Nowadays, rapid technological progress influences the dependability of equipments and also causes rapid obsolescence. The mechatronic and electronic equipment components are mostly affected by obsolescence. A new chal...Nowadays, rapid technological progress influences the dependability of equipments and also causes rapid obsolescence. The mechatronic and electronic equipment components are mostly affected by obsolescence. A new challenger unit possesses identical functionalities, but with higher performances. This work aims to find the optimal number of components which should be replaced by new-type units, under budgetary constraints. In this work, the new challenger unit is characterized by lower energy consumption and the optimization steps are based on genetic algorithm (GA). The result shows the importance of this type of replacement in order to economize energy consumption and to deal with obsolescence.展开更多
Braking system performance is relevant for both railway safety and network optimization. Most trains employ air brake systems;air brake systems of freight trains mostly cannot achieve a synchronous application of brak...Braking system performance is relevant for both railway safety and network optimization. Most trains employ air brake systems;air brake systems of freight trains mostly cannot achieve a synchronous application of brake forces, which is usually customary for passenger trains. The paper generalizes a previous air brake pneumatic model to passenger trains and describes the needed modifications. Among them, the way the pressure reduces in the brake pipe is generalized. Moreover, this paper reports an analytical bi-dimensional function for calculating the nozzle diameter equivalent to the electro-pneumatic(EP) or the electronically controlled pneumatic(ECP)brake valve as a function of the wagon length and the time to vent the brake pipe locally. The numerical results of the new model are compared against several experimental tests of high-speed passenger trains of Trenitalia, namely ETR500 and ETR1000. The model is suitable to be integrated into the UIC software TrainDy, aiming to extend its computational field to passenger trains and to simulate the safety of trains during a recovery.展开更多
Today, the advent of quantum computers and algorithms is calling into question the semantic security of symmetrical and asymmetrical cryptosystems. The security of objects connected to the network, which must provide ...Today, the advent of quantum computers and algorithms is calling into question the semantic security of symmetrical and asymmetrical cryptosystems. The security of objects connected to the network, which must provide a security service and protect the privacy of users by providing protection against attacks such as identity theft, denial of service, eavesdropping and unauthorised access to personal and sensitive data. It is therefore necessary to find a robust method of using the key that is effective in protecting and preventing data tampering. In this paper, we design and implement a security and data protection method using a key generated on the basis of electromagnetic wave propagation theories. Modelling and implementation of a data security and protection method using a key generated on the basis of electromagnetic wave propagation theories.展开更多
基金Supported by the National Natural Science Foundation of China (51679217)General Scientific ResearchProject of Zhejiang Education Department (Y202044645)the Doctoral Scientific Research Foundationof Zhejiang Ocean University (21045012715)。
文摘Nowadays, rapid technological progress influences the dependability of equipments and also causes rapid obsolescence. The mechatronic and electronic equipment components are mostly affected by obsolescence. A new challenger unit possesses identical functionalities, but with higher performances. This work aims to find the optimal number of components which should be replaced by new-type units, under budgetary constraints. In this work, the new challenger unit is characterized by lower energy consumption and the optimization steps are based on genetic algorithm (GA). The result shows the importance of this type of replacement in order to economize energy consumption and to deal with obsolescence.
文摘Braking system performance is relevant for both railway safety and network optimization. Most trains employ air brake systems;air brake systems of freight trains mostly cannot achieve a synchronous application of brake forces, which is usually customary for passenger trains. The paper generalizes a previous air brake pneumatic model to passenger trains and describes the needed modifications. Among them, the way the pressure reduces in the brake pipe is generalized. Moreover, this paper reports an analytical bi-dimensional function for calculating the nozzle diameter equivalent to the electro-pneumatic(EP) or the electronically controlled pneumatic(ECP)brake valve as a function of the wagon length and the time to vent the brake pipe locally. The numerical results of the new model are compared against several experimental tests of high-speed passenger trains of Trenitalia, namely ETR500 and ETR1000. The model is suitable to be integrated into the UIC software TrainDy, aiming to extend its computational field to passenger trains and to simulate the safety of trains during a recovery.
文摘Today, the advent of quantum computers and algorithms is calling into question the semantic security of symmetrical and asymmetrical cryptosystems. The security of objects connected to the network, which must provide a security service and protect the privacy of users by providing protection against attacks such as identity theft, denial of service, eavesdropping and unauthorised access to personal and sensitive data. It is therefore necessary to find a robust method of using the key that is effective in protecting and preventing data tampering. In this paper, we design and implement a security and data protection method using a key generated on the basis of electromagnetic wave propagation theories. Modelling and implementation of a data security and protection method using a key generated on the basis of electromagnetic wave propagation theories.