Wayside Detection: Component Interactions and Composite Rules

Author(s):  
Hark Braren ◽  
Michael Kennelly ◽  
Erik Eide

Every day railcars are setout for repair based on wayside detector absolute alarm limits. These alarms successfully identify most of the cars capable of causing derailments. There would be thousands of additional cars set out if these absolute alarms were lowered to the levels required to remediate the remaining cars capable of causing derailments. The rail industry cannot tolerate this level of setouts, nor can it tolerate derailments. A more focused approach is required. BNSF has developed a Composite Rules Engine (CRE), which combines and evaluates the data currently gathered by each individual wayside detection system. It is capable of pin-pointing the worst of the worst among the remaining cars exhibiting elevated detector readings. CRE provides BNSF the means of bridging its stand alone detection systems to provide one centralized alarming system. The CRE is able to combine the separate rule flows of: Acoustic Bearing Detectors (ABD), Machine Vision Systems (MVS), Truck Hunting Detectors (THD), Truck Performance Detectors (TPD), Hot Bearing Detectors (HBD), a Warm Bearing Detection System (WBDS), Hot / Cold Wheel Detectors (HW) and Wheel Impact Load Detectors (WILD). In summary, CRE targets cars with multiple low level indications that, individually, are of little concern, but collectively have the potential to cause derailments.

Sensors ◽  
2021 ◽  
Vol 21 (8) ◽  
pp. 2674
Author(s):  
Qingying Ren ◽  
Wen Zuo ◽  
Jie Xu ◽  
Leisheng Jin ◽  
Wei Li ◽  
...  

At present, the proposed microwave power detection systems cannot provide a high dynamic detection range and measurement sensitivity at the same time. Additionally, the frequency band of these detection systems cannot cover the 5G-communication frequency band. In this work, a novel microwave power detection system is proposed to measure the power of the 5G-communication frequency band. The detection system is composed of a signal receiving module, a power detection module and a data processing module. Experiments show that the detection frequency band of this system ranges from 1.4 GHz to 5.3 GHz, the dynamic measurement range is 70 dB, the minimum detection power is −68 dBm, and the sensitivity is 22.3 mV/dBm. Compared with other detection systems, the performance of this detection system in the 5G-communication frequency band is significantly improved. Therefore, this microwave power detection system has certain reference significance and application value in the microwave signal detection of 5G communication systems.


2021 ◽  
pp. 004051752110342
Author(s):  
Sifundvolesihle Dlamini ◽  
Chih-Yuan Kao ◽  
Shun-Lian Su ◽  
Chung-Feng Jeffrey Kuo

We introduce a real-time machine vision system we developed with the aim of detecting defects in functional textile fabrics with good precision at relatively fast detection speeds to assist in textile industry quality control. The system consists of image acquisition hardware and image processing software. The software we developed uses data preprocessing techniques to break down raw images to smaller suitable sizes. Filtering is employed to denoise and enhance some features. To generalize and multiply the data to create robustness, we use data augmentation, which is followed by labeling where the defects in the images are labeled and tagged. Lastly, we utilize YOLOv4 for localization where the system is trained with weights of a pretrained model. Our software is deployed with the hardware that we designed to implement the detection system. The designed system shows strong performance in defect detection with precision of [Formula: see text], and recall and [Formula: see text] scores of [Formula: see text] and [Formula: see text], respectively. The detection speed is relatively fast at [Formula: see text] fps with a prediction speed of [Formula: see text] ms. Our system can automatically locate functional textile fabric defects with high confidence in real time.


Author(s):  
Nicole Gailey ◽  
Noman Rasool

Canada and the United States have vast energy resources, supported by thousands of kilometers (miles) of pipeline infrastructure built and maintained each year. Whether the pipeline runs through remote territory or passing through local city centers, keeping commodities flowing safely is a critical part of day-to-day operation for any pipeline. Real-time leak detection systems have become a critical system that companies require in order to provide safe operations, protection of the environment and compliance with regulations. The function of a leak detection system is the ability to identify and confirm a leak event in a timely and precise manner. Flow measurement devices are a critical input into many leak detection systems and in order to ensure flow measurement accuracy, custody transfer grade liquid ultrasonic meters (as defined in API MPMS chapter 5.8) can be utilized to provide superior accuracy, performance and diagnostics. This paper presents a sample of real-time data collected from a field install base of over 245 custody transfer grade liquid ultrasonic meters currently being utilized in pipeline leak detection applications. The data helps to identify upstream instrumentation anomalies and illustrate the abilities of the utilization of diagnostics within the liquid ultrasonic meters to further improve current leak detection real time transient models (RTTM) and pipeline operational procedures. The paper discusses considerations addressed while evaluating data and understanding the importance of accuracy within the metering equipment utilized. It also elaborates on significant benefits associated with the utilization of the ultrasonic meter’s capabilities and the importance of diagnosing other pipeline issues and uncertainties outside of measurement errors.


Author(s):  
Renan Martins Baptista

This paper describes procedures developed by PETROBRAS Research & Development Center to assess a software-based leak detection system (LDS) for short pipelines. These so-called “Low Complexity Pipelines” are short pipeline segments with single-phase liquid flow. Detection solutions offered by service companies are frequently designed for large pipeline networks, with batches and multiple injections and deliveries. Such solutions are sometimes impractical for short pipelines, due to high cost, long tuning procedures, complex instrumentation and substantial computing requirements. The approach outlined here is a corporate approach that optimizes a LDS for shorter lines. The two most popular implemented techniques are the Compensated Volume Balance (CVB), and the Real Time Transient Model (RTTM). The first approach is less accurate, reliable and robust when compared to the second. However, it can be cheaper, simpler, faster to install and very effective, being marginally behind the second one, and very cost-efective. This paper describes a procedure to determine whether one can use a CVB in a short pipeline.


2006 ◽  
Vol 44 (3) ◽  
pp. 181-187 ◽  
Author(s):  
Ta-Te LIN ◽  
Chung-Fang CHIEN ◽  
Wen-Chi LIAO ◽  
Kuo-Chi CHUNG ◽  
Jen-Min CHANG

2018 ◽  
Vol 7 (2.4) ◽  
pp. 10
Author(s):  
V Mala ◽  
K Meena

Traditional signature based approach fails in detecting advanced malwares like stuxnet, flame, duqu etc. Signature based comparison and correlation are not up to the mark in detecting such attacks. Hence, there is crucial to detect these kinds of attacks as early as possible. In this research, a novel data mining based approach were applied to detect such attacks. The main innovation lies on Misuse signature detection systems based on supervised learning algorithm. In learning phase, labeled examples of network packets systems calls are (gave) provided, on or after which algorithm can learn about the attack which is fast and reliable to known. In order to detect advanced attacks, unsupervised learning methodologies were employed to detect the presence of zero day/ new attacks. The main objective is to review, different intruder detection methods. To study the role of Data Mining techniques used in intruder detection system. Hybrid –classification model is utilized to detect advanced attacks.


Sign in / Sign up

Export Citation Format

Share Document