123 Main Street, New York, NY 10001

Pantograph & DC-Link Control for Rail Traction Power

← Back to: Rail Transit & Locomotive

Center of the Topic

Purpose: This topic covers the operational dynamics, validation process, and troubleshooting for Pantograph and DC-Link control systems in rail transit. It emphasizes evidence-driven updates, model validation, and safety governance, ensuring reliable performance through structured feedback loops and clear troubleshooting steps.

H2-1. Scope & System Boundary

Define the pantograph + DC-link front-end control as a self-contained subsystem: actuation + sensing + insulation/arc supervision + event evidence.

Design intent: This page focuses on safe HV connection and provable safe exit. The deliverable is not just “it works,” but evidence that explains what happened during arcs, insulation events, and sequencing failures.

  • Physical boundary: overhead line / third rail contact → pantograph head & mechanism → HV switching chain (pre-charge, main contactor, discharge, breaker interface) → DC-link node (Vdc) → downstream load interface (referenced only).
  • Electrical boundary: HV domain (Vdc, contactor/breaker) + isolated sensing boundary + LV control domain (controller, comms, logging).
  • Responsibility boundary: this subsystem owns connect/disconnect sequencing, supervision, and evidence integrity; it does not own propulsion energy conversion.
  • HVIL
  • Pre-charge
  • Contactor/Bkr
  • IMD
  • Arc
  • Evidence Packet

In scope (explicit modules with acceptance evidence):

  • Pantograph actuation + sensing AFEs: motor/servo or pneumatic actuation; position/pressure/force sensing; plausibility checks; sensor health flags; log state transitions + key sensor snapshots.
  • DC-link connect/disconnect sequencing: pre-charge ramp validation, main close verification, discharge timing, contactor feedback (aux contact), weld/stuck detection; store sequence timeline and timeouts.
  • Insulation monitoring + ground/leakage detection: estimator output + confidence, hysteresis, action ladder; capture leakage trend + context (Vdc, environment, mode).
  • Arc detection + classification + protective actions: arc sensing and feature extraction; distinguish arc vs interference; actions (drop/raise policy, open contactor, lockout); save pre/post-trigger waveforms.
  • Event recording as evidence: trusted timestamps, ring buffer, counters, configuration/version stamps; produce a minimal evidence packet readable after power events.

Out of scope (intentional non-overlap):

  • Traction inverter switching, PWM, SiC/IGBT drive details, propulsion control loops (handled by a dedicated traction inverter page).
  • Station/substation converter equipment and site-level controls (handled by traction power/substation pages).
  • Signaling / passenger systems business logic (handled by signaling/PIS pages).

Interfaces only (named, not expanded): downstream load interface (“DC-link load”), and vehicle supervisory interface (“TCMS status/command & time sync”).

Evidence outputs (what this page ultimately promises):

  • Waveforms: Vdc ramp (pre-charge), contactor coil/feedback timing, arc feature traces (pre/post trigger), insulation estimator trend snapshots.
  • Logs: state machine transitions, trip reason codes, confidence scores, recovery gates, commit status under brownout.
  • Counters: arc event counts, lockout counts, pre-charge retries, contactor operations, discharge completion failures.
  • Integrity: timestamps + configuration versions (firmware/config IDs) to make evidence auditable.

Figure F1 — Context Map: OHL/Third Rail → Pantograph → DC Link → Loads

OHL / 3rd Rail Pantograph Actuation Position / Pressure AFE HV Switching Pre-charge Contactor / Breaker Discharge DC Link (Vdc) Cap Bank Load Interface only Isolation Boundary (HV ↔ LV) IMD Insulation / Leakage Arc Detection Classify + Protect Evidence Outputs Logs • Waveforms • Counters Timestamped packet
Use this map to keep scope tight: actuation + HV sequencing + IMD/arc supervision + evidence packet. Downstream loads are referenced as interfaces only.

H2-2. Rail-Specific Requirements & Standards Touchpoints

This subsystem is judged by availability, safety, compliance, and diagnosability. Requirements matter only when they map to design actions and evidence.

How standards are used on this page: each touchpoint is translated into a concrete engineering obligation:

  • Standard pressure (what the rail environment forces)
  • Design action (hardware/firmware policy that prevents unsafe behavior)
  • Validation evidence (what must be measured during qualification)
  • Field evidence fields (what must be logged so incidents are explainable)

Key rail reality: “pass on the bench” is insufficient. Power interruptions, EMC bursts near HV arcs, and vibration-induced intermittents can produce false arc/IMD trips unless the design preserves context and evidence.

  • EN 50155
  • EN 50121
  • IEC 61373
  • Fail-safe
  • Evidence retention

Standards-to-actions mapping (implementation view):

Touchpoint Standard pressure Design action Evidence (test + field)
EN 50155
Power + temperature
Supply variation and interruptions must not create unsafe HV states. Controllers and loggers must survive brownout long enough to exit safely. Define a power-fail policy: (1) force safe action (drop/open), (2) commit minimal evidence packet, (3) controlled shutdown. Add holdup budget for “commit then safe exit.” Test: Vdc interruption profiles; verify sequence behavior and commit completion.
Field: brownout reason + last safe state + commit status + precharge timeline snapshots.
EN 50121
EMC near HV
Long harnesses and roof HV equipment drive strong common-mode currents. Arc sensing is vulnerable to EMI bursts without context. Engineer CM paths (shield bonds, isolation boundary, filtering placement) and require arc classification to use multi-signal context (position/pressure/Vdc) rather than a single threshold. Test: EMC injection while checking “no false arc storm lockouts” and evidence completeness.
Field: arc confidence + correlated context (Vdc transient + sensor snapshot) + classifier version.
IEC 61373
Vibration/shock
Mechanical vibration can mimic electrical faults via connector micro-motion and switch bounce (e.g., HVIL and sensor intermittents). Add debounce + plausibility (cross-check position vs pressure/force vs HVIL), plus connector retention rules. Ensure policies avoid unsafe oscillation between states. Test: vibration profiles; verify no spurious state transitions and that “root-cause” is differentiable.
Field: bounce counters + multi-signal consistency flags + transition trace.
Fail-safe
Safety expectation
Default behavior must minimize hazard. Recovery must be gated by measurable conditions, not assumptions. Specify safe state ladder (warning → protective drop/open → lockout) with explicit recovery gates (IMD OK, no sustained arc, verified contactor state). Test: force each fault and verify deterministic actions.
Field: recovery gate evaluations + reason codes + timestamps for audit.
Evidence retention
Diagnosability
After an incident, the system must provide enough data to explain whether it was a true hazard or a false trigger. Use ring buffers and a minimal “evidence packet” schema with version stamps and trusted time reference. Test: power-loss during commit; verify readable packets.
Field: packet integrity checks + configuration IDs + pre/post-trigger waveforms.

Figure F2 — Requirement → Design Action → Evidence (mini-matrix)

Translate Standards into Actions and Evidence Pressure Design Action Validation Evidence Field Logs EN 50155 Power / Temp Interruptions → safe exit Holdup + commit + deterministic shutdown Vdc waveforms + commit success Sequence timeline and timeouts Reason codes Last safe state EN 50121 EMC HV arc + long harness CM noise Avoid false arc storms Injection tests + classification checks Context correlation (Vdc + sensors) Confidence Classifier version IEC 61373 Vibration Intermittents (HVIL/sensors) Debounce + plausibility Vibration profiles + transition traces No unsafe oscillations Bounce counters Consistency flags
Use the same translation pattern throughout the page: pressure → action → evidence. This prevents scope creep while strengthening “engineering credibility” signals.

H2-3. Functional Architecture Decomposition

Decompose the subsystem into modules with explicit inputs/outputs, isolation points, and failure modes, so implementation and acceptance testing remain unambiguous.

Implementation rule: each module must expose measurable signals that support a post-incident explanation. A module is considered complete only when it provides both control behavior and evidence fields.

  • Inputs/Outputs
  • Isolation
  • Failure Modes
  • Evidence Fields

Module set (acceptance-oriented):

  • Actuation & mechanics: raise/lower/hold/drop capability; actuator health; mechanical limits and bounce behavior.
  • Sensor AFEs: position + pressure/force + wear/contact channels; noise immunity; plausibility checks; open/short detection.
  • HV switching chain: pre-charge, main contactor, discharge, breaker interface, HVIL gating; coil drive and feedback validation.
  • Insulation monitoring: injection/measurement, leakage estimation and classification, hysteresis and action ladder.
  • Arc detection block: sensors → features → classifier → action policy; correlation with context to reduce false trips.
  • Controller & comms (TCMS interface only): commands, status, alarms, and time synchronization signals for consistent timestamps.
  • Event recorder: timestamping, ring buffer, nonvolatile commit, counters, and a minimal evidence packet schema.

Cross-module dependency examples: arc classification quality depends on synchronized context (actuation state + Vdc transient + HVIL status); sequence failures require both Vdc slope and contactor feedback to isolate root cause.

Evidence fields that must be routable to the recorder:

  • Sequencing: pre-charge start/stop, Vdc ramp slope, main close time, discharge completion time, timeout reasons.
  • Interlocks: HVIL state with debounce counters, maintenance/roof access mode (as an input), contactor auxiliary feedback state.
  • Arc/IMD: arc confidence + feature summary, leakage estimate + confidence + trend index, action taken and lockout gates.
  • Versions: configuration ID, classifier version, threshold set ID, recorder schema version.

Figure F3 — Block Diagram with Labeled Interfaces

Pantograph & DC-Link Control — Functional Architecture OHL / Contact HV source Actuation Motor / Pneumatic Sensor AFEs POS / PRESS / FORCE Wear / Contact HV Switching Chain Pre-charge Main Contactor Discharge COIL DRV AUX_FB DC Link VDC Cap Bank Insulation Monitor LEAK Inject / Measure Arc Detection ARC_FEAT Classify → Policy Controller STATE CMD TIME Recorder TS RING_BUF COMMIT TCMS CMD/STATUS/TIME ISO Boundary (HV ↔ LV) POS PRESS CONTACT HVIL AUX_FB VDC LEAK ARC_FEAT
Interfaces are labeled with short tokens (POS, PRESS, HVIL, COIL, AUX_FB, VDC, LEAK, ARC_FEAT, TIME) to keep the diagram readable on mobile while preserving implementation intent.

H2-4. Pantograph Actuation: Control Objectives & Failure-Safe States

Pantograph actuation must deliver stable contact behavior under vibration and disturbances, while preserving deterministic safe states and a complete transition evidence trail.

Control objectives (measurable acceptance points):

  • Raise/Lower determinism: bounded time-to-position, controlled overshoot, consistent limit detection, and repeatable state transitions.
  • Contact stability: maintain uplift force/pressure within a defined band; detect abnormal bounce and suppress unsafe oscillation.
  • Emergency drop latency: bounded trigger-to-drop response; action must remain deterministic even during supply disturbances.
  • Policy-driven recovery: recovery is gated by measurable conditions (interlocks valid, insulation/arc conditions cleared), not by blind retries.
  • Raise/Lower
  • Hold Uplift
  • Emergency Drop
  • Anti-bounce
  • Recovery Gates

Failure-safe ladder (trigger → action → recovery gate → evidence fields):

Trigger source Immediate action Recovery gate Evidence fields to log
Sensor invalid
open/short/drift
Freeze motion or controlled drop (policy); block unsafe raise. Sensor consistency restored; plausibility checks pass for a hold period. POS/PRESS snapshot, invalid reason code, plausibility flags, state transition trace.
Comms loss
TCMS/time sync
Enter deterministic safe mode; prevent ambiguous commands; prioritize safety exit policy. Link restored + time base valid; command sequence verified. Link status, time sync status, last CMD, local state, transition reason.
IMD alarm
leakage threshold
Apply action ladder: warn → protective drop/open → lockout based on severity/confidence. Leakage estimate returns to safe band with confidence + hold time. LEAK value+confidence, VDC context, action level, gate evaluation results.
Arc storm
repeated events
Immediate protective response (drop/open); lockout if repetition persists. No repeated arc events over a window; classifier confidence stable; interlocks valid. ARC_FEAT summary, repetition counters, action taken, pre/post-trigger waveform refs.
HVIL open
interlock chain
Block HV close; trigger safe exit if energized; force deterministic transition. HVIL stable closed with debounce window; maintenance mode cleared. HVIL edge timestamps, bounce counter, contactor feedback, transition trace.

State machine (high-level):

  • IDLE: interlocks verified; sensors healthy; awaiting command.
  • RAISE: actuator moves; position/pressure trends monitored; time-to-target bounded.
  • CONTACT/REGULATE: transition into stable uplift control; anti-bounce window active.
  • RUN: continuous monitoring; arc/IMD policies active; evidence triggers armed.
  • DROP: deterministic drop action; HV chain opened as required; record evidence packet.
  • LOCKOUT: repeated hazard or failed recovery gate; requires explicit clearance conditions.
  • RECOVER: gate checks executed; re-entry allowed only when measurable conditions pass.

Hard interlocks in-scope: HVIL, roof/maintenance input, and optional speed gate are treated as gating inputs only (no vehicle-wide business logic on this page).

Figure F4 — Pantograph State Machine + Triggers + Logged Fields

Actuation State Machine (with evidence-ready transitions) IDLE RAISE CONTACT / REG RUN DROP LOCKOUT RECOVER R1 R2 R3 R4 R5 R6 R7 Reason Codes (Trigger → Action → Logged fields) R1CMD valid + interlocks OK → start raise → log POS/PRESS + state R2contact reached → enter regulate → log uplift band + anti-bounce R3stable for window → RUN → arm triggers; log thresholds IDs R4ARC/IMD/HVIL/timeout → DROP → log reason + pre/post buffers R5hazard repeats → LOCKOUT → increment counters; require clearance Recovery gates (measurable, not time-based) R6LOCKOUT cleared → RECOVER → evaluate LEAK/ARC/HVIL stability R7gates pass + time base OK → IDLE → store gate results + versions Logged fields (minimal): POS, PRESS, HVIL, VDC, LEAK, ARC_FEAT, reason code, counters
Transitions are tagged with short reason codes (R1–R7). The legend maps each reason to trigger, action, and the minimal logged fields required for audit and field debugging.

H2-5. Position / Pressure / Force Sensing AFE Design (Noise immunity first)

Design the sensor analog front-end (AFE) as an immunity-first signal chain: protect against long-cable interference and ground shift, then preserve diagnosability via health flags, plausibility, and calibration versioning.

Primary risk: false readings are more dangerous than small accuracy loss. The AFE must prevent common-mode bursts and ground shifts from becoming state-machine triggers.

  • Long cable
  • CM noise
  • Isolation
  • Ratiometric
  • Open/Short
  • Plausibility

Sensor interface set (examples with interface risks):

  • Position: LVDT / linear potentiometer / encoder. Risk: cable pickup, bounce/glitch, reference shift.
  • Pressure: pressure transducer (voltage or bridge-type). Risk: excitation ripple coupling and offset drift.
  • Force: strain/force element. Risk: low-level differential signals are sensitive to EMI and thermal drift.
  • Limit / switch: discrete sensors. Risk: vibration bounce and intermittent contacts.

AFE chain (engineering choices that impact immunity and evidence):

  • Protection at the cable entry: clamp placement must avoid pushing the ADC into saturation during bursts. Track clamp-related events when available.
  • Excitation & ratiometric strategy: for bridge-like sensors, measure sensor output and excitation reference to suppress excitation drift.
  • Filtering vs latency: filter reduces EMI but adds group delay. Choose bandwidth to preserve event timing (e.g., bounce/transition windows).
  • ADC selection: prioritize robustness to interference and predictable data-valid flags; record mode/config IDs for auditability.
  • Open/short detection: detect cable faults explicitly (open, short-to-rail, short-to-reference) and log persistence duration.

Minimum evidence fields: sensor_valid, open_short_flag, adc_saturation_cnt, noise_metric, drift_index, cal_version.

Immunity blueprint (installation-grade rules):

  • Isolation placement: place isolation so the long cable does not create uncontrolled ground return paths across the HV↔LV boundary.
  • Shield termination: define shield bonding points intentionally; avoid using shield as signal return. Prevent uncontrolled ground loops across boundaries.
  • Common-mode control: prefer differential sensing where possible; ensure reference strategy remains stable under ground shift.
  • Debounce for discrete inputs: treat switch/limit as “noisy by default” under vibration and log bounce counters.

Prohibited patterns: shield-as-return, floating references across long runs, and ambiguous grounding that defeats isolation.

Health diagnostics (turn raw signals into trustworthy inputs):

  • Plausibility: cross-check position vs pressure/force changes. Inconsistency raises a confidence warning rather than forcing immediate hazardous actions.
  • Drift detection: separate slow drift from step changes (step changes often indicate intermittents rather than true mechanical movement).
  • Calibration versioning: every coefficient update must carry version ID + activation timestamp; logs must always include the active cal_version.

Figure F5 — Isolation Boundary + AFE Front-End + Error Budget

Sensor AFE (Immunity-first) — chain + error budget ISO Boundary (HV cable domain ↔ LV control domain) SENSOR POS / PRESS / FORCE CABLE Shield / CM PROTECT Clamp / TVS FILTER BW / Delay ADC Mode + Valid VALID DIAGNOSTICS Open/Short Plausibility Drift Index Cal Version Health Score O/S POS↔P DRIFT CAL_ID SCORE Error budget contributors (conceptual) NOISE DRIFT LATENCY OFFSET
Keep labels short (POS/PRESS/FORCE, PROTECT, FILTER, ADC, DIAGNOSTICS). Error budget tags show where noise, drift, and latency enter the chain.

H2-6. DC-Link Switching & Sequencing (Pre-charge / Discharge / Contactors)

Define the DC-link switching sequence as a deterministic specification: each step has gates, required measurements, timeouts, and evidence fields to prevent partial energization and ambiguous contactor states.

Power truth: the primary hazards are partial energization, unverified contactor state, and brownout mid-sequence. A correct design makes these cases detectable and explainable.

  • Pre-charge profile
  • Main close verify
  • Discharge proof
  • Weld detect
  • Timeouts
  • Evidence

Sequence specification (step → measurement → timeout → evidence):

  • Step 0 — Gating: HVIL stable, maintenance mode not active, safety conditions OK. Evidence: gate_result + fail_reason.
  • Step 1 — Pre-charge: limit inrush and validate Vdc ramp slope to threshold. Timeout: Tpc. Evidence: vdc_slope, t_to_threshold.
  • Step 2 — Main close: drive coil and verify auxiliary feedback transition. Timeout: Tcl. Evidence: coil_on_ts, aux_fb_ts.
  • Step 3 — Validate: confirm stable close (no “false close”); check Vdc behavior consistency. Timeout: Tval. Evidence: validate_flags.
  • Step 4 — Run monitor: watch aux feedback stability, Vdc anomalies, HVIL bounce counters. Evidence: runtime_counters.
  • Step 5 — Open: command open and verify feedback and Vdc response. Timeout: Top. Evidence: open_fb_ts, open_verified.
  • Step 6 — Discharge: prove Vdc drops below safe threshold within a window and stays stable. Timeout: Tdsg. Evidence: vdc_below_ts, discharge_fail_cnt.

Contactor / breaker control (must be verifiable):

  • Coil drive strategy: pick/hold phases with an economizer while keeping feedback validation deterministic.
  • Weld / stuck detection: open command with unchanged AUX_FB and/or non-decreasing Vdc indicates a suspect weld or partial energization.
  • Open-time verification: record open command, feedback edge, and confirm window outcomes.

Minimum evidence fields: precharge_start_ts, vdc_slope, aux_fb_ts, validate_flags, hvil_bounce_cnt, open_verified, vdc_below_ts, commit_status.

Edge cases (detectable and explainable):

  • Brownout mid-sequence: enforce a safe exit policy and log commit_status + last stable state to avoid “unknown HV state.”
  • HVIL bounce: apply debounce and prevent unsafe oscillation; log edge timestamps and bounce counters.
  • Partial energization: treat mismatched Vdc behavior vs feedback as hazardous; lock out until measurable clearance gates pass.

Figure F6 — Sequence Timeline: CMD → Precharge → Main Close → Validate → Run → Open → Discharge

DC-Link Switching Timeline — measurements + timeouts TIME → CMD Gate PRECHG Tpc MAIN Tcl VALID Tval RUN Mon OPEN Top DSCHG Tdsg Required measurements VDC slope / threshold AUX_FB close/open verify EDGE HVIL debounce LOG / TS commit status Evidence points (minimal) E1 precharge_start_ts + vdc_slope E2 coil_on_ts + aux_fb_ts (close verify) E3 validate_flags + mismatch counters E4 open_verified + vdc_below_ts E5 hvil_bounce_cnt + edges E6 commit_status + last stable state
Each step is paired with a timeout (Tpc/Tcl/Tval/Top/Tdsg) and minimal measurement icons (VDC, AUX_FB, HVIL, LOG/TS) to keep the timeline readable on mobile.

H2-7. Insulation Monitoring & Ground Fault: Detection Model and Evidence

Differentiate true insulation degradation from transient contamination and interference by using a measured leakage model, classification, hysteresis, and a traceable action ladder.

Design goal: avoid two failure modes—(1) transient contamination causing over-actions, and (2) slow degradation being ignored. The output must be leak_est + confidence + class, not a single alarm bit.

  • Leak model
  • Confidence
  • Classification
  • Hysteresis
  • Evidence fields

IMD measurement model (what must be controlled and recorded):

  • Injection parameters: mode, level, and frequency define the observability and immunity trade-off.
  • Measurement window: sample window and filter strategy define response time and false-trigger susceptibility.
  • Context coupling: leakage interpretation depends on Vdc, contactor state, and the active sequence state (precharge/validate/run/open/discharge).

Minimum config evidence: inj_mode, inj_level, inj_freq, window_id, filter_id, estimator_ver.

Leakage classification (shape → decision meaning):

Class Signature Typical meaning Preferred action bias
Steady leak Persistent above threshold; low variance; slow trend Likely insulation degradation Escalate to higher action levels sooner
Intermittent Spikes/bursts; repeated but unstable; higher variance Intermittent paths, harness/connector, surface wetting Use hysteresis + counters; avoid immediate lockout
Contamination / moisture-like Slow recovery; elevated noise; correlated with environment Surface leakage or contamination signature Maintenance flag + derate / restricted transitions

Estimator outputs to log: leak_est, leak_conf, leak_class, noise_metric, variance, trend.

Hysteresis and action ladder (policy must be explicit):

  • Two-threshold hysteresis: use TH_UP to enter an elevated state and TH_DN to exit, preventing oscillation.
  • Time qualification: require N consecutive windows or a minimum dwell time before stepping up.
  • Action levels (example): L0 log-only → L1 maintenance flag + higher logging density → L2 protective restrictions → L3 drop/open → L4 lockout with clear exit criteria.

Decision trace evidence: action_level, hys_state, reason_code, repetition_cnt, dwell_time, clear_gate.

Figure F7 — Leakage Model + Hysteresis + Action Ladder + Logs

Insulation Monitoring — model, hysteresis, actions, evidence MEASUREMENT Injection + Window inj_* win_* ESTIMATOR leak_est + conf LEAK / CONF CLASSIFIER steady / int / moist CLASS HYSTERESIS TH_UP / TH_DN enter / exit Action ladder (policy) L0 LOG L1 MAINT L2 PROTECT L3 DROP L4 LOCKOUT TH_UP enters higher level • TH_DN exits • counters + dwell time prevent oscillation Evidence TS STATE VDC LEAK CONF CLASS ACTION Context inputs (logged) VDC / dVdt Contactor + AUX Sequence state
F7 expresses a measurable loop: injection/window → leak estimate + confidence → class → hysteresis → action ladder → evidence fields.

H2-8. Arc Detection & Classification (Don’t confuse arcing with EMI)

Use multi-sensor fusion and explainable features to separate true arcing events from EMC bursts and unrelated transients. Every decision must produce an evidence packet.

Core rule: treat “single-sensor spikes” as suspect. Escalation requires cross-domain consistency (electrical + mechanical and/or physical-domain signatures).

  • Sensor fusion
  • Features
  • EMC gate
  • Arc storm
  • Evidence packet

Arc sources and what they tend to look like (evidence-centric):

  • Bounce / contact loss: repeated pulses; strong correlation with position/force disturbances.
  • Flashover: higher pulse energy; larger Vdc disturbance; may form short “storm” windows.
  • Ice / debris: intermittent events that cluster under certain environmental conditions.
  • Uplift mis-control: patterns correlate with force-control deviations rather than random EMI.

Sensing options (each has a dominant false-positive risk):

  • HV dv/dt pick-up: sensitive but can mistake unrelated transients as arc without context gates.
  • Optical / UV: direct evidence but vulnerable to occlusion/contamination; requires health checks.
  • Acoustic: useful corroboration but susceptible to environmental noise; needs time alignment.
  • Current derivative (di/dt): strong electrical signature but may be triggered by other disturbance sources.
  • RF signatures: informative in storms, but EMC environment can mimic bursts; relies on fusion scoring.

Feature extraction (small set, explainable, loggable):

  • Pulse energy proxy: peak × width or integral proxy.
  • Repetition rate: pulses per time window; supports “arc storm” decisions.
  • Cross-correlation: event alignment with position/force changes and Vdc ripple.
  • Sensor agreement score: how many sensors and domains concur within a time window.

Minimum feature logs: E_pulse, R_rep, corr_mech, vdc_dist, agree_score.

False-positive control (EMC gate + exclusion rules):

  • State gating: apply different sensitivity windows across sequence states to avoid mislabeling switching windows as arcing.
  • Exclusion: if only dv/dt triggers but mechanical/optical evidence is missing, classify as suspect and limit action escalation.
  • Decision trace: record which rule fired (reason_code) and whether the EMC gate reduced confidence.

Decision evidence: arc_conf, arc_class, emc_gate, reason_code, storm_cnt.

Protective actions (graded policy with storm lockout):

  • A0 Observe: log + increase sampling and buffering.
  • A1 Protect: restrict recovery transitions; require additional validation gates.
  • A2 Emergency: drop pantograph and open contactor chain when confidence is high.
  • A3 Arc storm lockout: repetition rate exceeds a window threshold with high agreement; requires explicit clearance conditions.

Figure F8 — Arc Sensor Fusion: Signals → Features → Classifier → Action + Evidence Packet

Arc detection — sensor fusion, features, EMC gate, evidence packet Signals (aligned) dv/dt pick-up di/dt / current optical / UV acoustic RF signature POS / FORCE FEATURES explainable + loggable E_pulse R_rep corr_mech agree EMC GATE reduce confidence emc_gate CLASSIFIER arc_conf + class ARC_CONF ARC_CLASS ACTIONS A0…A3 policy A0 A1 A2 A3 Evidence packet TS STATE VDC POS/FORCE FEATURE_SUM ARC_CONF EMC_GATE ACTION STORM_CNT REASON Escalation requires agreement across domains; single-sensor spikes are downgraded by the EMC gate. Log reasons and fields so every trip is explainable (feature + context + action trace).
F8 keeps labels short while enforcing the rule: sensor fusion + EMC gate → classifier → action policy → evidence packet.

H2-9. Event Recording as Evidence (Black-box for pantograph/DC-link)

Treat event recording as a design specification: deterministic triggers, pre/post buffers, trusted time, tamper-evident storage, and a fixed evidence packet schema.

Purpose: every protective action must be explainable after the fact. That requires a consistent schema and a recording plan that survives power loss.

  • Triggers
  • Ring buffer
  • Trusted time
  • Integrity
  • Fixed schema

Trigger strategy (design rules, not a wishlist):

  • Arc detected: classifier confidence exceeds threshold or “storm” counter window is met.
  • IMD threshold crossing: leakage model crosses TH_UP with minimum dwell time.
  • Sequence failure: timeout, mismatch (e.g., Vdc vs AUX_FB), or partial energization suspected.
  • HVIL open: debounced open event while HV switching is active or transitioning.
  • Contactor weld suspected: open command without verified open feedback and inconsistent Vdc decay.

Trigger log fields: trigger_id, trigger_reason, confidence, storm_cnt, seq_state, action_level.

Ring buffer (capture windows and sampling plan):

  • Pre-trigger window: keeps causal context (what happened before the decision).
  • Post-trigger window: confirms outcome (did Vdc decay, did AUX_FB change, did arc stop).
  • Per-signal sampling rates: assign higher rates to fast signatures (dv/dt, di/dt, AUX_FB edges) and lower rates to slow context (position/force trend, leak_est).
  • Bandwidth discipline: record downsampled “summary channels” plus short high-rate bursts to preserve evidence without runaway storage.

Buffer fields: pre_ms, post_ms, fs_fast, fs_slow, burst_len, buffer_overrun.

Trusted time (survive clock loss and prove ordering):

  • Monotonic counter: provides strict ordering even under wall-clock loss.
  • PTP/GNSS sync (when available): provides absolute time; record sync status and measured skew.
  • Skew handling: keep both mono_ts and wall_ts, plus sync_state so investigators can reconstruct timelines.

Time fields: mono_ts, wall_ts, sync_state, skew_us, time_src.

Integrity and anti-tamper (tamper-evident by design):

  • Hash + signature: compute a digest over the evidence payload and sign it; store signature alongside the packet.
  • Commit discipline: write “header → payload → footer(signature)” so incomplete writes are detectable.
  • Upload/extraction: define transport (e.g., via T2G gateway) and depot extraction procedures; always log upload status.

Integrity fields: hash_alg, hash, sig_alg, signature, commit_status, upload_status.

Minimum evidence packet schema (fixed layout recommended):

Section Contents Why it is required
Header packet_id, mono_ts, wall_ts, trigger_id, seq_state Unique identity and timeline anchoring
Context Vdc, AUX_FB, HVIL, position/force, leak_est/class Explain why the trigger was plausible
Waveforms pre/post burst blocks for fast channels + summaries Reconstruct the event, not just its outcome
Counters storm_cnt, bounce_cnt, timeout_cnt, saturation_cnt Distinguish one-off spikes from repeated patterns
Versions fw_ver, config_id, threshold_set, estimator_ver Make the decision reproducible and auditable
Footer hash + signature + commit_status Tamper-evident integrity and write completeness

Figure F9 — Evidence Packet Layout (fixed schema)

Evidence Packet — fixed layout for pantograph / DC-link events HEADER packet_id • mono_ts • wall_ts • trigger_id • seq_state CONTEXT VDC • AUX_FB • HVIL • POS/FORCE • LEAK_EST/CLASS • ACTION WAVEFORMS pre-trigger + post-trigger • fast bursts + summaries COUNTERS storm • bounce • timeout • saturation VERSIONS fw_ver • config_id • threshold_set • estimator_ver FOOTER: hash + signature + commit_status SIG
F9 illustrates a fixed schema so every event produces comparable, auditable evidence with a clear commit and signature.

H2-10. EMC/Surge/Transient Hardening for This Subsystem

Hardening must stay within the pantograph/DC-link domain: roof-level transient paths, common-mode return through structure, protection placement, controller survivability, and test mapping.

Focus: arcs and roof wiring create fast transients. Most field failures come from unexpected return paths (common-mode) and protection elements placed too far from the real entry points.

  • Surge/ESD path
  • CM return
  • Protection placement
  • Brownout
  • Test mapping

Surge/ESD paths near roof equipment (what must be mapped):

  • Common-mode return: transient current often returns via vehicle structure, not signal ground. Design assumes structure is part of the circuit.
  • Long harness pickup: sensor and command lines behave like antennas; CM bursts appear as false sensor motion unless controlled.
  • Arc proximity: arcing produces broadband energy; avoid relying on “clean ground” assumptions.

Protection placement (make the energy go where it should):

  • TVS/MOV selection and location: place clamps at the true entry points, not deep inside the controller.
  • Coil snubbers: use RC snubbers or clamp networks to limit coil kick and prevent feedback misreads.
  • Shield bonds: define where shields bond to structure; prevent the shield from becoming an uncontrolled signal return.
  • Isolation strategy: isolate where CM currents would otherwise cross boundaries and turn into measurement offsets.

Placement evidence: document entry points, clamp location, and the intended return path in drawings and test reports.

Controller survivability (brownout + holdup + safe outcome):

  • Brownout strategy: define thresholds and priorities: which functions shut down first and which must remain alive.
  • Holdup budget: reserve energy to perform “commit log then safe drop/open” rather than leaving ambiguous state.
  • Atomic logging: the event recorder must write a detectable commit_status even when power collapses.

Survivability evidence: brownout_level, holdup_ms, last_safe_action, commit_status.

Test mapping (inject vs observe, and what counts as pass):

Injection Where to inject Observe Pass criteria
ESD / fast transient Roof harness / sensor entry points / structure-adjacent points sensor_valid, false trigger counters, reset flags No unsafe action; evidence packet created if trigger occurs
Surge (DM) Power feed / DC-link related entry nodes Vdc profile, sequence state, contactor verify Sequence terminates safely; no partial energization
Common-mode burst Harness-to-structure coupling paths offset/drift metrics, IMD stability, arc classifier confidence Confidence gating prevents escalation; logs show emc_gate/reason_code
Brownout Controller supply rail and holdup boundary commit_status, last_safe_action, reboot reason Commit completes or fails safely with detectable status

Figure F10 — Noise/Transient Path Map (DM vs CM) for controller + sensors

Transient paths — DM vs CM around controller and roof sensors VEHICLE STRUCTURE / CHASSIS (CM return path) ROOF DOMAIN Pantograph sensors / wiring ARC BURST LONG HARNESS coupling + CM pickup PANTO / DC-LINK CONTROLLER AFE • IMD • ARC • SEQUENCER • LOGGER ENTRY CLAMPS ISOLATION COIL + SNUB Legend DM path (differential) CM path (common-mode) Key idea CM return flows in structure; clamps must be near entry points. Isolation prevents CM from becoming AFE offset or false triggers. Brownout + holdup ensures “commit log then safe drop/open”.
F10 separates DM (solid) and CM (dashed) paths and emphasizes structure return, entry clamp placement, isolation boundaries, and brownout survivability.

H2-11. Validation & Field Debug Playbook (What to measure, what to fix first)

An executable checklist that ties each test to specific waveforms, logs, and counters—so commissioning and field debug produce evidence, not opinions.

Rule: every “PASS/FAIL” must map to two independent proofs (e.g., a waveform + a state/log), and must produce an evidence packet if a protective action occurs.

  • Checklist
  • 2 proofs
  • Waveforms
  • Counters
  • Evidence packet

A) Commissioning (first power-up & mechanical sanity)

Objective: prove sensors, actuation limits, calibration constants, and safety interlocks are coherent before any HV switching sequence is trusted.

  • Sensor sanity: confirm each channel toggles/changes in the expected direction; detect open/short; record sensor_ok and diag_code.
  • Actuation end-stops: drive to raise/lower limits with reduced force/velocity; verify end-stop detection and no overshoot; log endstop_hit and pos_range.
  • Uplift/pressure calibration: verify ratiometric stability and plausibility (position vs pressure/force); log cal_id, cal_ver, offset, gain.
  • HVIL integrity: validate debounce and fail-safe; open HVIL must force safe states; log hvil_state, hvil_bounce_cnt, safe_action.

MPN examples (commissioning instrumentation / interfaces): TI ADS131M04 (multi-channel ADC), ADI ADXL357 (low-noise accelerometer), TI ISO7741 (digital isolator), NXP S32K3 family (automotive-grade MCU; rail suitability to be verified).

B) Sequencing validation (precharge / close / validate / open / discharge)

Objective: prove the HV switching chain executes deterministically and leaves no “partial energization” ambiguity.

  • Precharge waveform: measure Vdc(t) ramp slope and monotonicity; verify timeout and minimum ramp; log precharge_start, vdc_rise_rate, precharge_timeout.
  • Contactor timing: confirm coil drive edge, AUX feedback edge, and Vdc response align; log coil_cmd, aux_fb, close_time_ms.
  • Discharge time constant: verify Vdc falls below threshold within expected time; log discharge_start, vdc_below_th_ms, bleed_ok.
  • Weld detection: open command + no AUX open + Vdc not decaying = suspected weld; log weld_suspect, aux_mismatch_cnt, safe_lockout.

MPN examples (coil drive / sensing): TI DRV110 (solenoid/contactor driver), Infineon TLE9104SH (protected low-side switch), TI ISO1212 (industrial digital input receiver), TI AMC1311 (isolated amplifier for HV measurement chains).

C) IMD validation (known-leak injection + hysteresis proof)

Objective: prove the insulation monitoring decision is stable, repeatable, and resilient to interference—by using controlled leak injection and explicit hysteresis checks.

  • Known leak injection: apply a calibrated leakage path (test fixture) and verify estimator convergence; log leak_est, leak_conf, inj_mode.
  • Threshold & hysteresis confirmation: step leak across TH_UP and back below TH_DN; verify no oscillation; log hys_state, dwell_time, enter_cnt.
  • False-trigger resilience: inject CM disturbance while holding leakage constant; verify confidence gating prevents escalation; log emc_gate, reason_code.

MPN examples (isolation + measurement front-ends): ADI ADuM141E (digital isolator), TI ISO224 (isolated analog measurement), TI AMC1100 (isolated amplifier), ADI LTC6363 (diff amp for sensing chains; isolation boundary still required).

D) Arc validation (stimulus/replay + basic confusion checks)

Objective: prove arcing is not confused with EMC bursts by validating sensor fusion behavior and recording a minimal “confusion” summary.

  • Controlled stimulus / replay injection: replay stored waveforms (dv/dt, optical pulses, RF bursts) into the classifier input path where feasible; verify consistent classification; log arc_class, arc_conf, agree_score.
  • Confusion checks (basic): run two labeled sets: “arc-like” vs “EMC-like”; report false positives/negatives at a fixed threshold; log fp_cnt, fn_cnt, threshold_set.
  • Storm behavior: verify repetition-rate logic triggers lockout only when agreement holds; log storm_cnt, storm_window_ms, lockout_reason.

MPN examples (time alignment / fast capture building blocks): Microchip LAN7430 (Ethernet with IEEE-1588 timestamping), TI SN65HVD1781 (robust RS-485 transceiver), u-blox NEO-M9N (GNSS timing source where applicable).

E) EMC validation (disturbance injection with “no evidence gaps”)

Objective: inject disturbances and verify the subsystem remains safe, stable, and still produces complete evidence (no missing packets, no ambiguous commit states).

  • ESD/surge injection: inject at roof harness entry points and structure-adjacent locations; verify no unsafe action and no silent resets; log reset_reason, packet_drop_cnt.
  • CM burst validation: verify EMC gate reduces confidence rather than triggering false arc/IMD escalation; log emc_gate, arc_conf, leak_conf.
  • Brownout survivability: pull controller supply below threshold; verify “commit log then safe drop/open” executes or fails safely with detectable status; log brownout_level, commit_status, last_safe_action.

MPN examples (protection / holdup / integrity): Littelfuse SM8S series TVS (high-power transient suppression; select exact voltage), TI TPS25982 (eFuse/hot-swap), Microchip ATECC608B (secure element for signatures / anti-tamper evidence).

Field debug triad (Symptom → 2 evidence checks → First fix)

Use the same triad for every case. It forces disciplined diagnosis and prevents “parameter guessing.”

Symptom Evidence check #1 Evidence check #2 First fix (do this first)
Unexpected drop Read trigger_id + reason_code + action_level Check pre/post buffer for Vdc + POS/FORCE correlation Fix threshold set or sensor plausibility gate before changing mechanics
Precharge timeout Verify Vdc_rise_rate and ramp monotonicity Check aux_fb and sequence state transitions Inspect precharge path and verify measurement scaling before extending timeouts
IMD alarms only in storms Check emc_gate + leak_conf trend Confirm hys_state and dwell time qualification Improve CM handling (shield bond / isolation boundary) before lowering thresholds
Arc false positives Inspect agree_score across sensors Compare “arc-like” features vs EMC window (classifier input trace) Tighten fusion gate / EMC gate before disabling a sensor
Evidence missing after event Check commit_status and packet footer signature fields Check brownout logs: brownout_level, reset_reason Increase holdup or reorder commit steps before tuning triggers

Figure F11 — Test-to-Evidence Matrix (tests → required logs/waveforms/counters)

Test-to-Evidence Matrix — required proofs for PASS/FAIL Rows = tests • Columns = evidence types • Filled cells = mandatory capture TEST STATE LOG WAVEFORM COUNTERS VERSIONS INTEGRITY Commissioning sensor + end-stop + HVIL REQ REQ REQ Sequencing precharge / contactor / discharge REQ REQ REQ REQ REQ IMD validation known leak + hysteresis REQ REQ REQ REQ Arc validation replay + confusion checks REQ REQ REQ REQ REQ EMC / brownout disturbance + no gaps REQ REQ REQ REQ If a protective action occurs, INTEGRITY + VERSIONS become mandatory for audit and root-cause.
F11 is the acceptance contract: each test must output defined evidence types; missing cells mean “test not complete,” not “pass.”

Request a Quote

Accepted Formats

pdf, csv, xls, xlsx, zip

Attachment

Drag & drop files here or use the button below.

H2-12. Field Feedback Loop (Model updates without breaking safety)

A rail-ready update philosophy: thresholds and classifiers can improve with field evidence, but only under strict governance, rollback, and auditability.

Non-negotiable: field-driven tuning is allowed only when it is reproducible (evidence), reversible (rollback), and auditable (who/what/when/why).

  • Evidence-driven
  • Rollback
  • Audit trail
  • Staged rollout
  • KPI

A) What can be updated (and what must never be “live tuned”)

  • Allowed (governed updates): IMD thresholds/hysteresis parameters; arc classifier thresholds; feature gates; debounce/dwell windows; EMC gating parameters.
  • Never live tuned: fail-safe default states; hard interlock logic; evidence packet integrity rules; minimum pre/post trigger windows for black-box recording.

Design rule: any parameter that changes safety outcome requires sign-off + staged rollout + rollback.

B) Update workflow (evidence → change proposal → validation → rollout)

  • Field evidence intake: every candidate update must reference real evidence packets (H2-9) and the exact failure mode (false trip vs missed event).
  • Change proposal: define parameter diffs (old/new), expected KPI impact, and safety impact classification.
  • Validation gate: rerun the validation playbook items that cover the changed behavior (H2-11), including “no evidence gaps” under disturbance.
  • Rollout: depot rollout in stages (pilot fleet → expanded fleet), with an explicit rollback trigger and rollback package.

C) Parameter governance (versioning, sign-off, rollout policy)

  • Config versioning: every parameter set has config_id, threshold_set, estimator_ver, classifier_ver, and a monotonic release number.
  • Sign-off: record approver(s), rationale, linked evidence packets, and validation report IDs. No anonymous edits.
  • Staged rollout: apply a canary strategy and an A/B policy only when the safety case allows it (A/B never changes fail-safe states).
  • Rollback: a rollback must be a first-class artifact: previous config package, compatibility notes, and rollback KPI thresholds.

MPN examples (integrity / governance building blocks): Microchip ATECC608B (signed config / anti-tamper), ST STSAFE-A110 (secure element alternative), Infineon OPTIGA™ Trust family (platform-specific fit to be verified).

D) Drift tracking (separating environment vs true fault)

  • Sensor drift: track long-term offset/gain drift using “known stable” phases (e.g., parked/maintenance) and compare against calibration metadata.
  • Mechanical wear: correlate contact quality issues with wear indicators (position/force patterns) while keeping IMD/arc signals separate.
  • Environment cycles: detect humidity/rain cycles that raise EMI-like artifacts; require sensor-fusion agreement (H2-8) before escalating.

Drift evidence fields: drift_ppm, offset_trend, gain_trend, wear_index, env_tag, confidence.

E) KPIs that drive updates (must be measurable from evidence)

  • False trip rate: number of protective actions later classified as non-fault, normalized by operating hours.
  • Missed event rate: confirmed field faults with no corresponding event detection or incorrect class.
  • Evidence completeness rate: percent of events that produce a complete evidence packet (header+context+buffers+versions+signature+commit status).

Release gates: do not roll forward unless KPI improves without degrading evidence completeness.

Figure F12 — Closed-loop improvement (field → analysis → change → validation → rollout)

Closed-loop improvement without breaking safety Evidence-driven updates with audit trail, staged rollout, and rollback gates FIELD EVENTS evidence packets false trips / misses ANALYSIS label + root-cause drift vs wear vs EMI CHANGE PACKAGE config_id + diff signed + auditable VALIDATION GATE re-run affected tests no evidence gaps STAGED ROLLOUT pilot fleet → expand rollback trigger defined KPI GATES false trips ↓ • misses ↓ • evidence completeness ≥ target If KPI regresses or completeness drops → rollback package ROLLBACK READY
F12 shows a closed loop where every update is justified by evidence, gated by validation, rolled out in stages, and reversible by design.

H2-13. FAQs (Evidence-first troubleshooting)

Each answer follows the same triad: 1-sentence conclusion + 2 evidence checks + 1 first fix. Links point back to the relevant chapters.

Use this rule in the field: do not change parameters until two independent evidence checks agree (e.g., waveform + state log). If a protective action occurs, confirm an evidence packet exists (H2-9).

Q Pantograph raises but won’t maintain contact—force control issue or pressure sensor drift? H2-4 / H2-5 / H2-12

Conclusion: Loss of stable contact is most often a drifted pressure/force measurement causing the controller to regulate the wrong target. Evidence: (1) Compare force/pressure trend vs position during steady run—drift shows slow bias without matching mechanics. (2) Check drift KPIs and calibration/version tags. First fix: lock to last known-good calibration/config and re-run a short uplift calibration check.

Q Arc alarms spike during rain but no visible damage—true flashover or EMI false positives? H2-8 / H2-10 / H2-9

Conclusion: Rain-driven spikes are frequently EMI-like bursts that fool single-sensor detectors rather than true arcing. Evidence: (1) Inspect sensor-fusion agreement score and classifier confidence during spikes. (2) Check CM/EMC gate flags and structure-return indicators in the same evidence packet. First fix: tighten fusion gating and improve CM handling (shield bond / entry clamps) before lowering arc thresholds.

Q Pre-charge sometimes times out—bleeder path wrong or Vdc sensing noisy? H2-6 / H2-5 / H2-11

Conclusion: Intermittent precharge timeout is usually measurement noise or scaling error, not a true energy path failure. Evidence: (1) Compare Vdc ramp monotonicity vs coil/AUX feedback timing; noisy sensing shows nonphysical steps. (2) Check ADC diagnostics (open/short, saturation, filter state) around the timeout. First fix: verify Vdc sensing chain integrity and filtering, then re-run the precharge waveform validation.

Q Main contactor closes but Vdc collapses—welded contactor, ground fault, or load inrush? H2-6 / H2-7

Conclusion: A rapid Vdc collapse after closure points to a real energy sink (inrush or fault) rather than timing. Evidence: (1) Check Vdc decay shape and any current/di/dt proxy; faults tend to collapse faster than normal inrush. (2) Verify IMD/leak classification at the same timestamp and confirm no weld-suspect flags. First fix: force a safe open/lockout and validate insulation status before retrying closure.

Q Insulation monitor trips only at high speed—cable movement leakage or common-mode coupling? H2-7 / H2-10

Conclusion: Speed-correlated trips often indicate common-mode coupling or harness motion artifacts, not true insulation collapse. Evidence: (1) Compare leak_est confidence vs CM gate flags during speed changes. (2) Correlate trip timing with vibration/position excursions and HVIL bounce counters. First fix: improve CM suppression (structure bonding, isolation boundary checks) and increase dwell/hysteresis only after CM evidence is mitigated.

Q Emergency drop triggers unexpectedly—HVIL bounce or classifier policy too aggressive? H2-4 / H2-8 / H2-9

Conclusion: Unexpected emergency drops are typically caused by HVIL debounce gaps or over-aggressive escalation policy under noisy inputs. Evidence: (1) Check HVIL open events and bounce counters in the pre-trigger window. (2) Review classifier confidence and action ladder level at the decision moment. First fix: correct HVIL debounce and require multi-sensor agreement before emergency drop, then validate with replay/disturbance tests.

Q Discharge takes too long—bleeder degraded or contactor feedback lies? H2-6 / H2-9

Conclusion: Slow discharge is either a real bleed-path degradation or incorrect open verification. Evidence: (1) Compare Vdc decay constant against historical baseline; degradation shifts the time constant. (2) Verify open command timing vs AUX feedback state and weld-suspect counters. First fix: treat it as unsafe until proven otherwise—lockout, record evidence packet, and verify bleed path and feedback wiring before changing thresholds.

Q Arc events recorded but timestamps don’t align across car—PTP sync issue or local clock drift? H2-9 / H2-6

Conclusion: Misaligned event times usually come from sync-state changes or clock drift, not missing events. Evidence: (1) Check sync_state, skew_us, and time source fields in each evidence packet. (2) Compare monotonic counters (mono_ts) to confirm ordering despite wall-clock mismatch. First fix: restore PTP/GNSS sync health and enforce dual timestamps (mono+wall) as required fields before doing cross-car correlation analysis.

Q After an arc storm, system locks out—what evidence proves it’s safe to recover? H2-8 / H2-4 / H2-11

Conclusion: Recovery is allowed only when evidence shows the storm stopped and safety checks are clean. Evidence: (1) Confirm storm counters stop increasing and classifier confidence returns below threshold for a defined dwell time. (2) Verify IMD/leak status and that sequencing state is stable with valid HVIL. First fix: run the recovery checklist: controlled raise, contact regulation check, and a short validation capture before clearing lockout.

Q IMD shows gradual leakage increase—real insulation aging or contamination cycle? H2-7 / H2-12

Conclusion: Gradual leakage rise can be either true aging or a repeating contamination/environment cycle; the pattern matters. Evidence: (1) Check leak_est trend vs env tags (rain/humidity/temperature) and whether confidence remains high. (2) Compare drift and wear indexes to see if the change is mechanical/sensor-driven. First fix: classify the trend (steady vs cyclic) and apply governed threshold updates only after validation and audit sign-off.

Q Event logs missing right after a disturbance—storage issue or brownout commit not protected? H2-9 / H2-10

Conclusion: Missing logs after disturbance usually means the commit sequence was interrupted by brownout, not that the trigger failed. Evidence: (1) Check commit_status, reset_reason, and holdup markers around the event. (2) Verify whether footer signature fields are absent (incomplete write) or the packet_id was never allocated. First fix: increase holdup/commit robustness and enforce atomic “header→payload→footer” ordering before tuning trigger thresholds.

Q Pantograph chatters/bounces near steady speed—mechanical bounce or sensor/EMC false motion? H2-4 / H2-5 / H2-10

Conclusion: Chatter is often caused by false motion from CM pickup or drifted sensing rather than true mechanical instability. Evidence: (1) Compare position signal changes with pressure/force changes; false motion shows poor correlation. (2) Check CM gate flags and harness/structure coupling markers during the chatter period. First fix: fix sensing integrity (shield bond, filtering, isolation boundary) and add a stability dwell before applying stronger actuation gains.

Figure F13 — FAQ triad (Conclusion → 2 evidence checks → First fix)

FAQ triad — prevent guessing in field debug Every answer uses the same structure and references evidence sources 1-SENTENCE CONCLUSION what is most likely true 2 EVIDENCE CHECKS A) waveform / buffer B) state log / counters two independent proofs FIRST FIX safe + reversible action before changing thresholds Waveforms State Logs Counters
F13 standardizes troubleshooting so field decisions are tied to evidence and reversible first actions.