Search results

1 – 10 of 496
Article
Publication date: 7 May 2024

Swathi Pennapareddy, Ramprasad Srinivasan and Natarajan K.

Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one…

Abstract

Purpose

Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one of the most precise ways for tracking aircraft position. ADS-B is intended to provide greater situational awareness to the pilots by displaying the traffic information like aircraft ID, altitude, speed and other critical parameters on the Cockpit Display of Traffic Information displays in the cockpit. Unfortunately, due to the initial proposed nature of ADS-B protocol, it is neither encrypted nor has any other innate security mechanisms, which makes it an easy target for malicious attacks. The system is vulnerable to various active and passive attacks like message ingestion, message deletion, eavesdropping, jamming, etc., which has become an area of concern for the aviation industry. The purpose of this study is to propose a method based on modified advanced encryption standard (AES) algorithm to secure the ADS=B messages and increase the integrity of ADS-B data transmissions.

Design/methodology/approach

Though there are various cryptographic and non-cryptographic methods proposed to secure ADS-B data transmissions, it is evident that most of these systems have limitations in terms of cost, implementation or feasibility. The new proposed method implements AES encryption techniques on the ADS-B data on the sender side and correlated decryption mechanism at the receiver end. The system is designed based on the flight schedule data available from any flight planning systems and implementing the AES algorithm on the ADS-B data from each aircraft in the flight schedule.

Findings

The suitable hardware was developed using Raspberry pi, ESP32 and Ra-02. Several runs were done to verify the original message, transmitted data and received data. During transmission, encryption algorithm was being developed, which has got very high secured transmission, and during the reception, the data was secured. Field test was conducted to validate the transmission and quality. Several trials were done to validate the transmission process. The authors have successfully shown that the ADS-B data can be encrypted using AES algorithm. The authors are successful in transmitting and receiving the ADS-B data packet using the discussed hardware and software methodology. One major advantage of using the proposed solution is that the information received is encrypted, and the receiver ADS-B system can decrypt the messages on the receiving end. This clearly proves that when the data is received by an unknown receiver, the messages cannot be decrypted, as the receiver is not capable of decrypting the AES-authenticated messages transmitted by the authenticated source. Also, AES encryption is highly unlikely to be decrypted if the encryption key and the associated decryption key are not known.

Research limitations/implications

Implementation of the developed solution in actual onboard avionics systems is not within the scope of this research. Hence, assessing in the real-time distances is not covered.

Social implications

The authors propose to extend this as a software solution to the onboard avionics systems by considering the required architectural changes. This solution can also bring in positive results for unmanned air vehicles in addition to the commercial aircrafts. Enhancement of security to the key operational and navigation data elements is going to be invaluable for future air traffic management and saving lives of people.

Originality/value

The proposed solution has been practically implemented by developing the hardware and software as part of this research. This has been clearly brought out in the paper. The implementation has been tested using the actual ADS-B data/messages received from using the ADS-B receiver. The solution works perfectly, and this brings immense value to the aircraft-to-aircraft and aircraft-to-ground communications, specifically while using ADS-B data for communicating the position information. With the proposed architecture and minor software updates to the onboard avionics, this solution can enhance safety of flights.

Details

Aircraft Engineering and Aerospace Technology, vol. 96 no. 7
Type: Research Article
ISSN: 1748-8842

Keywords

Article
Publication date: 12 September 2024

Jiaqing Shen, Xu Bai, Xiaoguang Tu and Jianhua Liu

Unmanned aerial vehicles (UAVs), known for their exceptional flexibility and maneuverability, have become an integral part of mobile edge computing systems in edge networks. This…

Abstract

Purpose

Unmanned aerial vehicles (UAVs), known for their exceptional flexibility and maneuverability, have become an integral part of mobile edge computing systems in edge networks. This paper aims to minimize system costs within a communication cycle. To this end, this paper has developed a model for task offloading in UAV-assisted edge networks under dynamic channel conditions. This study seeks to efficiently execute task offloading while satisfying UAV energy constraints, and validates the effectiveness of the proposed method through performance comparisons with other similar algorithms.

Design/methodology/approach

To address this issue, this paper proposes a task offloading and trajectory optimization algorithm using deep deterministic policy gradient, which jointly optimizes Internet of Things (IoT) device scheduling, power distribution, task offloading and UAV flight trajectory to minimize system costs.

Findings

The analysis of simulation results indicates that this algorithm achieves lower redundancy compared to others, along with reductions in task size by 22.8%, flight time by 34.5%, number of IoT devices by 11.8%, UAV computing power by 25.35% and the required cycle for per-bit tasks by 33.6%.

Originality/value

A multi-objective optimization problem is established under dynamic channel conditions, and the effectiveness of this approach is validated.

Details

International Journal of Web Information Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 6 September 2023

Shreyanshu Parhi, Shashank Kumar, Kanchan Joshi, Milind Akarte, Rakesh D. Raut and Balkrishna Eknath Narkhede

The advent of Internet of Things, cloud computing and advanced computing has endowed smart manufacturing environments with resilience, reconfigurability and intelligence…

Abstract

Purpose

The advent of Internet of Things, cloud computing and advanced computing has endowed smart manufacturing environments with resilience, reconfigurability and intelligence, resulting in the emergence of novel capabilities. These capabilities have significantly reshaped the manufacturing ecosystem, enabling it to effectively navigate uncertainties. The purpose of this study is to assess the operational transformations resulting from the implementation of smart manufacturing, which distinguish it from conventional systems.

Design/methodology/approach

A list of qualitative and quantitative smart manufacturing performance metrics (SMPMs) are initially suggested and categorized into strategic, tactical and operational levels. The SMPMs resemble the capabilities of smart manufacturing systems to manage disruptions due to uncertainties. Then, industry and academia experts validate the SMPMs through the utilization of the Delphi method, enabling the ranking of the SMPMs.

Findings

The proposition of the SMPMs serves as a metric to assess the digital transformation capabilities of smart manufacturing systems. In addition, the ranking of the proposed SMPMs shows a degree of relevance of the measures in smart manufacturing deployment and managing the disruptions caused due to the COVID-19 pandemic

Research limitations/implications

The findings benefit managers, consultants, policymakers and researchers in making appropriate decisions for deploying and operationalizing smart manufacturing systems by focusing on critical SMPMs.

Originality/value

The research provides a metric to assess the operational transformations during the deployment of smart manufacturing systems. Also, it states the role of the metric in managing the potential disruptions that can alter the performance of the business due to the COVID-19 pandemic.

Details

Journal of Global Operations and Strategic Sourcing, vol. 17 no. 3
Type: Research Article
ISSN: 2398-5364

Keywords

Article
Publication date: 27 February 2024

Shefali Arora, Ruchi Mittal, Avinash K. Shrivastava and Shivani Bali

Deep learning (DL) is on the rise because it can make predictions and judgments based on data that is unseen. Blockchain technologies are being combined with DL frameworks in…

Abstract

Purpose

Deep learning (DL) is on the rise because it can make predictions and judgments based on data that is unseen. Blockchain technologies are being combined with DL frameworks in various industries to provide a safe and effective infrastructure. The review comprises literature that lists the most recent techniques used in the aforementioned application sectors. We examine the current research trends across several fields and evaluate the literature in terms of its advantages and disadvantages.

Design/methodology/approach

The integration of blockchain and DL has been explored in several application domains for the past five years (2018–2023). Our research is guided by five research questions, and based on these questions, we concentrate on key application domains such as the usage of Internet of Things (IoT) in several applications, healthcare and cryptocurrency price prediction. We have analyzed the main challenges and possibilities concerning blockchain technologies. We have discussed the methodologies used in the pertinent publications in these areas and contrasted the research trends during the previous five years. Additionally, we provide a comparison of the widely used blockchain frameworks that are used to create blockchain-based DL frameworks.

Findings

By responding to five research objectives, the study highlights and assesses the effectiveness of already published works using blockchain and DL. Our findings indicate that IoT applications, such as their use in smart cities and cars, healthcare and cryptocurrency, are the key areas of research. The primary focus of current research is the enhancement of existing systems, with data analysis, storage and sharing via decentralized systems being the main motivation for this integration. Amongst the various frameworks employed, Ethereum and Hyperledger are popular among researchers in the domain of IoT and healthcare, whereas Bitcoin is popular for research on cryptocurrency.

Originality/value

There is a lack of literature that summarizes the state-of-the-art methods incorporating blockchain and DL in popular domains such as healthcare, IoT and cryptocurrency price prediction. We analyze the existing research done in the past five years (2018–2023) to review the issues and emerging trends.

Details

International Journal of Quality & Reliability Management, vol. 41 no. 8
Type: Research Article
ISSN: 0265-671X

Keywords

Article
Publication date: 9 July 2024

Camila Favoretto, Glauco Henrique de Sousa Mendes, Renata de Oliveira Mota, Moacir Godinho Filho, Lauro Osiro and Gilberto Miller Devós M.D. Ganga

This paper aims to identify the interrelationships among critical factors for digital servitization (DS) implementation.

Abstract

Purpose

This paper aims to identify the interrelationships among critical factors for digital servitization (DS) implementation.

Design/methodology/approach

A multi-method research was used. Critical factors for a successful DS implementation were identified using a systematic literature review and expert interviews. The interpretive structural modeling (ISM) method was used to develop a hierarchical model of the identified factors, followed by the fuzzy Matrice d’Impacts Croisés Multiplication Appliqués à un Classement (MICMAC) analysis to assess their dependence and driving powers.

Findings

A total of 23 factors for DS implementation were identified, and the ISM model was developed. Based on MICMAC analysis, the factors were also grouped under four categories (dependent, driving, autonomous and linkage). A conceptual framework is proposed, highlighting that DS implementation relies on three main layers of critical factors: crafting alignment, scaling the change and achieving results.

Originality/value

The ISM and fuzzy MICMAC methods used in this study provided valuable insights into the interrelationship among the identified DS factors through a conceptual framework. To the best of the authors’ knowledge, the study is one of the first to identify critical factors influencing DS implementation and develop hierarchical relationships among them.

Details

Journal of Business & Industrial Marketing, vol. 39 no. 9
Type: Research Article
ISSN: 0885-8624

Keywords

Article
Publication date: 27 August 2024

Supriya Raheja, Rakesh Garg and Ritvik Garg

The Internet of Things (IoT) cloud platforms provide end-to-end solutions that integrate various capabilities such as application development, device and connectivity management…

Abstract

Purpose

The Internet of Things (IoT) cloud platforms provide end-to-end solutions that integrate various capabilities such as application development, device and connectivity management, data storage, data analysis and data visualization. The high use of these platforms results in their huge availability provided by different capabilities. Therefore, choosing the optimal IoT cloud platform to develop IoT applications successfully has become crucial. The key purpose of the present study is to implement a hybrid multi-attribute decision-making approach (MADM) to evaluate and select IoT cloud platforms.

Design/methodology/approach

The optimal selection of the IoT cloud platforms seems to be dependent on multiple attributes. Hence, the optimal selection of IoT cloud platforms problem is modeled as a MADM problem, and a hybrid approach named neutrosophic fuzzy set-Euclidean taxicab distance-based approach (NFS-ETDBA) is implemented to solve the same. NFS-ETDBA works on the calculation of assessment score for each alternative, i.e. IoT cloud platforms, by combining two different measures: Euclidean and taxicab distance.

Findings

A case study to illustrate the working of the proposed NFS-ETDBA for optimal selection of IoT cloud platforms is given. The results obtained on the basis of calculated assessment scores depict that “Azure IoT suite” is the most preferable IoT cloud platform, whereas “Salesman IoT cloud” is the least preferable.

Originality/value

The proposed NFS-ETDBA methodology for the IoT cloud platform selection is implemented for the first time in this field. ETDBA is highly capable of handling the large number of alternatives and the selection attributes involved in any decision-making process. Further, the use of fuzzy set theory (FST) makes it very easy to handle the impreciseness that may occur during the data collection through a questionnaire from a group of experts.

Details

International Journal of Intelligent Computing and Cybernetics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 18 September 2024

Rami Alkhudary and Paul Gardiner

This paper explores how blockchain technology can enhance information quality within project management information systems (PMIS), thereby positively affecting knowledge…

Abstract

Purpose

This paper explores how blockchain technology can enhance information quality within project management information systems (PMIS), thereby positively affecting knowledge management, learning capabilities and project portfolio success.

Design/methodology/approach

We employ a literature review and a theory-based approach to develop a conceptual framework and set of propositions that integrate key principles from blockchain technology, project management and dynamic capabilities theory. Subsequently, a focus group is conducted to refine our propositions, providing insights and examples demonstrating the potential value of blockchain in project management.

Findings

The findings suggest that blockchain significantly impacts the information quality within PMIS. This improvement in information quality enhances traceability, reliability and security of project data, facilitating better decision-making and governance. The focus group revealed blockchain’s benefits in managing confidential data and streamlining knowledge sharing processes, ultimately contributing to project portfolio success.

Originality/value

This research offers a novel conceptual framework and original insights into the application of blockchain in project management, particularly within the context of Industry 4.0, paving the way for future research on digital transformation in project management.

Details

International Journal of Managing Projects in Business, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1753-8378

Keywords

Article
Publication date: 28 August 2024

Lingbing Feng and Dasen Huang

This study aims to investigate the impact of climate risk disclosure by listed companies on the entry of green investors. It seeks to understand how proactive climate risk…

Abstract

Purpose

This study aims to investigate the impact of climate risk disclosure by listed companies on the entry of green investors. It seeks to understand how proactive climate risk disclosure can attract green investment and the underlying mechanisms that facilitate this process.

Design/methodology/approach

Textual analysis is employed to assess the extent of climate risk disclosure in annual reports. The research constructs indicators for green investor entry and applies regression analysis to examine the relationship between climate risk disclosure and green investment, considering various mediating variables such as positive online news coverage, ESG scores, and corporate reputation.

Findings

Green investors are more likely to invest in companies with higher levels of climate risk disclosure. This relationship is robust across different types of firms, with non-state-owned, non-high-tech, large-scale firms, and those in the Eastern region showing a stronger attraction to green investors. Climate risk disclosure promotes green investment through the “signal transmission” mechanism, enhancing corporate reputation and ESG performance.

Originality/value

This paper extends the traditional theory of external incentives for corporate green development to include autonomous incentives through active climate risk disclosure. It provides new insights into the theory of corporate sustainable development and offers practical recommendations for enhancing corporate green development pathways. The study’s comprehensive approach and use of extensive data contribute valuable knowledge to the field of green investment and corporate sustainability.

Details

China Finance Review International, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2044-1398

Keywords

Article
Publication date: 19 July 2024

Zican Chang, Guojun Zhang, Wenqing Zhang, Yabo Zhang, Li Jia, Zhengyu Bai and Wendong Zhang

Ciliated microelectromechanical system (MEMS) vector hydrophones pick up sound signals through Wheatstone bridge in cross beam-ciliated microstructures to achieve information…

Abstract

Purpose

Ciliated microelectromechanical system (MEMS) vector hydrophones pick up sound signals through Wheatstone bridge in cross beam-ciliated microstructures to achieve information transmission. This paper aims to overcome the complexity and variability of the marine environment and achieve accurate location of targets. In this paper, a new method for ocean noise denoising based on improved complete ensemble empirical mode decomposition with adaptive noise combined with wavelet threshold processing method (CEEMDAN-WT) is proposed.

Design/methodology/approach

Based on the CEEMDAN-WT method, the signal is decomposed into different intrinsic mode functions (IMFs), and relevant parameters are selected to obtain IMF denoised signals through WT method for the noisy mode components with low sample entropy. The final pure signal is obtained by reconstructing the unprocessed mode components and the denoising component, effectively separating the signal from the wave interference.

Findings

The three methods of empirical mode decomposition (EMD), ensemble empirical mode decomposition (EEMD) and CEEMDAN are compared and analyzed by simulation. The simulation results show that the CEEMDAN method has higher signal-to-noise ratio and smaller reconstruction error than EMD and EEMD. The feasibility and practicability of the combined denoising method are verified by indoor and outdoor experiments, and the underwater acoustic experiment data after processing are combined beams. The problem of blurry left and right sides is solved, and the high precision orientation of the target is realized.

Originality/value

This algorithm provides a theoretical basis for MEMS hydrophones to achieve accurate target positioning in the ocean, and can be applied to the hardware design of sonobuoys, which is widely used in various underwater acoustic work.

Details

Sensor Review, vol. 44 no. 5
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 30 August 2024

Janet Chang, Xiang Xie and Ajith Kumar Parlikad

This research investigates the capabilities of Cloud-based Building Information Modelling (CBIM) in managing quality asset information, drawing upon software engineers'…

Abstract

Purpose

This research investigates the capabilities of Cloud-based Building Information Modelling (CBIM) in managing quality asset information, drawing upon software engineers' perspectives. Compelling statistics highlight the relationship between building information and environmental sustainability. However, despite the growing utilisation of CBIM in the Architecture, Engineering and Construction (AEC) industry, a significant knowledge gap remains concerning its effectiveness in maintaining quality asset information.

Design/methodology/approach

This study employed an exploratory qualitative approach, utilising semi-structured interviews with thirteen software engineers actively developing technological solutions for the AEC industry. Following thematic analysis, the findings are categorised into four dimensions: strengths, weaknesses, opportunities and technological limitations. Subsequently, these findings are analysed in relation to previously identified information quality problems.

Findings

This research reveals that while CBIM improves project coordination and information accessibility, its effectiveness is challenged by the need for manual updates, vulnerability to human errors and dependency on network services. Technological limitations, notably the absence of automated updates for as-built drawings and the risk of data loss during file conversions in the design phase, coupled with its reduced capability to validate context-specific information from the user's viewpoint, emphasise the urgent need for managerial strategies to maximise CBIM's capabilities in addressing information quality problems.

Originality/value

This study augments the understanding of CBIM, highlighting the managerial implications of a robust information management process to safeguard information integrity. This approach fosters sustainable practices anchored in reliable information essential for achieving desired outcomes. The findings also have broader managerial implications, especially for sectors that employ CBIM as an instrumental tool.

Details

Built Environment Project and Asset Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2044-124X

Keywords

1 – 10 of 496