A Rail Vehicle Clearance Calculation Program

Author(s):  
Louis T. Klauder

This paper explains and illustrates a computer program for calculating clearances between a rail vehicle and wayside objects and between a vehicle on one track and a vehicle on an adjacent track. The program includes a graphic animation illustrating the geometrical proximity of the subject vehicle to successive wayside objects and to a vehicle in successive relative locations along an adjacent track. The situations of minimum clearance for given vehicle and track geometry inputs are highlighted in a report. The main program is accompanied by an auxiliary program that uses independent logic to calculate clearances for idealized situations and that generates input files representing those situations for the main program. This provides an efficient means for verifying basic aspects of the logic of the main program.

2013 ◽  
pp. 738-745
Author(s):  
Eugenia Alexandropoulou-Egyptiadou

The huge financial rewards that may be gained from software sales have resulted in computer piracy, an increasing worldwide phenomenon. This situation has posed a challenge to the legislator, who has imposed regulations concerning the protection of software, both at national and international level. The following chapter focuses on the presentation of the current Hellenic legal framework on computer program copyright protection following the implementation of the relative E.U. Directives (Law 2121/1993, as amended). The chapter consists of an introduction focusing on software piracy rates and on the international legal framework of the protection; there is a unit on the right holder, being the subject of software copyright protection; a unit on the field of the protection; a unit on the rights of the author (the moral right, the property right and the resulting powers thereof), focusing on the power of software reproduction and specific cases where the lawful user can carry out acts without the author’s consent; a unit on the consequences of copyright infringement (sanctions at civil, criminal, and administrative level); a unit on the duration of the protection; and finally concluding with final remarks and recommendations.


Author(s):  
Eugenia Alexandropoulou-Egyptiadou

The huge financial rewards that may be gained from software sales have resulted in computer piracy, an increasing worldwide phenomenon. This situation has posed a challenge to the legislator, who has imposed regulations concerning the protection of software, both at national and international level. The following chapter focuses on the presentation of the current Hellenic legal framework on computer program copyright protection following the implementation of the relative E.U. Directives (Law 2121/1993, as amended). The chapter consists of an introduction focusing on software piracy rates and on the international legal framework of the protection; there is a unit on the right holder, being the subject of software copyright protection; a unit on the field of the protection; a unit on the rights of the author (the moral right, the property right and the resulting powers thereof), focusing on the power of software reproduction and specific cases where the lawful user can carry out acts without the author’s consent; a unit on the consequences of copyright infringement (sanctions at civil, criminal, and administrative level); a unit on the duration of the protection; and finally concluding with final remarks and recommendations.


Author(s):  
Clifford S. Bonaventura ◽  
Joseph W. Palese ◽  
Allan M. Zarembski

A real-time dynamic simulation system designed to identify sections of track geometry that are likely to cause unsafe rail vehicle response is discussed. Known as TrackSafe, this system operates onboard a track geometry vehicle where the geometry measurements are passed as inputs to the dynamic model of one or more rail vehicle types. In order to comprehensively analyze the effect of the existing geometry on rail vehicle behavior, the system is capable of simultaneously simulating the response of several vehicle models, each over a range of traveling speeds. The resulting response predictions for each modeled vehicle and each simulated traveling speed are used to assess the track geometry condition and to identify locations leading to potentially unsafe response. This paper presents the latest work in the development of TrackSafe, specifically, the development and testing of eight new vehicle models is presented. The new car types modeled include a box car, flat car, and both a long and short tank car. Each can be simulated in a fully loaded or empty condition. Accuracy of the models is discussed in detail.


1971 ◽  
Vol 11 ◽  
pp. 192-193
Author(s):  
Daniel A. Klinglesmith

AbstractThis paper describes a computer program used to compute equivalent widths via an IBM 2250 attached to an IBM 360/75J.The measurement of stellar equivalent widths is a long tedious procedure and the final results depend to a large extent on where the stellar continuum is drawn. Therefore, a method which permits the continuum to be redrawn and the equivalent width remeasured quickly is desirable. An interactive CRT display device is an ideal instrument for allowing an astronomer to adjust the continuum level and the other parameters that are involved in equivalent width measurements. The display device discussed in this paper is an IBM model 2250 used in conjunction with a IBM 360/75J.The “2250” consists of a 12 inch (30 cm) square CRT display tube plus a 32 function key box, an alphanumeric keyboard and a light pen which can be pointed at any illuminated spot on the screen. Thus, there are 34 interrupts that can be sensed by the program controlling the “2250”. The program that has been used communicates with the astronomer via messages and questions displayed on the CRT screen. The main program remains in a wait state until one of the 34 possible interrupts occurs, whereupon it branches to the designated subroutine and executes the procedures necessary to satisfy the interrupt.


Author(s):  
J. A. Swaffield

The occurrence of column separation on the upstream side of a valve following valve closure has been the subject of a series of experiments on a test rig utilizing Concorde L56 alloy fuel piping and Esso Aviation Kerosine Specification 2494. A Fortran IV computer program based on the method of characteristics has been employed to solve the quasi-linear hyperbolic partial differential equations governing the propagation of transient pressures and to predict the duration of vapour cavities formed either at the valve or at any point in the pipeline. Comparison of computer and observed results indicates an accuracy within 3 per cent for the first peak following valve closure and for the duration of the vapour cavities, and within 10 per cent for the later pressure peaks following vapour cavity collapse.


1977 ◽  
Vol 99 (4) ◽  
pp. 841-848
Author(s):  
G. R. Doyle ◽  
M. A. Thomet

Passenger comfort is an important constraint on high-speed operation in curves and transitions. The effect of track geometry and vehicle suspension characteristics on passenger comfort were investigated with a six-degree-of-freedom, time domain simulation of the car body dynamics. The rail vehicle was simulated at constant speed on transitions and curves to generate acceleration profiles at a passenger’s seat location. The main conclusion of this study is that modern rolling stock can negotiate curves at a higher unbalanced superelevation than is recommended in the current AREA formula without exceeding passenger comfort standards. Also, the minimum spiral lengths as determined by the AREA formula are adequate for passenger cars with stiff roll characteristics, such as the Metroliner vehicles.


1968 ◽  
Vol 22 (6) ◽  
pp. 713-718 ◽  
Author(s):  
Michel Desjardins ◽  
John A. Moore

An original computer program is applied to handle spark-source mass-spectrometry data. Computerized “Celidometry” (trace impurity measurement) increases the speed of data handling and also leaves complete freedom in interpretation of results. This article briefly describes the method utilized to obtain trace impurity concentrations by spark-source mass spectrometry and discusses in detail the computer program used to perform some of the operations. The computer program is written in DOS FORTRAN IV (E LEVEL SUBSET) supplied by IBM for System 360. The main program requires a card reader, a printer, and a 65K byte central processor. In addition, two magnetic tape drivers are used to provide off-line plotting of the calibration curve.


2019 ◽  
Author(s):  
Gabriel E Silva ◽  
Clayton Mamedes

This article approaches the subject of musical form from the standpoint of an algorithmic composition practice. It introduces the problem of ergodicity in music, a formal situation at which music development is perceived as static. The concepts of ​General Periodicity by Henri Pousseur and ​Temporal Gestalt by James Tenney gave support to a reflection on the nature of the problem, as well as to formulate a twofold structuring procedure based on ideas of continuity and segmentation of the musical course. The devised method was implemented as a computer program to produce entire pieces of music.


2016 ◽  
Vol 4 (1) ◽  
pp. 1-4 ◽  
Author(s):  
Mirko Spiroski

AIM: The aim of this study was to show how to verify plagiarism of the paper written in Macedonian and translated in foreign language.MATERIAL AND METHODS: Original article “Ethics in Medical Research Involving Human Subjects”, written in Macedonian, was submitted as an assay-2 for the subject Ethics and published by Ilina Stefanovska, PhD candidate from the Iustinianus Primus Faculty of Law, Ss Cyril and Methodius University of Skopje (UKIM), Skopje, Republic of Macedonia in Fabruary, 2013. Suspected article for plagiarism was published by Prof. Dr. Gordana Panova from the Faculty of Medical Sciences, University Goce Delchev, Shtip, Republic of Macedonia in English with the identical title and identical content in International scientific on-line journal "SCIENCE & TECHNOLOGIES", Publisher "Union of Scientists - Stara Zagora".RESULTS: Original document (written in Macedonian) was translated with Google Translator; suspected article (published in English pdf file) was converted into Word document, and compared both documents with several programs for plagiarism detection. It was found that both documents are identical in 71%, 78% and 82%, respectively, depending on the computer program used for plagiarism detection. It was obvious that original paper was entirely plagiarised by Prof. Dr. Gordana Panova, including six references from the original paper.CONCLUSION: Plagiarism of the original papers written in Macedonian and translated in other languages can be verified after computerised translation in other languages. Later on, original and translated documents can be compared with available software for plagiarism detection.


Author(s):  
Robert L. Bleyl

Whenever an expert witness uses the results of computer analyses as the basis for an expert opinion, that individual should be able to derive the formulas and duplicate the computer-produced results manually. In any questionable case, it may be wise to have the expert demonstrate this capability, especially at the discovery or deposition stage of his involvement, since a considerable length of time may be required in demonstrating this capability. If the expert is successful at this task, he probably has an adequate understanding of the notation, the assumptions, and the relevance of the variables used in the calculations and formulas and is less likely to go astray than the expert who lacks this capability. In my opinion, unless expert witnesses can demonstrate this capability, they are really no more experts in the subject than any high school student who is able to mathematically solve an equation or enter data into a computer program, but has no depth of knowledge about th


Sign in / Sign up

Export Citation Format

Share Document