The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the most important areas of the water utilities is the water quality management. This area is responsible of guaranteeing safety in the water supply to the citizens. The strategy to guarantee the safety is based on two principal elements: disinfection and monitoring. Disinfection techniques, such as chlorination, allow to prevent the growing of microorganisms present in the water. Moreover,...
Vehicle-to-Home (V2H) supposes that electric vehicle (EV) chargers are bidirectionnal. It is necessary to find the best solution to use a bidirectionnal EV charger in a residential installation in terms of safety, availability and cost. This paper shows a method to determine if a residential installation can be supplied by an EV in stand-alone mode, without risk for person safety or availability in...
In this paper, the method of textual analysis is used to discuss main job stress sources of coal miners. On the basis of a textual analysis, work is done to preliminarily sort and identify items of job stress sources of coal miners, learn from existing studies to draw up a questionnaire of coal miners' job stress, and make a reliability and validity analysis. Research results show that coal miners'...
Vehicle platooning using reliable wireless communication between the member vehicles is a promising method to increase road capacity, lower fuel consumption, and improve safety and driver comfort. IEEE 802.11p is a key communication technology in Vehicular Ad-hoc Networks (VANETs) for Intelligent Transport System (ITS) applications. The broadcasted awareness messages in the wireless communication...
Vehicle-to-others (V2X) communication systems intend to increase safety and efficiency of our transportation networks. However, wireless communication imperfections such as missed messages due to collisions and fading in the wireless channel, may affect safety application reliability and lead to risky situations. Thus metrics are required to evaluate the impact of communication inadequacies on the...
Basic safety message(BSM) or heartbeat message is periodically broadcast by each vehicle on the road, conveying vehicle's instantaneous position and driving state. The vehicular communication network enables the fast exchange of BSMs with neighboring vehicles which assists drivers in acquiring the local driving environment and maneuvering promptly in case of any potential hazard. Such message is exceptionally...
A wide variety of mixed digital-physical (cyber-physical) systems with complex and often loosely defined components are now deployed, whose behavior affect our daily lives in significant and sometimes critical ways. Cyber-physical systems (CPS) can provide much richer functionality, efficiency, autonomy, and reliability than manually controlled and loosely coupled systems. However, they also create...
As the recognition of public transport system as a service is growing, the importance of customer satisfaction through enhancing customer experience has drawn more attention. Safety and comfort are mentioned as important aspects of public transport user experience. It is believed that customers' experience is influenced by affective factors experienced through contacts with organisations, such as...
This paper presents a human reliability analysis method based on cognitive process model. Human cognitive processes are modelled in different forms under different risk scenarios respectively. The cognitive process model consists of an event tree based on human cognitive process and Bayesian networks modelling the cognitive phases. The Bayesian networks (combining with evidence theory) use hierarchical...
Unmanned Aerial Vehicles (UAVs) are increasingly demanded in civil, military and research purposes. However, they also possess serious threats to the society because faults in UAVs can lead to physical damage or even loss of life. While increasing their intelligence, for example, adding vision-based sense-and-avoid capability, has a potential to reduce the safety threats, increased software complexity...
Considering the growing demand for railway transportation, especially metros, and the changing social context, regular 24-hour operation is becoming a requirement. The railway is an inherently complicated and complex system and extending the service hours increases the level of difficulty in operating. In order to run all the services safely, punctually and reliably, we have to manage this complexity...
This paper examines the energy consumption of the electric drives and permanent magnet machines considering the actual system performance of machine and variable speed drive. Most common solution in the current trend of elevator technology is permanent magnet synchronous motor with variable frequency drive with direct current voltage bus intermediate. Energy consumption has been understand with actual...
This paper examines the comparison of the electric drives with permanent magnet machines for vertical transportation considering the actual system with adjustable speed drives. Most common application in the recent times of elevator industry is permanent magnet synchronous machine with adjustable frequency drive along direct current bus voltage intermediate. Various System level performance parameters...
With regard to the challenges for CNC system design stemming from the diversity of design requirements, a multi-dimensional integrated design framework is proposed in this paper, which can provide a convenient and efficient way for CNC system design. As an important part of this framework, a modelling language is developed based on IEC 61499 and hierarchical policy. By encapsulating CNC functions...
In DSRC Consortium, a vehicle in the VANET network must be able to communicate with other vehicles with transmission range 10 seconds. Segmentation technique is a technique that divides the distance of the communication transmission range of a vehicle into several segments and do not overlap. There are two segmentation techniques namely uniform and non- uniform. However it does not answer the problem...
In recent years, in-memory key-value storage systems have become more and more popular in solving real-time and interactive tasks. Compared with disks, memories have much higher throughput and lower latency which enables them to process data requests with much higher performance. However, since memories have much smaller capacity than disks, how to expand the capacity of in-memory storage system while...
This paper based on the theory of reliability centered maintenance (RCM) techniques aimed to verify the analysis results obtained by GO-Bayes method. This paper addresses the problem of establishing Monte Carlo simulation model to simulate the braking system. Metro vehicle braking system has been selected as it is one of the most complex and high-technology systems among all devices of train vehicles...
Obtaining Worst-Case Execution Time (WCET) estimates is a required step in real-time embedded systems during software verification. Measurement-Based Probabilistic Timing Analysis (MBPTA) aims at obtaining WCET estimates for industrial-size software running upon hardware platforms comprising high-performance features. MBPTA relies on the randomization of timing behavior (functional behavior is left...
Critical systems are systems that have direct effects on human health and life. Large production systems are an example of the critical system. Safety is a concept that is ubiquitous in our life but has never been clearly defined. A common confusion with safety is that safety is viewed to be the same as reliability. In this paper, we revisit the concept of safety and propose a new approach for design...
This paper introduces the ARM Triple Core Lock-Step (TCLS) architecture, which builds up on the industry success of the ARM Cortex-R5 Dual-Core Lock-Step (DCLS) processor currently used in safety-critical real-time applications. The TCLS architecture adds a third redundant CPU unit to the DCLS Cortex-R5 system to achieve fail functional capabilities and hence increase the availability of the system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.