Search results
1 – 10 of over 1000Swathi Pennapareddy, Ramprasad Srinivasan and Natarajan K.
Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one…
Abstract
Purpose
Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one of the most precise ways for tracking aircraft position. ADS-B is intended to provide greater situational awareness to the pilots by displaying the traffic information like aircraft ID, altitude, speed and other critical parameters on the Cockpit Display of Traffic Information displays in the cockpit. Unfortunately, due to the initial proposed nature of ADS-B protocol, it is neither encrypted nor has any other innate security mechanisms, which makes it an easy target for malicious attacks. The system is vulnerable to various active and passive attacks like message ingestion, message deletion, eavesdropping, jamming, etc., which has become an area of concern for the aviation industry. The purpose of this study is to propose a method based on modified advanced encryption standard (AES) algorithm to secure the ADS=B messages and increase the integrity of ADS-B data transmissions.
Design/methodology/approach
Though there are various cryptographic and non-cryptographic methods proposed to secure ADS-B data transmissions, it is evident that most of these systems have limitations in terms of cost, implementation or feasibility. The new proposed method implements AES encryption techniques on the ADS-B data on the sender side and correlated decryption mechanism at the receiver end. The system is designed based on the flight schedule data available from any flight planning systems and implementing the AES algorithm on the ADS-B data from each aircraft in the flight schedule.
Findings
The suitable hardware was developed using Raspberry pi, ESP32 and Ra-02. Several runs were done to verify the original message, transmitted data and received data. During transmission, encryption algorithm was being developed, which has got very high secured transmission, and during the reception, the data was secured. Field test was conducted to validate the transmission and quality. Several trials were done to validate the transmission process. The authors have successfully shown that the ADS-B data can be encrypted using AES algorithm. The authors are successful in transmitting and receiving the ADS-B data packet using the discussed hardware and software methodology. One major advantage of using the proposed solution is that the information received is encrypted, and the receiver ADS-B system can decrypt the messages on the receiving end. This clearly proves that when the data is received by an unknown receiver, the messages cannot be decrypted, as the receiver is not capable of decrypting the AES-authenticated messages transmitted by the authenticated source. Also, AES encryption is highly unlikely to be decrypted if the encryption key and the associated decryption key are not known.
Research limitations/implications
Implementation of the developed solution in actual onboard avionics systems is not within the scope of this research. Hence, assessing in the real-time distances is not covered.
Social implications
The authors propose to extend this as a software solution to the onboard avionics systems by considering the required architectural changes. This solution can also bring in positive results for unmanned air vehicles in addition to the commercial aircrafts. Enhancement of security to the key operational and navigation data elements is going to be invaluable for future air traffic management and saving lives of people.
Originality/value
The proposed solution has been practically implemented by developing the hardware and software as part of this research. This has been clearly brought out in the paper. The implementation has been tested using the actual ADS-B data/messages received from using the ADS-B receiver. The solution works perfectly, and this brings immense value to the aircraft-to-aircraft and aircraft-to-ground communications, specifically while using ADS-B data for communicating the position information. With the proposed architecture and minor software updates to the onboard avionics, this solution can enhance safety of flights.
Details
Keywords
Nehemia Sugianto, Dian Tjondronegoro and Golam Sorwar
This study proposes a collaborative federated learning (CFL) framework to address personal data transmission and retention issues for artificial intelligence (AI)-enabled video…
Abstract
Purpose
This study proposes a collaborative federated learning (CFL) framework to address personal data transmission and retention issues for artificial intelligence (AI)-enabled video surveillance in public spaces.
Design/methodology/approach
This study examines specific challenges for long-term people monitoring in public spaces and defines AI-enabled video surveillance requirements. Based on the requirements, this study proposes a CFL framework to gradually adapt AI models’ knowledge while reducing personal data transmission and retention. The framework uses three different federated learning strategies to rapidly learn from different new data sources while minimizing personal data transmission and retention to a central machine.
Findings
The findings confirm that the proposed CFL framework can help minimize the use of personal data without compromising the AI model's performance. The gradual learning strategies help develop AI-enabled video surveillance that continuously adapts for long-term deployment in public spaces.
Originality/value
This study makes two specific contributions to advance the development of AI-enabled video surveillance in public spaces. First, it examines specific challenges for long-term people monitoring in public spaces and defines AI-enabled video surveillance requirements. Second, it proposes a CFL framework to minimize data transmission and retention for AI-enabled video surveillance. The study provides comprehensive experimental results to evaluate the effectiveness of the proposed framework in the context of facial expression recognition (FER) which involves large-scale datasets.
Details
Keywords
Tulsi Pawan Fowdur and Ashven Sanghan
The purpose of this paper is to develop a blockchain-based data capture and transmission system that will collect real-time power consumption data from a household electrical…
Abstract
Purpose
The purpose of this paper is to develop a blockchain-based data capture and transmission system that will collect real-time power consumption data from a household electrical appliance and transfer it securely to a local server for energy analytics such as forecasting.
Design/methodology/approach
The data capture system is composed of two current transformer (CT) sensors connected to two different electrical appliances. The CT sensors send the power readings to two Arduino microcontrollers which in turn connect to a Raspberry-Pi for aggregating the data. Blockchain is then enabled onto the Raspberry-Pi through a Java API so that the data are transmitted securely to a server. The server provides real-time visualization of the data as well as prediction using the multi-layer perceptron (MLP) and long short term memory (LSTM) algorithms.
Findings
The results for the blockchain analysis demonstrate that when the data readings are transmitted in smaller blocks, the security is much greater as compared with blocks of larger size. To assess the accuracy of the prediction algorithms data were collected for a 20 min interval to train the model and the algorithms were evaluated using the sliding window approach. The mean average percentage error (MAPE) was used to assess the accuracy of the algorithms and a MAPE of 1.62% and 1.99% was obtained for the LSTM and MLP algorithms, respectively.
Originality/value
A detailed performance analysis of the blockchain-based transmission model using time complexity, throughput and latency as well as energy forecasting has been performed.
Details
Keywords
Chao-Lung Yang, Chun-Fu Chen, Jin-Yu Chen and Hendri Sutrisno
Lean manufacturing has been pivotal in emphasizing the reduction of cycle times, minimizing manufacturing costs and diminishing inventories. This research endeavors to formulate a…
Abstract
Purpose
Lean manufacturing has been pivotal in emphasizing the reduction of cycle times, minimizing manufacturing costs and diminishing inventories. This research endeavors to formulate a lean data management paradigm, through the design and execution of a strategic edge-cloud data governance approach. This study aims to discern anomalous or unforeseen patterns within data sets, enabling an efficacious examination of product shortcomings within manufacturing processes, while concurrently minimizing the redundancy associated with the storage, access and processing of nonvalue-adding data.
Design/methodology/approach
Adopting a lean data management framework within both edge and cloud computing contexts, this study ensures the preservation of significant time series sequences, while ascertaining the optimal quantity of normal time series data to retain. The efficacy of detected anomalous patterns, both at the edge and in the cloud, is assessed. A comparative analysis between traditional data management practices and the strategic edge-cloud data governance approach facilitates an exploration into the equilibrium between anomaly detection and space conservation in cloud environments for aggregated data analysis.
Findings
Evaluation of the proposed framework through a real-world inspection case study revealed its capability to navigate alternative strategies for harmonizing anomaly detection with data storage efficiency in cloud-based analysis. Contrary to the conventional belief that retaining comprehensive data in the cloud maximizes anomaly detection rates, our findings suggest that a strategic edge-cloud data governance model, which retains a specific subset of normal data, can achieve comparable or superior accuracy with less normal data relative to traditional methods. This approach further demonstrates enhanced space efficiency and mitigates various forms of waste, including temporal delays, storage of noncontributory normal data, costs associated with the analysis of such data and excess data transmission.
Originality/value
By treating inspected normal data as nonvalue-added, this study probes the intricacies of maintaining an optimal balance of such data in light of anomaly detection performance from aggregated data sets. Our proposed methodology augments existing research by integrating a strategic edge-cloud data governance model within a lean data analytical framework, thereby ensuring the retention of adequate data for effective anomaly detection.
Details
Keywords
Rodolfo Canelón, Christian Carrasco and Felipe Rivera
It is well known in the mining industry that the increase in failures and breakdowns is due mainly to a poor maintenance policy for the equipment, in addition to the difficult…
Abstract
Purpose
It is well known in the mining industry that the increase in failures and breakdowns is due mainly to a poor maintenance policy for the equipment, in addition to the difficult access that specialized personnel have to combat the breakdown, which translates into more machine downtime. For this reason, this study aims to propose a remote assistance model for diagnosing and repairing critical breakdowns in mining industry trucks using augmented reality techniques and data analytics with a quality approach that considerably reduces response times, thus optimizing human resources.
Design/methodology/approach
In this work, the six-phase CRIPS-DM methodology is used. Initially, the problem of fault diagnosis in trucks used in the extraction of material in the mining industry is addressed. The authors then propose a model under study that seeks a real-time connection between a service technician attending the truck at the mine site and a specialist located at a remote location, considering the data transmission requirements and the machine's characterization.
Findings
It is considered that the theoretical results obtained in the development of this study are satisfactory from the business point of view since, in the first instance, it fulfills specific objectives related to the telecare process. On the other hand, from the data mining point of view, the results manage to comply with the theoretical aspects of the establishment of failure prediction models through the application of the CRISP-DM methodology. All of the above opens the possibility of developing prediction models through machine learning and establishing the best model for the objective of failure prediction.
Originality/value
The original contribution of this work is the proposal of the design of a remote assistance model for diagnosing and repairing critical failures in the mining industry, considering augmented reality and data analytics. Furthermore, the integration of remote assistance, the characterization of the CAEX, their maintenance information and the failure prediction models allow the establishment of a quality-based model since the database with which the learning machine will work is constantly updated.
Details
Keywords
Omotayo Farai, Nicole Metje, Carl Anthony, Ali Sadeghioon and David Chapman
Wireless sensor networks (WSN), as a solution for buried water pipe monitoring, face a new set of challenges compared to traditional application for above-ground infrastructure…
Abstract
Purpose
Wireless sensor networks (WSN), as a solution for buried water pipe monitoring, face a new set of challenges compared to traditional application for above-ground infrastructure monitoring. One of the main challenges for underground WSN deployment is the limited range (less than 3 m) at which reliable wireless underground communication can be achieved using radio signal propagation through the soil. To overcome this challenge, the purpose of this paper is to investigate a new approach for wireless underground communication using acoustic signal propagation along a buried water pipe.
Design/methodology/approach
An acoustic communication system was developed based on the requirements of low cost (tens of pounds at most), low power supply capacity (in the order of 1 W-h) and miniature (centimetre scale) size for a wireless communication node. The developed system was further tested along a buried steel pipe in poorly graded SAND and a buried medium density polyethylene (MDPE) pipe in well graded SAND.
Findings
With predicted acoustic attenuation of 1.3 dB/m and 2.1 dB/m along the buried steel and MDPE pipes, respectively, reliable acoustic communication is possible up to 17 m for the buried steel pipe and 11 m for the buried MDPE pipe.
Research limitations/implications
Although an important first step, more research is needed to validate the acoustic communication system along a wider water distribution pipe network.
Originality/value
This paper shows the possibility of achieving reliable wireless underground communication along a buried water pipe (especially non-metallic material ones) using low-frequency acoustic propagation along the pipe wall.
Details
Keywords
WenFeng Qin, Yunsheng Xue, Hao Peng, Gang Li, Wang Chen, Xin Zhao, Jie Pang and Bin Zhou
The purpose of this study is to design a wearable medical device as a human care platform and to introduce the design details, key technologies and practical implementation…
Abstract
Purpose
The purpose of this study is to design a wearable medical device as a human care platform and to introduce the design details, key technologies and practical implementation methods of the system.
Design/methodology/approach
A multi-channel data acquisition scheme based on PCI-E (rapid interconnection of peripheral components) was proposed. The flexible biosensor is integrated with the flexible data acquisition card with monitoring capability, and the embedded (device that can operate independently) chip STM32F103VET6 is used to realize the simultaneous processing of multi-channel human health parameters. The human health parameters were transferred to the upper computer LabVIEW by intelligent clothing through USB or wireless Bluetooth to complete the transmission and processing of clinical data, which facilitates the analysis of medical data.
Findings
The smart clothing provides a mobile medical cloud platform for wearable medical through cloud computing, which can continuously monitor the body's wrist movement, body temperature and perspiration for 24 h. The result shows that each channel is completely accurate to the top computer display, which can meet the expected requirements, and the wearable instant care system can be applied to healthcare.
Originality/value
The smart clothing in this study is based on the monitoring and diagnosis of textiles, and the electronic communication devices can cooperate and interact to form a wearable textile system that provides medical monitoring and prevention services to individuals in the fastest and most accurate way. Each channel of the system is precisely matched to the display screen of the host computer and meets the expected requirements. As a real-time human health protection platform technology, continuous monitoring of human vital signs can complete the application of human motion detection, medical health monitoring and human–computer interaction. Ultimately, such an intelligent garment will become an integral part of our everyday clothing.
Details
Keywords
Atefeh Hemmati, Mani Zarei and Amir Masoud Rahmani
Big data challenges and opportunities on the Internet of Vehicles (IoV) have emerged as a transformative paradigm to change intelligent transportation systems. With the growth of…
Abstract
Purpose
Big data challenges and opportunities on the Internet of Vehicles (IoV) have emerged as a transformative paradigm to change intelligent transportation systems. With the growth of data-driven applications and the advances in data analysis techniques, the potential for data-adaptive innovation in IoV applications becomes an outstanding development in future IoV. Therefore, this paper aims to focus on big data in IoV and to provide an analysis of the current state of research.
Design/methodology/approach
This review paper uses a systematic literature review methodology. It conducts a thorough search of academic databases to identify relevant scientific articles. By reviewing and analyzing the primary articles found in the big data in the IoV domain, 45 research articles from 2019 to 2023 were selected for detailed analysis.
Findings
This paper discovers the main applications, use cases and primary contexts considered for big data in IoV. Next, it documents challenges, opportunities, future research directions and open issues.
Research limitations/implications
This paper is based on academic articles published from 2019 to 2023. Therefore, scientific outputs published before 2019 are omitted.
Originality/value
This paper provides a thorough analysis of big data in IoV and considers distinct research questions corresponding to big data challenges and opportunities in IoV. It also provides valuable insights for researchers and practitioners in evolving this field by examining the existing fields and future directions for big data in the IoV ecosystem.
Details
Keywords
Hua Song, Siqi Han and Kangkang Yu
This study examines the cognitive factors of adopting blockchain technology in various supply chain scenarios and its role in reframing the distinctive values of supply chain…
Abstract
Purpose
This study examines the cognitive factors of adopting blockchain technology in various supply chain scenarios and its role in reframing the distinctive values of supply chain financing. Based on expectancy theory, this study explores the different profiles underlying the components of expectancy, valence and instrumentality.
Design/methodology/approach
This is a multiple-case study of four Fintech companies using blockchain technology to promote the performance of supply chain operations and financing.
Findings
The results show that blockchain-enabled supply chain finance (BSCF) can be classified into four scenarios based on the scope and purpose of blockchain technology applications. The success of BSCF depends on the profiles of BSCF expectancy (the recognized purpose and scope of BSCF), instrumentality (identified blockchain attributes and other technology combinations) and valence (the perceived distinctive value of BSCF). Blockchain attributes help solve information asymmetry problems and enhance financing performance in two ways: one is supporting transparency, traceability and verification of transmissions and the other entails facilitating a transformation to new business models.
Originality/value
This research applies a new perspective based on expectancy theory to study how cognitive factors affect Fintech companies' blockchain solutions under a given supply chain operation or financing activity. It explains the behavioral antecedents for applying blockchain technology, the situations appropriate for the different roles of blockchain technology and the profiles for realizing the value of blockchain technology.
Details
Keywords
Jinwei Zhao, Shuolei Feng, Xiaodong Cao and Haopei Zheng
This paper aims to concentrate on recent innovations in flexible wearable sensor technology tailored for monitoring vital signals within the contexts of wearable sensors and…
Abstract
Purpose
This paper aims to concentrate on recent innovations in flexible wearable sensor technology tailored for monitoring vital signals within the contexts of wearable sensors and systems developed specifically for monitoring health and fitness metrics.
Design/methodology/approach
In recent decades, wearable sensors for monitoring vital signals in sports and health have advanced greatly. Vital signals include electrocardiogram, electroencephalogram, electromyography, inertial data, body motions, cardiac rate and bodily fluids like blood and sweating, making them a good choice for sensing devices.
Findings
This report reviewed reputable journal articles on wearable sensors for vital signal monitoring, focusing on multimode and integrated multi-dimensional capabilities like structure, accuracy and nature of the devices, which may offer a more versatile and comprehensive solution.
Originality/value
The paper provides essential information on the present obstacles and challenges in this domain and provide a glimpse into the future directions of wearable sensors for the detection of these crucial signals. Importantly, it is evident that the integration of modern fabricating techniques, stretchable electronic devices, the Internet of Things and the application of artificial intelligence algorithms has significantly improved the capacity to efficiently monitor and leverage these signals for human health monitoring, including disease prediction.