The emergence of Automatic Dependent Surveillance-Broadcast (ADS-B) caused a revolution in Air Traffic control (ATC) thanks to the numerous benefits this protocol provides, especially when compared to traditional surv...
详细信息
ISBN:
(数字)9781665468800
ISBN:
(纸本)9781665468800
The emergence of Automatic Dependent Surveillance-Broadcast (ADS-B) caused a revolution in Air Traffic control (ATC) thanks to the numerous benefits this protocol provides, especially when compared to traditional surveillance technologies. Notably, ADS-B offers improved location accuracy from its use of GPS while reducing operational and maintenance costs. Despite these advantages, ADS-B's open broadcast of clear-text messages resulted in several vulnerabilities that negatively affected its widespread usage. In previous work, we proposed ADS-Bsec as a framework that leverages technologies such as cryptography, location verification and artificial intelligence to address the core of such vulnerabilities while keeping compatibility with the original protocol. However, air traffic services require aircraft crossing different authorities' zones to obtain additional authorization tokens, especially during international flights, thus imposing the need for ADS-Bsec to have a key management scheme that addresses this added layer of complexity. This paper presents a solution for this issue that extends the ADS-Bsec framework with the proposed implementation of a key management module based on our prior work on the key exchange protocol. The proposed module exchanges and manages keys to be used in the message verification process for each Flight Information Region (FIR) the aircraft goes through during its flight. We evaluate our ideas with a simulation of a real-world scenario based on actual data from a flight departing New York JFK airport and landing at Los Angeles LAX airport. We provide an analysis and a discussion of the results.
Wireless train control and monitoring system (WTCMS) introduces wireless communication technology on the basis of traditional TCMS, which is responsible for monitoring the operation status of train equipment in highsp...
详细信息
ISBN:
(数字)9781665468800
ISBN:
(纸本)9781665468800
Wireless train control and monitoring system (WTCMS) introduces wireless communication technology on the basis of traditional TCMS, which is responsible for monitoring the operation status of train equipment in highspeed trains. The delay of WTCMS has great influence on the operation safety of high-speed trains. In order to ensure the requirement of information transmission in real time, we analyze the stochastic delay bound of WTCMS using stochastic network calculus (SNC). For stochastic arrival curve of WTCMS, periodic traffic model and Poisson traffic model are used to describe processdata and message data of WTCMS, respectively. The impairment process model and Markov onoff model are used to denote the stochastic service curve of the wireless channel. And we represent the service curve of wired transmission network by combining the Latency-Rate model and the service priority model. Based on the moment generating function (MGF) method in SNC, the upper delay bounds of WTCMS are derived according to stochastic arrival curve and service curve. The theoretical analysis is validated by simulations, which shows that the delay performance of WTCMS meet the delay requirements.
Optimized dataanalysis methods can enhance teaching system efficiency. The optimization algorithm has spontaneous recognition of high-dimensional data sparsity in the density peak clustering information. This study p...
详细信息
A comprehensive study was conducted on the modeling, analysis, and simulation of overall system errors in response to the complex issue of error propagation and high control difficulty in visual-integrated composite r...
详细信息
ISBN:
(数字)9798350352627
ISBN:
(纸本)9798350352634
A comprehensive study was conducted on the modeling, analysis, and simulation of overall system errors in response to the complex issue of error propagation and high control difficulty in visual-integrated composite robots. Force analysis was performed to determine the conditions under which the Automated Guided Vehicle (AGV) would not tip over during operation. The current accuracy status and causes of errors in each subsystem were summarized, followed by modeling and analyzing the overall system errors. The impact of static deformation and impact acceleration on composite robots was analyzed using ANSYS. MATLAB was used to perform numerical simulation and modeling of the visual-based robotic arm control system, generating 1000 sets of random data within the range of subsystem errors. The errors produced by the AGV and the robotic arm were combined and compared with the actual errors of the composite robot system, thereby verifying the correctness and effectiveness of the overall system error analysis method and providing theoretical guidance for the error analysis in visual-integrated composite robot systems.
The composting process exhibits dynamic changes in environmental variables due to underlying biological and physiochemical mechanisms, adding complexity to its modeling. This work focuses on developing a mathematical ...
详细信息
Blockchain and SDN are combined in the "DistB-SD Cloud" architecture to secure and execute cloud-integrated IoT data. Cloud Computing Management and Services, Distributed Secure Blockchain Methodology, SDN E...
详细信息
ISBN:
(数字)9798331532420
ISBN:
(纸本)9798331532437
Blockchain and SDN are combined in the "DistB-SD Cloud" architecture to secure and execute cloud-integrated IoT data. Cloud Computing Management and Services, Distributed Secure Blockchain Methodology, SDN Environment, and data Extraction comprise the architecture. SDN-enabled devices safely gather and process sensor data in the data plane, while OpenFlow and OpenStack handle network component communication in the control plane. The application layer improves network administration with dynamic configuration and data analytics. Distributed nodes and hash chains ensure system integrity in blockchain-based access control and ledger maintenance. Blockchain and SDN improve security, privacy, and scalability by resisting attacks. The architecture outperforms OpenFlow-based SDN models in throughput and bandwidth, proving its stability under different network conditions. The study shows that the suggested "DistB-SD Cloud" achieves increased throughput (22.1 KB/s) and bandwidth (1.9 GB/s) when nodes and packet arrival rates increase, making it a feasible solution for safe and scalable cloud computing in IoT-based systems.
Different coffee drying technologies face complex tasks in ensuring an acceptable final seed moisture content. This research performed a Finite Element analysis (FEA) study, simulating a single coffee bean's dryin...
详细信息
Different coffee drying technologies face complex tasks in ensuring an acceptable final seed moisture content. This research performed a Finite Element analysis (FEA) study, simulating a single coffee bean's drying process as a transient mass diffusion model under mechanical and natural convection conditions, so the drying behavior and data of both case scenarios can be foreseen and controlled by a predictive Finite Element Model (FEM). A wet bean was 3D-scanned and digitized as the FEA simulation geometry;the water diffusion between the grain and the atmosphere was defined by a diffusion coefficient subject to the drying air temperature and the grain's moisture content. Three cases were studied: mechanical grain drying at three different temperatures (50, 45, and 40 degrees C) in a forced convection environment;variable natural convection drying under environmental conditions (wet and dry season);and constant natural convection (wet and dry season), including the variation in day/night temperature and relative humidity. The results agree well with the data found in the literature, obtaining the graphical moisture distribution of the phenomena, predictive drying curves, diffusion coefficients, and isotherms. Both simulated drying scenarios provide essential information for coffee growers to improve and control their drying processes, thus obtaining high-quality grains, reducing contamination by microorganisms, and ensuring the integrity of their products.
The system of public transport movement in the urban environment has been investigated using modern methods of dataanalysis. This approach allows to optimize the work of public transport and thereby improve the quali...
详细信息
As an industrial field bus, CAN bus has the characteristics of high real-time and high reliability. This chapter analyzes the risk situation by using CAN bus through the research on the actual situation of the industr...
详细信息
Inspection plays an important role in quality control and trust of manufacturing service in the cloud manufacturing (CMfg) paradigm. To provide an inspection service for complex mechanical parts in CMfg, the concept o...
详细信息
Inspection plays an important role in quality control and trust of manufacturing service in the cloud manufacturing (CMfg) paradigm. To provide an inspection service for complex mechanical parts in CMfg, the concept of cloud inspection was defined as a multi-dimension extension of CMfg. A framework of cloud inspection consisting of the physical resource layer, the cloud inspection platform, and the application layer was constructed. The data model of cloud inspection, including the role model, resource model, and business model was constructed. Besides, a 4-phrase process model was built by integrating digital inspection technology into the cloud manufacturing environment. Inspection resources including hardware resources, software resources, and knowledge resources were connected to the cloud inspection platform. A four-level model was proposed for the encapsulation of inspection services. Enable toolsets for cloud inspection of complex mechanical parts, including the inspection planning toolset, measurement programming toolset, inspection process monitor toolset, and dataanalysis toolset were encapsulated. A prototype system was developed. A case study was given to verify the effectiveness and feasibility of the proposed framework. The framework for cloud inspection provides a solution for the inspection business of mechanical parts in CMfg.
暂无评论