Search results

1 – 10 of over 1000
Article
Publication date: 7 May 2024

Swathi Pennapareddy, Ramprasad Srinivasan and Natarajan K.

Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one…

Abstract

Purpose

Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one of the most precise ways for tracking aircraft position. ADS-B is intended to provide greater situational awareness to the pilots by displaying the traffic information like aircraft ID, altitude, speed and other critical parameters on the Cockpit Display of Traffic Information displays in the cockpit. Unfortunately, due to the initial proposed nature of ADS-B protocol, it is neither encrypted nor has any other innate security mechanisms, which makes it an easy target for malicious attacks. The system is vulnerable to various active and passive attacks like message ingestion, message deletion, eavesdropping, jamming, etc., which has become an area of concern for the aviation industry. The purpose of this study is to propose a method based on modified advanced encryption standard (AES) algorithm to secure the ADS=B messages and increase the integrity of ADS-B data transmissions.

Design/methodology/approach

Though there are various cryptographic and non-cryptographic methods proposed to secure ADS-B data transmissions, it is evident that most of these systems have limitations in terms of cost, implementation or feasibility. The new proposed method implements AES encryption techniques on the ADS-B data on the sender side and correlated decryption mechanism at the receiver end. The system is designed based on the flight schedule data available from any flight planning systems and implementing the AES algorithm on the ADS-B data from each aircraft in the flight schedule.

Findings

The suitable hardware was developed using Raspberry pi, ESP32 and Ra-02. Several runs were done to verify the original message, transmitted data and received data. During transmission, encryption algorithm was being developed, which has got very high secured transmission, and during the reception, the data was secured. Field test was conducted to validate the transmission and quality. Several trials were done to validate the transmission process. The authors have successfully shown that the ADS-B data can be encrypted using AES algorithm. The authors are successful in transmitting and receiving the ADS-B data packet using the discussed hardware and software methodology. One major advantage of using the proposed solution is that the information received is encrypted, and the receiver ADS-B system can decrypt the messages on the receiving end. This clearly proves that when the data is received by an unknown receiver, the messages cannot be decrypted, as the receiver is not capable of decrypting the AES-authenticated messages transmitted by the authenticated source. Also, AES encryption is highly unlikely to be decrypted if the encryption key and the associated decryption key are not known.

Research limitations/implications

Implementation of the developed solution in actual onboard avionics systems is not within the scope of this research. Hence, assessing in the real-time distances is not covered.

Social implications

The authors propose to extend this as a software solution to the onboard avionics systems by considering the required architectural changes. This solution can also bring in positive results for unmanned air vehicles in addition to the commercial aircrafts. Enhancement of security to the key operational and navigation data elements is going to be invaluable for future air traffic management and saving lives of people.

Originality/value

The proposed solution has been practically implemented by developing the hardware and software as part of this research. This has been clearly brought out in the paper. The implementation has been tested using the actual ADS-B data/messages received from using the ADS-B receiver. The solution works perfectly, and this brings immense value to the aircraft-to-aircraft and aircraft-to-ground communications, specifically while using ADS-B data for communicating the position information. With the proposed architecture and minor software updates to the onboard avionics, this solution can enhance safety of flights.

Details

Aircraft Engineering and Aerospace Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1748-8842

Keywords

Article
Publication date: 7 March 2024

Nehemia Sugianto, Dian Tjondronegoro and Golam Sorwar

This study proposes a collaborative federated learning (CFL) framework to address personal data transmission and retention issues for artificial intelligence (AI)-enabled video…

Abstract

Purpose

This study proposes a collaborative federated learning (CFL) framework to address personal data transmission and retention issues for artificial intelligence (AI)-enabled video surveillance in public spaces.

Design/methodology/approach

This study examines specific challenges for long-term people monitoring in public spaces and defines AI-enabled video surveillance requirements. Based on the requirements, this study proposes a CFL framework to gradually adapt AI models’ knowledge while reducing personal data transmission and retention. The framework uses three different federated learning strategies to rapidly learn from different new data sources while minimizing personal data transmission and retention to a central machine.

Findings

The findings confirm that the proposed CFL framework can help minimize the use of personal data without compromising the AI model's performance. The gradual learning strategies help develop AI-enabled video surveillance that continuously adapts for long-term deployment in public spaces.

Originality/value

This study makes two specific contributions to advance the development of AI-enabled video surveillance in public spaces. First, it examines specific challenges for long-term people monitoring in public spaces and defines AI-enabled video surveillance requirements. Second, it proposes a CFL framework to minimize data transmission and retention for AI-enabled video surveillance. The study provides comprehensive experimental results to evaluate the effectiveness of the proposed framework in the context of facial expression recognition (FER) which involves large-scale datasets.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 25 April 2024

Tulsi Pawan Fowdur and Ashven Sanghan

The purpose of this paper is to develop a blockchain-based data capture and transmission system that will collect real-time power consumption data from a household electrical…

Abstract

Purpose

The purpose of this paper is to develop a blockchain-based data capture and transmission system that will collect real-time power consumption data from a household electrical appliance and transfer it securely to a local server for energy analytics such as forecasting.

Design/methodology/approach

The data capture system is composed of two current transformer (CT) sensors connected to two different electrical appliances. The CT sensors send the power readings to two Arduino microcontrollers which in turn connect to a Raspberry-Pi for aggregating the data. Blockchain is then enabled onto the Raspberry-Pi through a Java API so that the data are transmitted securely to a server. The server provides real-time visualization of the data as well as prediction using the multi-layer perceptron (MLP) and long short term memory (LSTM) algorithms.

Findings

The results for the blockchain analysis demonstrate that when the data readings are transmitted in smaller blocks, the security is much greater as compared with blocks of larger size. To assess the accuracy of the prediction algorithms data were collected for a 20 min interval to train the model and the algorithms were evaluated using the sliding window approach. The mean average percentage error (MAPE) was used to assess the accuracy of the algorithms and a MAPE of 1.62% and 1.99% was obtained for the LSTM and MLP algorithms, respectively.

Originality/value

A detailed performance analysis of the blockchain-based transmission model using time complexity, throughput and latency as well as energy forecasting has been performed.

Details

Sensor Review, vol. 44 no. 3
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 28 May 2024

Chao-Lung Yang, Chun-Fu Chen, Jin-Yu Chen and Hendri Sutrisno

Lean manufacturing has been pivotal in emphasizing the reduction of cycle times, minimizing manufacturing costs and diminishing inventories. This research endeavors to formulate a…

Abstract

Purpose

Lean manufacturing has been pivotal in emphasizing the reduction of cycle times, minimizing manufacturing costs and diminishing inventories. This research endeavors to formulate a lean data management paradigm, through the design and execution of a strategic edge-cloud data governance approach. This study aims to discern anomalous or unforeseen patterns within data sets, enabling an efficacious examination of product shortcomings within manufacturing processes, while concurrently minimizing the redundancy associated with the storage, access and processing of nonvalue-adding data.

Design/methodology/approach

Adopting a lean data management framework within both edge and cloud computing contexts, this study ensures the preservation of significant time series sequences, while ascertaining the optimal quantity of normal time series data to retain. The efficacy of detected anomalous patterns, both at the edge and in the cloud, is assessed. A comparative analysis between traditional data management practices and the strategic edge-cloud data governance approach facilitates an exploration into the equilibrium between anomaly detection and space conservation in cloud environments for aggregated data analysis.

Findings

Evaluation of the proposed framework through a real-world inspection case study revealed its capability to navigate alternative strategies for harmonizing anomaly detection with data storage efficiency in cloud-based analysis. Contrary to the conventional belief that retaining comprehensive data in the cloud maximizes anomaly detection rates, our findings suggest that a strategic edge-cloud data governance model, which retains a specific subset of normal data, can achieve comparable or superior accuracy with less normal data relative to traditional methods. This approach further demonstrates enhanced space efficiency and mitigates various forms of waste, including temporal delays, storage of noncontributory normal data, costs associated with the analysis of such data and excess data transmission.

Originality/value

By treating inspected normal data as nonvalue-added, this study probes the intricacies of maintaining an optimal balance of such data in light of anomaly detection performance from aggregated data sets. Our proposed methodology augments existing research by integrating a strategic edge-cloud data governance model within a lean data analytical framework, thereby ensuring the retention of adequate data for effective anomaly detection.

Details

Chinese Management Studies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1750-614X

Keywords

Article
Publication date: 14 November 2023

Rodolfo Canelón, Christian Carrasco and Felipe Rivera

It is well known in the mining industry that the increase in failures and breakdowns is due mainly to a poor maintenance policy for the equipment, in addition to the difficult…

Abstract

Purpose

It is well known in the mining industry that the increase in failures and breakdowns is due mainly to a poor maintenance policy for the equipment, in addition to the difficult access that specialized personnel have to combat the breakdown, which translates into more machine downtime. For this reason, this study aims to propose a remote assistance model for diagnosing and repairing critical breakdowns in mining industry trucks using augmented reality techniques and data analytics with a quality approach that considerably reduces response times, thus optimizing human resources.

Design/methodology/approach

In this work, the six-phase CRIPS-DM methodology is used. Initially, the problem of fault diagnosis in trucks used in the extraction of material in the mining industry is addressed. The authors then propose a model under study that seeks a real-time connection between a service technician attending the truck at the mine site and a specialist located at a remote location, considering the data transmission requirements and the machine's characterization.

Findings

It is considered that the theoretical results obtained in the development of this study are satisfactory from the business point of view since, in the first instance, it fulfills specific objectives related to the telecare process. On the other hand, from the data mining point of view, the results manage to comply with the theoretical aspects of the establishment of failure prediction models through the application of the CRISP-DM methodology. All of the above opens the possibility of developing prediction models through machine learning and establishing the best model for the objective of failure prediction.

Originality/value

The original contribution of this work is the proposal of the design of a remote assistance model for diagnosing and repairing critical failures in the mining industry, considering augmented reality and data analytics. Furthermore, the integration of remote assistance, the characterization of the CAEX, their maintenance information and the failure prediction models allow the establishment of a quality-based model since the database with which the learning machine will work is constantly updated.

Details

Journal of Quality in Maintenance Engineering, vol. 30 no. 1
Type: Research Article
ISSN: 1355-2511

Keywords

Article
Publication date: 6 October 2023

Omotayo Farai, Nicole Metje, Carl Anthony, Ali Sadeghioon and David Chapman

Wireless sensor networks (WSN), as a solution for buried water pipe monitoring, face a new set of challenges compared to traditional application for above-ground infrastructure…

Abstract

Purpose

Wireless sensor networks (WSN), as a solution for buried water pipe monitoring, face a new set of challenges compared to traditional application for above-ground infrastructure monitoring. One of the main challenges for underground WSN deployment is the limited range (less than 3 m) at which reliable wireless underground communication can be achieved using radio signal propagation through the soil. To overcome this challenge, the purpose of this paper is to investigate a new approach for wireless underground communication using acoustic signal propagation along a buried water pipe.

Design/methodology/approach

An acoustic communication system was developed based on the requirements of low cost (tens of pounds at most), low power supply capacity (in the order of 1 W-h) and miniature (centimetre scale) size for a wireless communication node. The developed system was further tested along a buried steel pipe in poorly graded SAND and a buried medium density polyethylene (MDPE) pipe in well graded SAND.

Findings

With predicted acoustic attenuation of 1.3 dB/m and 2.1 dB/m along the buried steel and MDPE pipes, respectively, reliable acoustic communication is possible up to 17 m for the buried steel pipe and 11 m for the buried MDPE pipe.

Research limitations/implications

Although an important first step, more research is needed to validate the acoustic communication system along a wider water distribution pipe network.

Originality/value

This paper shows the possibility of achieving reliable wireless underground communication along a buried water pipe (especially non-metallic material ones) using low-frequency acoustic propagation along the pipe wall.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 24 October 2023

WenFeng Qin, Yunsheng Xue, Hao Peng, Gang Li, Wang Chen, Xin Zhao, Jie Pang and Bin Zhou

The purpose of this study is to design a wearable medical device as a human care platform and to introduce the design details, key technologies and practical implementation…

Abstract

Purpose

The purpose of this study is to design a wearable medical device as a human care platform and to introduce the design details, key technologies and practical implementation methods of the system.

Design/methodology/approach

A multi-channel data acquisition scheme based on PCI-E (rapid interconnection of peripheral components) was proposed. The flexible biosensor is integrated with the flexible data acquisition card with monitoring capability, and the embedded (device that can operate independently) chip STM32F103VET6 is used to realize the simultaneous processing of multi-channel human health parameters. The human health parameters were transferred to the upper computer LabVIEW by intelligent clothing through USB or wireless Bluetooth to complete the transmission and processing of clinical data, which facilitates the analysis of medical data.

Findings

The smart clothing provides a mobile medical cloud platform for wearable medical through cloud computing, which can continuously monitor the body's wrist movement, body temperature and perspiration for 24 h. The result shows that each channel is completely accurate to the top computer display, which can meet the expected requirements, and the wearable instant care system can be applied to healthcare.

Originality/value

The smart clothing in this study is based on the monitoring and diagnosis of textiles, and the electronic communication devices can cooperate and interact to form a wearable textile system that provides medical monitoring and prevention services to individuals in the fastest and most accurate way. Each channel of the system is precisely matched to the display screen of the host computer and meets the expected requirements. As a real-time human health protection platform technology, continuous monitoring of human vital signs can complete the application of human motion detection, medical health monitoring and human–computer interaction. Ultimately, such an intelligent garment will become an integral part of our everyday clothing.

Details

International Journal of Clothing Science and Technology, vol. 36 no. 1
Type: Research Article
ISSN: 0955-6222

Keywords

Article
Publication date: 29 February 2024

Atefeh Hemmati, Mani Zarei and Amir Masoud Rahmani

Big data challenges and opportunities on the Internet of Vehicles (IoV) have emerged as a transformative paradigm to change intelligent transportation systems. With the growth of…

Abstract

Purpose

Big data challenges and opportunities on the Internet of Vehicles (IoV) have emerged as a transformative paradigm to change intelligent transportation systems. With the growth of data-driven applications and the advances in data analysis techniques, the potential for data-adaptive innovation in IoV applications becomes an outstanding development in future IoV. Therefore, this paper aims to focus on big data in IoV and to provide an analysis of the current state of research.

Design/methodology/approach

This review paper uses a systematic literature review methodology. It conducts a thorough search of academic databases to identify relevant scientific articles. By reviewing and analyzing the primary articles found in the big data in the IoV domain, 45 research articles from 2019 to 2023 were selected for detailed analysis.

Findings

This paper discovers the main applications, use cases and primary contexts considered for big data in IoV. Next, it documents challenges, opportunities, future research directions and open issues.

Research limitations/implications

This paper is based on academic articles published from 2019 to 2023. Therefore, scientific outputs published before 2019 are omitted.

Originality/value

This paper provides a thorough analysis of big data in IoV and considers distinct research questions corresponding to big data challenges and opportunities in IoV. It also provides valuable insights for researchers and practitioners in evolving this field by examining the existing fields and future directions for big data in the IoV ecosystem.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 20 March 2023

Hua Song, Siqi Han and Kangkang Yu

This study examines the cognitive factors of adopting blockchain technology in various supply chain scenarios and its role in reframing the distinctive values of supply chain…

1230

Abstract

Purpose

This study examines the cognitive factors of adopting blockchain technology in various supply chain scenarios and its role in reframing the distinctive values of supply chain financing. Based on expectancy theory, this study explores the different profiles underlying the components of expectancy, valence and instrumentality.

Design/methodology/approach

This is a multiple-case study of four Fintech companies using blockchain technology to promote the performance of supply chain operations and financing.

Findings

The results show that blockchain-enabled supply chain finance (BSCF) can be classified into four scenarios based on the scope and purpose of blockchain technology applications. The success of BSCF depends on the profiles of BSCF expectancy (the recognized purpose and scope of BSCF), instrumentality (identified blockchain attributes and other technology combinations) and valence (the perceived distinctive value of BSCF). Blockchain attributes help solve information asymmetry problems and enhance financing performance in two ways: one is supporting transparency, traceability and verification of transmissions and the other entails facilitating a transformation to new business models.

Originality/value

This research applies a new perspective based on expectancy theory to study how cognitive factors affect Fintech companies' blockchain solutions under a given supply chain operation or financing activity. It explains the behavioral antecedents for applying blockchain technology, the situations appropriate for the different roles of blockchain technology and the profiles for realizing the value of blockchain technology.

Details

International Journal of Operations & Production Management, vol. 43 no. 12
Type: Research Article
ISSN: 0144-3577

Keywords

Article
Publication date: 16 April 2024

Jinwei Zhao, Shuolei Feng, Xiaodong Cao and Haopei Zheng

This paper aims to concentrate on recent innovations in flexible wearable sensor technology tailored for monitoring vital signals within the contexts of wearable sensors and…

Abstract

Purpose

This paper aims to concentrate on recent innovations in flexible wearable sensor technology tailored for monitoring vital signals within the contexts of wearable sensors and systems developed specifically for monitoring health and fitness metrics.

Design/methodology/approach

In recent decades, wearable sensors for monitoring vital signals in sports and health have advanced greatly. Vital signals include electrocardiogram, electroencephalogram, electromyography, inertial data, body motions, cardiac rate and bodily fluids like blood and sweating, making them a good choice for sensing devices.

Findings

This report reviewed reputable journal articles on wearable sensors for vital signal monitoring, focusing on multimode and integrated multi-dimensional capabilities like structure, accuracy and nature of the devices, which may offer a more versatile and comprehensive solution.

Originality/value

The paper provides essential information on the present obstacles and challenges in this domain and provide a glimpse into the future directions of wearable sensors for the detection of these crucial signals. Importantly, it is evident that the integration of modern fabricating techniques, stretchable electronic devices, the Internet of Things and the application of artificial intelligence algorithms has significantly improved the capacity to efficiently monitor and leverage these signals for human health monitoring, including disease prediction.

Details

Sensor Review, vol. 44 no. 3
Type: Research Article
ISSN: 0260-2288

Keywords

1 – 10 of over 1000