Search results
1 – 10 of 12Eric Zanghi, Milton Brown Do Coutto Filho and Julio Cesar Stacchini de Souza
The current and modern electrical distribution networks, named smart grids (SGs), use advanced technologies to accomplish all the technical and nontechnical challenges naturally…
Abstract
Purpose
The current and modern electrical distribution networks, named smart grids (SGs), use advanced technologies to accomplish all the technical and nontechnical challenges naturally demanded by energy applications. Energy metering collecting is one of these challenges ranging from the most basic (i.e., visual assessment) to the expensive advanced metering infrastructure (AMI) using intelligent meters networks. The AMIs’ data acquisition and system monitoring environment require enhancing some routine tasks. This paper aims to propose a methodology that uses a distributed and sustainable approach to manage wide-range metering networks, focused on using current public or private telecommunication infrastructure, optimizing the implementation and operation, increasing reliability and decreasing costs.
Design/methodology/approach
Inspired by blockchain technology, a collaborative metering system architecture is conceived, managing massive data sets collected from the grid. The use of cryptography handles data integrity and security issues.
Findings
A robust proof-of-concept simulation results are presented concerning the resilience and performance of the proposed distributed remote metering system.
Originality/value
The methodology proposed in this work is an innovative AMI solution related to SGs. Regardless of the implementation, operation and maintenance of AMIs, the proposed solution is unique, using legacy and new technologies together in a reliable way.
Details
Keywords
Angelo Corallo, Martina De Giovanni, Maria Elena Latino and Marta Menegoli
Nowadays, the agri-food industry is called to face several sustainability challenges that require the development of new sustainable models. The adoption of new technological…
Abstract
Purpose
Nowadays, the agri-food industry is called to face several sustainability challenges that require the development of new sustainable models. The adoption of new technological assets from Industry 4.0 supports the companies during the implementation of sustainability practices. Several models design the operation management of the food supply chains (FSCs). Because none extant models resulted complete in technological and sustainability elements, this paper aims to propose an innovative and sustainable agri-food value chain model, contributing to extend understating of how supply chains can become more sustainable through the Industry 4.0 technologies.
Design/methodology/approach
Thanks to a well-structured and replicable systematic literature review and sequent content analysis, this work recognized and compared the extant FSC models, focusing on the interaction of five key elements: activities, flows, stakeholders, technologies and sustainability. The output of the comparison leading in the definition of the proposed model is discussed in a focus group of 10 experts and tested in a case study.
Findings
Fifteen extant models were recognized in literature and analysed to discover their features and to putt in light peculiarities and differences among them. This analysis provided useful insights to design and propose a new innovative and sustainable agri-food value chain model; an example for the olive oil business case is provided.
Originality/value
The adding value of the work is the proposed model which regards innovative elements such as recirculation flows, external stakeholders and Industry 4.0 technologies usage which allows enhancing the agri-FSCs operational efficiency and sustainability.
Details
Keywords
C. Bharanidharan, S. Malathi and Hariprasath Manoharan
The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems…
Abstract
Purpose
The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems (ITSs). VANETs have different characteristics and system architectures from mobile ad hoc networks (MANETs), with a primary focus on vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. But protecting VANETs from malicious assaults is crucial because they can undermine network security and safety.
Design/methodology/approach
The black hole attack is a well-known danger to VANETs. It occurs when a hostile node introduces phony routing tables into the network, potentially damaging it and interfering with communication. A safe ad hoc on-demand distance vector (AODV) routing protocol has been created in response to this issue. By adding cryptographic features for source and target node verification to the route request (RREQ) and route reply (RREP) packets, this protocol improves upon the original AODV routing system.
Findings
Through the use of cryptographic-based encryption and decryption techniques, the suggested method fortifies the VANET connection. In addition, other network metrics are taken into account to assess the effectiveness of the secure AODV routing protocol under black hole attacks, including packet loss, end-to-end latency, packet delivery ratio (PDR) and routing request overhead. Results from simulations using an NS-2.33 simulator show how well the suggested fix works to enhance system performance and lessen the effects of black hole assaults on VANETs.
Originality/value
All things considered, the safe AODV routing protocol provides a strong method for improving security and dependability in VANET systems, protecting against malevolent attacks and guaranteeing smooth communication between cars and infrastructure.
Details
Keywords
Swathi Pennapareddy, Ramprasad Srinivasan and Natarajan K.
Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one…
Abstract
Purpose
Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one of the most precise ways for tracking aircraft position. ADS-B is intended to provide greater situational awareness to the pilots by displaying the traffic information like aircraft ID, altitude, speed and other critical parameters on the Cockpit Display of Traffic Information displays in the cockpit. Unfortunately, due to the initial proposed nature of ADS-B protocol, it is neither encrypted nor has any other innate security mechanisms, which makes it an easy target for malicious attacks. The system is vulnerable to various active and passive attacks like message ingestion, message deletion, eavesdropping, jamming, etc., which has become an area of concern for the aviation industry. The purpose of this study is to propose a method based on modified advanced encryption standard (AES) algorithm to secure the ADS=B messages and increase the integrity of ADS-B data transmissions.
Design/methodology/approach
Though there are various cryptographic and non-cryptographic methods proposed to secure ADS-B data transmissions, it is evident that most of these systems have limitations in terms of cost, implementation or feasibility. The new proposed method implements AES encryption techniques on the ADS-B data on the sender side and correlated decryption mechanism at the receiver end. The system is designed based on the flight schedule data available from any flight planning systems and implementing the AES algorithm on the ADS-B data from each aircraft in the flight schedule.
Findings
The suitable hardware was developed using Raspberry pi, ESP32 and Ra-02. Several runs were done to verify the original message, transmitted data and received data. During transmission, encryption algorithm was being developed, which has got very high secured transmission, and during the reception, the data was secured. Field test was conducted to validate the transmission and quality. Several trials were done to validate the transmission process. The authors have successfully shown that the ADS-B data can be encrypted using AES algorithm. The authors are successful in transmitting and receiving the ADS-B data packet using the discussed hardware and software methodology. One major advantage of using the proposed solution is that the information received is encrypted, and the receiver ADS-B system can decrypt the messages on the receiving end. This clearly proves that when the data is received by an unknown receiver, the messages cannot be decrypted, as the receiver is not capable of decrypting the AES-authenticated messages transmitted by the authenticated source. Also, AES encryption is highly unlikely to be decrypted if the encryption key and the associated decryption key are not known.
Research limitations/implications
Implementation of the developed solution in actual onboard avionics systems is not within the scope of this research. Hence, assessing in the real-time distances is not covered.
Social implications
The authors propose to extend this as a software solution to the onboard avionics systems by considering the required architectural changes. This solution can also bring in positive results for unmanned air vehicles in addition to the commercial aircrafts. Enhancement of security to the key operational and navigation data elements is going to be invaluable for future air traffic management and saving lives of people.
Originality/value
The proposed solution has been practically implemented by developing the hardware and software as part of this research. This has been clearly brought out in the paper. The implementation has been tested using the actual ADS-B data/messages received from using the ADS-B receiver. The solution works perfectly, and this brings immense value to the aircraft-to-aircraft and aircraft-to-ground communications, specifically while using ADS-B data for communicating the position information. With the proposed architecture and minor software updates to the onboard avionics, this solution can enhance safety of flights.
Details
Keywords
Stephanie von Hinke, Jonathan James, Emil Sorensen, Hans H. Sievertsen and Nicolai Vitt
This chapter shows the prevalence, trends and heterogeneity in maternal smoking around birth in the United Kingdom (UK), focussing on the war and post-war reconstruction period in…
Abstract
This chapter shows the prevalence, trends and heterogeneity in maternal smoking around birth in the United Kingdom (UK), focussing on the war and post-war reconstruction period in which there exists surprisingly little systematic data on (maternal) smoking behaviours. Within this context, the authors highlight relevant events, the release of new information about the harms of smoking and changes in (government) policy aimed at reducing smoking prevalence. The authors show stark changes in smoking prevalence over a 30-year period, highlight the onset of the social gradient in smoking as well as genetic heterogeneities in smoking trends.
Details
Keywords
Lin Kang, Junjie Chen, Jie Wang and Yaqi Wei
In order to meet the different quality of service (QoS) requirements of vehicle-to-infrastructure (V2I) and multiple vehicle-to-vehicle (V2V) links in vehicle networks, an…
Abstract
Purpose
In order to meet the different quality of service (QoS) requirements of vehicle-to-infrastructure (V2I) and multiple vehicle-to-vehicle (V2V) links in vehicle networks, an efficient V2V spectrum access mechanism is proposed in this paper.
Design/methodology/approach
A long-short-term-memory-based multi-agent hybrid proximal policy optimization (LSTM-H-PPO) algorithm is proposed, through which the distributed spectrum access and continuous power control of V2V link are realized.
Findings
Simulation results show that compared with the baseline algorithm, the proposed algorithm has significant advantages in terms of total system capacity, payload delivery success rate of V2V link and convergence speed.
Originality/value
The LSTM layer uses the time sequence information to estimate the accurate system state, which ensures the choice of V2V spectrum access based on local observation effective. The hybrid PPO framework shares training parameters among agents which speeds up the entire training process. The proposed algorithm adopts the mode of centralized training and distributed execution, so that the agent can achieve the optimal spectrum access based on local observation information with less signaling overhead.
Details
Keywords
Hawra Alshula, Kawther Alawami, Hawra Abdullatif, Zahra Alhamood, Zainab Alshaikh, Jumanah Alawfi, Tunny Purayidathil, Omar Abuzaid, Yassmin Algindan and Rabie Khattab
This study aims to explore the link between prevalent risk factors for early childhood diarrhea, including hygiene, feeding, weaning practices and maternal education and the…
Abstract
Purpose
This study aims to explore the link between prevalent risk factors for early childhood diarrhea, including hygiene, feeding, weaning practices and maternal education and the occurrence and severity of early childhood diarrhea in Saudi Arabia.
Design/methodology/approach
A case-control study was conducted, involving 98 mothers from the Eastern Region of Saudi Arabia (51 cases and 47 controls). Data were collected from both hospital and community sources. The collected data were statistically analyzed and depicted using descriptive statistics and frequency tables.
Findings
Demographic data revealed that 60% of mothers were housewives, 75% had normal deliveries and all babies were full term. In the study cohort, 44% of children aged one to two years. Four domains were compared: diarrheal management, hygiene, weaning and feeding practices. Diarrheal management was suboptimal in some cases: 29% increased fluid intake, 10% maintained adequate food intake, 50% sought medical advice, 58% were familiar with oral rehydration solutions and only 37% used them. Hygiene practices were deficient, with 35% using wipes or sanitizers, 64% handwashing before feeding and 52% adhering to the recommended 10-s duration. Controls exhibited better hygiene practices. Weaning practices were generally similar, with no significant differences between the two groups.
Originality/value
To the best of the authors’ knowledge, this is the first study to collectively report on the risk factors linked to early childhood diarrhea in Saudi Arabia. This study yields significant insights, highlighting the crucial role of managing diarrhea, educating mothers and implementing proper household practices in impacting the occurrence and severity of this perilous ailment.
Details
Keywords
Prajakta Thakare and Ravi Sankar V.
Agriculture is the backbone of a country, contributing more than half of the sector of economy throughout the world. The need for precision agriculture is essential in evaluating…
Abstract
Purpose
Agriculture is the backbone of a country, contributing more than half of the sector of economy throughout the world. The need for precision agriculture is essential in evaluating the conditions of the crops with the aim of determining the proper selection of pesticides. The conventional method of pest detection fails to be stable and provides limited accuracy in the prediction. This paper aims to propose an automatic pest detection module for the accurate detection of pests using the hybrid optimization controlled deep learning model.
Design/methodology/approach
The paper proposes an advanced pest detection strategy based on deep learning strategy through wireless sensor network (WSN) in the agricultural fields. Initially, the WSN consisting of number of nodes and a sink are clustered as number of clusters. Each cluster comprises a cluster head (CH) and a number of nodes, where the CH involves in the transfer of data to the sink node of the WSN and the CH is selected using the fractional ant bee colony optimization (FABC) algorithm. The routing process is executed using the protruder optimization algorithm that helps in the transfer of image data to the sink node through the optimal CH. The sink node acts as the data aggregator and the collection of image data thus obtained acts as the input database to be processed to find the type of pest in the agricultural field. The image data is pre-processed to remove the artifacts present in the image and the pre-processed image is then subjected to feature extraction process, through which the significant local directional pattern, local binary pattern, local optimal-oriented pattern (LOOP) and local ternary pattern (LTP) features are extracted. The extracted features are then fed to the deep-convolutional neural network (CNN) in such a way to detect the type of pests in the agricultural field. The weights of the deep-CNN are tuned optimally using the proposed MFGHO optimization algorithm that is developed with the combined characteristics of navigating search agents and the swarming search agents.
Findings
The analysis using insect identification from habitus image Database based on the performance metrics, such as accuracy, specificity and sensitivity, reveals the effectiveness of the proposed MFGHO-based deep-CNN in detecting the pests in crops. The analysis proves that the proposed classifier using the FABC+protruder optimization-based data aggregation strategy obtains an accuracy of 94.3482%, sensitivity of 93.3247% and the specificity of 94.5263%, which is high as compared to the existing methods.
Originality/value
The proposed MFGHO optimization-based deep-CNN is used for the detection of pest in the crop fields to ensure the better selection of proper cost-effective pesticides for the crop fields in such a way to increase the production. The proposed MFGHO algorithm is developed with the integrated characteristic features of navigating search agents and the swarming search agents in such a way to facilitate the optimal tuning of the hyperparameters in the deep-CNN classifier for the detection of pests in the crop fields.
Details
Keywords
V. Sreekanth, E.G. Kavilal, Sanu Krishna and Nidhun Mohan
This paper aims to highlight how the six sigma methods helped the medical equipment manufacturing company in finding and analysing the root causes that lead to the reduction in…
Abstract
Purpose
This paper aims to highlight how the six sigma methods helped the medical equipment manufacturing company in finding and analysing the root causes that lead to the reduction in production rate, rejection rates, quality and other major causes that lead to the reduction in productivity of the blood bags manufacturing unit.
Design/methodology/approach
Given the critical nature of blood bag manufacturing Six Sigma was chosen as the primary methodology for this research since Six Sigma’s data-driven approach provides a structured framework to identify, analyse and rectify inefficiencies in the production processes. This study proposes the Six Sigma DMAIC (D-Define, M-Measure, A-Analyse, I-Improve, C-Control) encompassing rigorous problem definition, precise measurement, thorough analysis, improvement and vigilant control mechanisms for effectively attaining predetermined objectives.
Findings
The paper demonstrates how the Six Sigma principles were executed in a blood bag manufacturing unit. After a detailed and thorough data analysis, it was found that a total of 40 critical-to-quality factors under the five drivers such as Machine, Components, Inspection and Testing, People and Workspace were influential factors affecting the manufacturing of blood bags. From the study, it is identified that the drivers such as inspection and testing, components and machines contribute significantly to increasing productivity.
Research limitations/implications
The paper offers valuable strategic insights into implementing Six Sigma methodologies within the specific context of a blood bag manufacturing unit. The Six Sigma tools and techniques used by the project team to solve issues within the blood bag manufacturing unit can be used for similar healthcare organizations to successfully deploy Six Sigma. The insights from this research might not be directly applicable to other manufacturing facilities or industries but can be used as a guiding reference for researchers and managers.
Originality/value
The current state of scholarly literature indicates a significant absence in the examination of Six Sigma methodologies designed specifically to improve production output in healthcare equipment manufacturing. This paper highlights the application of Six Sigma principles to enhance efficiency in the specific context of blood bag manufacturing.
Details