Next Article in Journal
Intelligent Control Characteristics and Development of Highway Tunnel Lighting Environment in China
Previous Article in Journal
Enhancement of a Simple, Economic and Eco-Friendly Analytical Approach for the Extraction and Determination of Endocrine Disruptors from Plastics in Shrimp
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Travel Characteristics and Vulnerability Analysis of Road Resource Utilization Based on Taxi GPS Data

1
School of Architecture, Tianjin University, Tianjin 300072, China
2
ZJU-STEC Urban Development and Planning Innovation Joint Research Center, Zhejiang University, Hangzhou 310058, China
3
Tongji University, Shanghai 200092, China
4
School of Civil Engineering and Transportation, Northeast Forestry University, Harbin 150040, China
*
Author to whom correspondence should be addressed.
Sustainability 2024, 16(14), 5979; https://doi.org/10.3390/su16145979
Submission received: 11 June 2024 / Revised: 7 July 2024 / Accepted: 8 July 2024 / Published: 12 July 2024

Abstract

:
Residents’ travel and logistics are greatly affected by urban transportation networks, which are one of the most important supports for urban socio-economic activities. Urban transportation systems tend to cripple when faced with challenges such as natural hazards and social unrest. This paper proposes a framework for a vulnerability analysis of urban road networks (URNs) based on real traffic flows with GPS data. An improved K-shell critical node identification method is proposed based on structural and traffic characteristics. Then, a cascade failure model is proposed to analyze the structural and functional vulnerability of the URN by combining the load capacity model and the vulnerability model. This paper takes the Harbin main city URN as an example and first analyzes the passenger travel distribution and the relationship between travel orders, population and POI. Four deliberate attack methods are proposed to analyze the vulnerability of the URN under deliberate attack on commute days and rest days. The experimental results show that URNs exhibit intense vulnerability, with the fastest cascading failure occurring based on improved K-shell node failure. Furthermore, URNs are more vulnerable on rest days compared to commuter days. These findings could be used to inform a vulnerability-based spatiotemporal design of UBNs and provide theoretical support for managing traffic congestion on different days.

1. Introduction

Urban road networks (URNs) carry the daily lives of city dwellers and the activities of urban transport, which constitutes the physical vehicles that carry all urban transport activity. Transport networks are susceptible to various disruptions, such as infrastructure failures and temporary closures due to construction works. More severe disruptions, such as strikes or extreme weather conditions (e.g., droughts, heavy snow, and high winds), could lead to the partial unavailability of transport networks. The incident is likely to cause queues of vehicles in the affected section and sudden changes in the distribution of traffic flows in the URNs. It is also possible that the incident will cause cascading failures of nearby road sections, leading to widespread network paralysis. Therefore, in addition to the increasing conflict between supply and demand, URNs have to bear the potential risk of congestion caused by unexpected events.
The URNs are complex networks consisting of physical road networks and transport demand networks. URNs are typical examples of complex dynamic networks, characterized by network nodes, representing locations, and network connected edges, representing the adjacency relationship created by the line. Traffic flow in the transport demand network reflects how vehicles move along the road, which is a transport phenomenon associated with the URN. However, junctions and segments of the URNs are located in different places with different levels of importance. Therefore, it is very important to evaluate the importance of roads and intersections in the road network. It helps in finding weak roads and junctions in the road network. The identification of critical roads and intersections is important in terms of urban congestion relief, emergency response plans, and urban traffic planning and management.
To effectively analyze the importance of nodes in urban road networks, researchers have proposed identifying key nodes based on their vulnerability. Leveraging complex network theory, the analysis focuses on urban road networks. However, in actual road networks, the significance of nodes is influenced not only by the network structure but also by critical factors such as geographical location and traffic characteristics. Most existing studies have primarily examined differences in network structure based on characteristic models of road networks, often overlooking the crucial aspects of traffic characteristics and geographical location. The data generated by taxis provide a rich source of information that can be used to understand mobility in cities, as taxis usually have a more ample coverage of routes in a city. The data usually consist of GPS traces as well as ridership information that, when compared to traditional approaches to collecting data (namely travel surveys), provide more accurate and accessible information to describe the movements and discover mobility patterns. To name a few of the uses, the availability of GPS data has allowed researchers to critically analyze section identification [1], collaborative public transportation [2], travel characteristics [3], etc.
Therefore, to address the aforementioned gap, this paper proposes an improved K-shell model that incorporates both the structural characteristics of the URN (node degree and node betweenness) and traffic characteristics (node intensity, number of POIs, and average road width) to identify key stations within the network. This comprehensive approach aims to enhance the accuracy and reliability of pinpointing critical nodes by considering a broader range of influential factors. To construct a weighted URN for commuter days and rest days, traffic flows are allocated by a user equilibrium model based on daily travel demand differences on city streets. Then, the vulnerability of weight URNs is analyzed under deliberate attacks by comparing the cascade failure process.
The remainder of this paper is organized as follows. Section 2 presents a comprehensive relevant literature review. The feature analysis based on taxi GPS is described in Section 3. Section 4 presents the proposed methodology in detail. Section 5 analyzes the weighted URNs for commuting days and rest days. Finally, discussions are presented in Section 6.

2. Related Work

Complex networks have been an extensive research focus over the past 20 years. In 1998, Watts published the issue of ‘Small World’ in Nature and, in 1999, Barabási [4] published the issue of ‘Scale Free’ in Science; research on the structure and properties of complex networks is drawing more and more attention and has penetrated mathematics, computer science, sociology, traffic network [5], power networks [6], etc. The robustness of networks has been studied widely in the transportation field, such as road networks, maritime networks, subway networks [7], and bus transit networks [8,9]. The concept of vulnerability can measure the performance of networks. In transportation systems, vulnerability is often defined as susceptibility to events that could lead to reduced network availability [10].
A robust transportation network facilitates the movement of passengers, goods, and services and contributes to a thriving economy. Vulnerability has also taken on a different meaning in URNs. Jenelius et al. [11] argue that the concept of vulnerability with respect to road infrastructure should address two components: the probability of hazard occurrence and the consequences of the hazard event. Furthermore, Jenelius and Mattsson [12] state that the impact on a single user depends on their exposure to the disruption scenario. Berdica [13] defines vulnerability more specifically as “the susceptibility to incidents that can result in considerable reductions in road network serviceability.” Wen et al. [14] evaluated the urban road network in terms of layout and internal structure based on fractal analysis, analyzing the relationship between the length of the URN and the built-up area. Moreover, Taylor [15] defines network vulnerability in terms of the ease of access to activities from different locations within a regional network.
The URNs have heterogeneous traffic distribution. Jiang’s research showed that a few roads carry the most traffic flow [16]. However, these roads often have more severe consequences following failures and disruptions. However, identifying critical elements in the network is a crucial part of vulnerability analysis and designing resilient transportation systems [17]. According to network science, there are various methods for measuring the importance of nodes in complex networks, such as the degree centrality, betweenness centrality, closeness centrality [18,19,20], etc. Many researchers have quantified the vulnerability of UBNs using essential infrastructure recognition methods [21,22]. Sohn [21] analyzed the vulnerability of the road network following the disruption of critical links by considering the effects of distance decay and traffic volume on the traffic network. Ricci curvature [23] is used to study the topological characteristics of road networks by measuring the transmission state between nodes through an optimal transmission metric. Jenelius and Mattsson [12] analyzed the vulnerability of URNs under single link closures and area-covering disruptions by combining spatial patterns with regional variations in geographic location, travel patterns, and network density. Lu [24] considered the alignment and type of roads in the URNs and studied the vulnerability of URNs concerning traffic demand.
In actuality, the topological model does not properly reflect traffic flow dynamics. The URNs are the skeleton of the overall urban planning layout, which can provide safe, rapid, economical, and comfortable driving conditions for all kinds of transportation. Traffic flow refers to the flow generated by vehicles traveling in the URN. The study of traffic flow is generally divided into macroscopic traffic flow [25] and microscopic traffic flow [26]. It is therefore possible to simulate a more realistic road traffic network by using a traffic flow model that considers route choice and travel costs. In order to construct a weighted transportation network, traffic assignment is essential. Commonly used traffic flow allocation models include all or nothing [25], multi-road logit [9], system optimum [27], and user equilibrium [28]. The system optimum and user equilibrium models, which take capacity and congestion into account, have gained more attention in the vulnerability analysis of urban traffic networks [29]. Traffic flow allocation models based on user equilibrium models can be used to determine the most severe congestion failure segments [30].
While the cascading impacts from targeted attacks on road infrastructures are mainly unknown, researchers have also conducted numerous studies to quantify weighted network vulnerability. Zhang and Wang [22] developed a metric for road network capacity performance following natural hazards, and they discussed improving resilience by strengthening existing roads and strategic new constructions. He et al. [31] developed a multi-linked freight network and found that traffic impacts vulnerability differently. Wang et al. [32] propose a novel framework for analyzing the vulnerability of URNs based on the tracks of real taxis. Due to changes in the structure and capacity of the network, travelers’ planned travel routes will change in the event that weighted URNs fail, reducing the efficiency of their trips. Therefore, in addition to quantifying road network vulnerability to hazards, it is also vital to understand cascading vulnerability in the underlying road traffic network [26]. Wu et al. [33] analyzed the spatial and temporal patterns of cascading failures in URNs during real rainstorms. They used the relationship between degrees of centrality as a measure of road loading and investigated the spatial correlation between URN vulnerability and cascading failures. Jia et al. [34] proposed a cascading failure model to analyze the propagation of failures in URNs, providing guidance for planning freight routes during emergencies. Wang et al. [35] analyze the vulnerability of URNs to traffic situations at different moments. To measure cascade failure vulnerability, the researchers analyzed the post-failure road network structure, vehicle travel time, and accessibility.
However, the URN is inherently dynamic. Existing studies primarily focus on virtual flow or hypothetical traffic flow based on network topological features, with limited research on dynamic traffic flow modeling using actual data. To address this gap, this paper proposes a comprehensive method to analyze the vulnerability of urban road networks. First, areas with higher densities of order data are identified using GPS. By combining the OD demand matrix and user equilibrium model across different dates, traffic flow within road sections is accurately captured. In defining node importance, this study incorporates critical factors such as population and points of interest (POIs) surrounding the URN. This approach ensures a more realistic and data-driven analysis of node importance in the URN. Furthermore, under three deliberate attacks on three different dates, considering the geographic characteristics of the nodes, the cascade failure vulnerability of the URNs is analyzed.

3. Analysis and Mining of Traffic Features Based on Taxi GPS Tracks

Since the development of urban construction and the advancement of data technology, floating car systems have been established in most Chinese cities. The database receives real-time information about cab locations and passengers when GPS devices are installed in taxis. Since GPS has broad coverage, good continuity, and a low acquisition cost, it is widely used in studies of residential travel characteristics [36,37]. And GPS data from cab trips can provide useful insights into the mobility of city residents. This section analyzes the travel characteristics of residents in the central area of Harbin in terms of taxi order duration time, order number, GPS spatial distribution, and geographically weighted regression, respectively.
In this section, the road network in the main urban area of Harbin City is taken as the study area. The GPS data are the trajectory data of 2000 taxis every 30 s throughout the day on 14 April 2019 (rest day) and 17 April 2019 (commute day) provided by Harbin City Transportation Bureau; each record includes the vehicle number, time, latitude, longitude, speed, and the vehicle status (0 indicates that there is no passenger and 1 indicates that there is a passenger), as shown in Table 1.The GPS data are used to obtain the OD order data for taxis in the main urban area of Harbin City, and the OD orders are obtained by filtering and processing. By filtering and processing the GPS trajectory data, the taxi OD order data are obtained.
(1)
Travel orders per hour
The Taxi OD is the passengers’ origin and destination data and the taxi’s order data. This paper uses GPS data to extract cab order data for the Harbin section during commuter days and rest dates.
In Figure 1 and Figure 2, commuter day and rest day trips are demonstrated according to their time-varying characteristics. The resident trips are divided into 24 periods and moment 0 indicates 00:00 to 01:00. The hours of 03:00–05:00 are the low peak travel for commuting days and rest days. However, peak travel times differ markedly between commuting days and rest days. The morning peak of commuter day travel occurs at 09:00–10:00 and the evening peak occurs at 16:00 and 20:00. The morning peak for travel on rest days is 8:00 and the evening peak appears at 16:00–17:00.
(2)
Duration of order
As can be seen from Figure 3, the majority of taxi rides are less than twenty minutes, demonstrating that Harbin’s taxi rides are mostly short distances according to taxi orders on commuting days and weekends. Commute days have a longer average order duration than weekends, and peak order durations also differ between commute days and weekends. As shown in Figure 3, order durations at 7:00 and 17:00 on commuting days are often significantly higher than at other times, possibly due to traffic congestion.
(3)
Spatial distribution
The geographical distributions of urban travel are examined from two perspectives: GPS spatial distributions and travel OD spatial distributions.
This paper analyzes spatial distribution via a heat map. Figure 4 shows the GPS data for commuting and resting days. GPS points are mainly distributed in the main city of rest days and commuting days, and the difference between different days is slight. Moreover, GPS data contain track points where taxis are empty, so taxi drivers tend to choose areas with high passenger demand, as can be seen in Figure 4.
The spatial distribution of taxi order data on rest days and commuting days is shown in Figure 5. It can be seen that the overall spatial distribution is not distinct for all-day ODs when comparing the spatial distribution of origins and destinations. The extremely strong urban centrality is reflected in the highest travel density in the main area. However, the spatial distribution density of the OD differs slightly. On rest days and commuting days, orders are concentrated in Hehexing Road Street, Haxi Street Office, and Wanggang Town.
(4)
Geographically weighted regression analysis
Geographically weighted regression (GWR) is a statistical analysis model for local parameter estimation. The GWR model provides a better fit for the spatial variation in elements due to its responsiveness to the heterogeneity of the spatial distribution of ingredients compared to the global model [38]. The model structure calculation formula of GWR is as follows:
y i = β 0 ( u i , v i ) + k = 1 p β k u i , v i x i k + ε i
where u i , v i i = 1 , 2 , , n is the coordinates of the geographic center of the traffic zone i. β k u i , v i is the continuous function (the Gaussian of the GWR kernel function is used in this paper), β k u , v are the k regression parameters for traffic zone i, and ε i is the random error term.
Figure 6 depicts the geographically weighted regression between urban travel demand, POI, and population size for commuting days and rest days. The correlation between the variables is indicated by the colored bands. In densely populated areas, morning and evening peaks affect cab ridership differently. It can be seen from the regression analysis that taxi passenger flow is positively correlated with urban core population density, which results in higher levels of travel demand. According to the regression analysis of the morning peak POI and cab passenger flow on rest days, the correlation is lower in the core area. The correlation is more substantial during evening peak hours, which correlates with rest day travel patterns.

4. Evaluation Framework: Vulnerability Analysis Method

The vulnerability analysis framework proposed in this paper consists of four main components. The first step is constructing weighted URNs from the complex network theoretic. Then, utilizing the GPS data extracted in the previous section, OD travel volume on commuting days and rest days are assigned to link the road network. The second step, including the method of node importance assessment based on residents’ travel characteristics, is proposed by combining the population and POI numbers of traffic zones with the method of crucial node identification in complex networks. Lastly, the third step analyzes the characteristics of two different weighted road networks for commuter days and rest days utilizing the structural vulnerability metric. As shown in Figure 7, this section presents a vulnerability analysis framework for analyzing the network vulnerability based on structural and functional assessment indicators.

4.1. Flow Distribution Model

In a real URN, road managers are concerned mainly about the flow changes in road sections, while passengers are instead concerned about the difficulty of travel. The user equilibrium model formalizes the traffic problem by modeling a route choice: passengers complete their journey by choosing a path, l. Flows that occur when each driver minimizes their own travel time are known as user equilibrium flows. It is theoretically impossible for a driver to profit from deviating from their route in the resulting system state. In Wardrop’s principles in transportation, the Nash equilibrium in roads is essentially described: the travel time on all routes used by origin–destination (OD) pairs is equal and is lower than the travel time on any new route experienced by a single vehicle. The flow distribution under the user balance network can be regarded as the flow distribution. The convex program for the user equilibrium problem has been formulated [39] as follows:
min   l L 0 x l t l x d x s . t .   k f k s t = f s t   f k s t 0 , k x l = s t k f k s t δ l , k s t
where L is the set of all links l in a traffic network and t l x l is the link characteristic function that describes the relationship between the travel time t l x l and the passenger flow xl on link l. This paper considers the BPR function as the link characteristic function of MBNs. f k s t is the passenger flow between the original node s and the destination node t on path k, f s t is the total traffic between the original node s and the destination node t, and δ a , k s t = 1 when section l is on path k. The BPR function is as follows:
t l x l = t l 0 1 + α x l c l β
where c l is the capacity of a bus segment l and t l 0 is the free-flow travel time. The α and β are the shape coefficients, the values of which are generally set as α = 0.15 and β = 4.0. Since a simple topological structure ignores the heterogeneity of traffic flows in a traffic network, edge weights are introduced to quantify the distribution of traffic flows through travel times t l x l .

4.2. Critical Node Identification

In Section 3, the distribution of OD orders and the relationship with population and POI were analyzed. Therefore, this section proposes node importance indicators that consider complex network theory and traffic characteristics.
Improving the K-shell algorithm:
The K-shell algorithm traditionally produces a coarse result for node importance division, as a large number of nodes are assigned the same K value, making it difficult to distinguish the importance of nodes within the same layer.
This is based on the results of GWR, which indicate that road intersections exhibit distinct characteristics depending on their structure and traffic conditions. The paper proposes an improved K-shell algorithm that takes into account the structure of the road network and traffic characteristics.
W i = K s + K i
where Wi is the importance of intersection i, Ks is the K-shell value of intersection i, and Ki is the combined characteristic value of intersection i.
The value of intersection comprehensiveness comprises two parts: the structural characteristic index and the traffic characteristic index. The former includes classical metrics in complex networks, such as the node degree and node mediator. The latter is unique to road networks and better able to characterize the actual situation of the intersection, including node strength, number of points of interest, and average road width. The intersection comprehensive characteristic values are defined as follows:
K i = λ K α , i + ( 1 λ ) K β , i
where Kα,i is the intersection structural characteristic index, Kβ,i is the intersection traffic characteristic index, and λ is the coefficient to be determined.
(1) Index of Structural Characteristics. This index calculates the importance of an intersection in terms of its structural characteristics by taking into account the connectivity of the nodes and the number of shortest paths through the nodes. The calculation is as follows:
K α , i = σ d i + ( 1 σ ) B i
where di is the degree of node i, Bi denotes the betweenness of node i, and σ is a coefficient to be determined.
The indicator of node degree represents the number of edges connected to the node and is defined as follows:
d i = i j , j N N e i j
where j is the set of nodes connected to i.
Node betweenness is the ratio of the number of shortest paths through the node to the number of shortest paths in the entire network. Travelers typically choose the shortest path to travel, so the node with the shortest path will have a higher traffic demand. The node betweenness can be calculated as follows:
B i = e m n ( i ) e m n   ,   i m n ; i , m , n A
where emn(i) is the number of shortest paths of the node pair (node m and node n) through node i and emn is the total number of shortest paths between the node pair (node m and node n).
(2) Traffic Characteristic Indicators. Traffic characteristic indicators are calculated by considering node strength based on traffic, number of points of interest (POIs), and population. These indicators are used to evaluate the effectiveness of the intersection in terms of traffic characteristics and the traffic characteristic indicators are calculated as follows:
K β , i = μ 1 M 1 , i + μ 2 M 2 , i + μ 3 M 3 , i
where M1,i is the strength of node i, M2,i is the number of POIs of node i, M3,i is the average population of node i (the number of people in the region where node i is located), and μ1, μ2, and μ3 are coefficients to be determined.
Node strength is calculated as the sum of all edge weights adjacent to the node. In this paper, we selected the traffic of the road adjacent to node i as the node weight. Traffic is a quantitative indicator that characterizes traffic demand and reflects its size. The formula for calculating node strength is as follows:
M 1 , i = q i j   ,   i j ; i , j A
where qij is the flow between node i and node j.
The quantity of M2,i is determined by the number of POIs within a 200 m diameter centered on node i. POIs may indicate the strength of traffic attraction; a higher number of POIs indicates a denser distribution of public service facilities, resulting in a greater volume of trips and an increased likelihood of traffic congestion. We obtained a total of 80,255 POIs, categorized into 14 major and 139 medium categories.

4.3. Cascading Failure Model

The failure of one critical node or component in an urban road network may result in adjacent nodes or edges failing, which will severely collapse the network. The purpose of this section is to analyze the cascade failure characteristics of the weighted road network after failure. The capacity of the node, referred to as the maximum flow tolerance of a station in URNs, can often reflect the collection and dispersion ability [40]. The node capacity on the station of a network is defined as follows:
C ( i ) = ( 1 + α ) F i
Practically, the higher capacity intersection or roadway segment may also carry more traffic, so if the roadway is disrupted, more vehicles will use the higher capacity intersection or segment. The node connected to vj is defined as vk and the increase in traffic flow on edge vj to vk is as follows:
Δ F j k = Δ F i j C j k k = 1 k N e i g h b o r j C j k
where Neighborj is the neighboring nodes of node j and F j k ( t + Δ t ) denotes the traffic flow of F j k after failure occurs; the edge of ejk will be removed from the road network when F j k C j k , max , followed by cascading failure.

4.4. Vulnerability Indicator

The measurement of network operational loss (the degree of network dysfunction after a node or link is disrupted) is a practical tool for analyzing the dynamic performance of URNs over time. Following the node/link disruption, the most significant operational and connected part of the network is considered, where the isolated components of the network can perform partially independently after the disruption of the node or link.
In actual URNs, when there is some intersection congestion or emergency, the connected network will be divided into multiple sub-networks [40]. The sub-network containing the most nodes is known as the maximum giant component graph (MGC):
M G C ( t ) = N ( t ) N
where N(t) represents the number of nodes in MGC under cascading failures and N is the number of nodes in MGC at the beginning.
Network efficiency is calculated as the average of the inverse of the shortest path distances between all of the nodes in the network. This provides an overall measure of efficiency between all pairs of nodes. The global efficiency decreases as the average distance between any two nodes in the network increases. The global efficiency is calculated as follows:
E = 1 N × ( N 1 ) × 1 d i j   ,   i , j V ( i , j )
where E is the network efficiency, N is the total number of nodes in the network, and dij is the shortest path length between node i and node j.

5. Application of the Proposed Methodology

In this section, the URNs of Harbin’s main area are taken as an example to validate the performance of the proposed vulnerability analysis framework. Four deliberate attacks are proposed to simulate emergencies necessitating the method of critical node identification in Section 4.2. Deliberate attacks are based on the highest betweenness node attack (BHA), the maximum degree-based node attack (DMA), the kernel highest degree node attack (KHA), and the improved kernel highest degree node attack (IKHA), respectively.

5.1. Research Area of URNs

By analyzing the density of OD orders in Part III, the order data are mainly distributed in Harbin within the second ring road. Therefore, when studying the vulnerability of the road network, this paper selects the road network within the second ring road as a case study and obtains the road network data within the second ring road in Harbin through Open Street Map (OSM). Based on the fact that the open source data obtained by OSM will deviate from the actual data, we need to pre-process the road network, such as with topology checking, after processing to obtain 3246 road sections and 1960 intersections; the specific study area of the road network is shown in Figure 8.
Taxi GPS trajectory data can reflect the user’s travelling situation and, to a certain extent, it represents the operation status of the whole road network. We used the traffic allocation model in Section 4.1 to allocate traffic volume to each cell, obtaining the traffic flow on each road section and the distribution of traffic volume on weekdays. Figure 9 shows that, as can be seen from the allocation results, the traffic volume is mainly concentrated on urban expressways and main roads, while secondary roads and branch roads bear less traffic volume.

5.2. Vulnerability Analysis of the URN at Different Dates

In this subsection, the weight URNs based on the number of commuting and rest days orders are analyzed under three deliberate attacks.
A comparison of the different attack strategies during the working day shows that E and MGC decrease over time, indicating that the connectivity between nodes deteriorates and that several methods are close to each other in the case of a small number of node failures. After t = 23, the E under IKHA significantly decreases as the time steps increase. The IKHA results outperform BHA results on rest days and network efficiency decreases faster on rest days. In general, IKHA has a higher recognition accuracy than the other methods in the two different traffic conditions: commuting and rest days.
The change curve of the maximum connectivity subgraph ratio cascade failure in the network is shown in Figure 10b,d. Comparing the results of several deliberate attacks on commuting days and rest days, it can be seen that the network maximum connectivity subgraph ratio changes closely follow the trend in network efficiency. Consequently, the number of nodes contained in the maximum connected subgraph decreases with time and the ratio of the maximum connected subgraph decreases as the proportion of removed nodes increases. The network’s maximum connected subgraph ratio changes also show that IKHA is among the most vulnerable methods.

5.3. Vulnerability Analysis of URN with Changing Capacity Parameter (α)

In this subsection, the weight UBNs based on the number of day off orders are analyzed with three deliberate attacks. The vulnerability characteristics of the URN are evaluated as the node capacity parameters change. The network cascade fails the fastest under the improved K-shell attack, as shown in Section 5.1. In this section, we will analyze how network vulnerability changes under IKHS as capacity parameters change.
Figure 11 shows that different capacity parameters, α, have different degrees of influence on the resilience of the URN to destruction. As α increases, the MGC and E decrease more slowly, which decreases the probability of cascading failures in the URN as well as reducing the influence of failed nodes, making the URN more resistant to destruction. Therefore, the node capacity should be appropriately increased based on the daily traffic demand when urban junctions are reconstructed and expanded to reduce the impact of node failure on the URN, thus ensuring the safe operation of urban traffic.

6. Conclusions

The measurement of vulnerability is a critical issue in the field of transportation networks. This paper analyzes the travel characteristics of urban residents on commuter and rest days and the relationship between OD orders and population and POI using GPS data from taxis. The paper proposes a new method for identifying critical nodes based on the geographic features and POI of URNs. Moreover, it utilizes three different indicators to evaluate the importance of nodes in traffic networks based on their structural and functional characteristics. Then, a method for weighing URN construction based on OD orders is proposed to compare and analyze the cascading failure vulnerability characteristics of different weighted road networks on commuter days and rest days. Meanwhile, four malicious attack methods (DMA, BHA, KHA, and IKHA) are proposed to imitate an emergency, utilizing the main urban area of Harbin to demonstrate the feasibility and effectiveness of the model.
The improved IKS algorithm proposed in this paper takes into account the structural and traffic characteristics of the urban road network and puts forward the concept of intersection importance, which is more effective in classifying the importance of intersections than the traditional K-shell algorithm, and makes up for the shortcomings of the traditional K-shell algorithm in identifying the key intersections of the road network.
The result indicates that both weighted networks exhibit intense vulnerability under IKHA by weighting the URN for commuting days and rest days. Consequently, road traffic management should be different on commuter days and rest days, and such segments and intersections should be protected. Traffic management departments can upgrade intersections, restrict traffic flow, adjust signal timing, increase road capacity, and take other appropriate traffic management measures at key intersections. Different strategies for congestion prevention and evacuation can be formulated, according to the specific conditions of the identification results for weekends and holidays when traffic flows fluctuate greatly, in order to maximize the safety and efficiency of road traffic.
The presented approach has some limitations. First, the sample of this study is relatively small. This study estimates the traffic flow on roads by taxi trip data. However, the real traffic flow is mixed and the complexity of its composition and behavior determines that it is quite different from the pure vehicle flow. Thus, a prospective study with large samples is warranted in the future. Second, this paper presents a novel method for the vulnerability analysis of road networks without proposing a measure for improving network vulnerability. Third, this study does not consider real failures such as natural disasters and traffic accidents, although it simulates failure scenarios through random attacks and deliberate attacks.
To further optimize the proposed method, more detailed issues need to be investigated in our future research, such as the vulnerability of networks under the mutual influence of multiple transportation systems and recovery schemes of transportation networks with constrained emergency resources.

Author Contributions

Conceptualization, D.Z. and W.Z.; methodology, W.Z. and D.Z.; software, W.Z.; validation, D.Z. and W.Z.; formal analysis, Z.W.; investigation, D.Z. and W.Z.; resources, D.Z.; data curation, D.Z. and Z.W.; writing—original draft preparation, W.Z. All authors have read and agreed to the published version of the manuscript.

Funding

ZJU-STEC Urban Development and Planning Innovation Joint Research Center Project (Grant No. 513000-I5220A/001).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

No new data were created or analyzed in this study.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Feng, H.; Bai, F.; Xu, Y. Identification of critical roads in urban transportation network based on GPS trajectory data. Phys. A 2019, 535, 122337. [Google Scholar] [CrossRef]
  2. Nam, D.; Hyun, K.; Kim, H.; Ahn, K.; Jayakrishnan, R. Analysis of grid cell–based taxi ridership with large-scale GPS data. Transp. Res. Rec. 2016, 2544, 131–140. [Google Scholar] [CrossRef]
  3. Tang, J.; Liu, F.; Wang, Y.; Wang, H. Uncovering urban human mobility from large scale taxi GPS data. Phys. A 2015, 438, 140–153. [Google Scholar] [CrossRef]
  4. Barabási, A.L.; Albert, R. Emergence of scaling in random networks. Science 1999, 286, 509–512. [Google Scholar] [CrossRef] [PubMed]
  5. Zhang, J.; Wang, M. Transportation functionality vulnerability of urban rail transit networks based on movingblock: The case of Nanjing metro. Phys. A 2019, 535, 122367. [Google Scholar] [CrossRef]
  6. Zhou, D.; Hu, F.; Wang, S.; Chen, J. Power network robustness analysis based on electrical engineering and complex network theory. Phys. A 2021, 564, 125540. [Google Scholar] [CrossRef]
  7. Wang, S.; Lv, W.; Zhang, J.; Luan, S.; Chen, C.; Gu, X. Method of power network critical nodes identification and robustness enhancement based on a cooperative framework. Reliab. Eng. Syst. Saf. 2021, 207, 107313. [Google Scholar] [CrossRef]
  8. Lu, Q.C.; Zhang, L.; Xu, P.C.; Cui, X.; Li, J. Modeling network vulnerability of urban rail transit under cascading failures: A Coupled Map Lattices approach. Reliab. Eng. Syst. Saf. 2022, 221, 108320. [Google Scholar] [CrossRef]
  9. Cats, O.; Koppenol, G.J.; Warnier, M. Robustness assessment of link capacity reduction for complex networks: Application for public transport systems. Reliab. Eng. Syst. Saf. 2017, 167, 544–553. [Google Scholar] [CrossRef]
  10. Hong, L.; Zhong, X.; Ouyang, M.; Tian, H.; He, X. Vulnerability analysis of public transit systems from the perspective of urban residential communities. Reliab. Eng. Syst. Saf. 2019, 189, 143–156. [Google Scholar] [CrossRef]
  11. Jenelius, E.; Petersen, T.; Mattsson, L.G. Importance and exposure in road network vulnerability analysis. Transp. Res. Part A Policy Pract. 2006, 40, 537–560. [Google Scholar] [CrossRef]
  12. Jenelius, E.; Mattsson, L.G. Road network vulnerability analysis: Conceptualization, implementation and application. Comput. Environ. Urban Syst. 2015, 49, 136–147. [Google Scholar] [CrossRef]
  13. Berdica, K. An introduction to road vulnerability: What has been done, is done and should be done. Transp. Policy 2002, 9, 117–127. [Google Scholar] [CrossRef]
  14. Wen, W.; Zhang, W.; Deng, H. Research on urban road network evaluation based on fractal analysis. J. Adv. Transp. 2023, 2023, 9938001. [Google Scholar] [CrossRef]
  15. Taylor, M.A.P. Critical transport infrastructure in Urban areas: Impacts of traffic incidents assessed using accessibility-based network vulnerability analysis. Growth Change 2008, 39, 593–616. [Google Scholar] [CrossRef]
  16. Jiang, B. Street hierarchies: A minority of streets account for a majority of traffic flow. Int. J. Geogr. Inf. Sci. 2009, 23, 1033–1048. [Google Scholar] [CrossRef]
  17. Wang, D.Z.W.; Liu, H.; Szeto, W.Y.; Chow, A.H.F. Identification of critical combination of vulnerable links in transportation networks–a global optimisation approach. Transp. A Transp. Sci. 2016, 12, 346–365. [Google Scholar] [CrossRef]
  18. Zheng, Z.; Huang, Z.; Zhang, F.; Wang, P. Understanding coupling dynamics of public transportation networks. EPJ Data Sci. 2018, 7, 23. [Google Scholar] [CrossRef]
  19. Duan, Y.; Lu, F. Robustness of city road networks at different granularities. Phys. A 2014, 411, 21–34. [Google Scholar] [CrossRef]
  20. Tian, J.; Fang, H.; Wang, Y.; Ren, C. On the degree correlation of urban road networks. Trans. GIS 2018, 22, 119–148. [Google Scholar] [CrossRef]
  21. Sohn, J. Evaluating the significance of highway network links under the flood damage: An accessibility approach. Transp. Res. Part A 2006, 40, 491–506. [Google Scholar] [CrossRef]
  22. Zhang, W.; Wang, N. Resilience-based risk mitigation for road networks. Struct. Saf. 2016, 62, 57–65. [Google Scholar] [CrossRef]
  23. Gao, L.; Liu, X.; Liu, Y.; Wang, P.; Deng, M.; Zhu, Q.; Li, H. Measuring road network topology vulnerability by Ricci curvature. Phys. A 2019, 527, 121071. [Google Scholar] [CrossRef]
  24. Lu, Q.; Xu, P.; Zhang, J. Infrastructure-based transportation network vulnerability modeling and analysis. Phys. A 2021, 584, 126350. [Google Scholar] [CrossRef]
  25. Qian, Z.S.; Li, J.; Li, X.; Zhang, M.; Wnag, H. Modeling heterogeneous traffic flow: A pragmatic approach. Transp. Res. Part B 2017, 99, 183–204. [Google Scholar] [CrossRef]
  26. Hoogendoorn, S.P.; Bovy, P.H.L. State-of-the-art of vehicular traffic flow modelling. Proc. Inst. Mech. Eng. Part I J. Syst. Control. Eng. 2001, 215, 283–303. [Google Scholar] [CrossRef]
  27. Klein, I.; Levy, N.; Ben-Elia, E. An agent-based model of the emergence of cooperation and a fair and stable system optimum using ATIS on a simple road network. Transp. Res. Part C 2018, 86, 183–201. [Google Scholar] [CrossRef]
  28. Zhong, R.; Xiong, J.; Huang, Y.; Zheng, N.; Lam, W.H.; Pan, T.; He, B. Dynamic user equilibrium for departure time choice in the basic trip-based model. Transp. Res. Part C 2021, 128, 103190. [Google Scholar] [CrossRef]
  29. Çolak, S.; Lima, A.; González, M.C. Understanding congested travel in urban areas. Nat. Commun. 2016, 7, 10793. [Google Scholar] [CrossRef] [PubMed]
  30. Starita, S.; Scaparra, M.P. Assessing road network vulnerability: A user equilibrium interdiction model. J. Oper. Res. Soc. 2021, 72, 1648–1663. [Google Scholar] [CrossRef]
  31. He, Z.; Navneet, K.; van Dam, W.; Van Mieghem, P. Robustness assessment of multimodal freight transport networks. Reliab. Eng. Syst. Saf. 2021, 207, 107315. [Google Scholar] [CrossRef]
  32. Wang, S.; Chen, C.; Zhang, J.; Gu, X.; Huang, X. Vulnerability assessment of urban road traffic systems based on traffic flow. Int. J. Crit. Infrastruct. Prot. 2022, 38, 100536. [Google Scholar] [CrossRef]
  33. Wu, Q.; Han, Z.; Cui, C.; Liu, F.; Zhao, Y.; Xie, Z. Vulnerability Identification and Cascading Failure Spatiotemporal Patterns on Road Network under the Rainstorm Disaster. ISPRS Int. J. Geo-Inf. 2022, 11, 564. [Google Scholar] [CrossRef]
  34. Jia, H.; Li, F.; Yang, L.; Luo, Q.; Li, Y. Dynamic cascading failure analysis in congested urban road networks with self-organization. IEEE Access 2020, 8, 17916–17925. [Google Scholar] [CrossRef]
  35. Wang, Z.; Pei, Y.; Liu, J.; Liu, H. Vulnerability analysis of urban road networks based on traffic situation. Int. J. Crit. Infrastruct. Prot. 2023, 41, 100590. [Google Scholar] [CrossRef]
  36. Tang, L.; Kan, Z.; Zhang, X.; Yang, X.; Huang, F.; Li, Q. Travel time estimation at intersections based on low-frequency spatial-temporal GPS trajectory big data. Cartogr. Geogr. Inf. Sci. 2016, 43, 417–426. [Google Scholar] [CrossRef]
  37. Liu, X.; Gong, L.; Gong, Y.; Liu, Y. Revealing travel patterns and city structure with taxi trip data. J. Transp. Geogr. 2015, 43, 78–90. [Google Scholar] [CrossRef]
  38. Brunsdon, C.; Fotheringham, A.S.; Charlton, M.E. Geographically Weighted Regression: A Method for Exploring Spatial Nonstationarity. Geogr. Anal. 2010, 28, 281–298. [Google Scholar] [CrossRef]
  39. Xu, S.; Jiang, W.; Deng, X.; Shou, Y. A modified Physarum-inspired model for the user equilibrium traffic assignment problem. Appl. Math. Model. 2018, 55, 340–353. [Google Scholar] [CrossRef]
  40. Sun, L.; Huang, Y.; Chen, Y.; Yao, L. Vulnerability assessment of urban rail transit based on multi-static weighted method in Beijing, China. Transp. Res. Part A 2018, 108, 12–24. [Google Scholar] [CrossRef]
Figure 1. Number of orders per hour on rest day.
Figure 1. Number of orders per hour on rest day.
Sustainability 16 05979 g001
Figure 2. Number of orders per hour on commute day.
Figure 2. Number of orders per hour on commute day.
Sustainability 16 05979 g002
Figure 3. Order duration between commuting days and rest days.
Figure 3. Order duration between commuting days and rest days.
Sustainability 16 05979 g003
Figure 4. GPS contour map of spatial distribution.
Figure 4. GPS contour map of spatial distribution.
Sustainability 16 05979 g004
Figure 5. OD spatial distribution of order data.
Figure 5. OD spatial distribution of order data.
Sustainability 16 05979 g005
Figure 6. Geographically weighted regression visualization of the number of POI and population with the morning (MP) and evening (EP) peaks of taxi orders. (a) GWR of commuter MP origin and POI. (b) GWR of commuter MP origin and pop. (c) GWR of commuter EP destination and POI. (d) GWR of commuter EP destination and pop. (e) GWR of rest MP origin and POI. (f) GWR of rest MP origin and pop. (g) GWR of rest EP destination and POI. (h) GWR of rest EP destination and pop.
Figure 6. Geographically weighted regression visualization of the number of POI and population with the morning (MP) and evening (EP) peaks of taxi orders. (a) GWR of commuter MP origin and POI. (b) GWR of commuter MP origin and pop. (c) GWR of commuter EP destination and POI. (d) GWR of commuter EP destination and pop. (e) GWR of rest MP origin and POI. (f) GWR of rest MP origin and pop. (g) GWR of rest EP destination and POI. (h) GWR of rest EP destination and pop.
Sustainability 16 05979 g006
Figure 7. The framework of the vulnerability analysis.
Figure 7. The framework of the vulnerability analysis.
Sustainability 16 05979 g007
Figure 8. Harbin second ring road network structure.
Figure 8. Harbin second ring road network structure.
Sustainability 16 05979 g008
Figure 9. Traffic distribution on the road network after traffic assignment.
Figure 9. Traffic distribution on the road network after traffic assignment.
Sustainability 16 05979 g009
Figure 10. Variation in road network performance under different attack strategies.
Figure 10. Variation in road network performance under different attack strategies.
Sustainability 16 05979 g010
Figure 11. Changes in network performance for different α.
Figure 11. Changes in network performance for different α.
Sustainability 16 05979 g011
Table 1. Examples of taxi trip data records.
Table 1. Examples of taxi trip data records.
Vehicle License Plate NumberTimeLngLatOpenStatusSpeed (Km/h)
A00B9T04:38:29126.7030545.7573667016.6
A00B9T04:38:59126.702698345.7583400
A00B9T04:39:29126.702738345.758461708.4
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, W.; Zhai, D.; Wang, Z. Travel Characteristics and Vulnerability Analysis of Road Resource Utilization Based on Taxi GPS Data. Sustainability 2024, 16, 5979. https://doi.org/10.3390/su16145979

AMA Style

Zhang W, Zhai D, Wang Z. Travel Characteristics and Vulnerability Analysis of Road Resource Utilization Based on Taxi GPS Data. Sustainability. 2024; 16(14):5979. https://doi.org/10.3390/su16145979

Chicago/Turabian Style

Zhang, Wei, Duanqiang Zhai, and Ziqi Wang. 2024. "Travel Characteristics and Vulnerability Analysis of Road Resource Utilization Based on Taxi GPS Data" Sustainability 16, no. 14: 5979. https://doi.org/10.3390/su16145979

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop