Search results

1 – 10 of over 5000
Content available
Book part
Publication date: 30 January 2023

Peter Simon Sapaty

Abstract

Details

The Spatial Grasp Model
Type: Book
ISBN: 978-1-80455-574-3

Content available

Abstract

Details

Assembly Automation, vol. 24 no. 3
Type: Research Article
ISSN: 0144-5154

Keywords

Content available
Book part
Publication date: 30 September 2020

Saurav K. Dutta

Abstract

Details

The Definitive Guide to Blockchain for Accounting and Business: Understanding the Revolutionary Technology
Type: Book
ISBN: 978-1-78973-865-0

Open Access
Article
Publication date: 10 February 2023

Junting Lin, Mingjun Ni and Huadian Liang

This study aims to propose an adaptive fractional-order sliding mode controller to solve the problem of train speed tracking control and position interval control under…

Abstract

Purpose

This study aims to propose an adaptive fractional-order sliding mode controller to solve the problem of train speed tracking control and position interval control under disturbance environment in moving block system, so as to improve the tracking efficiency and collision avoidance performance.

Design/methodology/approach

The mathematical model of information interaction between trains is established based on algebraic graph theory, so that the train can obtain the state information of adjacent trains, and then realize the distributed cooperative control of each train. In the controller design, the sliding mode control and fractional calculus are combined to avoid the discontinuous switching phenomenon, so as to suppress the chattering of sliding mode control, and a parameter adaptive law is constructed to approximate the time-varying operating resistance coefficient.

Findings

The simulation results show that compared with proportional integral derivative (PID) control and ordinary sliding mode control, the control accuracy of the proposed algorithm in terms of speed is, respectively, improved by 25% and 75%. The error frequency and fluctuation range of the proposed algorithm are reduced in the position error control, the error value tends to 0, and the operation trend tends to be consistent. Therefore, the control method can improve the control accuracy of the system and prove that it has strong immunity.

Originality/value

The algorithm can reduce the influence of external interference in the actual operating environment, realize efficient and stable tracking of trains, and ensure the safety of train control.

Details

Railway Sciences, vol. 2 no. 1
Type: Research Article
ISSN: 2755-0907

Keywords

Content available
Article
Publication date: 1 March 1998

63

Abstract

Details

Assembly Automation, vol. 18 no. 1
Type: Research Article
ISSN: 0144-5154

Open Access
Article
Publication date: 11 September 2017

Michel van Eeten

The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global…

5195

Abstract

Purpose

The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global governance model of multi-stakeholder collaboration, as seen in forums like IGF, IETF, ICANN, etc. There is a strange disconnect, however, between this supposed fight and the actual control over cybersecurity “on the ground”. This paper aims to reconnect discourse and control via a property rights approach, where control is located first and foremost in ownership.

Design/methodology/approach

This paper first conceptualizes current governance mechanisms through ownership and property rights. These concepts locate control over internet resources. They also help us understand ongoing shifts in control. Such shifts in governance are actually happening, security governance is being patched left and right, but these arrangements bear little resemblance to either the national security model of states or the global model of multi-stakeholder collaboration. With the conceptualization in hand, the paper then presents case studies of governance that have emerged around specific security externalities.

Findings

While not all mechanisms are equally effective, in each of the studied areas, the author found evidence of private actors partially internalizing the externalities, mostly on a voluntary basis and through network governance mechanisms. No one thinks that this is enough, but it is a starting point. Future research is needed to identify how these mechanisms can be extended or supplemented to further improve the governance of cybersecurity.

Originality/value

This paper bridges together the disconnected research communities on governance and (technical) cybersecurity.

Details

Digital Policy, Regulation and Governance, vol. 19 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

Content available
Article
Publication date: 1 June 2001

1342

Abstract

Details

Aircraft Engineering and Aerospace Technology, vol. 73 no. 3
Type: Research Article
ISSN: 0002-2667

Keywords

Content available
Article
Publication date: 23 June 2021

Joe Garcia, Russell Shannon, Aaron Jacobson, William Mosca, Michael Burger and Roberto Maldonado

This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software…

1335

Abstract

Purpose

This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software support activity (SSA), with said paradigm supporting strong traceability and provability concerning the SSA’s output product, known as an operational flight program (OFP). Through a secure development environment (SDE), each critical software development function performed on said OFP during its development has a corresponding record represented on a blockchain.

Design/methodology/approach

An SDE is implemented as a virtual machine or container incorporating software development tools that are modified to support blockchain transactions. Each critical software development function, e.g. editing, compiling, linking, generates a blockchain transaction message with associated information embedded in the output of a said function that, together, can be used to prove integrity and support traceability. An attestation process is used to provide proof that the toolchain containing SDE is not subject to unauthorized modification at the time said critical function is performed.

Findings

Blockchain methods are shown to be a viable approach for supporting exhaustive traceability and strong provability of development system integrity for mission-critical software produced by an NAE SSA for NAE embedded systems software.

Practical implications

A blockchain-based authentication approach that could be implemented at the OFP point-of-load would provide for fine-grain authentication of all OFP software components, with each component or module having its own proof-of-integrity (including the integrity of the used development tools) over its entire development history.

Originality/value

Many SSAs have established control procedures for development such as check-out/check-in. This does not prove the SSA output software is secure. For one thing, a build system does not necessarily enforce procedures in a way that is determinable from the output. Furthermore, the SSA toolchain itself could be attacked. The approach described in this paper enforces security policy and embeds information into the output of every development function that can be cross-referenced to blockchain transaction records for provability and traceability that only trusted tools, free from unauthorized modifications, are used in software development. A key original concept of this approach is that it treats assigned developer time as a transferable digital currency.

Content available

Abstract

Details

Assembly Automation, vol. 24 no. 1
Type: Research Article
ISSN: 0144-5154

Keywords

Open Access
Article
Publication date: 24 November 2022

Eleni Papadonikolaki, Algan Tezel, Ibrahim Yitmen and Per Hilletofth

Rapid advancements in blockchain technology transform various sectors, attracting the attention of industrialists, practitioners, policymakers and academics, and profoundly affect…

2060

Abstract

Purpose

Rapid advancements in blockchain technology transform various sectors, attracting the attention of industrialists, practitioners, policymakers and academics, and profoundly affect construction businesses through smart contracts and crypto-economics. This paper explores the blockchain innovation ecosystem in construction.

Design/methodology/approach

Through a qualitative study of 23 diverse interviewees, the study explores how open or closed the blockchain innovation ecosystem in construction is and who its emerging orchestrators are.

Findings

The data showed that construction aims towards an open innovation blockchain ecosystem, although there are elements of hybridisation and closedness, each system pointing out to different orchestrators.

Practical implications

The study has implications for governments and large companies in construction, showing that open innovation initiatives need to be encouraged by policymakers through rules, regulations and government-sponsored demonstrator projects.

Social implications

The data showed that there is lack of readiness for business model change to support open innovation blockchain ecosystems in construction.

Originality/value

This is the first study applying the open innovation theory in the construction industry and sheds light into the phenomenon of blockchain, suggesting routes for further democratisation of the technology for policymakers and practitioners.

Details

Industrial Management & Data Systems, vol. 123 no. 2
Type: Research Article
ISSN: 0263-5577

Keywords

1 – 10 of over 5000