Alternative Rail Intruder and Obstacle Detection Systems
نویسنده
چکیده
Since the mid-1990s, the U.S. Department of Transportation (U.S. DOT) Federal Railroad Administration (FRA) has sponsored a research program on alternative detection technologies for railroad right-of-way (ROW) and highway-rail grade crossing applications. In support of this effort, the John A. Volpe National Transportation Systems Center (Volpe Center) of the U.S. DOT Research and Innovative Technology Administration has assessed the potential applicability of various technologies, tested prototype systems, and maintained a publicprivate partnership program to disseminate information. The application of non-track circuit-based technologies for train, highway vehicle, and intrusion/obstacle detection would improve the safety of rail operations and passengers and road users. These technologies would also protect the general population and environment from the risks associated with hazardous material shipments and help relieve congestion by reducing the number of incidents and delays due to those incidents.
منابع مشابه
Radar-based intruder detection for a robotic security system
The Mobile Detection Assessment and Response System, Exterior (MDARS-E) provides an automated robotic security capability for storage yards, petroleum tank farms, rail yards, and arsenals. The system includes multiple supervised-autonomous platforms equipped with intrusion detection, barrier assessment, and inventory assessment subsystems commanded from an integrated control station. The MDARS-...
متن کاملDistributed multi-sensor multi-target tracking with a low-cost wireless sensor network: an application to intruder detection
In the context of wireless communication systems many applications oriented to parameter monitoring are developed, such as automatic tracking systems. In this paper, an automatic tracking system based on a network of presence and range sensors, is presented. The main goal is to offer a low cost alternative to increase security staff effectiveness and to avoid problems of scattered alarms manage...
متن کاملCurrent Sensing Completion Detection in Single-Rail Asynchronous Systems
In this article, an alternative approach to detecting the computation completion of combinatorial blocks in asynchronous digital systems is presented. The proposed methodology is based on well-known phenomenon that occurs in digital systems fabricated in CMOS technology. Such logic circuits exhibit significantly higher current consumption during the signal transitions than in the idle state. Du...
متن کاملUsing received signal strength variation for surveillance in residential areas
There are various uses of wireless sensor technology, ranging from medical, to environmental, to military. One possible usage is home security. A wireless sensor network could be used to detect the presence of an intruder. We have investigated the use of Received Signal Strength Indicator (RSSI) values to determine the mobility of an intruder and have found that accurate intruder detection is p...
متن کاملT Axonomy Based Intrusion Attacks and Detection Management Scheme in P Eer - to - P Eer Network
A intrusion provides an unauthorized access, damage or disruption of the network. The process can understand the characteristics and nature of an intruder. The paper presents the taxonomy consists of the specification of an intruder. Taxonomy provides the classification of intruder and provides mechanism for intruder detection. We found the algorithm for developing an intruder which can be atta...
متن کامل