1 |
The Influence of Speed Variation on Wear-Type Rail Corrugation Formation and GrowthPaul Bellette Unknown Date (has links)
Rail corrugation is a periodic wear pattern that develops on the wheel and rail contacting surfaces in railway systems. It is a commonly observed phenomenon worldwide and is a serious problem because it causes degradation of the track and its components and is a significant source of noise. Currently the only reliable method of ameliorating the negative effects of rail corrugation is to periodically regrind the rail surface to a smooth profile, at great expense to the railway operator. It is therefore of interest to investigate other possible control strategies to reduce corrugation growth through an understanding of the mechanism of corrugation formation. This thesis presents an investigation into the effect of speed variation on the corrugation formation mechanism. The research presented is intended to highlight the significant role that speed variation has on corrugation formation via a disruption of the feedback mechanism which leads to corrugation growth over successive train passages. This discovery motivates the investigation the feasibility of altered speed variation as a novel corrugation control method, due to the large effect that the variance of train speed has on corrugation growth rates. The effect of variable pass speed on corrugation formation has been investigated in this thesis through the use of efficient models of corrugation formation in straight track and cornering conditions. These models are simple enough to readily perform corrugation control studies without neglecting any relevant physics, obscuring the corrugation formation mechanism with overly detailed modelling or imposing a significant computational burden on performing control studies. These novel models have been outlined and their predictions elucidated in detail. A theoretical investigation into the effect of speed variation in the presence of a resonance free mechanism for corrugation growth via a contact filter has been performed and shown to only be important when the dynamic wavelength of formation approaches the size of the contact patch. The results of these corrugation models have been validated via test rig and field experiments. An investigation of the effectiveness of speed variation as a corrugation growth control measure has also been investigated via test rig experiments. The results of this thesis have formed the basis of an industry supported field trail of this technique for corrugation mitigation that is currently in progress.
|
2 |
Review of the effectiveness of vehicle activated signsJomaa, Diala, Yella, Siril, Dougherty, Mark January 2013 (has links)
This paper reviews the effectiveness of vehicle activated signs. Vehicle activated signs are being reportedly used in recent years to display dynamic information to road users on an individual basis in order to give a warning or inform about a specific event. Vehicle activated signs are triggered individually by vehicles when a certain criteria is met. An example of such criteria is to trigger a speed limit sign when the driver exceeds a pre-set threshold speed. The preset threshold is usually set to a constant value which is often equal, or relative, to the speed limit on a particular road segment. This review examines in detail the basis for the configuration of the existing sign types in previous studies and explores the relation between the configuration of the sign and their impact on driver behavior and sign efficiency. Most of previous studies showed that these signs have significant impact on driver behavior, traffic safety and traffic efficiency. In most cases the signs deployed have yielded reductions in mean speeds, in speed variation and in longer headways. However most experiments reported within the area were performed with the signs set to a certain static configuration within applicable conditions. Since some of the aforementioned factors are dynamic in nature, it is felt that the configurations of these signs were thus not carefully considered by previous researchers and there is no clear statement in the previous studies describing the relationship between the trigger value and its consequences under different conditions. Bearing in mind that different designs of vehicle activated signs can give a different impact under certain conditions of road, traffic and weather conditions the current work suggests that variable speed thresholds should be considered instead.
|
3 |
Speed profile variation as a surrogate measure of road safety based on GPS-equipped vehicle dataBoonsiripant, Saroch 06 April 2009 (has links)
The identification of roadway sections with a higher than expected number of crashes is usually based on long term crash frequency data. In situations where historical crash data are limited or not available, surrogate safety measures, based on characteristics such as road geometries, traffic volume, and speed variation are often considered. Most of existing crash prediction models relate safety to speed variation at a specific point on the roadway. However, such point-specific explanatory variables do not capture the effect of speed consistency along the roadway. This study developed several measures based on the speed profiles along road segments to estimate the crash frequency on urban streets. To collect speed profile data, second-by-second speed data were obtained from more than 460 GPS-equipped vehicles participating in the Commute Atlanta Study over the 2004 calendar year. A series of speed data filters have been developed to identify likely free-flow speed data. The quantified relationships between surrogate measures and crash frequency are developed using regression tree and generalized linear modeling (GLM) approaches. The results indicate that safety characteristics of roadways are likely a function of the roadway classification. Two crash prediction models with different set of explanatory variables were developed for higher and lower classification roadways. The findings support the potential use of the profile-based measures to evaluate the safety of road network as the deployment of GPS-equipped vehicles become more prevalent.
|
4 |
A Risk Based Approach to Intelligent Transportation Systems SecurityBakhsh Kelarestaghi, Kaveh 11 July 2019 (has links)
Security threats to cyber-physical systems are targeting institutions and infrastructure around the world, and the frequency and severity of attacks are on the rise. Healthcare manufacturing, financial services, education, government, and transportation are among the industries that are the most lucrative targets for adversaries. Hacking is not just about companies, organizations, or banks; it also includes critical infrastructure. Wireless Sensors Networks, Vehicle-to-everything communication (V2X), Dynamic Message Signs (DMS), and Traffic Signal Controllers are among major Intelligent Transportation Systems (ITS) infrastructure that has already been attacked or remain vulnerable to hacking. ITS has been deployed with a focus on increasing efficiency and safety in the face of dramatic increases in travel demand. Although many studies have been performed and many security primitives have been proposed, there are significant concerns about flawless performance in a dynamic environment. A holistic security approach, in which all infrastructure performs within the satisfactory level of security remains undiscovered. Previously, hacking of road infrastructure was a rare event, however, in recent years, field devices such as DMS are hacked with higher frequency. The primary reason that transportation assets are vulnerable to cyber-attacks is due to their location. A more dramatic scenario occurs when hackers attempt to convey tampered instructions to the public.
Analyzing traveler behavior in response to the hacked messages sign on the basis of empirical data is a vital step toward operating a secure and reliable transportation system. There may be room for improvement by policymakers and program managers when considering critical infrastructure vulnerabilities. With cybersecurity issues escalating every day, road users' safety has been neglected. This dissertation overcomes these challenges and contributes to the nascent but growing literature of Intelligent Transportation System (ITS) security impact-oriented risk assessment in threefold.
• First, I employ a risk-based approach to conduct a threat assessment. This threat assessment performs a qualitative vulnerability-oriented threat analysis. The objective is to scrutinize safety, security, reliability, and operation issues that are prompted by a compromised Dynamic Message Signs (DMS).
• Second, I examine the impact of drivers' attitudes and behaviors on compliance, route diversion behavior, and speed change behavior, under a compromised DMS. We aim to assess the determinants that are likely to contribute to drivers' compliance with forged information. To this extent, this dissertation evaluates drivers' behavior under different unauthentic messages to assess in-depth the impact of an adversarial attack on the transportation network.
• Third, I evaluate distracted driving under different scenarios to assess the in-depth impact of an adversarial attack on the transportation network. To this extent, this dissertation examines factors that are contributing to the manual, visual, and cognitive distractions when drivers encountering fabricated advisory information at a compromised DMS.
The results of this dissertation support the original hypothesis and indicate that with respect to the forged information drivers tend to (1) change their planned route, (2) become involved in distracting activities, and (3) change their choice speed at the presence of a compromised DMS. The main findings of this dissertation are outlined below:
1. The DMS security vulnerabilities and predisposing conditions allow adversaries to compromise ITS functionality. The risk-based approach of this study delivers the impact-likelihood matrix, which maps the adverse impacts of the threat events onto a meaningful, visual, matrix. DMS hacking adverse impacts can be categorized mainly as high-risk and medium-risk clusters. The safety, operational (i.e., monetary losses) and behavioral impacts are associated with a high-risk cluster. While the security, reliability, efficiency, and operational (i.e., congestion) impacts are associated with the medium-risk cluster.
2. Tech friendly drivers are more likely to change their route under a compromised DMS. At the same time, while they are acquiring new information, they need to lowering their speed to respond to the higher information load. Under realistic-fabricated information, about 65% of the subjects would depart from their current route. The results indicate that females and subjects with a higher driving experience are more likely to change their route. In addition, those subjects who are more sensitive to the DMS's traffic-related messages and those who use DMS under congested traffic condition are more likely to divert. Interestingly, individuals with lower education level, Asians, those who live in urban areas, and those with trouble finding their direction in new routes are less likely to pick another route rather the one they planned for.
3. Regardless of the DMS hacking scenarios, drivers would engage in at least one of the distractive activities. Among the distractive activities, cognitive distraction has the highest impact on the distracted driving likelihood. Meaning, there is a high chance that drivers think of something other than driving, look at surrounding traffic and scenery, or talk to other passengers regarding the forged information they saw on the DMS. Drivers who rely and trust in technology, and those who check traffic condition before starting their trips tend to become distracted. In addition, the result identified that at the presence of bogus information, drivers tend to slow down or stop in order to react to the DMS. That is, they would either (1) become involved in activities through the means of their phone, (2) they would mind wander, look around, and talk to a passenger about the sign, and (3) search for extra information by means of their vehicle's radio or internet.
4. Females, black individuals, subjects with a disability, older, and those with high trust in DMS are less likely to ignore the fabricated messages. In contrary, white, those who drive long hours, and those who see driving as a tedious task are more likely to ignore the bogus messages. Drivers who comply with traffic regulations and have a good driving record are likely to slow down under the tampered messages. Furthermore, female drivers and those who live in rural areas are more likely to slow down under fabricated advisory information. Furthermore, this dissertation identifies that planning for alternative route and involvement in distractive activities cause speed variation behaviors under the compromised DMS.
This dissertation is the first to investigate the adverse impact of a compromised DMS on the road users and operators. I attempt to address the current gap in the literature by assessing and evaluating the impact of ITS security vulnerabilities. Broader impacts of this study include (1) to systematically raising awareness among policy-makers and engineers, (2) motivating further simulations and real-world experiments to investigate this matter further, (3) to systematically assessing the adverse impact of a security breach on transportation reliability and safety, and drivers' behavior, and (4) providing insights for system operators and decision-makers to prioritize the risk of a compromised DMS. Additionally, the outcome can be integrated with the nationwide connected vehicle and V2X implementations and security design. / Doctor of Philosophy / Security threats are targeting institutions and infrastructure around the world, and the frequency and severity of security attacks are on the rise. Healthcare manufacturing, financial services, education, government, and transportation are among the industries that are the most lucrative targets for adversaries. Hacking is not just about companies, organizations, or banks; it also includes critical infrastructure. Intelligent Transportation Systems have been deployed with a focus on increasing efficiency and safety in the face of dramatic increases in traffic volume. Although many studies have been performed and many security primitives have been proposed, there are significant concerns about flawless performance in a dynamic environment. A holistic security approach, in which all infrastructure performs within the satisfactory level of security remains undiscovered. Previously, hacking of road infrastructure was a rare event, however, in recent years, field devices, such as dynamic message signs, are hacked with higher frequency. The primary reason that transportation assets are vulnerable to cyber-attacks is that of their location in public. A more dramatic scenario occurs when hackers attempt to convey tampered instructions to the public. Analyzing traveler behavior in response to the hacked messages sign on the basis of empirical data is a vital step toward operating a secure and reliable transportation system. This study is the first to investigate the adversarial impact of a compromised message sign on the road users and operators. I attempt to address the current gap in the literature by assessing and evaluating the impact of ITS security vulnerabilities.
|
5 |
Zlepšení výroby aeronautické součásti / Production improvement of an aeronautical partLaforce, Francois January 2011 (has links)
Since aircrafts manufacturers intend to produce low consumption and efficient aircrafts, parts become more and more difficult to machine. Some processes like „air machining“ enables a one-step production for complex aluminium alloy shaped parts. Although the assembly offers a large access to cutting tool, the lack of stiffness for large parts, and especially for thin-walled aeronautics parts implies strong vibrations during machining. The aim of the study is to solve these difficulties in order to keep productivity and improve surface quality. Further innovative solutions are considered like modal analysis, in-phase machining, spindle speed variation, 3 flutes end mill and variable helix angle mill. All propositions are tested on DMG 65 machine tool with Siemens 840D controller. Although vibrations are intrinsic to flexible parts, surface quality has been improved with higher cutting continuity and variable helix angle cutting tool.
|
Page generated in 0.0902 seconds