Search results

1 – 5 of 5
Article
Publication date: 25 February 2014

Huansheng Ning and Weishi Chen

– Bird strike risk (BSR) evaluation is a significant part of the avian radar system worldwide installed and operated at airports. The paper aims to discuss these issues.

1143

Abstract

Purpose

Bird strike risk (BSR) evaluation is a significant part of the avian radar system worldwide installed and operated at airports. The paper aims to discuss these issues.

Design/methodology/approach

This paper proposed a method using the real-time avian radar data to evaluate BSR with the estimations of bird strike probability and severity. The probability estimation model considered the attributes of the relative positions of the flock and the runway, the altitude of the flock and the aircraft, the flight path of the aircraft, and the ability of the bird species to avoid collision. The severity was estimated by the combination of the Delphi method and the analytic hierarchy process (AHP), called DAHP, which took full advantage of the expert knowledge and quantitative calculation.

Findings

The model was tested successfully on the simulated data at Beijing Capital International Airport (BCIA) with three runways and real data at Beihai Fucheng Airport (BFA) with one runway.

Practical implications

The BSR evaluation model was specifically designed for the airports with avian radars. It enabled the airport managers to objectively evaluate the risk in real time and to take effective measures.

Originality/value

The proposed BSR evaluation model was constructed with the real-time features of birds and aircraft based on the DAHP framework, providing scientific guidance for aviation safety and environmental management at the airport.

Details

Aircraft Engineering and Aerospace Technology: An International Journal, vol. 86 no. 2
Type: Research Article
ISSN: 0002-2667

Keywords

Article
Publication date: 1 January 2014

Weishi Chen and Huansheng Ning

Incoherent primary radar is an applicable means for security surveillance of low-altitude airspace. An experimental airspace surveillance radar system has been developed for such…

Abstract

Purpose

Incoherent primary radar is an applicable means for security surveillance of low-altitude airspace. An experimental airspace surveillance radar system has been developed for such applications. Target detector based on radar images is a powerful technique for the system. The main difficulty in designing such a detector is the rejection of heavy edge clutter for the plane position indicator (PPI) radar images after background subtraction.

Design/methodology/approach

The paper proposes an edge clutter rejection (ECR) detector with spatial characteristics to detect target instead of sheer threshold segmentation.

Findings

The paper chooses the optimal parameter values for the ECR detector and compares it with the existing techniques. Detection results show that the proposed detector achieves higher probability of detection with low false alarm rate, outperforming the fixed-threshold detector and the popular constant false alarm rate detectors. The ECR detector also presents limited computational cost due to its concentration on the pixels detected by the fixed-threshold algorithm with low threshold.

Practical implications

The aviation security of low-altitude airspace can be greatly increased by designing affordable airspace surveillance radar system.

Originality/value

The paper presents critical techniques for clutter rejection with PPI images, which is a significant part of the surveillance system.

Details

Aircraft Engineering and Aerospace Technology: An International Journal, vol. 86 no. 1
Type: Research Article
ISSN: 0002-2667

Keywords

Article
Publication date: 5 July 2011

Weishi Chen, Qunyu Xu, Huansheng Ning, Taosheng Wang and Jing Li

Foreign object debris (FOD) poses a significant hazard to aviation safety and brings huge economic losses to the aerospace industry due to aircraft damage and out‐of‐service…

1294

Abstract

Purpose

Foreign object debris (FOD) poses a significant hazard to aviation safety and brings huge economic losses to the aerospace industry due to aircraft damage and out‐of‐service delays. Different schemes and sensors have been utilized for FOD detection. This paper aims to look into a video‐based FOD detection system for airport runway security and propose a scheme for FOD surveillance network establishment.

Design/methodology/approach

The FOD detection algorithm for the system is analyzed in detail, including four steps of pre‐processing, background subtraction, post‐processing and FOD location.

Findings

The overall algorithm is applied to two sets of live video images. The results show that the algorithm is effective for FOD targets of different shades under different lighting conditions. The proposed system is also evaluated by the ground‐truth data collected at Nanyang Airport.

Practical implications

The runway security can be greatly increased by designing an affordable video‐based FOD detection system.

Originality/value

The paper presents critical techniques of video‐based FOD detection system. The scheme for FOD surveillance network, as a significant part of aviation risk management at airports, is applicable and extensible.

Details

Aircraft Engineering and Aerospace Technology, vol. 83 no. 4
Type: Research Article
ISSN: 0002-2667

Keywords

Article
Publication date: 23 November 2021

Anas Maazu Kademi and Ahmet Hasan Koltuksuz

This paper aims to establish a theoretic framework to provide a fundamental understanding of cyberspatial objects, their existence and their identification scheme while providing…

Abstract

Purpose

This paper aims to establish a theoretic framework to provide a fundamental understanding of cyberspatial objects, their existence and their identification scheme while providing a connection between cyber-enabled spaces and cyberspace. It develops an avenue to quantify general philosophical and theoretical questions, precisely, inherently spatial basis that produces an unprecedented space–time continuum, in which cyber-enabled relations evolve.

Design/methodology/approach

Multidisciplinary theoretical approaches are needed to describe complex systems, which in this paper are integrated in a quest for the principles underlying the structural organization and dynamics of cyberspace. A theoretic framework is presented, and the spatial conception of cyber-enabled physical, social, information and thinking spaces and entities existence are provided.

Findings

With spatial objects and spatial properties, cyberspace is inherently spatial. Its basic constructs are founded on its spatial qualities and producing radical space–time compression, cyber-enabled spaces in which dynamic relations develop and thrive. The cyberspatial object operations are primarily built on foundations that depend on physical space and other spatial metaphors. Information space, basically missing in the literature, is an important part of cyberspace.

Research limitations/implications

This work suggested a novel analytical approach to describing cyberspace from broader perspectives and fields. Due to the novelty and divergence of cyber concepts, an interdisciplinary study and methodology are needed. Thus, more research toward theoretical direction could help many of the practical implementations of concepts.

Practical implications

The research is of particular significance in cyberspatial mechanics to describe the dynamics and behavior of cyber physical systems. For example, object-based analysis functions like spatial query, node pattern analysis, cluster analysis, spatial similarity analysis and location modeling.

Originality/value

Complementing the existing literature and defining information space to the research sphere, a theoretical framework providing a fundamental understanding of cyberspatial objects and the general cyberspace foundation has been proposed, resulting in a formalized concept of existence, interactions and applications and services, with respect to philosophy, science and technology, respectively.

Details

Kybernetes, vol. 52 no. 3
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 2 November 2015

Nancy Ambritta P, Poonam N. Railkar and Parikshit N. Mahalle

This paper aims at providing a comparative analysis of the existing protocols that address the security issues in the Future Internet (FI) and also to introduce a Collaborative…

196

Abstract

Purpose

This paper aims at providing a comparative analysis of the existing protocols that address the security issues in the Future Internet (FI) and also to introduce a Collaborative Mutual Identity Establishment (CMIE) scheme which adopts the elliptical curve cryptography (ECC), to address the issues, such as content integrity, mutual authentication, forward secrecy, auditability and resistance to attacks such as denial-of-service (DoS) and replay attack.

Design/methodology/approach

This paper provides a comparative analysis of the existing protocols that address the security issues in the FI and also provides a CMIE scheme, by adopting the ECC and digital signature verification mechanism, to address the issues, such as content integrity, mutual authentication, forward secrecy, auditability and resistance to attacks such as DoS and replay attack. The proposed scheme enables the establishment of secured interactions between devices and entities of the FI. Further, the algorithm is evaluated against Automated Validation of Internet Security Protocols and Application (AVISPA) tool to verify the security solutions that the CMIE scheme has claimed to address to have been effectively achieved in reality.

Findings

The algorithm is evaluated against AVISPA tool to verify the security solutions that the CMIE scheme has claimed to address and proved to have been effectively achieved in reality. The proposed scheme enables the establishment of secured interactions between devices and entities of the FI.

Research limitations/implications

Considering the Internet of Things (IoT) scenario, another important aspect that is the device-to-location (D2L) aspect has not been considered in this protocol. Major focus of the protocol is centered around the device-to-device (D2D) and device-to-server (D2S) scenarios. Also, IoT basically works upon a confluence of hundreds for protocols that support the achievement of various factors in the IoT, for example Data Distribution Service, Message Queue Telemetry Transport, Extensible Messaging and Presence Protocol, Constrained Application Protocol (CoAP) and so on. Interoperability of the proposed CMIE algorithm with the existing protocols has to be considered to establish a complete model that fits the FI. Further, each request for mutual authentication requires a querying of the database and a computation at each of the participating entities side for verification which could take considerable amount of time. However, for applications that require firm authentication for maintaining and ensuring secure interactions between entities prior to access control and initiation of actual transfer of sensitive information, the negligible difference in computation time can be ignored for the greater benefit that comes with stronger security. Other factors such as quality of service (QoS) (i.e. flexibility of data delivery, resource usage and timing), key management and distribution also need to be considered. However, the user still has the responsibility to choose the required protocol that suits one’s application and serves the purpose.

Originality/value

The originality of the work lies in adopting the ECC and digital signature verification mechanism to develop a new scheme that ensures mutual authentication between participating entities in the FI based upon certain user information such as identities. ECC provides efficiency in terms of key size generated and security against main-in-middle attack. The proposed scheme provides secured interactions between devices/entities in the FI.

Details

International Journal of Pervasive Computing and Communications, vol. 11 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 5 of 5