Loading [MathJax]/jax/output/SVG/jax.js
Research article Special Issues

Empowering high-speed train positioning: Innovative paradigm for generating universal virtual positioning big data

  • High-speed trains (HSTs) positioning is a critical technology that affects the safety and operational efficiency of trains. The unique operating environment of HSTs, coupled with the limitations of real data collection, poses challenges in obtaining large-scale and diverse positioning data. To tackle this problem, we introduce a comprehensive method for generating virtual position data for HSTs. Utilizing virtual simulation technology and expert expertise, this method constructs a HST operating simulation environment on the Unity 3D platform, effectively simulating a range of operating scenarios and complex scenes. Positioning data is collected using virtual sensors, while error characteristics are incorporated to emulate real data collection behavior. The contribution of this paper lies in providing abundant, reliable, controllable and diverse positioning data for HSTs, thereby offering novel insights and data support for the evaluation and optimization of positioning algorithms. This method is not only applicable to various routes and scenarios, but also delivers fresh perspectives on data generation for research in other domains, boasting a broad scope of application.

    Citation: Xiaoyu Zheng, Dewang Chen, Liping Zhuang. Empowering high-speed train positioning: Innovative paradigm for generating universal virtual positioning big data[J]. Electronic Research Archive, 2023, 31(10): 6197-6215. doi: 10.3934/era.2023314

    Related Papers:

    [1] Ailing Xiang, Liangchen Wang . Boundedness of a predator-prey model with density-dependent motilities and stage structure for the predator. Electronic Research Archive, 2022, 30(5): 1954-1972. doi: 10.3934/era.2022099
    [2] Jialu Tian, Ping Liu . Global dynamics of a modified Leslie-Gower predator-prey model with Beddington-DeAngelis functional response and prey-taxis. Electronic Research Archive, 2022, 30(3): 929-942. doi: 10.3934/era.2022048
    [3] Jiani Jin, Haokun Qi, Bing Liu . Hopf bifurcation induced by fear: A Leslie-Gower reaction-diffusion predator-prey model. Electronic Research Archive, 2024, 32(12): 6503-6534. doi: 10.3934/era.2024304
    [4] Xuemin Fan, Wenjie Zhang, Lu Xu . Global dynamics of a predator-prey model with prey-taxis and hunting cooperation. Electronic Research Archive, 2025, 33(3): 1610-1632. doi: 10.3934/era.2025076
    [5] Shuxia Pan . Asymptotic spreading in a delayed dispersal predator-prey system without comparison principle. Electronic Research Archive, 2019, 27(0): 89-99. doi: 10.3934/era.2019011
    [6] Yuan Tian, Yang Liu, Kaibiao Sun . Complex dynamics of a predator-prey fishery model: The impact of the Allee effect and bilateral intervention. Electronic Research Archive, 2024, 32(11): 6379-6404. doi: 10.3934/era.2024297
    [7] Érika Diz-Pita . Global dynamics of a predator-prey system with immigration in both species. Electronic Research Archive, 2024, 32(2): 762-778. doi: 10.3934/era.2024036
    [8] Miao Peng, Rui Lin, Zhengdi Zhang, Lei Huang . The dynamics of a delayed predator-prey model with square root functional response and stage structure. Electronic Research Archive, 2024, 32(5): 3275-3298. doi: 10.3934/era.2024150
    [9] Pinglan Wan . Dynamic behavior of stochastic predator-prey system. Electronic Research Archive, 2023, 31(5): 2925-2939. doi: 10.3934/era.2023147
    [10] Ling Xue, Min Zhang, Kun Zhao, Xiaoming Zheng . Controlled dynamics of a chemotaxis model with logarithmic sensitivity by physical boundary conditions. Electronic Research Archive, 2022, 30(12): 4530-4552. doi: 10.3934/era.2022230
  • High-speed trains (HSTs) positioning is a critical technology that affects the safety and operational efficiency of trains. The unique operating environment of HSTs, coupled with the limitations of real data collection, poses challenges in obtaining large-scale and diverse positioning data. To tackle this problem, we introduce a comprehensive method for generating virtual position data for HSTs. Utilizing virtual simulation technology and expert expertise, this method constructs a HST operating simulation environment on the Unity 3D platform, effectively simulating a range of operating scenarios and complex scenes. Positioning data is collected using virtual sensors, while error characteristics are incorporated to emulate real data collection behavior. The contribution of this paper lies in providing abundant, reliable, controllable and diverse positioning data for HSTs, thereby offering novel insights and data support for the evaluation and optimization of positioning algorithms. This method is not only applicable to various routes and scenarios, but also delivers fresh perspectives on data generation for research in other domains, boasting a broad scope of application.



    This paper is devoted to the existence of weak solutions to the Cauchy problem for the two-component Novikov equation [18]

    {mt+uvmx+(2vux+uvx)m=0,m=uuxx,t>0,nt+uvnx+(2uvx+vux)n=0,n=vvxx. (1)

    Note that this system reduces respectively to the Novikov equation [23]

    mt+3uuxm+u2mx=0, (2)

    when v=u, and the celebrated Camassa-Holm (CH) equation [1]

    mt+2uxm+umx=0, (3)

    when v=1.

    The CH equation was proposed as a nonlinear model describing the unidirectional propagation of the shallow water waves over a flat bottom [1]. Based on the Hamiltonian theory of integrable systems, it was found earlier by using the method of recursion operator due to Fuchssteiner and Fokas [10]. It can also be obtained by using the tri-Hamiltonian duality approach related to the bi-Hamiltonian representation of the Korteweg-de Vries (KdV) equation [9,25]. The CH equation exhibits several remarkable properties. One is the the existence of the multi-peaked solitons on the line R and unit circle S1 [1,2], where the peaked solitons are the weak solution in the sense of distribution. Second, it can describes wave breaking phenomena [4], which is different from the classical integrable systems. The existence of H1-conservation law to the CH equation enables ones to define the H1-weak solution [28]. There have been a number of results concerning about integrability, well-posedness, blow up and wave breaking, orbital stability in the energy space and geometric formulations etc, see for instance [4,5,6,8,28] and references therein.

    The Novikov equation (2) can be viewed as a cubic generalization of the CH equation, which was introduced by Novikov [23,24] in the classification for a class of equations while they possesses higher-order generalized symmetries. Eq. (2) was proved to be integrable since it enjoys Lax-pair and bi-Hamiltonian structure [14], and is equivalent to the first equation in the negative flow of the Sawada-Kotera hierarchy via Liouville transformation [16]. The Novikov equation (2) also admits peaked solitons over the line R and unit circle S1 [14,20], which can be derived by the inverse spectral method. Orbital stability of peaked solitons over the line R and unit circle S1 of (2) in the energy space were verified [20] based on the conservation laws and the structure of peaked solitons of the Novikov equation (2). The well-posedness and wave breaking of the Novikov equation have been discussed in a number of papers, and it reveals that the Cauchy problem of the Novikov equation (2) has global strong solutions when the initial data u0Hs, s>3/2 [3,15,26,27]. The existence of global weak solutions to the Cauchy problem of the Novikov equation (2) was also discussed in [17].

    As the two-component generalization of Novikov equation (2), the so-called Geng-Xue system [11]

    mt+3vuxm+uvmx=0,nt+3uvxn+uvnx=0, (4)

    has been studied extensively [11,13]. The integrability [11,19], dynamics and structure of the peaked solitons of (4) [21] were discussed. In [13], well-posedness and wave breaking phenomena of the Cauchy problem of (4) were discussed. The single peakons and multi-peakons of system (4) were constructed in [21] by using compatibility of Lax-pair, which are not the weak solutions in the sense of distribution. Furthermore, the Geng-Xue system does not have the H1-conserved density, this is different from the CH and Novikov equations. The weak solution in H1 is not well-defined since it does not obey the H1-conservation law.

    The main object in this work is to investigate the existence of weak solutions to system (1). It is of great interest to understand the effect from interactions among the two-components, nonlinear dispersion and various nonlinear terms. More specifically, we shall consider the Cauchy problem of (1) and aim to leverage ideas from previous works on CH and Novikov equations. The weak solution of the Cauchy problem associated with (1) is established in Theorem 3.1.

    The remainder of this paper is organized as follows. In the next section 2, we review some basic results and lemmas as well as invariant properties of momentum densities m and n. In Section 3, we establish the existence of weak solutions, our approach is the regular approximation method together with some a priori estimates.

    In this section, we recall the local well-posedness, some properties of strong and weak solutions to equation (1) and several approximation results.

    First, we introduce some notations. Throughout the paper, we denote the convolution by . Let X denote the norm of Banach space X and let , denote the duality paring between H1(R) and H1(R). Let M(R) be the space of Radon measures on R with bounded total variation and M+(R) be the subset of positive Radon measures. Moreover, we write BV(R) for the space of functions with bounded variation, V(f) being the total variation of fBV(R). Furthermore, for 0<p<, s0, let Lp and s denote the norm of Lp(R) space and Hs(R) space, respectively.

    With m=uuxx and n=vvxx, the Cauchy problem of equation (1) takes the form:

    {mt+uvmx+(2vux+uvx)m=0,m=uuxx,t>0,xR,nt+uvnx+(2uvx+vux)n=0,n=vvxx,u(0,x)=u0(x),v(0,x)=v0(x),xR. (5)

    Note that if P(x)=12e|x|, xR, we have (12x)1f=Pf for all the fL2(R) and Pm=u, Pn=v. Then we can rewrite the equation (5) as follows:

    {ut+uvux+Px(12u2xv+uuxvx+u2v)+12P(u2xvx)=0,t>0,xR,vt+uvvx+Px(12v2xu+vvxux+v2u)+12P(v2xux)=0,u(0,x)=u0(x),v(0,x)=v0(x),xR. (6)

    Next we recall the local well-posedness and the conservation laws.

    Lemma 2.1. [12] Let u0,v0Hs(R), s3. Assume that T=T(u0,v0)>0 be the maximal existence time of the corresponding strong solution (u,v). Then the initial value problem of system (1) possesses a strong solution

    u,vC([0,T);Hs(R))C1([0,T);Hs1(R))

    Moreover, the solution depends continuously on the initial data, i.e. the mapping (u0,v0)(u(,u0),v(,v0)):Hs(R)×Hs(R)C([0,T);Hs(R))C1([0,T);Hs1(R))×C([0,T);Hs(R))C1([0,T);Hs1(R)) is continuous.

    Lemma 2.2. [12] Let u0,v0Hs(R), s3, and let (u(t,x),v(t,x)) be the corresponding solution to equation (1) with the initial data (u0,v0). Then we have

    R(u2(t,x)+u2x(t,x))dx=R(u20+u20x)dx,R(v2(t,x)+v2x(t,x))dx=R(v20+v20x)dx,R(u(t,x)v(t,x)+ux(t,x)vx(t,x))dx=R(u0v0+u0xv0x)dx.

    Moreover, we have

    |u(t,x)|22u01,|v(t,x)|22v01.

    Note that equation (1) has the solitary waves with corner at their peaks. Obviously, such solitons are not strong solutions to equation (6). In order to provide a mathematical framework for the study of these solitons, we define the notion of weak solutions to equation (6). Let

    Fu(u,v)=uvux+Px(12u2xv+uuxvx+u2v)+12P(u2xvx),Fv(u,v)=uvvx+Px(12v2xu+vvxux+v2u)+12P(v2xux).

    Then equation (6) can be written as

    {ut+Fu(u,v)=0,vt+Fv(u,v)=0,u(0,x)=u0(x),v(0,x)=v0(x). (7)

    Lemma 2.3. [22] Let T>0. If

    f,gL2((0,T);H1(R))anddfdt,dgdtL2((0,T);H1(R)),

    then f,g are a.e. equal to functions continuous from [0,T] into L2(R) and

    f(t),g(t)f(s),g(s)=tsdf(τ)dτ,g(τ)dτ+tsdg(τ)dτ,f(τ)dτ

    for all s,t[0,T].

    Throughout this paper, let {ρn}n1 denote the mollifiers

    ρn=(Rρ(ξ)dξ)1nρ(nx),xR,n1,

    where ρCc(R) is defined by

    ρ(x)={e1x21,for|x|<1,0,for|x|1.

    Next, we recall two crucial approximation results and two identities.

    Lemma 2.4. [7] Let f:RR be uniformly continuous and bounded. If μM(R), then

    [ρn(fμ)(ρnf)(ρnμ)]0,asninL1(R).

    Lemma 2.5. [7] Let f:RR be uniformly continuous and bounded. If gL(R), then

    ρn(fg)(ρnf)(ρng)0,asninL(R).

    Lemma 2.6. [7] Assume that u(t,)W1,1(R) is uniformly bounded in W1,1(R) for all tR+. Then for a.e. tR+, there hold

    ddtR|ρnu|dx=R(ρnut)sgn(ρnu)dx

    and

    ddtR|ρnux|dx=R(ρnuxt)sgn(ρnux)dx.

    Consider the flow governed by (uv)(t,x):

    {dq(t,x)dt=(uv)(t,q),t>0,xR,q(0,x)=x,xR. (8)

    Applying classical results in the theory of ODEs, one can obtain the following useful result on the above initial value problem.

    Lemma 2.7. [12] Let u0,v0Hs(R), s3, and T>0 be the life-span of the corresponding strong solution (u,v) to equation (5) with the initial data (u0,v0). Then equation (8) has a unique solution qC1([0,T)×R,R). Moreover, the map q(t,) is an increasing diffeomorphism over R with

    qx=exp(t0(uv)x(s,q(s,x))ds),(t,x)[0,T)×R.

    Furthermore, setting m=uuxx and n=vvxx, we obtain

    m(t,q)=exp(t0(2vux+uvx)(s,q(s,x))ds)m0,n(t,q)=exp(t0(2uvx+vux)(s,q(s,x))ds)n0,(t,x)[0,T)×R.

    Theorem 2.8. Let u0,v0Hs(R), s3. Assume that m0=u02xu0 and n0=v02xv0 are nonnegative, and T>0 be the maximal existence time of the corresponding strong solution (u,v). Then the initial value problem of system (1) possesses a pair of unique strong solution (u,v), where

    u,vC([0,T);Hs(R))C1([0,T);Hs1(R)).

    Set m(t,)=u(t,)uxx(t,) and n(t,)=v(t,)vxx(t,). Then, Eu(u)=R(u2+u2x)dx, Ev(v)=R(v2+v2x)dx, H(u,v)=R(uv+uxvx)dx and E0(u,v)=R(mn)13dx are four conservation laws and we have for all tR+

    (i).m(t,)0,n(t,)0,u(t,)0,v(t,)0and|ux(t,)|u(t,),|vx(t,)|v(t,)onR;(ii).u(t,)L1m(t,)L1,u(t,)L22u(t,)1=22u01,andv(t,)L1n(t,)L1,v(t,)L22v(t,)1=22v01;(iii).ux(t,)L1m(t,)L1andvx(t,)L1n(t,)L1.

    Moreover, if m0,n0L1(R), we obtain

    m(t,)L1eu01v01tm0L1andn(t,)L1eu01v01tn0L1.

    Proof. Let u0,v0Hs(R), s3, and let T>0 be the maximal existence time of the solution (u,v) to equation (5) with the initial data (u0,v0). If m00 and n00, then Lemma 2.7 ensures that m(t,)0 and n(t,)0 for all t[0,). By u=Pm, v=Pn and the positivity of P, we infer that u(t,)0 and v(t,)0 for all t0. Note that v is analogous as u and

    u(t,x)=ex2xeym(t,y)dy+ex2xeym(t,y)dy, (9)

    and

    ux(t,x)=ex2xeym(t,y)dy+ex2xeym(t,y)dy. (10)

    From the above two relations and m0, we deduce that

    |ux(t,x)|u(t,x)22u(t,x)1.

    In view of Lemma 2.2, we obtain that Eu(u) and Ev(v) are conserved and

    u(t,x)22u01,(t,x)R+×R.

    Since m(t,x)=uuxx, it follows that u=Pm and ux=Pxm. Note that PL1=PxL1=1. Applying Young's inequality, one can easily obtain (i)(iii). Since equation (1) can be used to derive the following form

    ((mn)13)t+((mn)13uv)x=0,

    it immediately follows that E0(u,v) is a conserved density. On the other hand, by equation (5), we have

    ddtRm(t,x)dx=(uvmx+(2vux+uvx)m)dx=(vuxm(uvm)x)dxuLvLm(t,x)dxu01v01m(t,x)dx.

    Since m0L1(R), in view of Gronwall's inequality, we can get

    m(t,)L1eu01v01tm0L1.

    Similarly, we find

    n(t,)L1eu01v01tn0L1.

    This completes the proof of Theorem 2.8.

    In this section, we will prove that there exists a unique global weak solution to equation (6), provided the initial data (u0,v0) satisfy certain sign-invariant conditions.

    Theorem 3.1. Let u0,v0H1(R). Assume m0=u0u0xxandn0=v0v0xxM+(R).Then equation (6) has a pair of unique weak solution (u,v), where

    u,vW1,(Rx×R)L(R+;H1(R))

    with the initial data u(0,x)=u0,v(0,x)=v0 and such that m=uuxx,n=vvxxM+(R) are bounded on [0,T), for any fixed T>0. Moreover, Eu(u)=R(u2+u2x)dx, Ev(v)=R(v2+v2x)dx and H(u,v)=R(uv+vxux)dx are conserved densities.

    Proof. First, we shall prove u,vW1,(Rx×R)L(R+;H1(R)). Let u0,v0H1(R) and assume that m0=u0u0,xx,n0=v0v0,xxM+(R). Note that u0=Pm0 and v0=Pn0. Thus, we have for any fL(R),

    u0L1=Pm0L1=supfL1Rf(x)(Pm0)(x)dx=supfL1Rf(x)RP(xy)dm0(y)dx=supfL1R(Pf)(y)dm0(y)supfL1PL1fLm0M(R)=m0M(R). (11)

    Similarly, we have

    v0L1n0M(R). (12)

    We first prove that there exists a corresponding (u,v) with the initial data (u0,v0), which belongs to H1loc(R+×R)L(R+;H1(R))×H1loc(R+×R)L(R+;H1(R)), satisfying equation (6) in the sense of distributions.

    Let us define un0=ρnu0H(R) and vn0=ρnv0H(R) for n1. Obviously, we have

    un0u0H1(R),n,vn0v0H1(R),n, (13)

    and for all n1,

    un01=ρnu01u01,vn01v01,un0L1=ρnu0L1u0L1,vn0L1v0L1, (14)

    in view of Young's inequality. Note that for all n1,

    mn0=un0un0,xx=ρnm00,andnn0=vn0vn0,xx=ρnv00.

    Comparing with the proof of relation (11) and (12), we get

    mn0L1m0M(R),andnn0L1n0M(R),n1. (15)

    By Theorem 2.8, we obtain that there exists a global strong solution

    un=un(,un0),vn=vn(,vn0)C([0,T);Hs(R))C1([0,T);Hs1(R))

    for every s3, and we have un(t,x)unxx(t,x)0 and vn(t,x)vnxx(t,x)0 for all (t,x)R+×R. In view of theorem 2.8 and (14), we obtain for n1 and t0,

    unx(t,)Lun(t,)Lun(t,)1=un01u01,vnx(t,)Lvn(t,)Lvn(t,)1=vn01v01. (16)

    By the above inequality, we have

    un(t,)vn(t,)unx(t,)L2un(t,)Lvn(t,)Lunx(t,)L2un(t,)21vn(t,)1u021v01. (17)

    Similarly, we have

    vn(t,)un(t,)vnx(t,)L2v021u01. (18)

    By Young's inequality and (16), for all t0 and n1, we obtain

    Px(12(unx)2vn+ununxvnx+(un)2vn)+12P((unx)2vnx)L2PxL212(unx)2vn+ununxvnx+(un)2vnL1+12PL2(unx)2vnxL112unx2L2vnL+12unLunxL2vnxL2+un2L2vnL+12vnxLunx2L252un21vn152u021v01. (19)

    Similarly, we get

    Px(12(vnx)2un+vnunxvnx+(vn)2un)+12P((vnx)2unx)L252v021u01. (20)

    Combining (17)-(20) with equation (6) for all t0 and n1, we find

    ddtun(t,)L272u021v01,andddtvn(t,)L272v021u01. (21)

    For fixed T>0, by Theorem 2.8 and (21), we have

    T0R([un(t,x)]2+[unx(t,x)]2+[unt(t,x)]2)dxdt(u021+494u041v021)T,T0R([vn(t,x)]2+[vnx(t,x)]2+[vnt(t,x)]2)dxdt(v021+494v041u021)T. (22)

    It follows that the sequence {un}n1 is uniformly bounded in the space H1((0,T)×R).Thus we can extract a subsequence such that

    unkuweaklyinH1(0,T)×R)fornk (23)

    and

    unku,a.e.on(0,T)×Rfornk, (24)

    for some uH1((0,T)×R). By Theorem 2.8, (11) and (14), we have that for fixed t(0,T), the sequence unkx(t,)BV(R) satisfies

    V[unkx(t,)]=unkxx(t,)L1unk(t,)L1+mnk(t,)L12mnk(t,)L12eunk01vnk01tmnk0L12eu01v01tm0M(R)

    and

    unkx(t,)Lunk(t,)1=unk0(t,)1u01.

    Applying Helly's theorem, we obtain that there exists a subsequence, denoted again by {unkx(t,)}, which converges at every point to some function ˆu(t,) of finite variation with

    V[ˆu(t,)]2eu01v01tm0M(R).

    Since for almost all t(0,T), unkx(t,)ux(t,) in D(R) in view of (24), it follows that ˆu(t,)=ux(t,) for a.e. t(0,T). Therefore, we have

    unkxuxa.e.on(0,T)×Rfornk, (25)

    and for a.e. t(0,T),

    V[ux(t,)]=uxx(t,)M(R)2eu01v01tm0M(R).

    We can analogously extract a subsequence of {vnk}, denote again by {vnk} such that

    vnkva.e.on(0,T)×Rfornkandvnkxvxa.e.on(0,T)×Rfornk. (26)

    By Theorem 2.8 (ii)(iii) and (16), we have

    12(unx)2vn+ununxvnx+(un)2vn+12(unx)2vnxL13u021v01.

    For fixed t(0,T), it follows that the sequence {12(unx)2vn+ununxvnx+(un)2vn+12(unx)2vnx} is uniformly bounded in L1(R). Therefore, it has a subsequence converging weakly in L1(R), denoted again by {12(unx)2vn+ununxvnx+(un)2vn+12(unx)2vnx}. By (24) and (25), we deduce that the weak L1(R)-limit is 12(ux)2vn+uuxvx+u2v+12(ux)2vx. Note that P,PxL(R). It follows that

    Px[12(unx)2vn+ununxvnx+(un)2vn]+P(12(unx)2vnx)Px[12u2xvn+uuxvx+u2v]+P(12u2xvx),asn. (27)

    We can analogously obtain that

    Px[12(vnx)2un+vnvnxunx+(vn)2un]+P(12(vnx)2unx)Px[12v2xun+vvxux+v2u]+P(12v2xux),asn. (28)

    Combining (24)-(26) with (27) and (28), we deduce that (u,v) satisfies equation (6) in D((0,T)×R).

    Since unkt(t,) is uniformly bounded in L2(R) for all tR+ and unk(t,)1 has a uniform bound as tR+ and all n1. Hence the family tunk(t,)H1(R) is weakly equicontinuous on [0,T] for any T>0. An application of the Arzela-Ascoli theorem yields that {unk} contains a subsequence, denoted again by {unk}, which converges weakly in H1(R), uniformly in t[0,T]. The limit function is u. Because T is arbitrary, we have that u is locally and weakly continuous from [0,) into H1(R), i.e.

    uCw,loc(R+;H1(R)).

    For a.e. tR+, since unk(t,)u(t,) weakly in H1(R), in view of (15) and (16), we obtain

    u(t,)Lu(t,)1lim infnkun(t,)1=lim infnkunk0(t,)1lim infnkP1mnk0(t,)L1m0M(R), (29)

    for a.e. tR+. The previous relation implies that

    uL(R+×R)L(R+;H1(R)).

    Note that by Theorem 2.8 and (15), we have

    unx(t,)Lun(t,)Lun(t,)1P1mn0(t,)L1m0(t,)M(R). (30)

    Combining this with (25), we deduce that

    uxL(R+×R).

    This shows that

    uW1,(R+×R)L(R+;H1(R)).

    Taking the same way as u, we get

    vW1,(R+×R)L(R+;H1(R)).

    Please note that we use the subsequence of {vnk} which is determined after using the Arzela-Ascoli theorem.

    Now, by a regularization technique, we prove that Eu(u), Ev(v) and H(u,v) are conserved densities. As (u,v) solves equation (6) in the sense of distributions, we see that for a.e. tR+, n1,

    {ρnut+ρn(uvux)+ρnPx(12u2xv+uuxvx+u2v)+12ρnP(u2xvx)=0,ρnvt+ρn(uvvx)+ρnPx(12v2xv+vuxvx+v2u)+12ρnP(v2xux)=0. (31)

    By differentiation of the first equation of (31), we obtain

    ρnuxt+ρn(uvux)x+ρnPx(12u2xvx)+ρnPxx(12u2xv+uuxvx+u2v)=0. (32)

    Note that 2(Pf)=Pff, fL2(R). We can rewrite (32) as

    ρnuxt+ρnx(uvux)+ρnP(12u2xv+uuxvx+u2v)ρn(12u2xv+uuxvx+u2v)+ρnPx(12u2xvx)=0. (33)

    Take these two equation (32) and (33) into the integration below, we obtain

    12ddtR(ρnu)2+(ρnux)2dx=R(ρnu)(ρnut)+(ρnux)(ρnuxt)dx=R(ρnu)(ρn(uvux)+ρnPx(12u2xv+uuxvx+u2v)+ρnP(12u2xvx))dxR(ρnux)(ρnx(uvux)+ρnP(12u2xv+uuxvx+u2v)ρn(12u2xv+uuxvx+u2v)+ρnPx(12u2xvx))dx. (34)

    Note that

    limnρnuuL2=limnρn(uvux)uvuxL2=0.

    Therefore, by using H¨older inequality, we have for a.e. tR+

    R(ρnu)(ρn(uvux))dxRu2vuxdx,asn.

    Similarly, for a.e. tR

    R(ρnu)(ρnPx(12u2xv+uuxvx+u2v))dxRuPx(12u2xv+uuxvx+u2v)dx,asn,
    R(ρnu)(ρnP(12u2xvx))dxRuP(12u2xvx)dx,asn,
    R(ρnux)(ρnP(12u2xv+uuxvx+u2v))dxRuxP(12u2xv+uuxvx+u2v)dx,asn,
    R(ρnux)(ρn(12u2xv+uuxvx+u2v))dxRux(12u2xv+uuxvx+u2v)dx,asn,
    R(ρnux)(ρnPx(12u2xvx))dxRuxPx(12u2xvx)dx,asn,

    as u(t,),v(t,)H1(R) and ux,vxL(R+×R). Furthermore, note that

    R(ρnux)(ρnx(uvux))dx=R(ρn,xxu)(ρ(uvux))dx+R(ρn,xxu)(ρnuv)(ρnux)dx+12R(ρnux)2(ρn(uv)x)dx. (35)

    Observe that

    R(ρnux)2(ρn(uv)x)dxRu2x(uv)xdx,asn.

    On the other hand

    ρnxxuL1uxxM(R)2eu01v01tm0M(R),t[0,T).

    As u(t,),v(t,)H1(R) and ux,vxL(R+×R), by Lemma 2.5, it follows that

    (ρnuv)(ρnux)(ρn(uvux))L0,n.

    Therefore,

    R(ρn,xxu)((ρnuv)(ρnux)ρn(uvux))dx0,n.

    In view of the above relations and (35), we obtain

    R(ρnux)(ρnx(uvux))dx12Ru2x(uv)xdx,n. (36)

    Let us define

    Eun(t)=R(ρnu)2+(ρnux)2dx, (37)

    and

    Gun(t)=2R(ρnu)(ρn(uvux)+ρnPx(12u2xv+uuxvx+u2v)+ρnP(12u2xvx))dx2R(ρnux)(ρnx(uvux)+ρnP(12u2xv+uuxvx+u2v)ρn(12u2xv+uuxvx+u2v)+ρnPx(12u2xvx))dx.

    We have proved that for fixed T>0, for a.e. t[0,T),

    {ddtEun(t)=Gun(t),n1,Gun(t)0,n. (38)

    Therefore, we get

    Eun(t)Eun(0)=t0Gun(s)ds,t[0,T),n1. (39)

    By Young's inequality and H¨older's inequality, it follows that there is a Ku(T)>0 such that

    |Gun(t)|Ku(T),n1.

    In view of (38) and (39), an application of Lebesgue's dominated convergence theorem yields that for fixed a.e. tR+,

    limn(Eun(t)Eun(0))=0.

    By (24) and the above relation, for fixed tR+, we can get

    Eu(u)=limnEun(t)=limnEun(0)=Eu(u0).

    By Theorem 2.8, we infer that for all fixed tR+, Eu(u) is conserved. Similarly, we can show that Ev(v) is also conserved.

    Next, we prove that H(u,v) is a conserved density.

    By differentiation of the second equation of (31), we obtain this relation:

    ρnvxt+ρnx(uvvx)+ρnP(12v2xu+vuxvx+v2u)ρn(12v2xu+vuxvx+v2u)+ρnPx(12v2xux)=0. (40)

    In view of (31), (33) and (40), we obtain

    ddtR(ρnu)(ρnv)+(ρnux)(ρnvx)dx=R(ρnu)(ρnvt)+(ρnux)(ρnvxt)+(ρnut)(ρnv)+(ρnuxt)(ρnvx)dx=R(ρnu)(ρn(uvvx)+ρnPx(12v2xu+vuxvx+v2u)
    +ρnP(12v2xux))dxR(ρnux)(ρnx(uvvx)+ρnP(12v2xu+vuxvx+v2u)ρn(12v2xu+vuxvx+v2u)+ρnPx(12v2xux))dxR(ρnv)(ρn(vuux)+ρnPx(12u2xv+uuxvx+u2v)+ρnP(12u2xvx))dxR(ρnvx)(ρnx(uvux)+ρnP(12u2xv+uuxvx+u2v)ρn(12u2xv+uuxvx+u2v)+ρnPx(12u2xvx))dx. (41)

    We can analogously get the similar convergence like the case ddtR(ρnu)2+(ρnux)2dx by using Lemma 2.5, u(t,),v(t,)H1(R) and ux,vxL(R+×R).

    It is nature to define

    Hn(t)=R(ρnu)(ρnv)+(ρnux)(ρnvx)dx, (42)

    and

    Gu,vn(t)=R(ρnu)(ρn(uvvx)+ρnPx(12v2xu+vuxvx+v2u)+ρnP(12v2xux))dxR(ρnux)(ρnx(uvvx)+ρnP(12v2xu+vuxvx+v2u)ρn(12v2xu+vuxvx+v2u)+ρnPx(12v2xux))dxR(ρnv)(ρn(vuux)+ρnPx(12u2xv+uuxvx+u2v)+ρnP(12u2xvx))dxR(ρnvx)(ρnx(uvux)+ρnP(12u2xv+uuxvx+u2v)ρn(12u2xv+uuxvx+u2v)+ρnPx(12u2xvx))dx. (43)

    And it is easy to get

    Hn(t)Hn(0)=t0Gu,vn(s)ds,t[0,T),n1. (44)

    Similarly, we get this estimate by using Young's inequality and Holder's inequality:

    |Gu,vn(t)|Ku,v(T),n1.

    An application of Lebesgue's dominated convergence theorem yields that for fixed a.e. tR+,

    limn[Hn(t)Hn(0)]=0.

    By these convergence above, for fixed tR+, we can get

    H(u,v)=limnHn(t)=limnHn(0)=H(u0,v0),

    which indicates that H(u,v) is a conserved density.

    Since L1(R)(L(R))(C0(R))=M(R). It is not too hard to show that for a.e. t[0,T),

    m(t,)3eu01v01tm0M(R).

    For any fixed T, t[0,T), we have proved

    (u(t,)uxx(t,))M(R).

    Therefore, in view of (24) and (25), we obtain that for all t[0,T), as n,

    unk(t,)unkxx(t,)u(t,)uxx(t,)inD(R).

    Since unk(t,)unkxx(t,)0 for all (t,x)R+×R, we deduce that for a.e. t[0,T)

    u(t,)uxx(t,)M+(R).

    Similarly, we arrive at the conclusion:

    v(t,)vxx(t,)M+(R).

    Finally, we show the uniqueness of the weak solutions of equation (6). Let (u,v) and (ˉu,ˉv) be two weak solutions of equation (6) in the class

    (f,g)W1,(R+×R)L(R+;H1(R))×W1,(R+×R)L(R+;H1(R))

    Note that

    u(t,)uxx(t,)M(R)3eu01v01tm0M(R),v(t,)vxx(t,)M(R)3eu01v01tn0M(R)fora.e.t[0,T).

    Define

    M(T)=supt[0,T){u(t,)uxx(t,)M(R)+v(t,)vxx(t,)M(R)+ˉu(t,)ˉuxx(t,)M(R)+ˉv(t,)ˉvxx(t,)M(R)}.

    Then for fixed T, we obtain M(T)<. For all (t,x)[0,T)×R, in view of (11), we find that

    u(t,)L1PL1M(T)=M(T),ux(t,)L1PxL1M(T)=M(T),v(t,)L1,vx(t,)L1,ˉu(t,)L1,ˉux(t,)L1,ˉv(t,)L1andˉvx(t,)L1M(T). (45)

    On the other hand, from (29) and (30), we have

    u(t,)Lm0M(R)N,ux(t,)Lm0M(R)N,v(t,)Ln0M(R)N,vx(t,)Ln0M(R)N,ˉu(t,)L,ˉux(t,)L,ˉv(t,)Landˉvx(t,)LN. (46)

    Let us define

    ˆu(t,x)=u(t,x)ˉu(t,x)andˆv(t,x)=v(t,x)ˉv(t,x),(t,x)[0,T)×R.

    Convoluting equation (6) for (u,v) and (ˉu,ˉv) with ρn, we have that for a.e. t[0,T) and all n1,

    ddtR|ρnˆu|dx=Rρnˆutsgn(ρnˆu)dx=Rρn(ˆuvux+ˉuuxˆv+ˉuˉvˆux)sgn(ρnˆu)dxRρnPxx(12ˆu(ux+ˉux)v+12ˉu2xˆv+ˆuuxvx+ˉuvxˆux+ˉuˉuxˆvx+ˆu(u+ˉu)v+u2ˆv)sgn(ρnxˆu)dxRρn12P(ˆux(ux+ˉux)vx+ˉu2xˆvx)sgn(ρnˆu)dx. (47)

    Using (46) and Young's inequality, we infer that for a.e. t[0,T) and all n1

    ddtR|ρnˆu|dxC(R|ρnˆu|dx+R|ρnˆux|dx+R|ρnˆv|dx+R|ρnˆvx|dx). (48)

    where C is a constant depending on N. Similarly, convoluting equation (6) for (u,v) and (ˉu,ˉv) with ρn,x, it follows that

    ddtR|ρnˆux|dx=Rρnˆuxtsgn(ρnxˆu)dx=Rρn(ˆuvux+ˉuuxˆv+ˉuˉvˆux)xsgn(ρnxˆu)dxRρnPxx(12ˆu(ux+ˉux)v+12ˉu2xˆv+ˆuuxvx+ˉuvxˆux+ˉuˉuxˆvx+ˆu(u+ˉu)v+u2ˆv)sgn(ρnxˆu)dxRρn12Px(ˆux(ux+ˉux)vx+ˉu2xˆvx)sgn(ρnxˆu)dx=I1+I2+I3. (49)

    For the term I1, we have

    I1=Rρn(ˆuxvux+ˆuuxvx+ˆuvuxx+ˉuxuxˆv+ˉuuxxˆv+ˉuuxˆvx+ˉuxˉvˆux+ˉuˉvxˆux+ˉuˉvˆuxx)sgn(ρnxˆu)dxC(R|ρnˆu|dx+R|ρnˆux|dx+R|ρnˆv|dx+R|ρnˆvx|dx)Rρn(ˆuvuxx+ˉuuxxˆv+ˉuˉvˆuxx)sgn(ρnxˆu)dxC(R|ρnˆu|dx+R|ρnˆux|dx+R|ρnˆv|dx+R|ρnˆvx|dx)R(ρnˆuv)(ρnuxx)sgn(ρnxˆu)dxR(ρnˉuˆv)(ρnuxx)sgn(ρnxˆu)dxR(ρnˉuˉv)(ρnˆuxx)sgn(ρnxˆu)dx+Rn(t)
    C(R|ρnˆu|dx+R|ρnˆux|dx+R|ρnˆv|dx+R|ρnˆvx|dx)+R(ρn(ˆuv)x)(ρnux)sgn(ρnxˆu)dx+R(ρn(ˉuˆv)x)(ρnux)sgn(ρnxˆu)dx+R(ρn(ˉuˉv)x)(ρnˆux)sgn(ρnxˆu)dx+Rn(t)C(R|ρnˆu|dx+R|ρnˆux|dx+R|ρnˆv|dx+R|ρnˆvx|dx)+Rn(t), (50)

    where C is a constant depending on M(T), N, u01 and v01 and Rn(t) satisfies

    {Rn(t)0,n,|Rn(t)|κ(T),n1,t[0,T). (51)

    For the second term I2, we find

    I2=RρnPxx(12ˆu(ux+ˉux)v+12ˉu2xˆv+ˆuuxvx+ˉuvxˆux+ˉuˉuxˆvx+ˆu(u+ˉu)v+u2ˆv)sgn(ρnxˆu)dx2Rρn|12ˆu(ux+ˉux)v+12ˉu2xˆv+ˆuuxvx+ˉuvxˆux+ˉuˉuxˆvx+ˆu(u+ˉu)v+u2ˆv|dxC(R|ρnˆu|dx+R|ρnˆux|dx+R|ρnˆv|dx+R|ρnˆvx|dx). (52)

    For the final term I3, we have

    I3=Rρn12Px(ˆux(ux+ˉux)vx+ˉu2xˆvx)sgn(ρnxˆu)dxC(R|ρnˆu|dx+R|ρnˆux|dx+R|ρnˆv|dx+R|ρnˆvx|dx). (53)

    Adding these three terms, we obtain

    ddtR|ρnˆux|dxC(R|ρnˆu|dx+R|ρnˆux|dx+R|ρnˆv|dx+R|ρnˆvx|dx)+Rn(t). (54)

    For these terms ddtR|ρnˆv|dx and ddtR|ρnˆvx|dx, we have similar results:

    ddtR|ρnˆv|dxC(R|ρnˆu|dx+R|ρnˆux|dx+R|ρnˆv|dx+R|ρnˆvx|dx),ddtR|ρnˆvx|dxC(R|ρnˆu|dx+R|ρnˆux|dx+R|ρnˆv|dx+R|ρnˆvx|dx)+Rn(t). (55)

    From (48), (54) and (55), we infer that

    ddt(R|ρnˆu|dx+R|ρnˆux|dx+R|ρnˆv|dx+R|ρnˆvx|dx)C(R|ρnˆu|dx+R|ρnˆux|dx+R|ρnˆv|dx+R|ρnˆvx|dx)+Rn(t). (56)

    If R|ρnˆu|dx+R|ρnˆux|dx+R|ρnˆv|dx+R|ρnˆvx|dx0, then by Gronwall's inequality, we obtain

    (R|ρnˆu|dx+R|ρnˆux|dx+R|ρnˆv|dx+R|ρnˆvx|dx)et0C+˜Rn(τ)dτ(|ρnˆu|+|ρnˆux|+|ρnˆv|+|ρnˆvx|)(0,x), (57)

    where ˜Rn(t)=Rn(t)(R|ρnˆu|dx+R|ρnˆux|dx+R|ρnˆv|dx+R|ρnˆvx|dx)1. From Lebesgue's dominated convergence theorem, it follows that

    (R|ρnˆu|dx+R|ρnˆux|dx+R|ρnˆv|dx+R|ρnˆvx|dx)eCt(|ρnˆu|+|ρnˆux|+|ρnˆv|+|ρnˆvx|)(0,x), (58)

    As T is arbitrary, ˆu0=ˆu0x=ˆv0=ˆv0,x=0, we obtain (u,v)=(ˉu,ˉv). This completes the proof of theorem 3.1.



    [1] Y. Ye, P. Huang, Y. Zhang, Deep learning-based fault diagnostic network of high-speed train secondary suspension systems for immunity to track irregularities and wheel wear, Railway Eng. Sci., 30 (2022), 96–116. https://doi.org/10.1007/s40534-021-00252-z doi: 10.1007/s40534-021-00252-z
    [2] V. Lauda, V. Novotný, Role of railway transport in green deal 2050 challenge-situation in the Czech Republic, Promet-Traffic Transp., 34 (2022), 801–812. https://doi.org/10.7307/ptt.v34i5.4117 doi: 10.7307/ptt.v34i5.4117
    [3] L. Zhang, Z. Wang, Q. Wang, J. Mo, J. Feng, K. Wang, The effect of wheel polygonal wear on temperature and vibration characteristics of a high-speed train braking system, Mech. Syst. Signal. Process., 186 (2023), 109864. https://doi.org/10.1016/j.ymssp.2022.109864 doi: 10.1016/j.ymssp.2022.109864
    [4] I. A. Tasiu, Z. Liu, S. Wu, W. Yu, M. Barashi, J. O. Ojo, Review of recent control strategies for the traction converters in high-speed train, IEEE Trans. Transp. Electrif., 8(2022), 2311–2333. https://doi.org/10.1109/TTE.2022.3140470 doi: 10.1109/TTE.2022.3140470
    [5] J. Yang, J. Wang, Y. Zhao, Simulation of nonlinear characteristics of vertical vibration of railway freight wagon varying with train speed, Electron. Res. Arch., 30 (2022), 4382–4400. https://doi.org/10.3934/era.2022222 doi: 10.3934/era.2022222
    [6] H. Song, E. Schnieder, Availability and performance analysis of train-to-train data communication system, IEEE Trans. Intell. Transp. Syst., 20 (2019), 2786–2795. https://doi.org/10.1109/TITS.2019.2914701 doi: 10.1109/TITS.2019.2914701
    [7] W. Li, O. P. Hilmola, J. Wu, Chinese high-speed railway: Efficiency comparison and the future, Promet-Traffic Transp., 31 (2019), 693–702. https://doi.org/10.7307/ptt.v31i6.3220 doi: 10.7307/ptt.v31i6.3220
    [8] F. Bădău, Railway interlockings—A review of the current state of railway safety technology in Europe, Promet-Traffic Transp., 34 (2022), 443–454. https://doi.org/10.7307/ptt.v34i3.3992 doi: 10.7307/ptt.v34i3.3992
    [9] H. Gu, T. Liu, Z. Jiang, Z. Guo, Experimental and simulation research on the aerodynamic effect on a train with a wind barrier in different lengths, J. Wind Eng. Ind. Aerod., 214 (2021), 104644. https://doi.org/10.1016/j.jweia.2021.104644 doi: 10.1016/j.jweia.2021.104644
    [10] H. Song, S. Gao, Y. Li, L. Liu, H. Dong, Train-centric communication based autonomous train control system, IEEE Trans. Intell. Veh., 8 (2022), 721–731. https://doi.org/10.1109/TIV.2022.3192476 doi: 10.1109/TIV.2022.3192476
    [11] R. Kour, A. Patwardhan, A. Thaduri, R. Karim, A review on cybersecurity in railways, Proc. Inst. Mech. Eng., Part F: J. Rail Rapid Transit, 237 (2022), 3–20. https://doi.org/10.1177/09544097221089389 doi: 10.1177/09544097221089389
    [12] L. Zhang, Vibration analysis and multi-state feedback control of maglev vehicle-guideway coupling system, Electron. Res. Arch., 30 (2022), 3887–3901. https://doi.org/10.3934/era.2022198 doi: 10.3934/era.2022198
    [13] M. Roth, H. Winter, An open data set for rail vehicle positioning experiments, in 2020 IEEE 23rd International Conference on Intelligent Transportation Systems (ITSC), IEEE, (2020), 1–7. https://doi.org/10.1109/ITSC45102.2020.9294594
    [14] H. Winter, Rail vehicle positioning data set: Lucy, October 2018, Technische Universität Darmstadt, 2020. https://doi.org/10.25534/tudatalib-360
    [15] Y. Cao, Z. Zhang, F. Cheng, S. Su, Trajectory optimization for high-speed trains via a mixed integer linear programming approach, IEEE Trans. Intell. Transp. Syst., 23 (2022), 17666–17676. https://doi.org/10.1109/TITS.2022.3155628 doi: 10.1109/TITS.2022.3155628
    [16] M. Spiryagin, Q. Wu, O. Polach, J. Thorburn, W. Chua, V. Apiryagin, et al., Problems, assumptions and solutions in locomotive design, traction and operational studies, Railway Eng. Sci., 30 (2022), 265–288. https://doi.org/10.1007/s40534-021-00263-w doi: 10.1007/s40534-021-00263-w
    [17] Y. Feng, C. Zhao, W. Zhai, L. Tong, X. Liang, Y. Shu, Dynamic performance of medium speed maglev train running over girders: field test and numerical simulation, Int. J. Struct. Stab. Dyn., 23 (2023), 2350006. https://doi.org/10.1142/S0219455423500062 doi: 10.1142/S0219455423500062
    [18] W. Yu, D. Huang, Q. Wang, L. Cai, Distributed event-triggered iterative learning control for multiple high-speed trains with switching topologies: A data-driven approach, IEEE Trans. Intell. Transp. Syst., 2023 (2023). https://doi.org/10.1109/TITS.2023.3277452 doi: 10.1109/TITS.2023.3277452
    [19] J. Yin, C. Ning, T. Tang, Data-driven models for train control dynamics in high-speed railways: LAG-LSTM for train trajectory prediction, Inf. Sci., 600 (2022), 377–400. https://doi.org/10.1016/j.ins.2022.04.004 doi: 10.1016/j.ins.2022.04.004
    [20] Q. Wu, C. Cole, Computing schemes for longitudinal train dynamics: sequential, parallel and hybrid, J. Comput. Nonlinear Dyn., 10 (2015), 064502. https://doi.org/10.1115/1.4029716 doi: 10.1115/1.4029716
    [21] Q. Wu, C. Cole, S. Maksym, W. Yucang, W. Ma, C. Wei, Railway air brake model and parallel computing scheme, J. Comput. Nonlinear Dyn., 12 (2017), 051017. https://doi.org/10.1115/1.4036421 doi: 10.1115/1.4036421
    [22] K. Fadhloun, H. Rakha, A. Loulizi, A. Abdelkefi, Vehicle dynamics model for estimating typical vehicle accelerations, Transp. Res. Rec., 2491 (2015), 61–71. https://doi.org/10.3141/2491-07 doi: 10.3141/2491-07
    [23] Y. Cheng, J. Yin, L. Yang, Robust energy-efficient train speed profile optimization in a scenario-based position–Time–Speed network, Front. Eng. Manage., 8 (2021), 595–614. https://doi.org/10.1007/s42524-021-0173-1 doi: 10.1007/s42524-021-0173-1
    [24] M. Zhang, Z. Yang, J. Cheng, Speed and distance measurement algorithm of train control onboard equipment based on adaptive federated filter, China Railway Sci., 43 (2022), 144–151.
    [25] H. Chen, T. Furuya, S. Fukagai, S. Saga, J. Ikoma, K. Kimura, et al., Wheel slip/slide and low adhesion caused by fallen leaves, Wear, 446 (2020), 203187. https://doi.org/10.1016/j.wear.2020.203187 doi: 10.1016/j.wear.2020.203187
    [26] D. Zhang. Y. Tang, Q. Peng, A novel approach for decreasing driving energy consumption during coasting and cruise for the railway vehicle, Energy, 263 (2023), 125615. https://doi.org/10.1016/j.energy.2022.125615 doi: 10.1016/j.energy.2022.125615
    [27] Y. Peng, Y. Lin, C. Fan, Q, Xu, D. Xu, S. Yi, et al., Passenger overall comfort in high-speed railway environments based on EEG: assessment and degradation mechanism, Build. Environ., 210 (2022), 108711. https://doi.org/10.1016/j.buildenv.2021.108711 doi: 10.1016/j.buildenv.2021.108711
    [28] Y. Lu, D. Chen, Z. Zhao, Algorithm for automatically generating a large number of speed curves of subway trains based on AlphaZero, Chin. J. Intell. Sci. Technol., 3 (2021), 179–184.
  • This article has been cited by:

    1. Byungsoo Moon, Orbital stability of periodic peakons for the generalized modified Camassa-Holm equation, 2021, 14, 1937-1632, 4409, 10.3934/dcdss.2021123
    2. K.H. Karlsen, Ya. Rybalko, Global semigroup of conservative weak solutions of the two-component Novikov equation, 2025, 86, 14681218, 104393, 10.1016/j.nonrwa.2025.104393
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1547) PDF downloads(83) Cited by(1)

Figures and Tables

Figures(8)  /  Tables(6)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog