Patent classifications
B61L15/00
Autonomous optimization of intra-train communication network
A system for dynamically adjusting a configuration of an intra-train communication network includes an electronic device and a computer-readable storage medium. The computer-readable storage medium has one or more programming instructions that, when executed, cause the electronic device to receive one or more parameters values associated with a train consist, determine whether a potentially adverse condition that would affect intra-train communication for the train consist is anticipated based on at least a portion of the received parameters, in response to determining that the potentially adverse condition is anticipated, identify one or more updated network parameter settings that will assist in maintaining intra-train communication of the train consist during an occurrence of the potentially adverse condition by executing a machine learning model, and implement the identified one or more updated network parameter settings.
METHODS AND SYSTEMS FOR WORKER PROTECTION SYSTEM WITH ULTRA-WIDEBAND (UWB) BASED ANCHOR NETWORK
Systems and methods are provided for worker protection system with ultra-wideband (UWB) based anchors. One or more wayside units placed on or near a track may be configured to form a work zone network, based on ultra-wideband (UWB) communications, corresponding to a work zone in an area surrounding or in proximity to the one or more wayside units. When the work zone network is formed, at least one wayside unit of the one or more wayside units may be configured to obtain ranging information to a train traversing the track, based on communications of UWB signals with at least one train-mounted unit deployed on the train, and the one or more wayside units are configured to generate, based on the ranging information, notifications relating to the train and/or the work zone.
METHOD FOR IDENTIFYING AND VERIFYING CONTROL SOFTWARE OF A RAIL VEHICLE
A method identifies and verifies control software of a rail vehicle. In the method, the control software is formed by functions, with each function fulfilling an associated task. As a networked collective, the functions form the structure of the control program. A function-dependent checksum is generated for each function. A structure-dependent checksum is generated for the structure. A total checksum is generated for the control software from the function-dependent checksums and the structure-dependent checksum. This total checksum identifies and verifies the control software for homologation in a country.
SELF-MONITORING SYSTEM AND METHOD
A self-monitoring system is disclosed. The self-monitoring system may include: a control unit that receives and processes a monitoring signal for monitoring of an operating system; a power unit for supplying default power to the control unit; a communication unit that transmits, to a server unit, at least a portion or all of the monitoring signal processed by the control until; and a watchdog unit that monitors the supply of the default power and the operation of the control unit and, when it is detected that there is an abnormality in the supply of the default power or the operation of the control unit, and blocks data transmission to the server unit via the communication unit. In addition, a self-monitoring method to be applied to a self-monitoring system is disclosed.
VEHICLE CONTROL SYSTEM
A vehicle control system is provided and may include a sensor that may measure an acceleration and a displacement of a vehicle during movement of the vehicle. The system may include one or more processors that can examine the acceleration and the displacement to identify an abnormal condition of the vehicle that includes an instability condition and/or a derailment condition of the vehicle. The processors may identify the instability condition responsive to the acceleration that is measured being no greater than an acceleration threshold and the displacement that is measured being no greater than a displacement threshold. The processors may identify the derailment condition responsive to the acceleration that is measured being greater than the acceleration threshold and the displacement that is measured being greater than the displacement threshold.
Vehicle travel planning constrained by probe vehicle data
A system includes one or more processors that are configured to obtain a constraint on movement for a first vehicle system along a route. The constraint is based on movement of a separate second vehicle system that is concurrently traveling along the same route. The processor(s) are configured to determine a speed profile that designates speeds for the first vehicle system according to at least one of distance, location, or time based on the constraint such that the first vehicle system maintains a designated spacing from the second vehicle system along the route.
Train system monitoring
An on board unit (OBU) of a train may determine that a trip or shift has ended and may initiate a train log-off procedure. The OBU may monitor for at least one alert condition during performance of the log-off procedure, the at least one alert condition comprising a condition wherein unauthorized train movement is possible. In response to detecting the at least one alert condition, the OBU may report the at least one alert condition and disable the train log-off procedure until the OBU determines that the at least one alert condition is resolved. In response to failing to detect the at least one alert condition and/or in response to determining that the at least one alert condition is resolved, the OBU may complete the train log-off procedure.
Vehicle control system
Provided is a computer-implemented method for determining a communication status in a train consist operating in a distributed power system, the train consist including a lead locomotive and a plurality of remote locomotives. The method includes, for each remote locomotive of the plurality of remote locomotives that receives the command message directly from the lead locomotive, setting the message source indicator of the remote locomotive to a first state representative of a direct receipt of the command message, incrementing the message source counter for each response message received by the remote locomotive from other remote locomotives in which the respective message source indicator is set to the first state, generating a response message including a value of the message source indicator and a value of the message source counter, and transmitting the response message. A system and computer program product are also disclosed.
Method for wagon-to-wagon communication, method for controlling integrity of a train and train wagon
A method for wagon-to-wagon communication between wagons of a train is disclosed. The train includes a first train wagon and at least one further train wagon, the first train wagon having a first transmitter/receiver device, and the further train wagon having a further transmitter/receiver device. The first transmitter/receiver device sends a request message using short distance communication. The further transmitter/receiver device sends an acknowledgement to the first transmitter/receiver device using short distance communication. The first transmitter/receiver device sends a first identification code identifying the first train wagon to the further train wagon. A method for checking train integrity and a train wagon is also disclosed.
Cyber security anonymizer
A cyber security system for providing security to a railway, the system comprising: a data monitoring and processing hub; a network comprising a plurality of data collection agents synchronized to a same network clock and configured to monitor railway infrastructure devices and onboard devices of rolling stock having a train communication network (TCN), and forward monitored data to the hub for processing by the hub to detect anomalies in railway operation that are indicative of a cyber-attack; at least one anonymizer configured to scrub information items from data that the hub receives from a data collection agent of the plurality of data collection agents which may be used to identify the cyber security system or the railway for which the system provides security.