Loading…

The identification of traffic crash hot zones under the link-attribute and event-based approaches in a network-constrained environment

•The link-attribute and event-based approaches in identifying hot zones are explained.•A systematic comparison of hot zone results under the two approaches ismade.•603 simulated patterns of traffic crashes on three road structures are conducted.•30,490 traffic crashes in Hong Kong are analyzed using...

Full description

Saved in:
Bibliographic Details
Published in:Computers, environment and urban systems environment and urban systems, 2013-09, Vol.41, p.249-261
Main Authors: Loo, Becky P.Y., Yao, Shenjun
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:•The link-attribute and event-based approaches in identifying hot zones are explained.•A systematic comparison of hot zone results under the two approaches ismade.•603 simulated patterns of traffic crashes on three road structures are conducted.•30,490 traffic crashes in Hong Kong are analyzed using the two approaches. In the spatial analysis of road traffic crashes, a hot zone methodology explicitly uses the network contiguity of more than one road segment as a criterion in identifying crash clusters. In this paper, 603 simulated patterns of traffic crashes in three simplified hypothetical networks and the empirical crash pattern in Hong Kong from 2008 to 2010 (with a total of 30,490 traffic crashes on 1090km of roads) are analyzed using the link-attribute approach and the network-constrained event-based approach. Procedures for identifying hot zones using statistical thresholds are developed. This paper represents the first systematic comparison of hot zone results using these two different approaches. The results suggest that the link-attribute approach and network-constrained event-based approach are usually consistent but there are major differences between the two approaches.
ISSN:0198-9715
1873-7587
DOI:10.1016/j.compenvurbsys.2013.07.001