Search results

1 – 10 of 432
Article
Publication date: 7 November 2023

Ashwini K. and Jagadeesh V.K.

The purpose of this paper is to present an up-to-date survey on the non-orthogonal multiple access (NOMA) technique with co-operative strategy, a fast-evolving fifth-generation…

Abstract

Purpose

The purpose of this paper is to present an up-to-date survey on the non-orthogonal multiple access (NOMA) technique with co-operative strategy, a fast-evolving fifth-generation (5 G) technology. NOMA is used for serving many mobile users, both in power and code domains. This paper considers the power-domain NOMA, which is now discussed as NOMA.

Design/methodology/approach

The first part of the paper discusses NOMA-based cooperative relay systems using different relay strategies over different channel models. In various research works, the analytical expressions of many performance metrics were derived, measured and simulated for better performance of the NOMA systems. In the second part, a brief introduction to diversity techniques is discussed. The multiple input and multiple output system merged with cooperative NOMA technology, and its future challenges were also presented in this part. In the third part, the paper surveys some new conceptions such as cognitive radio, index modulation multiple access, space-shift keying and reconfigurable intelligent surface that can be combined with NOMA systems for better performance.

Findings

The paper presents a brief survey of diverse research projects being carried out in the field of NOMA. The paper also surveyed two different relaying strategies that were implemented in cooperative NOMA over different channels and compared several performance parameters that were evaluated and derived in these implementations.

Originality/value

The paper provides a scope for recognizable future work and presents a brief idea of the new techniques that can be united with NOMA for better performance in wireless systems.

Details

World Journal of Engineering, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1708-5284

Keywords

Article
Publication date: 7 May 2024

Swathi Pennapareddy, Ramprasad Srinivasan and Natarajan K.

Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one…

Abstract

Purpose

Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one of the most precise ways for tracking aircraft position. ADS-B is intended to provide greater situational awareness to the pilots by displaying the traffic information like aircraft ID, altitude, speed and other critical parameters on the Cockpit Display of Traffic Information displays in the cockpit. Unfortunately, due to the initial proposed nature of ADS-B protocol, it is neither encrypted nor has any other innate security mechanisms, which makes it an easy target for malicious attacks. The system is vulnerable to various active and passive attacks like message ingestion, message deletion, eavesdropping, jamming, etc., which has become an area of concern for the aviation industry. The purpose of this study is to propose a method based on modified advanced encryption standard (AES) algorithm to secure the ADS=B messages and increase the integrity of ADS-B data transmissions.

Design/methodology/approach

Though there are various cryptographic and non-cryptographic methods proposed to secure ADS-B data transmissions, it is evident that most of these systems have limitations in terms of cost, implementation or feasibility. The new proposed method implements AES encryption techniques on the ADS-B data on the sender side and correlated decryption mechanism at the receiver end. The system is designed based on the flight schedule data available from any flight planning systems and implementing the AES algorithm on the ADS-B data from each aircraft in the flight schedule.

Findings

The suitable hardware was developed using Raspberry pi, ESP32 and Ra-02. Several runs were done to verify the original message, transmitted data and received data. During transmission, encryption algorithm was being developed, which has got very high secured transmission, and during the reception, the data was secured. Field test was conducted to validate the transmission and quality. Several trials were done to validate the transmission process. The authors have successfully shown that the ADS-B data can be encrypted using AES algorithm. The authors are successful in transmitting and receiving the ADS-B data packet using the discussed hardware and software methodology. One major advantage of using the proposed solution is that the information received is encrypted, and the receiver ADS-B system can decrypt the messages on the receiving end. This clearly proves that when the data is received by an unknown receiver, the messages cannot be decrypted, as the receiver is not capable of decrypting the AES-authenticated messages transmitted by the authenticated source. Also, AES encryption is highly unlikely to be decrypted if the encryption key and the associated decryption key are not known.

Research limitations/implications

Implementation of the developed solution in actual onboard avionics systems is not within the scope of this research. Hence, assessing in the real-time distances is not covered.

Social implications

The authors propose to extend this as a software solution to the onboard avionics systems by considering the required architectural changes. This solution can also bring in positive results for unmanned air vehicles in addition to the commercial aircrafts. Enhancement of security to the key operational and navigation data elements is going to be invaluable for future air traffic management and saving lives of people.

Originality/value

The proposed solution has been practically implemented by developing the hardware and software as part of this research. This has been clearly brought out in the paper. The implementation has been tested using the actual ADS-B data/messages received from using the ADS-B receiver. The solution works perfectly, and this brings immense value to the aircraft-to-aircraft and aircraft-to-ground communications, specifically while using ADS-B data for communicating the position information. With the proposed architecture and minor software updates to the onboard avionics, this solution can enhance safety of flights.

Details

Aircraft Engineering and Aerospace Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1748-8842

Keywords

Article
Publication date: 3 January 2024

Miao Ye, Lin Qiang Huang, Xiao Li Wang, Yong Wang, Qiu Xiang Jiang and Hong Bing Qiu

A cross-domain intelligent software-defined network (SDN) routing method based on a proposed multiagent deep reinforcement learning (MDRL) method is developed.

Abstract

Purpose

A cross-domain intelligent software-defined network (SDN) routing method based on a proposed multiagent deep reinforcement learning (MDRL) method is developed.

Design/methodology/approach

First, the network is divided into multiple subdomains managed by multiple local controllers, and the state information of each subdomain is flexibly obtained by the designed SDN multithreaded network measurement mechanism. Then, a cooperative communication module is designed to realize message transmission and message synchronization between the root and local controllers, and socket technology is used to ensure the reliability and stability of message transmission between multiple controllers to acquire global network state information in real time. Finally, after the optimal intradomain and interdomain routing paths are adaptively generated by the agents in the root and local controllers, a network traffic state prediction mechanism is designed to improve awareness of the cross-domain intelligent routing method and enable the generation of the optimal routing paths in the global network in real time.

Findings

Experimental results show that the proposed cross-domain intelligent routing method can significantly improve the network throughput and reduce the network delay and packet loss rate compared to those of the Dijkstra and open shortest path first (OSPF) routing methods.

Originality/value

Message transmission and message synchronization for multicontroller interdomain routing in SDN have long adaptation times and slow convergence speeds, coupled with the shortcomings of traditional interdomain routing methods, such as cumbersome configuration and inflexible acquisition of network state information. These drawbacks make it difficult to obtain global state information about the network, and the optimal routing decision cannot be made in real time, affecting network performance. This paper proposes a cross-domain intelligent SDN routing method based on a proposed MDRL method. First, the network is divided into multiple subdomains managed by multiple local controllers, and the state information of each subdomain is flexibly obtained by the designed SDN multithreaded network measurement mechanism. Then, a cooperative communication module is designed to realize message transmission and message synchronization between root and local controllers, and socket technology is used to ensure the reliability and stability of message transmission between multiple controllers to realize the real-time acquisition of global network state information. Finally, after the optimal intradomain and interdomain routing paths are adaptively generated by the agents in the root and local controllers, a prediction mechanism for the network traffic state is designed to improve awareness of the cross-domain intelligent routing method and enable the generation of the optimal routing paths in the global network in real time. Experimental results show that the proposed cross-domain intelligent routing method can significantly improve the network throughput and reduce the network delay and packet loss rate compared to those of the Dijkstra and OSPF routing methods.

Details

International Journal of Intelligent Computing and Cybernetics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 30 April 2024

Sophie van Roosmale, Amaryllis Audenaert and Jasmine Meysman

This paper aims to highlight the expanding link between facility management (FM) and building automation and control systems (BACS) through a review of literature. It examines the…

Abstract

Purpose

This paper aims to highlight the expanding link between facility management (FM) and building automation and control systems (BACS) through a review of literature. It examines the opportunities and challenges of BACS for facility managers and proposes solutions for mitigating the risks associated with BACS implementation.

Design/methodology/approach

This paper reviews various research papers to explore the positive influences of BACS on FM, such as support with strategic decision-making, predictive maintenance, energy efficiency and comfort improvement. It also discusses the challenges of BACS, including obsolescence, interoperability, vendor lock-in, reliability and security risks and suggests potential solutions based on existing literature.

Findings

BACS offers numerous opportunities for facility managers, such as improved decision-making, energy efficiency and comfort levels in office buildings. However, there are also risks associated with BACS implementation, including obsolescence, interoperability, vendor lock-in, reliability and security risks. These risks can be mitigated through measures such as hardware and software obsolescence management plans, functional requirement lists, wireless communication protocols, advanced feedback systems and increased awareness about BACS security.

Originality/value

To the best of the authors’ knowledge, no prior academic research has been conducted on the expanding link between FM and BACS. Although some papers have touched upon the opportunities and challenges of BACS for FM, this paper aims to provide a comprehensive overview of these findings by consolidating existing literature.

Details

Facilities , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0263-2772

Keywords

Article
Publication date: 21 August 2023

Xiaowei Zhou and Yousong Wang

The increasing adoption of informatization in the architecture, engineering, and construction (AEC) industries has raised the competency requirements for AEC practitioners…

Abstract

Purpose

The increasing adoption of informatization in the architecture, engineering, and construction (AEC) industries has raised the competency requirements for AEC practitioners. However, existing research primarily focuses on the integration of emerging technologies in AEC education programs, with little attention to the development of informatization-related competencies. Therefore, this paper aims to explore the competency requirements in the information age of the AEC industry.

Design/methodology/approach

Taking a policy perspective, this study investigates the competency requirements within the context of AEC industry informatization. By employing a competency-based theoretical framework, content analysis is conducted on China's policy document, the Outline of the Development of Informatization in the Construction Industry.

Findings

The study identifies crucial emerging technologies in the AEC industry, such as building information modeling (BIM), Big Data, Internet of things, networking, and cloud computing, along with their application scenarios. It considers various market players, including survey and design institutes, construction companies, and general contracting enterprises. Comparative analysis reveals the technology application patterns of these market players, shedding light on their preferences and perspectives. Based on these findings, the study proposes recommendations for competency requirements in the AEC industry.

Originality/value

This study extends the competency-based theory to AEC education from a macro perspective. The findings enhance understanding of informatization by providing insights into the related technologies, their applications, and the market players utilizing them. Moreover, the study's results have significant implications for AEC education, particularly in the design of curriculum systems for emerging technology-related fields.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 1 August 2023

Frank Ato Ghansah and Weisheng Lu

Despite the growing attention on the relevance of improved building management systems with cognition in recent years in the architecture, engineering, construction and operation…

Abstract

Purpose

Despite the growing attention on the relevance of improved building management systems with cognition in recent years in the architecture, engineering, construction and operation (AECO) community, no review has been conducted to understand the human-environment interaction features of cyber-physical systems (CPS) and digital twins (DTs) in developing the concept of a cognitive building (CB). Thus, this paper aims to review existing studies on CPS and DTs for CB to propose a comprehensive system architecture that considers human-environment interactions.

Design/methodology/approach

Scientometric analysis and content analysis were adopted for this study.

Findings

The scientometric analysis of 1,042 journal papers showed the major themes of CPS/DTs for CB, and these can be categorized into three key technologies to realize CB in the AECO community: CPS, DTs and cognitive computing (CC). Content analysis of 44 relevant publications in the built environment assisted in understanding and evidently confirming the claim of this study on the integration of CPS and DTs for CB in construction by also involving the CC. It is found and confirmed that CB can be realized with CPS and DTs along with the CC. A CB system architecture (CBSA) is proposed from the three key technologies considering the human-environment interactions in the loop. The study discovered the potential applications of the CBSA across the building lifecycle phases, including the design, construction and operations and maintenance, with the potential promise of endowing resilience, intelligence, greater efficiency and self-adaptiveness. Based on the findings of the review, four research directions are proposed: human-environment interactions, CB for sustainable building performance, CB concept for modular buildings and moving beyond CB.

Originality/value

This study stands out for comprehensively surveying the intellectual core and the landscape of the general body of knowledge on CPS/DTs for CB in the built environment. It makes a distinctive contribution to knowledge as it does not only propose CBSA by integrating CPS and DTs along with CC but also suggests some potential practical applications. These may require expert judgments and real case examples to enhance reproducibility and validation.

Details

Construction Innovation , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1471-4175

Keywords

Article
Publication date: 22 June 2022

Suvarna Abhijit Patil and Prasad Kishor Gokhale

With the advent of AI-federated technologies, it is feasible to perform complex tasks in industrial Internet of Things (IIoT) environment by enhancing throughput of the network…

Abstract

Purpose

With the advent of AI-federated technologies, it is feasible to perform complex tasks in industrial Internet of Things (IIoT) environment by enhancing throughput of the network and by reducing the latency of transmitted data. The communications in IIoT and Industry 4.0 requires handshaking of multiple technologies for supporting heterogeneous networks and diverse protocols. IIoT applications may gather and analyse sensor data, allowing operators to monitor and manage production systems, resulting in considerable performance gains in automated processes. All IIoT applications are responsible for generating a vast set of data based on diverse characteristics. To obtain an optimum throughput in an IIoT environment requires efficiently processing of IIoT applications over communication channels. Because computing resources in the IIoT are limited, equitable resource allocation with the least amount of delay is the need of the IIoT applications. Although some existing scheduling strategies address delay concerns, faster transmission of data and optimal throughput should also be addressed along with the handling of transmission delay. Hence, this study aims to focus on a fair mechanism to handle throughput, transmission delay and faster transmission of data. The proposed work provides a link-scheduling algorithm termed as delay-aware resource allocation that allocates computing resources to computational-sensitive tasks by reducing overall latency and by increasing the overall throughput of the network. First of all, a multi-hop delay model is developed with multistep delay prediction using AI-federated neural network long–short-term memory (LSTM), which serves as a foundation for future design. Then, link-scheduling algorithm is designed for data routing in an efficient manner. The extensive experimental results reveal that the average end-to-end delay by considering processing, propagation, queueing and transmission delays is minimized with the proposed strategy. Experiments show that advances in machine learning have led to developing a smart, collaborative link scheduling algorithm for fairness-driven resource allocation with minimal delay and optimal throughput. The prediction performance of AI-federated LSTM is compared with the existing approaches and it outperforms over other techniques by achieving 98.2% accuracy.

Design/methodology/approach

With an increase of IoT devices, the demand for more IoT gateways has increased, which increases the cost of network infrastructure. As a result, the proposed system uses low-cost intermediate gateways in this study. Each gateway may use a different communication technology for data transmission within an IoT network. As a result, gateways are heterogeneous, with hardware support limited to the technologies associated with the wireless sensor networks. Data communication fairness at each gateway is achieved in an IoT network by considering dynamic IoT traffic and link-scheduling problems to achieve effective resource allocation in an IoT network. The two-phased solution is provided to solve these problems for improved data communication in heterogeneous networks achieving fairness. In the first phase, traffic is predicted using the LSTM network model to predict the dynamic traffic. In the second phase, efficient link selection per technology and link scheduling are achieved based on predicted load, the distance between gateways, link capacity and time required as per different technologies supported such as Bluetooth, Wi-Fi and Zigbee. It enhances data transmission fairness for all gateways, resulting in more data transmission achieving maximum throughput. Our proposed approach outperforms by achieving maximum network throughput, and less packet delay is demonstrated using simulation.

Findings

Our proposed approach outperforms by achieving maximum network throughput, and less packet delay is demonstrated using simulation. It also shows that AI- and IoT-federated devices can communicate seamlessly over IoT networks in Industry 4.0.

Originality/value

The concept is a part of the original research work and can be adopted by Industry 4.0 for easy and seamless connectivity of AI and IoT-federated devices.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 25 January 2024

Lin Kang, Jie Wang, Junjie Chen and Di Yang

Since the performance of vehicular users and cellular users (CUE) in Vehicular networks is highly affected by the allocated resources to them. The purpose of this paper is to…

Abstract

Purpose

Since the performance of vehicular users and cellular users (CUE) in Vehicular networks is highly affected by the allocated resources to them. The purpose of this paper is to investigate the resource allocation for vehicular communications when multiple V2V links and a V2I link share spectrum with CUE in uplink communication under different Quality of Service (QoS).

Design/methodology/approach

An optimization model to maximize the V2I capacity is established based on slowly varying large-scale fading channel information. Multiple V2V links are clustered based on sparrow search algorithm (SSA) to reduce interference. Then, a weighted tripartite graph is constructed by jointly optimizing the power of CUE, V2I and V2V clusters. Finally, spectrum resources are allocated based on a weighted 3D matching algorithm.

Findings

The performance of the proposed algorithm is tested. Simulation results show that the proposed algorithm can maximize the channel capacity of V2I while ensuring the reliability of V2V and the quality of service of CUE.

Originality/value

There is a lack of research on resource allocation algorithms of CUE, V2I and multiple V2V in different QoS. To solve the problem, one new resource allocation algorithm is proposed in this paper. Firstly, multiple V2V links are clustered using SSA to reduce interference. Secondly, the power allocation of CUE, V2I and V2V is jointly optimized. Finally, the weighted 3D matching algorithm is used to allocate spectrum resources.

Details

International Journal of Intelligent Computing and Cybernetics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 6 July 2023

Iqra Masroor and Jamshed Aslam Ansari

Compact and wideband antennas are the need of modern wireless systems that preferably work with compact, low-profile and easy-to-install devices that provide a wider coverage of…

Abstract

Purpose

Compact and wideband antennas are the need of modern wireless systems that preferably work with compact, low-profile and easy-to-install devices that provide a wider coverage of operating frequencies. The purpose of this paper is to propose a novel compact and ultrawideband (UWB) microstrip patch antenna intended for high frequency wireless applications.

Design/methodology/approach

A square microstrip patch antenna was initially modeled on finite element method-based electromagnetic simulation tool high frequency structure simulator. It was then loaded with a rectangular slit and Koch snowflake-shaped fractal notches for bandwidth enhancement. The fabricated prototype was tested by using vector network analyzer from Agilent Technologies, N5247A, Santa Clara, California, United States (US).

Findings

The designed Koch fractal patch antenna is highly compact with dimensions of 10 × 10 mm only and possesses UWB characteristics with multiple resonances in the operating band. The −10 dB measured impedance bandwidth was observed to be approximately 13.65 GHz in the frequency range (23.20–36.85 GHz).

Originality/value

Owing to its simple and compact structure, positive and substantial gain values, high radiation efficiency and stable radiation patterns throughout the frequency band of interest, the proposed antenna is a suitable candidate for high frequency wireless applications in the K (18–27 GHz) and Ka (26.5–40 GHz) microwave bands.

Details

Microelectronics International, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1356-5362

Keywords

Article
Publication date: 20 September 2022

Robin Cyriac and Saleem Durai M.A.

Routing protocol for low-power lossy network (RPL) being the de facto routing protocol used by low power lossy networks needs to provide adequate routing service to mobile nodes…

Abstract

Purpose

Routing protocol for low-power lossy network (RPL) being the de facto routing protocol used by low power lossy networks needs to provide adequate routing service to mobile nodes (MNs) in the network. As RPL is designed to work under constraint power requirements, its route updating frequency is not sufficient for MNs in the network. The purpose of this study is to ensure that MNs enjoy seamless connection throughout the network with minimal handover delay.

Design/methodology/approach

This study proposes a load balancing mobility aware secure hybrid – RPL in which static node (SN) identifies route using metrics like expected transmission count, and path delay and parent selection are further refined by working on remaining energy for identifying the primary route and queue availability for secondary route maintenance. MNs identify route with the help of smart timers and by using received signal strength indicator sampling of parent and neighbor nodes. In this work, MNs are also secured against rank attack in RPL.

Findings

This model produces favorable result in terms of packet delivery ratio, delay, energy consumption and number of living nodes in the network when compared with different RPL protocols with mobility support. The proposed model reduces packet retransmission in the network by a large margin by providing load balancing to SNs and seamless connection to MNs.

Originality/value

In this work, a novel algorithm was developed to provide seamless handover for MNs in network. Suitable technique was developed to provide load balancing to SNs in network by maintaining appropriate secondary route.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of 432