版权所有:内蒙古大学图书馆 技术提供:维普资讯• 智图
内蒙古自治区呼和浩特市赛罕区大学西街235号 邮编: 010021
作者机构:Wuhan Univ Technol Natl Engn Lab Fiber Opt Sensing Technol Wuhan 430070 Peoples R China Wuhan Univ Technol Sch Informat Engn Wuhan 430070 Peoples R China Univ Calif Irvine Dept Civil & Environm Engn Irvine CA 92697 USA
出 版 物:《SENSORS》 (传感器)
年 卷 期:2019年第19卷第12期
页 面:2666.-2666.页
核心收录:
学科分类:0710[理学-生物学] 071010[理学-生物化学与分子生物学] 0808[工学-电气工程] 07[理学] 0804[工学-仪器科学与技术] 0703[理学-化学]
基 金:National Natural Science Foundation of China [61735013, 61875155] Fundamental Research Funds for the Central Universities [WUT: 2019-III-160CG]
主 题:underground structure safety train tracking incursion detection ultra-weak FBG distributed vibration dynamic measurement
摘 要:Tracking operating trains and identifying illegal intruders are two important and critical issues in subway safety management. One challenge is to find a reliable methodology that would enable these two needs to be addressed with high sensitivity and spatial resolution over a long-distance range. This paper proposes a novel monitoring approach based on distributed vibration, which is suitable for both train tracking and incursion detection. For an actual subway system, ultra-weak fiber Bragg grating (FBG) sensing technology was applied to collect the distributed vibration responses from moving trains and intruders. The monitoring data from the subway operation stage were directly utilized to evaluate the feasibility of the proposed method for tracking trains. Moreover, a field simulation experiment was performed to validate the possibility of detecting human intrusion. The results showed that the diagonal signal pattern in the distributed vibration response can be used to reveal the location and speed of the moving loads (e.g., train and intruders). Other train parameters, such as length and the number of compartments, can also be obtained from the vibration responses through cross-correlation and envelope processing. Experimental results in the time and frequency domains within the selected intrusion range indicated that the proposed method can distinguish designed intrusion cases in terms of strength and mode.