Search results

1 – 10 of 24
Open Access
Article
Publication date: 16 May 2024

Axel Buck and Christian Mundt

Reynolds-averaged Navier–Stokes (RANS) models often perform poorly in shock/turbulence interaction regions, resulting in excessive wall heat load and incorrect representation of…

Abstract

Purpose

Reynolds-averaged Navier–Stokes (RANS) models often perform poorly in shock/turbulence interaction regions, resulting in excessive wall heat load and incorrect representation of the separation length in shockwave/turbulent boundary layer interactions. The authors suggest that this can be traced back to inadequate numerical treatment of the inviscid fluxes. The purpose of this study is an extension to the well-known Harten, Lax, van Leer, Einfeldt (HLLE) Riemann solver to overcome this issue.

Design/methodology/approach

It explicitly takes into account the broadening of waves due to the averaging procedure, which adds numerical dissipation and reduces excessive turbulence production across shocks. The scheme is derived based on the HLLE equations, and it is tested against three numerical experiments.

Findings

Sod’s shock tube case shows that the scheme succeeds in reducing turbulence amplification across shocks. A shock-free turbulent flat plate boundary layer indicates that smooth flow at moderate turbulence intensity is largely unaffected by the scheme. A shock/turbulent boundary layer interaction case with higher turbulence intensity shows that the added numerical dissipation can, however, impair the wall heat flux distribution.

Originality/value

The proposed scheme is motivated by implicit large eddy simulations that use numerical dissipation as subgrid-scale model. Introducing physical aspects of turbulence into the numerical treatment for RANS simulations is a novel approach.

Details

International Journal of Numerical Methods for Heat & Fluid Flow, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0961-5539

Keywords

Article
Publication date: 24 April 2024

Hangyue Zhang, Yanchu Yang and Rong Cai

This paper aims to present numerical simulations for a series of flight processes for the postlaunching stage of the “balloon-borne UAV system.” It includes the balloon further…

Abstract

Purpose

This paper aims to present numerical simulations for a series of flight processes for the postlaunching stage of the “balloon-borne UAV system.” It includes the balloon further ascent motion after airborne launching. In terms of unmanned aerial vehicles (UAVs), the tailspin state and the charge-out process with an anti-tailspin parachute-assisted suspending are analyzed. Then, the authors conduct trajectory optimization simulations for the long-distance gliding process.

Design/methodology/approach

The balloon kinematics model and the parachute Kane multibody dynamic model are established. Using steady-state tailspin to reduced-order analysis and achieving change-out simulation by parachute suspension dynamic model. A reentry optimization control problem is developed and the Radau pseudo-spectral method is used to calculate the glide trajectory.

Findings

The established dynamic model and trajectory optimization method can effectively simulate the motion process of balloons and UAVs. The system mass reduction for launching UAVs will not cause damage to the balloon structure. The anti-tailspin parachute can reduce the UAV attack angles effectively. The UAV can glide to the designated target position by adjusting the attack angle and sideslip angle. The farthest flight distance after launching from 20 km height is 94 km and the gliding time is 40 min, which demonstrates the potential application advantage of high-altitude launching.

Practical implications

The research content and related conclusions of this article achieve a closed-loop analysis of the flight mission chain for the “balloon-borne UAV system,” which provides simulation references for relevant balloon launching experiments.

Originality/value

This paper establishes a complete set of numerical simulation models and can effectively analyze various postlaunching behaviors.

Details

Aircraft Engineering and Aerospace Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1748-8842

Keywords

Article
Publication date: 7 May 2024

Swathi Pennapareddy, Ramprasad Srinivasan and Natarajan K.

Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one…

Abstract

Purpose

Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one of the most precise ways for tracking aircraft position. ADS-B is intended to provide greater situational awareness to the pilots by displaying the traffic information like aircraft ID, altitude, speed and other critical parameters on the Cockpit Display of Traffic Information displays in the cockpit. Unfortunately, due to the initial proposed nature of ADS-B protocol, it is neither encrypted nor has any other innate security mechanisms, which makes it an easy target for malicious attacks. The system is vulnerable to various active and passive attacks like message ingestion, message deletion, eavesdropping, jamming, etc., which has become an area of concern for the aviation industry. The purpose of this study is to propose a method based on modified advanced encryption standard (AES) algorithm to secure the ADS=B messages and increase the integrity of ADS-B data transmissions.

Design/methodology/approach

Though there are various cryptographic and non-cryptographic methods proposed to secure ADS-B data transmissions, it is evident that most of these systems have limitations in terms of cost, implementation or feasibility. The new proposed method implements AES encryption techniques on the ADS-B data on the sender side and correlated decryption mechanism at the receiver end. The system is designed based on the flight schedule data available from any flight planning systems and implementing the AES algorithm on the ADS-B data from each aircraft in the flight schedule.

Findings

The suitable hardware was developed using Raspberry pi, ESP32 and Ra-02. Several runs were done to verify the original message, transmitted data and received data. During transmission, encryption algorithm was being developed, which has got very high secured transmission, and during the reception, the data was secured. Field test was conducted to validate the transmission and quality. Several trials were done to validate the transmission process. The authors have successfully shown that the ADS-B data can be encrypted using AES algorithm. The authors are successful in transmitting and receiving the ADS-B data packet using the discussed hardware and software methodology. One major advantage of using the proposed solution is that the information received is encrypted, and the receiver ADS-B system can decrypt the messages on the receiving end. This clearly proves that when the data is received by an unknown receiver, the messages cannot be decrypted, as the receiver is not capable of decrypting the AES-authenticated messages transmitted by the authenticated source. Also, AES encryption is highly unlikely to be decrypted if the encryption key and the associated decryption key are not known.

Research limitations/implications

Implementation of the developed solution in actual onboard avionics systems is not within the scope of this research. Hence, assessing in the real-time distances is not covered.

Social implications

The authors propose to extend this as a software solution to the onboard avionics systems by considering the required architectural changes. This solution can also bring in positive results for unmanned air vehicles in addition to the commercial aircrafts. Enhancement of security to the key operational and navigation data elements is going to be invaluable for future air traffic management and saving lives of people.

Originality/value

The proposed solution has been practically implemented by developing the hardware and software as part of this research. This has been clearly brought out in the paper. The implementation has been tested using the actual ADS-B data/messages received from using the ADS-B receiver. The solution works perfectly, and this brings immense value to the aircraft-to-aircraft and aircraft-to-ground communications, specifically while using ADS-B data for communicating the position information. With the proposed architecture and minor software updates to the onboard avionics, this solution can enhance safety of flights.

Details

Aircraft Engineering and Aerospace Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1748-8842

Keywords

Article
Publication date: 29 April 2024

Qiuqi Wu, Youchao Sun and Man Xu

About 70% of all aircraft accidents are caused by human–machine interaction, thus identifying and quantifying performance shaping factors is a significant challenge in the study…

Abstract

Purpose

About 70% of all aircraft accidents are caused by human–machine interaction, thus identifying and quantifying performance shaping factors is a significant challenge in the study of human reliability. An information flow field model of human–machine interaction is put forward to help better pinpoint the factors influencing performance and to make up for the lack of a model of information flow and feedback processes in the aircraft cockpit. To enhance the efficacy of the human–machine interaction, this paper aims to examine the important coupling factors in the system using the findings of the simulation.

Design/methodology/approach

The performance-shaping factors were retrieved from the model, which was created to thoroughly describe the information flow. The coupling degree between the performance shaping factors was calculated, and simulation and sensitivity analysis are based on system dynamics.

Findings

The results show that the efficacy of human–computer interaction is significantly influenced by individual important factors and coupling factors. To decrease the frequency of accidents after seven hours, attention should be paid to these factors.

Originality/value

The novelty of this work lies in proposing a theoretical model of cockpit information flow and using system dynamics to analyse the effect of the factors in the human–machine loop on human–machine efficacy.

Details

Aircraft Engineering and Aerospace Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1748-8842

Keywords

Article
Publication date: 17 May 2024

Yong Fu, Kun Chen, Li He and Hui Tan Wang

The purpose of this paper is to address two major challenges faced by robotic fish when operating in underwater environments: insufficient path planning capabilities and…

Abstract

Purpose

The purpose of this paper is to address two major challenges faced by robotic fish when operating in underwater environments: insufficient path planning capabilities and difficulties in avoiding dynamic obstacles. To achieve this, a method is proposed that combines the Improved Rapid Randomized Tree Star (IRRT*) with the dynamic window approach (DWA).

Design/methodology/approach

The RRT-connect algorithm is used to determine an initial feasible path quickly. The quality of sampling points is then improved by dividing the regions and selecting each region’s probability based on its fitness value. The fitness function and roulette wheel method are introduced for region selection. Subtarget points of the DWA algorithm are extracted from the IRRT* algorithm to achieve real-time dynamic path planning.

Findings

In various maps, the iteration count for the IRRT* algorithm decreased by 61%, 35% and 51% respectively, compared to the RRT* algorithm, whereas the iteration time was reduced by 75%, 34% and 57%, respectively. In addition, the IRRT*-DWA algorithm can successfully navigate through multiple dynamic obstacles, and the average time, path length, etc. do not change much when parameters change, and the stability is high.

Originality/value

A novel IRRT*-DWA algorithm is proposed, which, by refining the sampling strategy and updating sub-target points in real time, not only addresses the limitations of existing algorithms in terms of path planning efficiency in complex environments but also enhances their capability to avoid dynamic obstacles. Ultimately, experimental results indicate a high level of similarity between the actual and ideal paths.

Details

Industrial Robot: the international journal of robotics research and application, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0143-991X

Keywords

Article
Publication date: 21 May 2024

Seon-Woo Kim

This experiment examines targeted public diplomacy message effects during a crisis, focusing on effects of whether such messages provide a targeted solidarity call that build a…

Abstract

Purpose

This experiment examines targeted public diplomacy message effects during a crisis, focusing on effects of whether such messages provide a targeted solidarity call that build a sense of common purpose by comparing the other country’s past crises to Ukraine’s current crisis.

Design/methodology/approach

Using an experiment, this study investigates whether such targeting in Zelensky’s speeches increased foreign public policy support for Ukraine, the perceived agenda importance of the war and Ukraine’s legitimacy.

Findings

The results found that a targeted solidarity call in public diplomacy messages during an international crisis helps gain foreign public policy support. However, it does not significantly impact the perceived agenda importance and the country’s legitimacy.

Originality/value

There has been a lack of studies on whether targeted messaging is more effective than nontargeted one in public diplomacy literature. The study’s result implies that the inclusion of a solidarity call in public diplomacy messaging is more effective in achieving its strategic goal of receiving aid. This study, therefore, empirically answers the remaining question about the effectiveness of targeted messaging in public diplomacy and advances. It also advances theoretical connections among solidarity, targeted messaging and public diplomacy.

Details

Journal of Communication Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1363-254X

Keywords

Article
Publication date: 30 April 2024

Jacqueline Humphries, Pepijn Van de Ven, Nehal Amer, Nitin Nandeshwar and Alan Ryan

Maintaining the safety of the human is a major concern in factories where humans co-exist with robots and other physical tools. Typically, the area around the robots is monitored…

16

Abstract

Purpose

Maintaining the safety of the human is a major concern in factories where humans co-exist with robots and other physical tools. Typically, the area around the robots is monitored using lasers. However, lasers cannot distinguish between human and non-human objects in the robot’s path. Stopping or slowing down the robot when non-human objects approach is unproductive. This research contribution addresses that inefficiency by showing how computer-vision techniques can be used instead of lasers which improve up-time of the robot.

Design/methodology/approach

A computer-vision safety system is presented. Image segmentation, 3D point clouds, face recognition, hand gesture recognition, speed and trajectory tracking and a digital twin are used. Using speed and separation, the robot’s speed is controlled based on the nearest location of humans accurate to their body shape. The computer-vision safety system is compared to a traditional laser measure. The system is evaluated in a controlled test, and in the field.

Findings

Computer-vision and lasers are shown to be equivalent by a measure of relationship and measure of agreement. R2 is given as 0.999983. The two methods are systematically producing similar results, as the bias is close to zero, at 0.060 mm. Using Bland–Altman analysis, 95% of the differences lie within the limits of maximum acceptable differences.

Originality/value

In this paper an original model for future computer-vision safety systems is described which is equivalent to existing laser systems, identifies and adapts to particular humans and reduces the need to slow and stop systems thereby improving efficiency. The implication is that computer-vision can be used to substitute lasers and permit adaptive robotic control in human–robot collaboration systems.

Details

Technological Sustainability, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2754-1312

Keywords

Article
Publication date: 25 April 2024

Matthew D. Roberts, Matthew A. Douglas and Robert E. Overstreet

To investigate the influence of logistics and transportation workers’ perceptions of their management’s simultaneous safety and operations focus (or lack thereof) on related…

Abstract

Purpose

To investigate the influence of logistics and transportation workers’ perceptions of their management’s simultaneous safety and operations focus (or lack thereof) on related worker safety and operational perceptions and behaviors.

Design/methodology/approach

This multi-method research consisted of two studies. Study 1 aimed to establish correlational relationships by evaluating the impact of individual-level worker perceptions of operationally focused routines (as a moderator) on the relationship between worker perceptions of safety-related routines and workers’ self-reported safety and in-role operational behaviors using a survey. Study 2 aimed to establish causal relationships by evaluating the same conceptual relationships in a behavioral-type experiment utilizing vehicle simulators. After receiving one of four pre-task briefings, participants completed a driving task scenario in a driving simulator.

Findings

In Study 1, the relationship between perceived safety focus and safety behavior/in-role operational behavior was strengthened at higher levels of perceived operations focus. In Study 2, participants who received the balanced pre-task briefing committed significantly fewer safety violations than the other 3 treatment groups. However, in-role driving deviations were not impacted as hypothesized.

Originality/value

This research is conducted at the individual (worker) level of analysis to capture the little-known perspectives of logistics and transportation workers and explore the influence of balanced safety and operational routines from a more micro perspective, thus contributing to a deeper understanding of how balanced routines might influence worker behavior when conducting dynamic tasks to ensure safe, effective outcomes.

Details

International Journal of Physical Distribution & Logistics Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0960-0035

Keywords

Article
Publication date: 2 May 2024

Xin Fan, Yongshou Liu, Zongyi Gu and Qin Yao

Ensuring the safety of structures is important. However, when a structure possesses both an implicit performance function and an extremely small failure probability, traditional…

Abstract

Purpose

Ensuring the safety of structures is important. However, when a structure possesses both an implicit performance function and an extremely small failure probability, traditional methods struggle to conduct a reliability analysis. Therefore, this paper proposes a reliability analysis method aimed at enhancing the efficiency of rare event analysis, using the widely recognized Relevant Vector Machine (RVM).

Design/methodology/approach

Drawing from the principles of importance sampling (IS), this paper employs Harris Hawks Optimization (HHO) to ascertain the optimal design point. This approach not only guarantees precision but also facilitates the RVM in approximating the limit state surface. When the U learning function, designed for Kriging, is applied to RVM, it results in sample clustering in the design of experiment (DoE). Therefore, this paper proposes a FU learning function, which is more suitable for RVM.

Findings

Three numerical examples and two engineering problem demonstrate the effectiveness of the proposed method.

Originality/value

By employing the HHO algorithm, this paper innovatively applies RVM in IS reliability analysis, proposing a novel method termed RVM-HIS. The RVM-HIS demonstrates exceptional computational efficiency, making it eminently suitable for rare events reliability analysis with implicit performance function. Moreover, the computational efficiency of RVM-HIS has been significantly enhanced through the improvement of the U learning function.

Details

Engineering Computations, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0264-4401

Keywords

Article
Publication date: 23 April 2024

Mohamed Abou-Shouk, Nagwa Zouair, Ayman Abdelhakim, Hany Roshdy and Marwa Abdel-Jalil

This research paper aims to investigate the predictors and outcomes of immersive technology adoption in tourism.

Abstract

Purpose

This research paper aims to investigate the predictors and outcomes of immersive technology adoption in tourism.

Design/methodology/approach

PLS-SEM is used for data collected from tourists visiting the UAE and Egypt to examine predictors and consequences of adoption.

Findings

It is revealed that perceived ease of use, enjoyment, immersion, usefulness and attitude towards technology predict immersive technology adoption. It is also revealed that the adoption affects tourists’ perceived value and engagement, which, in turn, affects tourists’ satisfaction and loyalty.

Originality/value

The study has integrated a research model that combines both antecedents and consequences of immersive technology adoption where few empirical investigations were revealed to draw conclusions on this research area. Also, missing relations have been included and tested in the research model.

Details

International Journal of Contemporary Hospitality Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-6119

Keywords

Access

Year

Last month (24)

Content type

Earlycite article (24)
1 – 10 of 24