1. Introduction
As the core control center of rail transit systems, the train control system (TCS) plays a crucial role in ensuring safe and efficient train operations. The train positioning system, serving as a critical component of TCS, provides real-time precise position information that forms the foundation for key functions such as train protection curve calculation and movement authority generation. Current positioning solutions predominantly employ a hybrid architecture combining onboard equipment (e.g., odometers and Doppler radars) with wayside facilities (e.g., balises and track circuits) [1], with satellite positioning technology additionally integrated in specific lines such as the Qinghai–Tibet Railway [2]. However, existing train positioning technologies based on vehicle-ground collaboration present a significant technical–economic contradiction: the pursuit of high-precision positioning necessitates high-density deployment of ground-based infrastructure, resulting in exponentially increasing system operation and maintenance costs. Notably, as rail transit systems evolve toward automated operation and intelligent maintenance paradigms [3], conventional positioning methodologies relying on dedicated ground equipment are becoming increasingly inadequate to meet the dual requirements of economic viability and operational reliability demanded by advanced train control systems. Consequently, achieving a technological breakthrough in ground equipment-independent autonomous train positioning has emerged as a critical pathway for advancing intelligent rail transportation development. Therefore, research on autonomous train positioning methodologies holds substantial theoretical significance and engineering application value, particularly in addressing the evolving needs of next-generation rail transit systems.
To address these technical challenges, researchers have conducted extensive explorations from multiple dimensions, leading to several representative solutions: machine vision-based roadside feature recognition [4], LiDAR point cloud matching [5], mobile communication-based base station positioning [6], and laser ranging-based dynamic correction [7]. Experimental data indicate that machine vision methods perform well for positioning under adequate illumination conditions but experience performance degradation in low-light environments, with complete functional failure occurring under adverse meteorological conditions (e.g., fog, rain, or snow). Although LiDAR point cloud matching technology overcomes illumination limitations inherent in optical imaging, its point cloud resolution remains visibility-dependent, failing to completely eliminate performance degradation or failure in severe weather scenarios. While mobile communication-based positioning solutions can leverage existing infrastructure, they exhibit significantly increased positioning errors in environments with pronounced multipath effects, such as tunnels. The laser ranging system demonstrates relatively low architectural complexity but is prone to position divergence in feature-sparse environments. Comprehensive analysis reveals that existing single-sensor modalities exhibit significant performance boundaries in complex operational environments, highlighting the technical bottleneck of current solutions in meeting the full-scenario positioning requirements of rail transit under diverse working conditions. In this context, multi-source information fusion positioning technology has emerged as a research focus [8], demonstrating enhanced environmental adaptability and higher reliability through coordinated integration of heterogeneous sensor data.
Notably, while improving positioning performance, multi-source fusion technology introduces significant computational demands: the exponential growth of data volume from multi-sensor acquisition, coupled with the requirement for sophisticated modeling to achieve heterogeneous data fusion. This poses substantial challenges to the processing capacity of onboard security computers, often necessitating auxiliary computing units in conventional architectures. Although cloud computing offers advantages in elastic computing resources, the data transmission between cloud platforms and onboard terminals suffers from unpredictable communication latency and bandwidth consumption. In contrast, edge computing demonstrates unique strengths in reducing latency sensitivity and communication overhead through its proximal deployment characteristics, thereby providing a viable technical pathway for engineering implementation of multi-source fusion positioning systems [9].
Edge computing demonstrates excellent performance in fast sensing and the computing of massive sensor data to optimize decision-making [10]. H. Song et al. [11] break the data segregation under an autonomous train control system (ATCS) by applying data prediction and edge computing-based information fusion to process real dynamic data and estimate train speed and position. L. Zhu et al. [12] proposed a collaborative train and edge computing framework to provide real-time communication and computation services. L. Li et al. [13] proposed a Mobile Edge Computing (MEC) framework for millimeter-wave train–ground communication systems and a resource allocation and computation offloading (RACO) algorithm. M. Saki et al. [14] proposed a new framework for a future data-driven Railway Condition Monitoring (RCM) system and designed an edge processing unit. E. Pencheva et al. [15] designed a new mobile edge service to provide core functionality for many railroad use cases, supporting data sessions for application launch and operation. Although existing methods have made significant advancements in edge computing and multi-sensor fusion for train positioning, they face limitations in ensuring reliable performance under dynamic conditions [16].
Additionally, the complex operating environment of trains under edge computing may lead to data transmission failures, and the dynamic changes in the computing resources capacity of edge servers may cause delays in processing the train’s positioning data [17]. Therefore, designing the data processing flow for fusion positioning methods of trains under edge computing and validating their reliability holds significant theoretical and practical value. Before a system is implemented in practical applications, verifying its reliability is crucial. To achieve this, an essential procedure that translates the system’s behaviors and performances into a computerized model is necessary. Formal methods play a pivotal role in this context by providing a clear and unambiguous description of a system’s properties using rigorous mathematical symbols and rules. This approach not only facilitates the identification of logical and functional deficiencies, but also significantly enhances design reliability [18].
The main contributions of this paper are as follows:
A novel train fusion positioning method is introduced, leveraging edge computing to reduce onboard computational load and enhance real-time positioning accuracy.
A CPN model is proposed to ensure the system’s reliability and functional safety, providing a formal verification framework.
State-space analysis is conducted to validate the system’s safety under various fault conditions, demonstrating resilience during communication failures and limited computing resources.
Numerical experiments analyze factors influencing data processing delays, and a reference boundary for train tracking under edge computing is calculated to ensure safe operations.
2. Preliminaries
2.1. Application of CPNs in System Modeling and Verification
Modeling is an essential step in abstractly describing a system’s behavior and structure, traditionally achieved using techniques like Unified Modeling Language (UML) [19]. It is noteworthy that formal modeling, mandated as a compulsory methodology in the industry certification standard EN 50128-2011 (Railway Applications—Communication, Signaling and Processing Systems), demonstrates high reliability and safety characteristics attributable to its mathematical rigor. However, these conventional approaches often prove inadequate in effectively capturing concurrency, parallelism, and synchronization within complex systems. To address these limitations, Petri Nets (PNs) provide a mathematically grounded graphical modeling language whose formal verification framework maintains full compatibility with formal specifications of system behaviors, enabling rigorous logical deduction and state space analysis.
PNs comprise three foundational components, places, transitions, and arcs, which collectively characterize system states and their dynamic evolution through token distribution and transition mechanisms. Through formal analysis methods such as reachability analysis and liveness verification, PNs facilitate rigorous validation of system properties, exhibiting significant advantages in complex engineering domains with stringent reliability requirements, particularly railway systems [20]. In railway applications, notable implementations include Song et al.’s application of CPN for establishing formal models and performing performance evaluation in automatic line management systems [21]; Das et al.’s safety analysis of railway level crossing operations focusing on pedestrian–train interaction dynamics [22]; and Outafraout et al.’s development of a Multimodal Transportation System (MTS) model based on Colored Hybrid Petri Nets (CHPNs), which implemented an optimal control strategy guided by just-in-time criteria for critical parameter optimization and validation [23].
CPNs, an extension of basic PNs, further enhance this modeling approach by introducing data types and structured tokens, enabling more detailed system representations [24]. CPNs support complex data processing and integrate timing parameters, which are essential for analyzing temporal performance in systems characterized by randomness and concurrency. These features, coupled with the use of Meta Language (ML) for efficient state-space analysis, make CPNs well suited for verifying both system safety and performance [25].
Compared to techniques like Fault Tree Analysis (FTA) [26], Bayesian networks [27], and Markov processes [28], CPNs offer a more robust framework for modeling and verifying systems with concurrent and random behaviors, ensuring functional safety and facilitating performance evaluation in complex systems.
2.2. Basic Modeling Theory of CPNs
The CPN model is formalized as a nine-tuple [29], where
-
denotes a finite non-empty set of colors, representing different types of tokens.
-
P is the set of places, serving as holding areas for tokens.
-
T represents the set of transitions, which are events that can change the state of the system.
-
A constitutes the set of arcs, directing the flow between places and transitions.
-
N is the node function , mapping arcs to their source and target nodes.
-
C is the coloring function , assigning colors to places and defining the type of tokens they can contain.
-
G is the guard function, assigning Boolean conditions to transitions to control their firing.
-
E is the expression function, defining the conditions under which tokens can move across arcs.
-
I is the initialization function, setting the initial marking of places in the net.
The dynamics of the CPN model are characterized by several foundational properties:
Reachability: A state is reachable from if there exists a sequence of transitions that can transform into .
Boundedness: A place is bounded if there is a maximum number of tokens it can contain, ensuring that the net does not grow indefinitely.
Security: The model is secure if every place in the net has a finite upper bound on the number of tokens it can hold.
Liveness: A transition is live if it can eventually fire from any reachable state, preventing deadlocks.
Fairness: When multiple transition are enabled, each one has an equal chance to fire, preventing resource monopolization.
For a comprehensive analysis of the system’s behavior, it is essential to define and verify system functional safety-related characteristics based on domain knowledge, thereby ensuring the reliability of the system modeled with CPNs.
3. System Structure of Train Fusion Positioning Method Based on Edge Computing
Coasting and slipping during train operation can cause gradual positioning errors if only the speed sensor is used [30]. To reduce these errors and improve accuracy, the train calculates the traveled distance with the speed sensor and regularly transmits data from other onboard sensors, such as GNSS and INS, to the edge server via the train–ground communication link. The edge server processes these data and sends back the corrected position, ensuring more precise and reliable positioning, as shown in Figure 1.
In the edge computing-based train fusion positioning framework, a variety of sensors are installed on the train to monitor its operational status, including speed sensors, GNSS, and Inertial Navigation System (INS) devices. These sensors generate real-time data that are essential for determining the train’s position. The onboard system utilizes speed data to calculate the traveled distance, which serves as the basis for initial positioning. The edge device, located on the ground, consists of computing units and wireless transceivers that receive, process, and transmit the sensor data back to the train, as illustrated in Figure 2.
The train module uses an extended Kalman filter (EKF) for real-time sensor data fusion, incorporating inputs from GNSS, inertial sensors, and speed sensors. In the edge module, we utilize a dynamic task allocation algorithm to prioritize computational resources based on the real-time processing needs of multiple trains. The multi-sensor fusion technique leverages a weighted fusion strategy to balance sensor reliability and minimize positioning errors. For details on the offloading algorithm used in the specific example, readers can refer to our previously published papers [31].
The communication sequence between the onboard system and the edge server follows a structured process, as illustrated in Figure 3. First, the train collects sensor data , where t represents the current time:
(1)
After completing the data collection, the train sends a data processing request and identification to the edge server:(2)
where represents the algorithm complexity, the edge server allocates computational resources based on its current load and transmits the result back to the train:(3)
(4)
Once the train receives the resource allocation, it sends the collected sensor data to the edge server for processing:(5)
The edge server processes the sensor data and performs the necessary calculations to generate the positioning result :(6)
Finally, the edge server transmits the positioning result back to the train, and the train updates its position accordingly:(7)
(8)
This sequence ensures the efficient processing and correction of the train’s position by leveraging edge computing, reducing onboard computational load while maintaining real-time positioning accuracy.4. Modeling of Train Fusion Positioning Based on Edge Computing
The method is implemented using the modeling software CPN Tools (4.0.1 version), which provides a platform for simulating and analyzing the train fusion positioning system. The model is primarily composed of three key modules: (1) the transmission module, responsible for handling data communication between the vehicle and the edge server; (2) the vehicle module, which simulates the onboard systems, including sensor data generation and processing; and (3) the edge module, which processes the sensor data received from the vehicle and returns the corrected position. These modules work together to ensure accurate and efficient train positioning through edge computing.
4.1. Transmission Module
The transmission module facilitates two-way communication between the vehicle module (
As the communication channel between the vehicle and edge modules, the transmission module simulates two-way communication, including potential issues such as packet loss, bit errors, and disconnections. The transitions
During communication between the vehicle and ground, the transmission module indicates the transmission results by returning different token types to the vehicle terminal.
4.2. Vehicle Module
The vehicle terminal triggers corresponding changes based on the received tokens, including the following:
FAIL token: TheFail transition is activated, prompting the train to resend data or request processing from the edge server according to the timeout retransmission mechanism. If packet loss or bit errors exceed the allowable threshold within a single cycle, a communication abnormality is detected. In such cases, theAbandon transition is triggered, and the train ceases data uploads to the edge for that cycle, opting to use the onboard processor to correct the train’s position.BREAK token: TheBreak transition is triggered when the communication link is disconnected. To minimize the impact of communication failure on the positioning function, the onboard processor is used to correct the train’s position until the communication link can be re-established.
The specific structure of the vehicle module is shown in Figure 5. The places, transitions included in the module, and their meanings are shown in Table 2. In the initial state, the place
The system uses two possible tokens to manage sensor data processing at the edge or locally, as shown in Algorithm 1:
Algorithm 1 Processing Sensor Data |
|
The
PERMIT token indicates that additional computing resources are available at the edge. When the transitionPermit is triggered, the current sensor data are packaged and sent to the edge for processing.The
REJECT token signifies that no remaining computing resources are available at the edge. In this case, the transitionReject is triggered, and the sensor data are transferred to the placeCPU , representing the vehicle’s local processor for processing.
In both scenarios (whether edge or onboard processing), the train status transitions from
Algorithm 2 Data Processing Completion |
|
The onboard system generates a
RESULT token, signaling that the data have been processed.The train status changes from
UPDATING toUPDATED via the transitionsEdgeCorrect orLocalCorrect , depending on where the processing occurred.The system triggers the
Update transition, resetting the vehicle to theIDLE state, which marks the end of the current cycle and the start of the next.
Initially, the communication state (
Algorithm 3 Communication Link Establishment |
|
If the link is successfully established, the communication state changes to
ESTABLISHED .If the link fails, the transition
Miss is triggered, reverting the communication state back toNOLINK .
If the number of link attempts exceeds a predefined limit, the train stops further transmission for the current cycle and processes the data locally using the onboard processor. The train will retry link establishment in the next cycle, as shown in Algorithm 4.
Algorithm 4 Handling Link Attempts |
|
4.3. Edge Module
The structure of the edge module in the model is illustrated in Figure 6, while the corresponding places, transitions, and their functions are detailed in Table 3. The vehicle terminal uploads different types of tokens to the edge module’s waiting queue (
The
REQUEST token represents a train positioning task. Upon receiving this token, theJudge transition is triggered to check if sufficient computing resources are available at the edge server.The
DATA token represents the sensor data uploaded by the train. If sufficient resources are available, theApply transition is triggered to process the data. If resources are insufficient, the data wait in the queue until the previous task is completed and resources are freed.Other types of tokens indicate issues such as packet loss or bit errors during transmission. In these cases, the
ReSend transition is triggered to retransmit the data.
5. Reliability Verification
5.1. Prerequisites
Software reliability is defined as the ability of software to avoid system failures under specified conditions within a given time frame. The dependable operation of software systems fundamentally relies on robust hardware infrastructure, with the present system’s operational integrity being predicated on hardware configurations that satisfy the Safety Integrity Level 4 (SIL-4) requirements stipulated in the IEC 61508 international standard. In this study, the reliability of the train fusion positioning method under edge computing is reflected in the following aspects:
In fault scenarios, the method ensures that the train reaches the desired position update state within a finite number of state transitions.
Under normal operating conditions, the method consistently reaches the desired position update state within a finite number of steps, similar to the behavior in fault scenarios.
The processing delay of train positioning data in edge computing does not lead to train conflicts or other hazardous situations that could compromise operational safety.
The primary objective of functional safety verification is to ensure that the system’s safety functions operate correctly under both normal and fault conditions. The first two reliability requirements are verified through functional safety analysis, while performance analysis ensures that delays in processing train positioning data do not result in dangerous scenarios, such as rear-end collisions, thereby verifying the third reliability requirement [32].
Since system failures affect reliability, functional safety, and performance, functional safety verification and performance analysis are combined to meet the overall verification requirements for the method’s reliability [33].
5.2. Functional Safety Verification Principle
Functional safety refers to the part of a system’s overall safety that ensures the system or device can operate correctly in response to inputs or failures. CPNs describe the logical functions and properties of the proposed method using formal semantics, incorporating both its static structure and dynamic characteristics. Logical reasoning rules are employed to conduct reachability analysis on each node within the model’s state space, verifying whether it meets the functional safety requirements [34].
To verify functional safety, domain knowledge and system functional requirements are integrated with the model. The temporal logic analysis tool, ASK-CTL, traverses the state space to determine if nodes exist that satisfy the desired states. The specific verification requirements are defined as follows:
Can train positioning be achieved if the communication link is broken? Before transmitting data to the edge server, the train must establish a train-to-ground communication link. If the link fails to establish or disconnects after being established, the train cannot complete the positioning function.
Can train positioning be achieved after packet loss and bit errors? During the train-to-ground communication process, adverse environmental conditions may cause data packet loss and bit errors. In such cases, neither the onboard system nor the edge server can obtain relevant data in time, increasing data transmission delays and affecting train positioning.
Can train positioning be achieved when edge computing resources are limited? Edge servers have finite computing resources. If the server is overwhelmed with tasks, data processing requests from trains may be queued, leading to processing delays and impacting the train positioning function.
5.3. Case Studies
Functional safety assurance methods must satisfy two fundamental properties: operability and safety. The operability criterion mandates that the target state should be achievable through a finite sequence of state transitions, ensuring the feasibility of system operations. Concurrently, the safety criterion guarantees that no execution paths will lead to hazardous states during operational processes. Drawing upon edge computing principles and system functional requirements, this section conducts four case studies to validate the proposed functional safety framework.
5.3.1. Case 1: Communication Disconnection
This case verifies the impact of link establishment failure or communication disconnection on the train positioning function in a single-train scenario. According to the principle of operability, the method must ensure that an abnormal state can transition to a normal working state when adverse factors occur. Using timing logic, we verify whether the onboard system can update the train positioning result after a communication link failure.
5.3.2. Case 2: Packet Loss and Bit Error
The function
5.3.3. Case 3: Limited Computing Resources
In this scenario, two trains are managed by the same edge server, but the server’s computing resources can only process the data from one train at a time. When resources are limited, the
Using the CPN ML language, the inspection logic is implemented as shown in Table 4. The function
The results show that the method consistently corrects the train’s position, even when the communication link is broken, meeting the operability requirements. The method also successfully performs position correction after packet loss, bit errors, and under limited computing resources, further verifying its reliability and operability.
5.3.4. Case 4: Multi-Train Scenario
Safety requires that the method avoids transitioning to a dangerous state during execution. Let represent the dangerous state and the initial state. If there exists a path from to , i.e., , then the method fails to meet the safety requirements, as the system transitions to a dangerous state.
Based on the system’s functional requirements, if any node in a state transition path fails to complete the train positioning correction, it indicates the method has entered a dangerous state. Conversely, assume is the state where the train positioning result is successfully corrected. If for all reachable nodes from , , meaning there exists a path to from any reachable state, then the method satisfies the safety requirements.
The logic verification function, implemented in CPN ML language, is used to verify the method’s safety. The specific results are presented in Table 5. The results demonstrate that, starting from the initial node in the state space, any given path can reach the desired node (
According to the operability and safety analysis, the method designed in this paper satisfies the functional safety requirements and operates correctly under various inputs or fault conditions.
The safety validation of multi-train formations (consisting of three or more vehicles) can be deductively established based on the two-train safety verification framework. This conclusion stems from the structural observation that any multi-train configuration fundamentally comprises adjacent train pairs that replicate the classical leader–follower dynamic examined in preceding studies. Through rigorous verification of pairwise interaction safety under standard tracking conditions, the system’s collective safety properties are thereby demonstrably preserved in extended train formations.
6. Numerical Performance Analysis
On the basis of verifying the functional safety of the method, the performance of the method under different conditions was analyzed. In the train fusion positioning method under edge computing, the data transmission success rate, transmission delay, and edge server computing delay will all affect the data processing timeliness of the method. Adding conditional triggering rules to directed arcs in the model and injecting random delay parameters into specific transitions can simulate the impact of the above disadvantages on the method. The method process is simulated based on the established CPN model, and the data monitor of CPN Tools is used to record the data processing delay of each position correction process. Based on the collected simulation data, the probability density distribution of data processing delays under different levels of influencing factors is obtained, as shown in Figure 7.
The corresponding cumulative distribution is shown in Figure 8. It can be seen that changes in different data transmission delays have the greatest impact on method data processing latency, followed by edge server computing latency, and data transmission failure rate has the least impact. Hence, transmission delay plays the most significant role in influencing data processing time, likely due to the inherent limitations of train–ground communication systems. In high-speed environments, even minor transmission disruptions can lead to significant delays in data relay between the train and edge server. These delays are exacerbated by environmental factors such as signal interference or train velocity.
In order to further verify the above conclusion, the orthogonal experimental method was used to conduct a qualitative analysis of each influencing factor based on the simulation results. The specific selected influencing factor levels are shown in Table 6.
According to the influencing factor level table, a three-factor and three-level orthogonal experiment was designed to obtain the model simulation results and conduct range analysis and variance analysis, as shown in Table 7, Table 8 and Table 9. It can be seen from the range analysis results that compared with the other two factors, the transmission delay factor has the largest range value, indicating that changes in transmission delay have the greatest impact on data processing delays. In addition, in order to avoid errors in the results of one-sided range analysis, variance analysis was performed on the experimental results. From the variance analysis output results, it can be seen that the transmission delay factor corresponds to the largest F value, which also shows that the transmission delay is the largest influencing factor of data processing delay, which is consistent with the range analysis results.
It can be seen from the analysis that the positioning method designed in this article requires multiple information interactions between the train and the edge server, and the data transmission delay will significantly affect the data processing efficiency. Under edge computing, data are mainly processed through edge servers, and the computing delay of the server will also have a significant impact on data processing efficiency. Under normal circumstances, the failure probability of method data transmission under edge computing is low, and the retransmission mechanism designed by the method can effectively reduce the impact of data transmission failure. The data transmission failure rate has a limited impact on the data processing delay of the method. To sum up, in the actual system development process, we should focus on reducing the data transmission delay in the train-to-ground communication process.
Based on the qualitative analysis results, in order to further ensure the reliability of the method, the train tracking interval under edge computing is calculated based on the mapping relationship between data processing delay and train safety tracking interval. The tracking interval represents the time interval between adjacent trains passing a certain same point, reflecting the line’s capacity. It is mainly determined by the train length , braking reaction time travel distance , braking distance , safety margin distance , and the distance from the front train to the entrance of the blockage zone where it is located . The details are as follows:
(9)
If the train runs in a uniform deceleration state during the deceleration process and the common braking deceleration is a, the tracking interval is as follows, where v is the train speed:
(10)
The corresponding train speed protection curve is obtained according to the tracking separation distance, as shown in Figure 9.
When the train has positioning errors, it will affect the tracking interval. At this time, the tracking interval of the train needs to consider the size of the train positioning error, as shown in Figure 10.
The increase in data processing delay will lead to an increase in train positioning error, thus affecting the train tracking interval. The tracking interval considering the impact of the data processing delay is as follows, where is the additional data processing delay.
(11)
Based on the simulation results, the distribution of data processing delays of the method under the worst case scenario (equal probability of communication link interruption, packet loss and bit error, and successful transmission during the communication process) is analyzed.
The simulation parameters are derived from the relevant literature, and their values are presented in Table 10. The function in the table represents the exponential distribution, where . The delay follows an exponential distribution, expressed as follows:
(12)
where the mean of the distribution is and the variance is . This distribution is used for modeling data transmission delays, edge computing delays, onboard computing delays, and communication chain building delays.As shown in Figure 11, the maximum processing time for train positioning data during the simulation is 3053 milliseconds. To prevent unnecessary braking within data processing cycles, the minimum tracking interval, calculated using Equation (11), must be more than 159 s. This ensures that the two trains maintain a safe operational distance under the edge computing-based train fusion positioning method.
The current operational status of rail transit systems in China indicates that train tracking intervals predominantly exceed 180 s. The novel train positioning system proposed in this study not only establishes a robust autonomous positioning solution, but also provides technical support for achieving shorter operational intervals through enhanced positioning accuracy. This system demonstrates significant potential for improving transportation efficiency in existing rail networks, while holding substantial engineering application value for advancing high-density train scheduling.
7. Conclusions
This study presents a comprehensive model of a train fusion positioning method utilizing edge computing, constructed and validated through the use of CPNs. Initially, the data processing flow of the method is rigorously defined within a hierarchical CPN model. Following the confirmation of the model’s validity, the method’s functional safety is assessed using state-space analysis. The findings indicate that the proposed positioning method maintains the integrity of train positioning functions across various fault scenarios. Further analysis identifies the three primary factors influencing the data processing delay of the method, highlighting that the delay in data transmission significantly impacts the positioning accuracy. Thus, enhancing the data transmission rate is pivotal in the design of actual systems. Moreover, by examining the relationship between positioning data processing delays and the minimal tracking interval, the study calculates the shortest tracking interval that ensures safe train operations under specified conditions, effectively mitigating potential train conflicts due to processing delays.
Despite these contributions, the study acknowledges several limitations that pave the way for future research. Firstly, the employed CPN model, while effective in abstractly simulating the method’s workflow, requires further refinement to mirror the intricacies of real-world systems more closely and achieve higher fidelity in the simulation of information exchange processes. Secondly, the optimization method for computational resources on edge servers is based on the assumption of simultaneous data arrival from all trains, an idealization that overlooks the stochastic nature of data arrival in practical implementations. Addressing this gap by considering the randomness in data arrival could enhance the method’s applicability. Lastly, the GNSS/INS fusion method’s reliance on historical data for training introduces variability in model performance due to differences in driving patterns influenced by human or external factors, suggesting a need to improve model generalizability and reduce prediction errors. Addressing these limitations will significantly advance the development of real-time, accurate train control systems.
Conceptualization, H.S.; Methodology, H.Y.; Validation, R.W.; Formal analysis, Z.D.; Investigation, R.W.; Resources, H.S.; Writing—original draft, H.Y.; Writing—review and editing, M.Z.; Supervision, H.S. and H.D.; Project administration, H.D. All authors have read and agreed to the published version of the manuscript.
The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.
All authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Figure 7. Probability density distribution of data processing delay under different impact factors.
Figure 8. Cumulative distribution of data processing delay under different impact factors.
Transition module’s places and transitions.
Name | Type | Description |
---|---|---|
TrainSend | Place | Vehicle transmission buffer |
TrainRecv | Place | Vehicle receiving buffer |
EdgeSend | Place | Edge transmission buffer |
EdgeRecv | Place | Edge receiving buffer |
Count | Place | Transfer failure count |
Uplink | Transition | Uplink transmission |
Downlink | Transition | Downlink transmission |
Break | Transition | Communication disconnection |
Vehicle module’s place and transition.
Name | Type | Description |
---|---|---|
TrainState | Place | Vehicle terminal status |
ComState | Place | Communication status |
ScanResult | Place | Chain building results |
RecvBuffer | Place | Receive buffer |
SendBuffer | Place | Send buffer |
Sensor | Place | Sensor data |
CPU | Place | Vehicle processor |
Resource | Place | Onboard computing resources |
Result | Place | Onboard calculation results |
FailCount | Place | Transfer failure count |
BreakCount | Place | Chain building failure count |
Scan | Transition | Attempting to establish a link |
Miss | Transition | Link establishment failed |
Detected | Transition | Link established successfully |
DataArrive | Transition | Sensor data generation |
Send | Transition | Data transmission |
Recv | Transition | Data reception |
Fail | Transition | Packet loss error code |
Reject | Transition | Refuse to handle |
Permit | Transition | Allow processing |
EdgeCorrect | Transition | Edge position correction |
LocalCorrect | Transition | Vehicle end position correction |
PosUpdate | Transition | Update positioning results |
Break | Transition | Communication disconnection |
Compute | Transition | Vehicle data processing |
Abandon | Transition | Abort upload |
LocalProc | Transition | Task local processing |
Places and transitions in the edge module.
Name | Type | Description |
---|---|---|
EdgeRecv | Place | Receiving buffer |
EdgeSend | Place | Transmission buffer |
Queue | Place | Task waiting queue |
CPU | Place | Task execution pool |
Resources | Place | Computing resource |
Recv | Transition | Data reception |
Apply | Transition | Data processing |
Output | Transition | Data output |
Judge | Transition | Resource judgment |
ReSend | Transition | Data retransmission |
Method operability verification in different cases.
ASK-CTL |
---|
Case 1: fun Unexpect n = (Mark.Train1’ScanResult 1 n = [UNSUCCESS] |
orelse Mark.Train1’RecvBuffer 1 n = [BREAK]); |
Case 2: fun Unexpect n = (Mark.Train1’RecvBuffer 1 n = [FAIL] |
orelse Mark.Top’Count 1 n <>[(1,0)]); |
Case 3: fun Unexpect n = (Mark.Edge’Resources 1 n = [0] |
andalso size(Mark.Edge’Queue 1 n) <>0); |
val UnexpectList = PredAllNodes(fn n=>(Unexpect n)) |
fun Expect n = (Mark.Train1’TrainState 1 n = [UPDATED]); |
val myASKCTLformula = POS(MODAL(NF(“STILL WORK”,Expect))); |
fun verify n = eval_arc myASKCTLformula n; |
val results = map verify UnexpectList; |
if(cf(true,results) >0) |
then print “The method works normally” |
else print “The method works abnormally” |
Result |
val Unexpect = fn: Node ->bool |
val Expect = fn: Node ->bool |
val myASKCTLformula = |
EXIST UNTIL(TT,MODAL(NF(“STILL WORK”,fn))): A |
val verify = fn: Arc ->bool |
val results = [true,true,true,…]: bool list |
The method works normally |
Method security validation.
ASK-CTL |
---|
Case 4: fun Unexpect n = (Mark.Train1’TrainState 1 n = [UPDATED] |
orelse Mark.Train2’TrainState 1 n) = [UPDATED]); |
val myASKCTLformula = EV(NF(“always get results”, Result)); |
eval_ node myASKCTLformula InitNode; |
Result |
val Result= fn: Node ->bool |
val myASKCTLformula = |
FORALL_ UNTIL(TT,NF(“ALWAYS GET RESULT”,fn)): A |
val it = true: bool |
Influencing factor levels.
Level | Transmission Success (%) | Delay (ms) | Computing Latency (ms) |
---|---|---|---|
1 | 99 | 1 | 5 |
2 | 95 | 5 | 10 |
3 | 90 | 10 | 20 |
Comparative experimental results.
No. | Trans. Success (%) | Delay (ms) | Comp. Latency (ms) | Proc. Delay (ms) |
---|---|---|---|---|
1 | 99 | 1 | 5 | 15.03 |
2 | 95 | 5 | 10 | 36.81 |
3 | 90 | 10 | 20 | 69.83 |
4 | 99 | 1 | 20 | 29.85 |
5 | 95 | 10 | 5 | 53.67 |
6 | 90 | 5 | 10 | 37.63 |
7 | 99 | 10 | 10 | 55.82 |
8 | 95 | 5 | 20 | 46.28 |
9 | 90 | 1 | 5 | 15.45 |
Range analysis results.
Impact Level | Trans. Success (%) | Trans. Delay | Comp. Latency |
---|---|---|---|
1 | 33.57 | 20.11 | 28.05 |
2 | 45.59 | 40.24 | 43.42 |
3 | 40.97 | 59.77 | 48.65 |
Range | 12.02 | 39.66 | 20.60 |
Variance analysis results.
Item | Sum of Squares | Freedom | MSE | F Value |
---|---|---|---|---|
Trans. Success | 220.6 | 2 | 110.302 | 65.73 |
Trans. Delay | 1799.33 | 2 | 899.665 | 536.14 |
Comp. Latency | 688.12 | 2 | 344.061 | 205.04 |
Error | 3.36 | 2 | 1.678 | — |
Total | 2711.41 | 8 | — | — |
Simulation parameter setting.
Parameter | Value |
---|---|
Train length (m) | 180 |
Reaction time travel distance (m) | 416 |
Protection distance (m) | 110 |
Block zone length (m) | 1950 |
Position error (m) | 10 |
Service braking deceleration (m/ | 0.671 |
Data transmission delay (ms) | Exp (1/10) |
Edge computing delay (ms) | Exp (1/40) |
Onboard computing delay (ms) | Exp (1/200) |
Communication chain building delay (ms) | Exp (1/150) |
Train speed (km/h) | 300 |
Maximum number of retransmissions | 3 |
References
1. Song, H.; Sun, Z.; Wang, H.; Qu, T.; Zhang, Z.; Dong, H. Enhancing train position perception through AI-driven multi-source information fusion. Control Theory Technol.; 2023; 21, pp. 425-436. [DOI: https://dx.doi.org/10.1007/s11768-023-00158-7]
2. Jiang, W.; Liu, M.; Cai, B.; Rizos, C.; Wang, J. An accurate train positioning method using tightly-coupled GPS plus BDS PPP/IMU strategy. GPS Solut.; 2022; 26, [DOI: https://dx.doi.org/10.1007/s10291-022-01250-2]
3. Song, X.; Song, H.; Wang, H.; Zhang, Z.; Dong, H. Deep Learning-Based Railway Foreign Object Intrusion Intelligent Perception Using Attention-Aggregated Semantic Segmentation. IEEE/ASME Trans. Mechatron.; 2024; pp. 1-11. [DOI: https://dx.doi.org/10.1109/TMECH.2024.3468620]
4. Huang, K.; Shen, Y.; Chen, J.; Wang, L.; Wang, S.; Dai, P. FRVO-Mono: Feature-Based Railway Visual Odometry with Monocular Camera. IEEE Trans. Instrum. Meas.; 2023; 72, 5030510. [DOI: https://dx.doi.org/10.1109/TIM.2023.3324678]
5. Liu, R.; Geng, C. Research on Train Positioning Technology of Urban Rail Transit Based on Lidar. Proceedings of the IEEE 7th International Conference on Intelligent Transportation Engineering (ICITE); Beijing, China, 11–13 November 2022; pp. 101-105. [DOI: https://dx.doi.org/10.1109/ICITE56321.2022.10101461]
6. Ko, K.; Byun, I.; Ahn, W.; Shin, W. High-Speed Train Positioning Using Deep Kalman Filter with 5G NR Signals. IEEE Trans. Intell. Transp. Syst.; 2022; 23, pp. 15993-16004. [DOI: https://dx.doi.org/10.1109/TITS.2022.3146932]
7. Nai, W.; Chen, Y.; Zhang, X.; Lei, X.; Dong, D. A train positioning algorithm based on inflexion analysis by using sets of distance measurement data collected from on-board laser ranging equipments. Proceedings of the 2017 3rd IEEE International Conference on Computer and Communications (ICCC); Chengdu, China, 13–16 December 2017; pp. 901-904. [DOI: https://dx.doi.org/10.1109/CompComm.2017.8322674]
8. Zhou, Y.; Lai, S.; Cheng, H.; Redhwan, A.H.M.; Wang, P.; Zhu, J.; Gao, Z.; Ma, Z.; Bi, Y.; Lin, F. et al. Toward Autonomy of Micro Aerial Vehicles in Unknown and Global Positioning System Denied Environments. IEEE Trans. Ind. Electron.; 2021; 68, pp. 7642-7651. [DOI: https://dx.doi.org/10.1109/TIE.2020.3008378]
9. Yang, Z.; Hu, Y.; Xu, Q. A Review of Task Offloading in Edge Computing for Intelligent and Connected Vehicles. J. Chongqing Jiaotong Univ. (Nat. Sci. Ed.); 2024; 43, pp. 98-110.
10. Brik, B.; Ksentini, A. Toward Optimal MEC Resource Dimensioning for a Vehicle Collision Avoidance System: A Deep Learning Approach. IEEE Netw.; 2021; 35, pp. 74-80. [DOI: https://dx.doi.org/10.1109/MNET.011.2000577]
11. Song, H.; Gao, S.; Li, Y.; Liu, L.; Dong, H. Train-Centric Communication Based Autonomous Train Control System. IEEE Trans. Intell. Veh.; 2023; 8, pp. 721-731. [DOI: https://dx.doi.org/10.1109/TIV.2022.3192476]
12. Zhu, L.; Gong, T.; Wei, S.; Yu, F.R. Collaborative Train and Edge Computing in Edge Intelligence Based Train Autonomous Operation Control Systems. IEEE Trans. Intell. Transp. Syst.; 2024; 25, pp. 11991-120041. [DOI: https://dx.doi.org/10.1109/TITS.2024.3382747]
13. Li, L.; Niu, Y.; Mao, S.; Ai, B.; Zhong, Z.; Wang, N.; Chen, Y. Resource Allocation and Computation Offloading in a Millimeter-Wave Train-Ground Network. IEEE Trans. Veh. Technol.; 2022; 71, pp. 10615-10630. [DOI: https://dx.doi.org/10.1109/TVT.2022.3185331]
14. Saki, M.; Abolhasan, M.; Lipman, J. A Novel Approach for Big Data Classification and Transportation in Rail Networks. IEEE Trans. Intell. Transp. Syst.; 2020; 21, pp. 1239-1249. [DOI: https://dx.doi.org/10.1109/TITS.2019.2905611]
15. Pencheva, E.; Atanasov, I. Application Initiated Data Session as a Service for High Reliable and Safe Railway Communications. Proceedings of the Advances in Computing and Data Sciences (ICACDS 2022), PT II; Kurnool, India, 22–23 April 2022; Volume 1614, pp. 24-37.
16. Li, Z.; Taiyuan, G.; Hao, L.; Tao, T.; Xi, W.; Hongwei, W. Application of Edge Intelligence in Rail Transit: Prospects and Outlook. J. Electron. Inf. Technol.; 2023; 45, pp. 1514-1528.
17. Liu, J.; Wu, H.; Li, P. Research on Edge Computing Security in Railway 5G Mobile Communication Systems. J. Comput. Eng. Appl.; 2021; 57, pp. 1-10.
18. Woodcock, J.; Larsen, P.G.; Bicarregui, J.; Fitzgerald, J. Formal methods: Practice and experience. ACM Comput. Surv. (CSUR); 2009; 41, pp. 1-36.
19. Barišić, A.; Ruchkin, I.; Savić, D.; Mohamed, M.A.; Al-Ali, R.; Li, L.W.; Mkaouar, H.; Eslampanah, R.; Challenger, M.; Blouin, D. et al. Multi-paradigm modeling for cyber–physical systems: A systematic mapping review. J. Syst. Softw.; 2022; 183, 111081.
20. Giua, A.; Seatzu, C. Modeling and Supervisory Control of Railway Networks Using Petri Nets. IEEE Trans. Autom. Sci. Eng.; 2008; 5, pp. 431-445. [DOI: https://dx.doi.org/10.1109/TASE.2008.916925]
21. Song, H.; Li, L.; Li, Y.; Tan, L.; Dong, H. Functional Safety and Performance Analysis of Autonomous Route Management for Autonomous Train Control System. IEEE Trans. Intell. Transp. Syst.; 2024; 25, pp. 13291-13304. [DOI: https://dx.doi.org/10.1109/TITS.2024.3402435]
22. Das, M.; Mohan, B.R.; Guddeti, R.M.R.; Rodagi, K.; Harale, M.; Kerkar, A.; Jain, R. Safety Assessment of Railway Crossing Junction Via Petri Nets. Proceedings of the 2024 5th International Conference on Innovative Trends in Information Technology (ICITIIT); Kottayam, India, 15–16 March 2024; pp. 1-8. [DOI: https://dx.doi.org/10.1109/ICITIIT61487.2024.10580646]
23. Outafraout, K.; Nait-Sidi-Moh, A.; Chakir El Alaoui, E.H. A Control Approach Based on Colored Hybrid Petri Nets and (Max, plus) Algebra: Application to Multimodal Transportation Systems. IEEE Trans. Autom. Sci. Eng.; 2020; 17, pp. 1208-1220. [DOI: https://dx.doi.org/10.1109/TASE.2020.2973996]
24. Zhou, Y.X.; Ni, F.; Liu, J.; Xiao, Y.T.; Zhu, J.Y. An Executable Modeling Method of CPN Based on i-BPMN Business Architecture. Adv. Appl. Math.; 2023; 12, 550.
25. Wu, D.; Lu, D.; Tang, T. Qualitative and Quantitative Safety Evaluation of Train Control System (CTCS) Using Stochastic Colored Petri Nets. IEEE Trans. Intell. Transp. Syst.; 2022; 23, pp. 10223-10238. [DOI: https://dx.doi.org/10.1109/TITS.2021.3088136]
26. Yazdi, M.; Mohammadpour, J.; Li, H.; Huang, H.Z.; Zarei, E.; Pirbalouti, R.G.; Adumene, S. Fault tree analysis improvements: A bibliometric analysis and literature review. Qual. Reliab. Eng. Int.; 2023; 39, pp. 1639-1659. [DOI: https://dx.doi.org/10.1002/qre.3271]
27. Machado, P.G.; Ribeiro, C.d.O.; do Nascimento, C.A.O. Risk analysis in energy projects using Bayesian networks: A systematic review. Energy Strateg. Rev.; 2023; 47, 101097. [DOI: https://dx.doi.org/10.1016/j.esr.2023.101097]
28. Gupta, M.; Bhargava, A. Optimal selection and analysis of microgrid energy system using Markov process. Sustain. Energy Technol. Assess.; 2024; 62, 103623. [DOI: https://dx.doi.org/10.1016/j.seta.2024.103623]
29. Zroug, S.; Remadna, I.; Kahloul, L.; Terrissa, S.L.; Benharzallah, S. Towards performance evaluation prediction in WSNs using artificial neural network multi-perceptron. Clust. Comput.; 2023; 26, pp. 1405-1423.
30. Yang, Z.; Datian, Z.; Hongjie, L.; Bo, L. Train Speed Measurement and Positioning Method Based on Multi-Sensor Fusion. Urban Rail Transit; 2011; 24, pp. 30-32.
31. Wu, W.; Song, H.; Wang, H.; Dong, H. Potential game based task offloading in the high-speed railway with reinforcement learning. IEEE Trans. Intell. Transp. Syst.; 2023; 24, pp. 12671-12685.
32. Ferrari, A.; Mazanti, F.; Basile, D.; Terbeck, M.H. System Evaluation and Usability Analysis of a Formal Method Tool for Railway Signaling System Design. IEEE Trans. Softw. Eng.; 2022; 48, pp. 4675-4691. [DOI: https://dx.doi.org/10.1109/TSE.2021.3124677]
33. Liang, Z.; Xianan, C.; Bin, S. Review of Model Based Mission Assurance for Complex System. J. Comput. Eng. Appl.; 2022; 58, pp. 30-39. [DOI: https://dx.doi.org/10.3778/j.issn.1002-8331.2203-0617]
34. Xu, Q.; Lin, J.T. Safety Requirement Verification of Train-Centric CBTC by Integrating STPA with Coloured Petri Net. Int. J. Ind. Syst. Eng.; 2023; 43, pp. 168-189.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
For train control systems, the accuracy of positioning tracking is essential for ensuring the safety and efficiency of operations. Multi-source information fusion techniques can improve positioning accuracy, but the computational limitations of onboard equipment impede the real-time processing capabilities required by advanced information fusion algorithms. An innovative approach, which combines multi-sensor information fusion with edge computing, is proposed to reduce the computational load on onboard systems and accelerate data processing. Colored Petri Nets (CPNs) are utilized for the modeling and validation of the algorithm. State-space analysis is used to evaluate the functional safety of the proposed method. Numerical simulations are performed to identify the key factors affecting the train positioning method’s performance. These simulations also determine the minimal tracking interval required for effective operation under edge computing. The results show that the edge computing-based train fusion positioning method reduces data processing delays and improves positioning accuracy. This approach offers a practical solution for real-time and accurate train control systems.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details





1 School of Electronic Information Engineering, Beihang University, Beijing 100191, China;
2 School of Automation and Intelligence, Beijing Jiaotong University, Beijing 100044, China;
3 College of Electrical Engineering and Automation, Shandong University of Science and Technology, Qingdao 266590, China;