
          -
          <year>2018</year>
          .158874.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Fonstad</surname>
            ,
            <given-names>M. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dietrich</surname>
            ,
            <given-names>J. T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Courville</surname>
            ,
            <given-names>B. C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jensen</surname>
            ,
            <given-names>J. L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Carbonneau</surname>
            ,
            <given-names>P. E.</given-names>
          </string-name>
          :
          <article-title>Topographic structure from motion: a new development in photogrammetric measurement</article-title>
          .
          <source>Earth Surface Processes and Landforms</source>
          <volume>38</volume>
          (
          <issue>4</issue>
          ),
          <fpage>421</fpage>
          -
          <lpage>430</lpage>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Hahanov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gharibi</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Litvinova</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chumachenko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ziarmand</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Englesi</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          , ...,
          <string-name>
            <surname>Khakhanova</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Cloud-Driven Traffic Monitoring and Control Based on Smart Virtual Infrastructure (</article-title>
          <year>2017</year>
          -01-0092).
          <source>In: SAE Technical Paper</source>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kochan</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kharchenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Roth</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yatskiv</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chernyshov</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , ...,
          <string-name>
            <surname>Fesenko</surname>
          </string-name>
          , H.:
          <article-title>Mobile Post-Emergency Monitoring System for Nuclear Power Plants</article-title>
          . In: ICTERI,
          <fpage>384</fpage>
          -
          <lpage>398</lpage>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Jurgen R. K</surname>
          </string-name>
          .:
          <article-title>Autonomous Vehicles for Safer Driving</article-title>
          . In:SAE International (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <article-title>Scanning trees will help them weigh and detect carbon content: https://ukurier</article-title>
          .gov.ua/uk/news/skanuvannya-derev
          <article-title>-dopomozhe-yih-zvazhuvati-ta-viya/.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <article-title>How big data and drones can save Ukrainian forests</article-title>
          : http://texty.org.ua/pg/blog/nartext/read/76201/Jak_big
          <article-title>_data_i_drony_mozhut_vratuvaty.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Song</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Huang</surname>
            ,
            <given-names>C. T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ye</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          :
          <article-title>Smart urban surveillance using fog computing</article-title>
          .
          <source>In: 2016 IEEE/ACM Symposium on Edge Computing (SEC)</source>
          ,
          <fpage>95</fpage>
          -
          <lpage>96</lpage>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Zdebskyi</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Demchuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krylyshyn</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>An Application Development for Recognizing of View in Order to Control the Mouse Pointer</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , vol
          <volume>2386</volume>
          , pp.
          <fpage>55</fpage>
          -
          <lpage>74</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mykhailyshyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kohut</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Intelligent system of a smart house</article-title>
          .
          <source>In: 3rd International Conference on Advanced Information and Communications Technologies, AICT</source>
          , pp.
          <fpage>282</fpage>
          -
          <lpage>287</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Emmerich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yevseyeva</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fernandes</surname>
            ,
            <given-names>V. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dosyn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Preface: Modern Machine Learning Technologies and Data Science (MoMLeT&amp;DS2019)</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , vol
          <volume>2386</volume>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sharonova</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hamon</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cherednichenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grabar</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>KowalskaStyczen</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Preface: Computational Linguistics and Intelligent Systems (COLINS-</article-title>
          <year>2019</year>
          ).
          <source>In: CEUR Workshop Proceedings</source>
          , vol
          <volume>2362</volume>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , ,
          <string-name>
            <surname>Stefanchuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Oborska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lozynska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mykich</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Basyuk</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rzheuskyi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Development of mobile application for choreographic productions creation and visualization</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          ,
          <volume>2386</volume>
          ,
          <fpage>340</fpage>
          -
          <lpage>358</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Information Encryption Based on the Synthesis of a Neural Network and AES Algorithm</article-title>
          .
          <source>In: 3rd International Conference on Advanced Information and Communications Technologies, AICT</source>
          <year>2019</year>
          ,
          <volume>447</volume>
          -
          <fpage>450</fpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>